Abstract: This paper describes a paradigmatic approach to develop architecture of secure systems by describing the requirements from four different points of view: that of the owner, the administrator, the user, and the network. Deriving requirements and developing architecture implies the joint elicitation and describing the problem and the structure of the solution. The view points proposed in this paper are those we consider as requirements towards their contributions as major parties in the design, implementation, usage and maintenance of secure systems. The dramatic growth of the technology of Internet and the applications deployed in World Wide Web have lead to the situation where the security has become a very important concern in the development of secure systems. Many security approaches are currently being used in organizations. In spite of the widespread use of many different security solutions, the security remains a problem. It is argued that the approach that is described in this paper for the development of secure architecture is practical by all means. The models representing these multiple points of view are termed the requirements model (views of owner and administrator) and the operations model (views of user and network). In this paper, this multiple view paradigm is explained by first describing the specific requirements and or characteristics of secure systems (particularly in the domain of networks) and the secure architecture / system development methodology.
Abstract: This paper describes an expanded system for a servo
system design by using the Loop Shaping Design Procedure (LSDP).
LSDP is one of the H∞ design procedure. By conducting Loop
Shaping with a compensator and robust stabilization to satisfy the
index function, we get the feedback controller that makes the control
system stable. In this paper, we propose an expanded system for a
servo system design and apply to the DC motor. The proposed method
performs well in the DC motor positioning control. It has no
steady-state error in the disturbance response and it has robust
stability.
Abstract: Threedimensional numerical simulations are conducted on a full scale CANDU Moderator and Transient variations of the temperature and velocity distributions inside the tank are determined. The results show that the flow and temperature distributions inside the moderator tank are three dimensional and no symmetry plane can be identified.Competition between the upward moving buoyancy driven flows and the downward moving momentum driven flows, results in the formation of circulation zones. The moderator tank operates in the buoyancy driven mode and any small disturbances in the flow or temperature makes the system unstable and asymmetric. Different types of temperature fluctuations are noted inside the tank: (i) large amplitude are at the boundaries between the hot and cold (ii) low amplitude are in the core of the tank (iii) high frequency fluctuations are in the regions with high velocities and (iv) low frequency fluctuations are in the regions with lower velocities.
Abstract: This paper seeks to give a general idea of the universe of project portfolio management, from its multidisciplinary nature, to the many challenges it raises, passing through the different techniques, models and tools used to solve the multiple problems known. It is intended to contribute to the clarification, with great depth, of the impacts and relationships involved in managing the projects- portfolio. It aims at proposing a technique for the project alignment with the organisational strategy, in order to select projects that later on will be considered in the analysis and selection of the portfolio. We consider the development of a methodology for assessing the project alignment index very relevant in the global market scenario. It can help organisations to gain a greater awareness of market dynamics, speed up the decision process and increase its consistency, thus enabling the strategic alignment and the improvement of the organisational performance.
Abstract: The noticeable advance in the area of computer technology has paved the way for the invention of powerful mobile devices. However, limited storage, short battery life, and relatively low computational power define the major problems of such devices. Due to the ever increasing computational requirements, such devices may fail to process needed tasks under certain constraints. One of the proposed solutions to this drawback is the introduction of Collaborative Computing, a new concept dealing with the distribution of computational tasks amongst several handhelds. This paper introduces the basics of Collaborative Computing, and proposes a new protocol that aims at managing and optimizing computing tasks in Ad-Hoc Collaborative Computing Environments.
Abstract: Recently, Denial of Service(DoS) attacks and Distributed DoS(DDoS) attacks which are stronger form of DoS attacks from plural hosts have become security threats on the Internet. It is important to identify the attack source and to block attack traffic as one of the measures against these attacks. In general, it is difficult to identify them because information about the attack source is falsified. Therefore a method of identifying the attack source by tracing the route of the attack traffic is necessary. A traceback method which uses traffic patterns, using changes in the number of packets over time as criteria for the attack traceback has been proposed. The traceback method using the traffic patterns can trace the attack by matching the shapes of input traffic patterns and the shape of output traffic pattern observed at a network branch point such as a router. The traffic pattern is a shapes of traffic and unfalsifiable information. The proposed trace methods proposed till date cannot obtain enough tracing accuracy, because they directly use traffic patterns which are influenced by non-attack traffics. In this paper, a new traffic pattern matching method using Independent Component Analysis(ICA) is proposed.
Abstract: The usefulness of weaning foods to meet the nutrient
needs of children is well recognized, and most of them are precooked
roller dried mixtures of cereal and/or legume flours which posses a
high viscosity and bulk when reconstituted. The objective of this study
was to formulate composite weaning foods using cereals, malted
legumes and vegetable powders and analyze them for nutrients,
functional properties and sensory attributes. Selected legumes (green
gram and lentil) were germinated, dried and dehulled. Roasted wheat,
rice, carrot powder and skim milk powder also were used. All the
ingredients were mixed in different proportions to get four
formulations, made into 30% slurry and dried in roller drier. The
products were analyzed for proximate principles, mineral content,
functional and sensory qualities. The results of analysis showed
following range of constituents per 100g of formulations on dry
weight basis, protein, 18.1-18.9 g ; fat, 0.78-1.36 g ; iron, 5.09-6.53
mg; calcium, 265-310 mg. The lowest water absorption capacity was
in case of wheat green gram based and the highest was in rice lentil
based sample. Overall sensory qualities of all foods were graded as
“good" and “very good" with no significant differences. The results
confirm that formulated weaning foods were nutritionally superior,
functionally appropriate and organoleptically acceptable.
Abstract: In this paper, the babbitting of a bearing in boiler feed pump of an electromotor has been studied. These bearings have an important role in reducing the shut down times in the pumps, compressors and turbines. The most conventional method in babbitting is casting as a melting method. The comparison between thermal spray and casting methods in babbitting shows that the thermal spraying babbitt layer has better performance and tribological behavior. The metallurgical and tribological analysis such as SEM, EDS and wet chemical analysis has been made in the Babbitt alloys and worn surfaces. Two type of babbitt materials: tinbase and lead-base babbitt was used. The benefits of thermally sprayed babbitt layers are completely clear especially in large bearings.
Abstract: It-s known that incorporating prior knowledge into support
vector regression (SVR) can help to improve the approximation
performance. Most of researches are concerned with the incorporation
of knowledge in form of numerical relationships. Little work,
however, has been done to incorporate the prior knowledge on the
structural relationships among the variables (referred as to Structural
Prior Knowledge, SPK). This paper explores the incorporation of SPK
in SVR by constructing appropriate admissible support vector kernel
(SV kernel) based on the properties of reproducing kernel (R.K).
Three-levels specifications of SPK are studies with the corresponding
sub-levels of prior knowledge that can be considered for the method.
These include Hierarchical SPK (HSPK), Interactional SPK (ISPK)
consisting of independence, global and local interaction, Functional
SPK (FSPK) composed of exterior-FSPK and interior-FSPK. A
convenient tool for describing the SPK, namely Description Matrix
of SPK is introduced. Subsequently, a new SVR, namely Motivated
Support Vector Regression (MSVR) whose structure is motivated
in part by SPK, is proposed. Synthetic examples show that it is
possible to incorporate a wide variety of SPK and helpful to improve
the approximation performance in complex cases. The benefits of
MSVR are finally shown on a real-life military application, Air-toground
battle simulation, which shows great potential for MSVR to
the complex military applications.
Abstract: A lightpipe is an about 99 percent specular reflective
mirror pipe or duct that is used for the transmission of the daylight
from the outside into a building. The lightpipes are usually used in
the daylighting buildings, in the residential, industrial and
commercial sectors. This paper is about the performances of a
lightpipe installed in a laboratory (3 m x 2.6 m x 3 m) without
windows. The aim is to analyse the luminous intensity distribution
for several sky/sun conditions. The lightpipe was monitored during
the year 2006. The lightpipe is 1 m long and the diameter of the top
collector and of the internal diffuser device is 0.25 m. In the
laboratory there are seven illuminance sensors: one external is
located on the roof of the laboratory and six internal sensors are
connected to a data acquisition system. The internal sensors are
positioned under the internal diffusive device at an height of 0.85 m
from the floor to simulate a working plane. The numerical data are
obtained through a simulation software. This paper shows the
comparison between the experimental and numerical results
concerning the behavior of the lightpipe.
Abstract: An Advance Driver Assistance System (ADAS) is a computer system on board a vehicle which is used to reduce the risk of vehicular accidents by monitoring factors relating to the driver, vehicle and environment and taking some action when a risk is identified. Much work has been done on assessing vehicle and environmental state but there is still comparatively little published work that tackles the problem of driver state. Visual attention is one such driver state. In fact, some researchers claim that lack of attention is the main cause of accidents as factors such as fatigue, alcohol or drug use, distraction and speeding all impair the driver-s capacity to pay attention to the vehicle and road conditions [1]. This seems to imply that the main cause of accidents is inappropriate driver behaviour in cases where the driver is not giving full attention while driving. The work presented in this paper proposes an ADAS system which uses an image based template matching algorithm to detect if a driver is failing to observe particular windscreen cells. This is achieved by dividing the windscreen into 24 uniform cells (4 rows of 6 columns) and matching video images of the driver-s left eye with eye-gesture templates drawn from images of the driver looking at the centre of each windscreen cell. The main contribution of this paper is to assess the accuracy of this approach using Receiver Operating Characteristic analysis. The results of our evaluation give a sensitivity value of 84.3% and a specificity value of 85.0% for the eye-gesture template approach indicating that it may be useful for driver point of regard determinations.
Abstract: The gel-supported precipitation (GSP) process can be
used to make spherical particles (spherules) of nuclear fuel,
particularly for very high temperature reactors (VHTR) and even for
implementing the process called SPHEREPAC. In these different
cases, the main characteristics are the sphericity of the particles to be
manufactured and the control over their grain size. Nonetheless,
depending on the specifications defined for these spherical particles,
the GSP process has intrinsic limits, particularly when fabricating
very small particles. This paper describes the use of secondary
fragmentation (water, water/PVA and uranyl nitrate) on solid
surfaces under varying temperature and vibration conditions to assess
the relevance of using this new technique to manufacture very small
spherical particles by means of a modified GSP process. The
fragmentation mechanisms are monitored and analysed, before the
trends for its subsequent optimised application are described.
Abstract: In contrast to conventional generators, self-excited induction generators are found to be most suitable machines for wind energy conversion in remote and windy areas due to many advantages over grid connected machines. This papers presents a Self-Excited Induction Generator (SEIG) driven by wind turbine and supplying an induction motor which is coupled to a centrifugal pump. A method to describe the steady state performance based on nodal analysis is presented. Therefore the advanced knowledge of the minimum excitation capacitor value is required. The effects of variation of excitation capacitance on system and rotor speed under different loading conditions have been analyzed and considered to optimize induction motor pump performances.
Abstract: In this paper, the effect of transmission codes on the
performance of coherent square M-ary quadrature amplitude
modulation (CSMQAM) under hybrid selection/maximal-ratio
combining (H-S/MRC) diversity is analysed. The fading channels are
modeled as frequency non-selective slow independent and identically
distributed Rayleigh fading channels corrupted by additive white
Gaussian noise (AWGN). The results for coded MQAM are
computed numerically for the case of (24,12) extended Golay code
and compared with uncoded MQAM under H-S/MRC diversity by
plotting error probabilities versus average signal to noise ratio (SNR)
for various values L and N in order to examine the improvement in
the performance of the digital communications system as the number
of selected diversity branches is increased. The results for no
diversity, conventional SC and Lth order MRC schemes are also
plotted for comparison. Closed form analytical results derived in this
paper are sufficiently simple and therefore can be computed
numerically without any approximations. The analytical results
presented in this paper are expected to provide useful information
needed for design and analysis of digital communication systems
over wireless fading channels.
Abstract: In the past 20 years the economy of the Czech
Republic has experienced substantial changes. In the 1990s the
development was affected by the transformation which sought to
establish the right conditions for privatization and creation of
elementary market relations. In the last decade the characteristic
elements such as private ownership and corresponding institutional
framework have been strengthened. This development was marked by
the accession of the Czech Republic to the EU. The Czech Republic
is striving to reduce the difference between its level of economic
development and the quality of institutional framework in
comparison with other developed countries. The process of finding
the adequate solutions has been hampered by the negative impact of
the world financial crisis on the Czech Republic and the standard of
living of its inhabitants. This contribution seeks to address the
question of whether and to which extent the economic development
of the transitive Czech economy is affected by the change in
behaviour of households and their tendency to consumption, i.e. in
the sense of reduction or increase in demand for goods and services.
It aims to verify whether the increasing trend of household
indebtedness and decreasing trend of saving pose a significant risk in
the Czech Republic. At a general level the analysis aims to contribute
to finding an answer to the question of whether the debt increase of
Czech households is connected to the risk of "eating through" the
borrowed money and whether Czech households risk falling into a
debt trap. In addition to household indebtedness risks in the Czech
Republic the analysis will focus on identification of specifics of the
transformation phase of the Czech economy in comparison with the
EU countries, or selected OECD countries.
Abstract: The number of the companies accepting RFID in Korea
has been increased continuously due to the domestic development of
information technology. The acceptance of RFID by companies in
Korea enabled them to do business with many global enterprises in a
much more efficient and effective way. According to a survey[33,
p76], many companies in Korea have used RFID for inventory or
distribution manages. But, the use of RFID in the companies in Korea
is in the early stages and its potential value hasn-t fully been realized
yet. At this time, it would be very important to investigate the factors
that affect RFID acceptance. For this study, many previous studies
were referenced and some RFID experts were interviewed. Through
the pilot test, four factors were selected - Security Trust, Employee
Knowledge, Partner Influence, Service Provider Trust - affecting
RFID acceptance and an extended technology acceptance
model(e-TAM) was presented with those factors. The proposed model
was empirically tested using data collected from employees in
companies or public enterprises. In order to analyze some
relationships between exogenous variables and four variables in TAM,
structural equation modeling(SEM) was developed and SPSS12.0 and
AMOS 7.0 were used for analyses. The results are summarized as
follows: 1) security trust perceived by employees positively
influences on perceived usefulness and perceived ease of use; 2)
employee-s knowledge on RFID positively influences on only
perceived ease of use; 3) a partner-s influence for RFID acceptance
positively influences on only perceived usefulness; 4) service provider
trust very positively influences on perceived usefulness and perceived
ease of use 5) the relationships between TAM variables are the same as
the previous studies.
Abstract: In this contribution, a way to enhance the performance of the classic Genetic Algorithm is proposed. The idea of restarting a Genetic Algorithm is applied in order to obtain better knowledge of the solution space of the problem. A new operator of 'insertion' is introduced so as to exploit (utilize) the information that has already been collected before the restarting procedure. Finally, numerical experiments comparing the performance of the classic Genetic Algorithm and the Genetic Algorithm with restartings, for some well known test functions, are given.
Abstract: In this article the influence of higher frequency effects
in addition to a special damper design on the electrical behavior of a
synchronous generator main exciter machine is investigated. On the
one hand these machines are often highly stressed by harmonics from
the bridge rectifier thus facing additional eddy current losses. On the
other hand the switching may cause the excitation of dangerous
voltage peaks in resonant circuits formed by the diodes of the
rectifier and the commutation reactance of the machine. Therefore
modern rotating exciters are treated like synchronous generators
usually modeled with a second order equivalent circuit. Hence the
well known Standstill Frequency Response Test (SSFR) method is
applied to a test machine in order to determine parameters for the
simulation. With these results it is clearly shown that higher
frequencies have a strong impact on the conventional equivalent
circuit model. Because of increasing field displacement effects in the
stranded armature winding the sub-transient reactance is even smaller
than the armature leakage at high frequencies. As a matter of fact this
prevents the algorithm to find an equivalent scheme. This issue is
finally solved using Laplace transfer functions fully describing the
transient behavior at the model ports.
Abstract: Cosmic showers, from their places of origin in space,
after entering earth generate secondary particles called Extensive Air
Shower (EAS). Detection and analysis of EAS and similar High
Energy Particle Showers involve a plethora of experimental setups
with certain constraints for which soft-computational tools like
Artificial Neural Network (ANN)s can be adopted. The optimality
of ANN classifiers can be enhanced further by the use of Multiple
Classifier System (MCS) and certain data - dimension reduction
techniques. This work describes the performance of certain data
dimension reduction techniques like Principal Component Analysis
(PCA), Independent Component Analysis (ICA) and Self Organizing
Map (SOM) approximators for application with an MCS formed
using Multi Layer Perceptron (MLP), Recurrent Neural Network
(RNN) and Probabilistic Neural Network (PNN). The data inputs are
obtained from an array of detectors placed in a circular arrangement
resembling a practical detector grid which have a higher dimension
and greater correlation among themselves. The PCA, ICA and SOM
blocks reduce the correlation and generate a form suitable for real
time practical applications for prediction of primary energy and
location of EAS from density values captured using detectors in a
circular grid.
Abstract: Discrimination between different classes of environmental
sounds is the goal of our work. The use of a sound recognition
system can offer concrete potentialities for surveillance and
security applications. The first paper contribution to this research
field is represented by a thorough investigation of the applicability
of state-of-the-art audio features in the domain of environmental
sound recognition. Additionally, a set of novel features obtained by
combining the basic parameters is introduced. The quality of the
features investigated is evaluated by a HMM-based classifier to which
a great interest was done. In fact, we propose to use a Multi-Style
training system based on HMMs: one recognizer is trained on a
database including different levels of background noises and is used
as a universal recognizer for every environment. In order to enhance
the system robustness by reducing the environmental variability, we
explore different adaptation algorithms including Maximum Likelihood
Linear Regression (MLLR), Maximum A Posteriori (MAP)
and the MAP/MLLR algorithm that combines MAP and MLLR.
Experimental evaluation shows that a rather good recognition rate
can be reached, even under important noise degradation conditions
when the system is fed by the convenient set of features.