Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.
Abstract: In this paper, linear multistep technique using power
series as the basis function is used to develop the block methods
which are suitable for generating direct solution of the special second
order ordinary differential equations of the form y′′ = f(x,y), a < = x < = b with associated initial or boundary conditions. The continuaous hybrid formulations enable us to differentiate and evaluate at some
grids and off – grid points to obtain two different three discrete
schemes, each of order (4,4,4)T, which were used in block form for
parallel or sequential solutions of the problems. The computational
burden and computer time wastage involved in the usual reduction of
second order problem into system of first order equations are avoided
by this approach. Furthermore, a stability analysis and efficiency of
the block method are tested on linear and non-linear ordinary
differential equations whose solutions are oscillatory or nearly
periodic in nature, and the results obtained compared favourably with
the exact solution.
Abstract: An effort estimation model is needed for softwareintensive
projects that consist of hardware, embedded software or
some combination of the two, as well as high level software
solutions. This paper first focuses on functional decomposition
techniques to measure functional complexity of a computer system
and investigates its impact on system development effort. Later, it
examines effects of technical difficulty and design team capability
factors in order to construct the best effort estimation model. With
using traditional regression analysis technique, the study develops a
system development effort estimation model which takes functional
complexity, technical difficulty and design team capability factors as
input parameters. Finally, the assumptions of the model are tested.
Abstract: this paper presented a survey analysis subjected on
network bandwidth management from published papers referred in
IEEE Explorer database in three years from 2009 to 2011. Network
Bandwidth Management is discussed in today-s issues for computer
engineering applications and systems. Detailed comparison is
presented between published papers to look further in the IP based
network critical research area for network bandwidth management.
Important information such as the network focus area, a few
modeling in the IP Based Network and filtering or scheduling used in
the network applications layer is presented. Many researches on
bandwidth management have been done in the broad network area
but fewer are done in IP Based network specifically at the
applications network layer. A few researches has contributed new
scheme or enhanced modeling but still the issue of bandwidth
management still arise at the applications network layer. This survey
is taken as a basic research towards implementations of network
bandwidth management technique, new framework model and
scheduling scheme or algorithm in an IP Based network which will
focus in a control bandwidth mechanism in prioritizing the network
traffic the applications layer.
Abstract: A common way to elude the signature-based Network Intrusion Detection System is based upon changing a recognizable attack to an unrecognizable one via the IDS. For example, in order to evade sign accommodation with intrusion detection system markers, a hacker spilt the payload packet into many small pieces or hides them within messages. In this paper we try to model the main fragmentation attack and create a new module in the intrusion detection architecture system which recognizes the main fragmentation attacks through verification of integrity checking of TCP packet in order to prevent elusion of the system and also to announce the necessary alert to the system administrator.
Abstract: This paper investigates the performance of a speech
recognizer in an interactive voice response system for various coded
speech signals, coded by using a vector quantization technique namely
Multi Switched Split Vector Quantization Technique. The process of
recognizing the coded output can be used in Voice banking application.
The recognition technique used for the recognition of the coded speech
signals is the Hidden Markov Model technique. The spectral distortion
performance, computational complexity, and memory requirements of
Multi Switched Split Vector Quantization Technique and the
performance of the speech recognizer at various bit rates have been
computed. From results it is found that the speech recognizer is
showing better performance at 24 bits/frame and it is found that the
percentage of recognition is being varied from 100% to 93.33% for
various bit rates.
Abstract: In this research work, investigations are carried out on
Continuous Wave (CW) Nd:YAG laser welding system after
preliminary experimentation to understand the influencing parameters
associated with laser welding of AISI 304. The experimental
procedure involves a series of laser welding trials on AISI 304
stainless steel sheets with various combinations of process parameters
like beam power, beam incident angle and beam incident angle. An
industrial 2 kW CW Nd:YAG laser system, available at Welding
Research Institute (WRI), BHEL Tiruchirappalli, is used for
conducting the welding trials for this research. After proper tuning of
laser beam, laser welding experiments are conducted on AISI 304
grade sheets to evaluate the influence of various input parameters on
weld bead geometry i.e. bead width (BW) and depth of penetration
(DOP). From the laser welding results, it is noticed that the beam
power and welding speed are the two influencing parameters on
depth and width of the bead. Three dimensional finite element
simulation of high density heat source have been performed for laser
welding technique using finite element code ANSYS for predicting
the temperature profile of laser beam heat source on AISI 304
stainless steel sheets. The temperature dependent material properties
for AISI 304 stainless steel are taken into account in the simulation,
which has a great influence in computing the temperature profiles.
The latent heat of fusion is considered by the thermal enthalpy of
material for calculation of phase transition problem. A Gaussian
distribution of heat flux using a moving heat source with a conical
shape is used for analyzing the temperature profiles. Experimental
and simulated values for weld bead profiles are analyzed for stainless
steel material for different beam power, welding speed and beam
incident angle. The results obtained from the simulation are
compared with those from the experimental data and it is observed
that the results of numerical analysis (FEM) are in good agreement
with experimental results, with an overall percentage of error
estimated to be within ±6%.
Abstract: This paper describes an efficient hardware implementation of a new technique for interfacing the data exchange between the microprocessor-based systems and the external devices. This technique, based on the use of software/hardware system and a reduced physical address, enlarges the interfacing capacity of the microprocessor-based systems, uses the Direct Memory Access (DMA) to increases the frequency of the new bus, and improves the speed of data exchange. While using this architecture in microprocessor-based system or in computer, the input of the hardware part of our system will be connected to the bus system, and the output, which is a new bus, will be connected to an external device. The new bus is composed of a data bus, a control bus and an address bus. A Xilinx Integrated Software Environment (ISE) 7.1i has been used for the programmable logic implementation.
Abstract: In this paper the development of a heat exchanger as a
pilot plant for educational purpose is discussed and the use of neural
network for controlling the process is being presented. The aim of the
study is to highlight the need of a specific Pseudo Random Binary
Sequence (PRBS) to excite a process under control. As the neural
network is a data driven technique, the method for data generation
plays an important role. In light of this a careful experimentation
procedure for data generation was crucial task. Heat exchange is a
complex process, which has a capacity and a time lag as process
elements. The proposed system is a typical pipe-in- pipe type heat
exchanger. The complexity of the system demands careful selection,
proper installation and commissioning. The temperature, flow, and
pressure sensors play a vital role in the control performance. The
final control element used is a pneumatically operated control valve.
While carrying out the experimentation on heat exchanger a welldrafted
procedure is followed giving utmost attention towards safety
of the system. The results obtained are encouraging and revealing
the fact that if the process details are known completely as far as
process parameters are concerned and utilities are well stabilized then
feedback systems are suitable, whereas neural network control
paradigm is useful for the processes with nonlinearity and less
knowledge about process. The implementation of NN control
reinforces the concepts of process control and NN control paradigm.
The result also underlined the importance of excitation signal
typically for that process. Data acquisition, processing, and
presentation in a typical format are the most important parameters
while validating the results.
Abstract: Nowadays, several techniques such as; Fuzzy
Inference System (FIS) and Neural Network (NN) are employed for
developing of the predictive models to estimate parameters of water
quality. The main objective of this study is to compare between the
predictive ability of the Adaptive Neuro-Fuzzy Inference System
(ANFIS) model and Artificial Neural Network (ANN) model to
estimate the Biochemical Oxygen Demand (BOD) on data from 11
sampling sites of Saen Saep canal in Bangkok, Thailand. The data is
obtained from the Department of Drainage and Sewerage, Bangkok
Metropolitan Administration, during 2004-2011. The five parameters
of water quality namely Dissolved Oxygen (DO), Chemical Oxygen
Demand (COD), Ammonia Nitrogen (NH3N), Nitrate Nitrogen
(NO3N), and Total Coliform bacteria (T-coliform) are used as the
input of the models. These water quality indices affect the
biochemical oxygen demand. The experimental results indicate that
the ANN model provides a higher correlation coefficient (R=0.73)
and a lower root mean square error (RMSE=4.53) than the
corresponding ANFIS model.
Abstract: Understanding proteins functions is a major goal in
the post-genomic era. Proteins usually work in context of other
proteins and rarely function alone. Therefore, it is highly relevant to
study the interaction partners of a protein in order to understand its
function. Machine learning techniques have been widely applied to
predict protein-protein interactions. Kernel functions play an
important role for a successful machine learning technique. Choosing
the appropriate kernel function can lead to a better accuracy in a
binary classifier such as the support vector machines. In this paper,
we describe a Bayesian kernel for the support vector machine to
predict protein-protein interactions. The use of Bayesian kernel can
improve the classifier performance by incorporating the probability
characteristic of the available experimental protein-protein
interactions data that were compiled from different sources. In
addition, the probabilistic output from the Bayesian kernel can assist
biologists to conduct more research on the highly predicted
interactions. The results show that the accuracy of the classifier has
been improved using the Bayesian kernel compared to the standard
SVM kernels. These results imply that protein-protein interaction can
be predicted using Bayesian kernel with better accuracy compared to
the standard SVM kernels.
Abstract: Wheeled Mobile Robots (WMRs) are built with their
Wheels- drive machine, Motors. Depend on their desire design of
WMR, Technicians made used of DC Motors for motion control. In
this paper, the author would like to analyze how to choose DC motor
to be balance with their applications of especially for WMR.
Specification of DC Motor that can be used with desire WMR is to
be determined by using MATLAB Simulink model. Therefore, this
paper is mainly focus on software application of MATLAB and
Control Technology. As the driving system of DC motor, a
Peripheral Interface Controller (PIC) based control system is
designed including the assembly software technology and H-bridge
control circuit. This Driving system is used to drive two DC gear
motors which are used to control the motion of WMR. In this
analyzing process, the author mainly focus the drive system on
driving two DC gear motors that will control with Differential Drive
technique to the Wheeled Mobile Robot . For the design analysis of
Motor Driving System, PIC16F84A is used and five inputs of sensors
detected data are tested with five ON/OFF switches. The outputs of
PIC are the commands to drive two DC gear motors, inputs of Hbridge
circuit .In this paper, Control techniques of PIC
microcontroller and H-bridge circuit, Mechanism assignments of
WMR are combined and analyzed by mainly focusing with the
“Modeling and Simulink of DC Motor using MATLAB".
Abstract: Years of extensive research in the field of speech
processing for compression and recognition in the last five decades,
resulted in a severe competition among the various methods and
paradigms introduced. In this paper we include the different representations
of speech in the time-frequency and time-scale domains
for the purpose of compression and recognition. The examination of
these representations in a variety of related work is accomplished.
In particular, we emphasize methods related to Fourier analysis
paradigms and wavelet based ones along with the advantages and
disadvantages of both approaches.
Abstract: Current systems for face recognition techniques often
use either SVM or Adaboost techniques for face detection part and use
PCA for face recognition part. In this paper, we offer a novel method
for not only a powerful face detection system based on
Six-segment-filters (SSR) and Adaboost learning algorithms but also
for a face recognition system. A new exclusive face detection
algorithm has been developed and connected with the recognition
algorithm. As a result of it, we obtained an overall high-system
performance compared with current systems. The proposed algorithm
was tested on CMU, FERET, UNIBE, MIT face databases and
significant performance has obtained.
Abstract: In this paper, a method for deriving a group priority vector in the Fuzzy Analytic Network Process (FANP) is proposed. By introducing importance weights of multiple decision makers (DMs) based on their experiences, the Fuzzy Preferences Programming Method (FPP) is extended to a fuzzy group prioritization problem in the FANP. Additionally, fuzzy pair-wise comparison judgments are presented rather than exact numerical assessments in order to model the uncertainty and imprecision in the DMs- judgments and then transform the fuzzy group prioritization problem into a fuzzy non-linear programming optimization problem which maximize the group satisfaction. Unlike the known fuzzy prioritization techniques, the new method proposed in this paper can easily derive crisp weights from incomplete and inconsistency fuzzy set of comparison judgments and does not require additional aggregation producers. Detailed numerical examples are used to illustrate the implement of our approach and compare with the latest fuzzy prioritization method.
Abstract: The application of a Static Synchronous Series Compensator (SSSC) controller to improve the transient stability performance of a power system is thoroughly investigated in this paper. The design problem of SSSC controller is formulated as an optimization problem and Particle Swarm Optimization (PSO) Technique is employed to search for optimal controller parameters. By minimizing the time-domain based objective function, in which the deviation in the oscillatory rotor angle of the generator is involved; transient stability performance of the system is improved. The proposed controller is tested on a weakly connected power system subjected to different severe disturbances. The non-linear simulation results are presented to show the effectiveness of the proposed controller and its ability to provide efficient damping of low frequency oscillations. It is also observed that the proposed SSSC controller improves greatly the voltage profile of the system under severe disturbances.
Abstract: Machine-understandable data when strongly
interlinked constitutes the basis for the SemanticWeb. Annotating
web documents is one of the major techniques for creating metadata
on the Web. Annotating websitexs defines the containing data in a
form which is suitable for interpretation by machines. In this paper,
we present a better and improved approach than previous [1] to
annotate the texts of the websites depends on the knowledge base.
Abstract: Variable speed drives are growing and varying. Drives expanse depend on progress in different part of science like power system, microelectronic, control methods, and so on. Artificial intelligent contains hard computation and soft computation. Artificial intelligent has found high application in most nonlinear systems same as motors drive. Because it has intelligence like human but there are no sentimental against human like angriness and.... Artificial intelligent is used for various points like approximation, control, and monitoring. Because artificial intelligent techniques can use as controller for any system without requirement to system mathematical model, it has been used in electrical drive control. With this manner, efficiency and reliability of drives increase and volume, weight and cost of them decrease.
Abstract: The original idea for a feature film may come from a
writer, director or a producer. Director is the person responsible for
the creative aspects, both interpretive and technical, of a motion
picture production in a film. Director may be shot discussing his
project with his or her cowriters, members of production staff, and
producer, and director may be shown selecting locales or
constructing sets. All these activities provide, of course, ways of
externalizing director-s ideas about the film. A director sometimes
pushes both the film image and techniques of narration to new artistic
limits, but main responsibility of director is take the spectator to an
original opinion in his philosophical approach. Director tries to find
an artistic angle in every scene and change screenplay into an
effective story and sets his film on a spiritual and philosophical base.
Abstract: Brain ArterioVenous Malformation (BAVM) is an abnormal tangle of brain blood vessels where arteries shunt directly into veins with no intervening capillary bed which causes high pressure and hemorrhage risk. The success of treatment by embolization in interventional neuroradiology is highly dependent on the accuracy of the vessels visualization. In this paper the performance of clustering techniques on vessel segmentation from 3- D rotational angiography (3DRA) images is investigated and a new technique of segmentation is proposed. This method consists in: preprocessing step of image enhancement, then K-Means (KM), Fuzzy C-Means (FCM) and Expectation Maximization (EM) clustering are used to separate vessel pixels from background and artery pixels from vein pixels when possible. A post processing step of removing false-alarm components is applied before constructing a three-dimensional volume of the vessels. The proposed method was tested on six datasets along with a medical assessment of an expert. Obtained results showed encouraging segmentations.