Abstract: In this paper, a framework is presented trying to make
the most secure web system out of the available generic and web
security technology which can be used as a guideline for
organizations building their web sites. The framework is designed to
provide necessary security services, to address the known security
threats, and to provide some cover to other security problems
especially unknown threats. The requirements for the design are
discussed which guided us to the design of secure web system. The
designed security framework is then simulated and various quality of
service (QoS) metrics are calculated to measure the performance of
this system.
Abstract: Reverse Engineering is a very important process in
Software Engineering. It can be performed backwards from system
development life cycle (SDLC) in order to get back the source data
or representations of a system through analysis of its structure,
function and operation. We use reverse engineering to introduce an
automatic tool to generate system requirements from its program
source codes. The tool is able to accept the Cµ programming source
codes, scan the source codes line by line and parse the codes to
parser. Then, the engine of the tool will be able to generate system
requirements for that specific program to facilitate reuse and
enhancement of the program. The purpose of producing the tool is to
help recovering the system requirements of any system when the
system requirements document (SRD) does not exist due to
undocumented support of the system.
Abstract: Wind catchers are traditional natural ventilation
systems attached to buildings in order to ventilate the indoor air. The
most common type of wind catcher is four sided one which is
capable to catch wind in all directions. CFD simulation is the perfect
way to evaluate the wind catcher performance. The accuracy of CFD
results is the issue of concern, so sensitivity analyses is crucial to
find out the effect of different settings of CFD on results. This paper
presents a series of 3D steady RANS simulations for a generic
isolated four-sided wind catcher attached to a room subjected to wind
direction ranging from 0º to 180º with an interval of 45º. The CFD
simulations are validated with detailed wind tunnel experiments. The
influence of an extensive range of computational parameters is
explored in this paper, including the resolution of the computational
grid, the size of the computational domain and the turbulence model.
This study found that CFD simulation is a reliable method for wind
catcher study, but it is less accurate in prediction of models with non
perpendicular wind directions.
Abstract: Turbulent heat transfer to fluid flow through channel with triangular ribs of different angles are presented in this paper. Ansys 14 ICEM and Ansys 14 Fluent are used for meshing process and solving Navier stokes equations respectively. In this investigation three angles of triangular ribs with the range of Reynolds number varied from 20000 to 60000 at constant surface temperature are considered. The results show that the Nusselt number increases with the increase of Reynolds number for all cases at constant surface temperature. According to the profile of local Nusselt number on ribs walled of channel, the peak is at the midpoint between the two ribs. The maximum value of average Nusselt number is obtained for triangular ribs of angel 60°and at Reynolds number of 60000 compared to the Nusselt number for the ribs of angel 90° and 45° and at same Reynolds number. The recirculation regions generated by the ribs corresponding to the velocity streamline show the largest recirculation region at triangular ribs of angle 60° which also provides the highest enhancement of heat transfer.
Abstract: In this paper, a two-dimensional mathematical model is developed for estimating the extent of inland inundation due to Indonesian tsunami of 2004 along the coastal belts of Peninsular Malaysia and Thailand. The model consists of the shallow water equations together with open and coastal boundary conditions. In order to route the water wave towards the land, the coastal boundary is treated as a time dependent moving boundary. For computation of tsunami inundation, the initial tsunami wave is generated in the deep ocean with the strength of the Indonesian tsunami of 2004. Several numerical experiments are carried out by changing the slope of the beach to examine the extent of inundation with slope. The simulated inundation is found to decrease with the increase of the slope of the orography. Correlation between inundation / recession and run-up are found to be directly proportional to each other.
Abstract: Streamribbon is used to visualize the rotation of the
fluid flow. The rotation of flow is useful in fluid mechanics,
engineering and geophysics. This paper introduces the construction
technique of streamribbon using the streamline which is generated
based on the law of mass conservation. The accuracy of constructed
streamribbons is shown through two examples.
Abstract: Many attempts have been made to strengthen Feistel based block ciphers. Among the successful proposals is the key- dependent S-box which was implemented in some of the high-profile ciphers. In this paper a key-dependent permutation box is proposed and implemented on DES as a case study. The new modified DES, MDES, was tested against Diehard Tests, avalanche test, and performance test. The results showed that in general MDES is more resistible to attacks than DES with negligible overhead. Therefore, it is believed that the proposed key-dependent permutation should be considered as a valuable primitive that can help strengthen the security of Substitution-Permutation Network which is a core design in many Feistel based block ciphers.
Abstract: Let T and S be a subspace of Cn and Cm, respectively.
Then for A ∈ Cm×n satisfied AT ⊕ S = Cm, the generalized
inverse A(2)
T,S is given by A(2)
T,S = (PS⊥APT )†. In this paper, a
finite formulae is presented to compute generalized inverse A(2)
T,S
under the concept of restricted inner product, which defined as <
A,B >T,S=< PS⊥APT,B > for the A,B ∈ Cm×n. By this
iterative method, when taken the initial matrix X0 = PTA∗PS⊥, the
generalized inverse A(2)
T,S can be obtained within at most mn iteration
steps in absence of roundoff errors. Finally given numerical example
is shown that the iterative formulae is quite efficient.
Abstract: The small interfering RNA (siRNA) alters the
regulatory role of mRNA during gene expression by translational
inhibition. Recent studies show that upregulation of mRNA because
serious diseases like cancer. So designing effective siRNA with good
knockdown effects plays an important role in gene silencing. Various
siRNA design tools had been developed earlier. In this work, we are
trying to analyze the existing good scoring second generation siRNA
predicting tools and to optimize the efficiency of siRNA prediction
by designing a computational model using Artificial Neural Network
and whole stacking energy (%G), which may help in gene silencing
and drug design in cancer therapy. Our model is trained and tested
against a large data set of siRNA sequences. Validation of our results
is done by finding correlation coefficient of experimental versus
observed inhibition efficacy of siRNA. We achieved a correlation
coefficient of 0.727 in our previous computational model and we
could improve the correlation coefficient up to 0.753 when the
threshold of whole tacking energy is greater than or equal to -32.5
kcal/mol.
Abstract: Location-aware computing is a type of pervasive
computing that utilizes user-s location as a dominant factor for
providing urban services and application-related usages. One of the
important urban services is navigation instruction for wayfinders in a
city especially when the user is a tourist. The services which are
presented to the tourists should provide adapted location aware
instructions. In order to achieve this goal, the main challenge is to
find spatial relevant objects and location-dependent information. The
aim of this paper is the development of a reusable location-aware
model to handle spatial relevancy parameters in urban location-aware
systems. In this way we utilized ontology as an approach which could
manage spatial relevancy by defining a generic model. Our
contribution is the introduction of an ontological model based on the
directed interval algebra principles. Indeed, it is assumed that the
basic elements of our ontology are the spatial intervals for the user
and his/her related contexts. The relationships between them would
model the spatial relevancy parameters. The implementation language
for the model is OWLs, a web ontology language. The achieved
results show that our proposed location-aware model and the
application adaptation strategies provide appropriate services for the
user.
Abstract: In this paper, Land Marks for Unique Addressing( LMUA) algorithm is develped to generate unique ID for each and every node which leads to the formation of overlapping/Non overlapping clusters based on unique ID. To overcome the draw back of the developed LMUA algorithm, the concept of clustering is introduced. Based on the clustering concept a Land Marks for Unique Addressing and Clustering(LMUAC) Algorithm is developed to construct strictly non-overlapping clusters and classify those nodes in to Cluster Heads, Member Nodes, Gate way nodes and generating the Hierarchical code for the cluster heads to operate in the level one hierarchy for wireless communication switching. The expansion of the existing network can be performed or not without modifying the cost of adding the clusterhead is shown. The developed algorithm shows one way of efficiently constructing the
Abstract: In this paper, the optimum weight and cost of a laminated composite plate is seeked, while it undergoes the heaviest load prior to a complete failure. Various failure criteria are defined for such structures in the literature. In this work, the Tsai-Hill theory is used as the failure criterion. The theory of analysis was based on the Classical Lamination Theory (CLT). A newly type of Genetic Algorithm (GA) as an optimization technique with a direct use of real variables was employed. Yet, since the optimization via GAs is a long process, and the major time is consumed through the analysis, Radial Basis Function Neural Networks (RBFNN) was employed in predicting the output from the analysis. Thus, the process of optimization will be carried out through a hybrid neuro-GA environment, and the procedure will be carried out until a predicted optimum solution is achieved.
Abstract: The study is about the designed and decorative fabric printing that derived from the Five-color porcelain (Benjarong). The
researcher examined the pattern and creativity of the decorative design
of the Five-color porcelain (Benjarong) by the artists in order to apply
for contemporary arts so that young generation will acknowledge the
importance of the Five-color porcelain (Benjarong). The research methodology is both quantitative and qualitative. The researcher
conducted an in-depth interview with the operator of five-color
porcelain (Benjarong) at Ampawa, Samutsongkram. The information
from the interview can be useful and implemented for designing the
fabric patterns. The researcher found that there were many formats
and designs of the Five-color porcelain (Benjarong) from the past to the present. Its unique design can be applied for the fabric patterns
and ready-to-wear clothes properly. After advertising and showing
the work of the Five-color porcelain (Benjarong) publicly, there were
more young people interested in the Five-color porcelain (Benjarong)
than expected which exceeded the objective with positive attitudes
towards the Five-color porcelain (Benjarong).
Abstract: In this paper, we propose the robust water level detection method based on the accumulated histogram under small changed image which is acquired from water level surveillance camera. In general surveillance system, this is detecting and recognizing invasion from searching area which is in big change on the sequential images. However, in case of a water level detection system, these general surveillance techniques are not suitable due to small change on the water surface. Therefore the algorithm introduces the accumulated histogram which is emphasizing change of water surface in sequential images. Accumulated histogram is based on the current image frame. The histogram is cumulating differences between previous images and current image. But, these differences are also appeared in the land region. The band pass filter is able to remove noises in the accumulated histogram Finally, this algorithm clearly separates water and land regions. After these works, the algorithm converts from the water level value on the image space to the real water level on the real space using calibration table. The detected water level is sent to the host computer with current image. To evaluate the proposed algorithm, we use test images from various situations.
Abstract: In this paper we propose segmentation approach based
on Vector Quantization technique. Here we have used Kekre-s fast
codebook generation algorithm for segmenting low-altitude aerial
image. This is used as a preprocessing step to form segmented
homogeneous regions. Further to merge adjacent regions color
similarity and volume difference criteria is used. Experiments
performed with real aerial images of varied nature demonstrate that
this approach does not result in over segmentation or under
segmentation. The vector quantization seems to give far better results
as compared to conventional on-the-fly watershed algorithm.
Abstract: In this paper we present simulation results for the
application of a bandwidth efficient algorithm (mapping algorithm)
to an image transmission system. This system considers three
different real valued transforms to generate energy compact
coefficients. First results are presented for gray scale and color image
transmission in the absence of noise. It is seen that the system
performs its best when discrete cosine transform is used. Also the
performance of the system is dominated more by the size of the
transform block rather than the number of coefficients transmitted or
the number of bits used to represent each coefficient. Similar results
are obtained in the presence of additive white Gaussian noise. The
varying values of the bit error rate have very little or no impact on
the performance of the algorithm. Optimum results are obtained for
the system considering 8x8 transform block and by transmitting 15
coefficients from each block using 8 bits.
Abstract: Fractional Fourier Transform is a powerful tool,
which is a generalization of the classical Fourier Transform. This
paper provides a mathematical relation relating the span in Fractional
Fourier domain with the amplitude and phase functions of the signal,
which is further used to study the variation of quality factor with
different values of the transform order. It is seen that with the
increase in the number of transients in the signal, the deviation of
average Fractional Fourier span from the frequency bandwidth
increases. Also, with the increase in the transient nature of the signal,
the optimum value of transform order can be estimated based on the
quality factor variation, and this value is found to be very close to
that for which one can obtain the most compact representation. With
the entire mathematical analysis and experimentation, we consolidate
the fact that Fractional Fourier Transform gives more optimal
representations for a number of transform orders than Fourier
transform.
Abstract: Sensitive and predictive DILI (Drug Induced Liver
Injury) biomarkers are needed in drug R&D to improve early
detection of hepatotoxicity. The discovery of DILI biomarkers that
demonstrate the predictive power to identify individuals at risk to
DILI would represent a major advance in the development of
personalized healthcare approaches. In this healthy volunteer
acetaminophen study (4g/day for 7 days, with 3 monitored nontreatment
days before and 4 after), 450 serum samples from 32
subjects were analyzed using protein profiling by antibody
suspension bead arrays. Multiparallel protein profiles were generated
using a DILI target protein array with 300 antibodies, where the
antibodies were selected based on previous literature findings of
putative DILI biomarkers and a screening process using pre dose
samples from the same cohort. Of the 32 subjects, 16 were found to
develop an elevated ALT value (2Xbaseline, responders). Using the
plasma profiling approach together with multivariate statistical
analysis some novel findings linked to lipid metabolism were found
and more important, endogenous protein profiles in baseline samples
(prior to treatment) with predictive power for ALT elevations were
identified.
Abstract: Hardness of the widely used structural steel is of vital
importance since it may help in the determination of many
mechanical properties of a material under loading situations. In order
to obtain reliable information for design, properties homogeneity
should be validated. In the current study the hardness variation over
the different diameters of the same AISI 4140 bar is investigated.
Measurements were taken on the two faces of the stock at equally
spaced eight sectors and fifteen layers. Statistical and graphical
analysis are performed to asses the distribution of hardness
measurements over the specified area. Hardness measurements
showed some degree of dispersion with about ± 10% of its nominal
value provided by manufacturer. Hardness value is found to have a
slight decrease trend as the diameter is reduced. However, an
opposite behavior is noticed regarding the sequence of the sector
indicating a nonuniform distribution over the same area either on the
same face or considering the corresponding sector on the other face
(cross section) of the same material bar.
Abstract: Biclustering aims at identifying several biclusters that
reveal potential local patterns from a microarray matrix. A bicluster is
a sub-matrix of the microarray consisting of only a subset of genes
co-regulates in a subset of conditions. In this study, we extend the
motif of subspace clustering to present a K-biclusters clustering (KBC)
algorithm for the microarray biclustering issue. Besides minimizing
the dissimilarities between genes and bicluster centers within all
biclusters, the objective function of the KBC algorithm additionally
takes into account how to minimize the residues within all biclusters
based on the mean square residue model. In addition, the objective
function also maximizes the entropy of conditions to stimulate more
conditions to contribute the identification of biclusters. The KBC
algorithm adopts the K-means type clustering process to efficiently
make the partition of K biclusters be optimized. A set of experiments
on a practical microarray dataset are demonstrated to show the
performance of the proposed KBC algorithm.