Abstract: The number of intrusions and attacks against critical
infrastructures and other information networks is increasing rapidly.
While there is no identified evidence that terrorist organizations are
currently planning a coordinated attack against the vulnerabilities of
computer systems and network connected to critical infrastructure,
and origins of the indiscriminate cyber attacks that infect computers
on network remain largely unknown. The growing trend toward the
use of more automated and menacing attack tools has also
overwhelmed some of the current methodologies used for tracking
cyber attacks. There is an ample possibility that this kind of cyber
attacks can be transform to cyberterrorism caused by illegal purposes.
Cyberterrorism is a matter of vital importance to national welfare.
Therefore, each countries and organizations have to take a proper
measure to meet the situation and consider effective legislation about
cyberterrorism.
Abstract: Currently, there has been a 3G mobile networks data
traffic explosion due to the large increase in the number of smartphone
users. Unlike a traditional wired infrastructure, 3G mobile networks
have limited wireless resources and signaling procedures for complex
wireless resource management. And mobile network security for
various abnormal and malicious traffic technologies was not ready. So
Malicious or potentially malicious traffic originating from mobile
malware infected smart devices can cause serious problems to the 3G
mobile networks, such as DoS and scanning attack in wired networks.
This paper describes the DoS security threat in the 3G mobile network
and proposes a detection technology.
Abstract: In this paper we propose a new traffic simulation
package, TDMSim, which supports both macroscopic and
microscopic simulation on free-flowing and regulated traffic systems.
Both simulators are based on travel demands, which specify the
numbers of vehicles departing from origins to arrive at different
destinations. The microscopic simulator implements the carfollowing
model given the pre-defined routes of the vehicles but also
supports the rerouting of vehicles. We also propose a macroscopic
simulator which is built in integration with the microscopic simulator
to allow the simulation to be scaled for larger networks without
sacrificing the precision achievable through the microscopic
simulator. The macroscopic simulator also enables the reuse of
previous simulation results when simulating traffic on the same
networks at later time. Validations have been conducted to show the
correctness of both simulators.
Abstract: Linear stochastic estimation and quadratic stochastic
estimation techniques were applied to estimate the entire velocity
flow-field of an open cavity with a length to depth ratio of 2. The
estimations were done through the use of instantaneous velocity
magnitude as estimators. These measurements were obtained by
Particle Image Velocimetry. The predicted flow was compared
against the original flow-field in terms of the Reynolds stresses and
turbulent kinetic energy. Quadratic stochastic estimation proved to be
more superior than linear stochastic estimation in resolving the shear
layer flow. When the velocity fluctuations were scaled up in the
quadratic estimate, both the time-averaged quantities and the
instantaneous cavity flow can be predicted to a rather accurate extent.
Abstract: Encrypted messages sending frequently draws the attention
of third parties, perhaps causing attempts to break and
reveal the original messages. Steganography is introduced to hide
the existence of the communication by concealing a secret message
in an appropriate carrier like text, image, audio or video. Quantum
steganography where the sender (Alice) embeds her steganographic
information into the cover and sends it to the receiver (Bob) over a
communication channel. Alice and Bob share an algorithm and hide
quantum information in the cover. An eavesdropper (Eve) without
access to the algorithm can-t find out the existence of the quantum
message. In this paper, a text quantum steganography technique based
on the use of indefinite articles (a) or (an) in conjunction with the nonspecific
or non-particular nouns in English language and quantum
gate truth table have been proposed. The authors also introduced a
new code representation technique (SSCE - Secret Steganography
Code for Embedding) at both ends in order to achieve high level of
security. Before the embedding operation each character of the secret
message has been converted to SSCE Value and then embeds to cover
text. Finally stego text is formed and transmits to the receiver side.
At the receiver side different reverse operation has been carried out
to get back the original information.
Abstract: Cryptography provides the secure manner of
information transmission over the insecure channel. It authenticates
messages based on the key but not on the user. It requires a lengthy
key to encrypt and decrypt the sending and receiving the messages,
respectively. But these keys can be guessed or cracked. Moreover,
Maintaining and sharing lengthy, random keys in enciphering and
deciphering process is the critical problem in the cryptography
system. A new approach is described for generating a crypto key,
which is acquired from a person-s iris pattern. In the biometric field,
template created by the biometric algorithm can only be
authenticated with the same person. Among the biometric templates,
iris features can efficiently be distinguished with individuals and
produces less false positives in the larger population. This type of iris
code distribution provides merely less intra-class variability that aids
the cryptosystem to confidently decrypt messages with an exact
matching of iris pattern. In this proposed approach, the iris features
are extracted using multi resolution wavelets. It produces 135-bit iris
codes from each subject and is used for encrypting/decrypting the
messages. The autocorrelators are used to recall original messages
from the partially corrupted data produced by the decryption process.
It intends to resolve the repudiation and key management problems.
Results were analyzed in both conventional iris cryptography system
(CIC) and non-repudiation iris cryptography system (NRIC). It
shows that this new approach provides considerably high
authentication in enciphering and deciphering processes.
Abstract: In July 1, 2007, Taiwan Stock Exchange (TWSE) on
market observation post system (MOPS) adds a new "Financial
reference database" for investors to do investment reference. This
database as a warning to public offering companies listed on the
public financial information and it original within eight targets. In
this paper, this database provided by the indicators for the application
of company financial crisis early warning model verify that the
database provided by the indicator forecast for the financial crisis,
whether or not companies have a high accuracy rate as opposed to
domestic and foreign scholars have positive results. There is use of
Logistic Regression Model application of the financial early warning
model, in which no joined back-conditions is the first model, joined it
in is the second model, has been taken occurred in the financial crisis
of companies to research samples and then business took place
before the financial crisis point with T-1 and T-2 sample data to do
positive analysis. The results show that this database provided the
debt ratio and net per share for the best forecast variables.
Abstract: Consumer behaviour analysis represents an important
field of study in marketing. Particularly strategy development for
marketing and communications will be more focused and effective
when marketers have an understanding of the motivations, behaviour
and psychology of consumers. While materialism has been found to
be one of the important elements in consumer behaviour, compulsive
consumption represents another aspect that has recently attracted
more attention. This is because of the growing prevalence of
dysfunctional buying that has raised concern in consumer societies.
Present studies and analyses on origins and motivations of
compulsive buying have mainly focused on either individual factors
or groups of related factors and hence a need for a holistic view
exists. This paper provides a comprehensive perspective on
compulsive consumption and establishes relevant propositions
keeping the family life cycle stages as a reference for the incidence of
chronic consumer states and their influence on compulsive
consumption.
Abstract: In view of geological origin, formation of the shallow
gas reservoir of the Hangzhou Bay, northern Zhejiang Province,
eastern China, and original occurrence characteristics of the gassy
sand are analyzed. Generally, gassy sand in scale gas reservoirs is in
the state of residual moisture content and the approximate scope of
initial matric suction of sand ranges about from 0kPa to100kPa.
Results based on GDS triaxial tests show that the classical shear
strength formulas of unsaturated soil can not effectively describe basic
strength characteristics of gassy sand; the relationship between
apparent cohesion and matric suction of gassy sand agrees well with
the power function, which can reasonably be used to describe the
strength of gassy sand. In the stress path of gas release, shear strength
of gassy sand will increase and experimental results show the formula
proposed in this paper can effectively predict the strength increment.
When saturated strength indexes of the sand are used in engineering
design, moderate reduction should be considered.
Abstract: To model the human visual system (HVS) in the region of interest, we propose a new objective metric evaluation adapted to wavelet foveation-based image compression quality measurement, which exploits a foveation setup filter implementation technique in the DWT domain, based especially on the point and region of fixation of the human eye. This model is then used to predict the visible divergences between an original and compressed image with respect to this region field and yields an adapted and local measure error by removing all peripheral errors. The technique, which we call foveation wavelet visible difference prediction (FWVDP), is demonstrated on a number of noisy images all of which have the same local peak signal to noise ratio (PSNR), but visibly different errors. We show that the FWVDP reliably predicts the fixation areas of interest where error is masked, due to high image contrast, and the areas where the error is visible, due to low image contrast. The paper also suggests ways in which the FWVDP can be used to determine a visually optimal quantization strategy for foveation-based wavelet coefficients and to produce a quantitative local measure of image quality.
Abstract: Volume rendering is widely used in medical CT image
visualization. Applying 3D image visualization to diagnosis
application can require accurate volume rendering with high
resolution. Interpolation is important in medical image processing
applications such as image compression or volume resampling.
However, it can distort the original image data because of edge
blurring or blocking effects when image enhancement procedures
were applied. In this paper, we proposed adaptive tension control
method exploiting gradient information to achieve high resolution
medical image enhancement in volume visualization, where restored
images are similar to original images as much as possible. The
experimental results show that the proposed method can improve
image quality associated with the adaptive tension control efficacy.
Abstract: This paper introduces a new method called ARPDC (Advanced Robust Parallel Distributed Compensation) for automatic control of nonlinear systems. This method improves a quality of robust control by interpolating of robust and optimal controller. The weight of each controller is determined by an original criteria function for model validity and disturbance appreciation. ARPDC method is based on nonlinear Takagi-Sugeno (T-S) fuzzy systems and Parallel Distributed Compensation (PDC) control scheme. The relaxed stability conditions of ARPDC control of nominal system have been derived. The advantages of presented method are demonstrated on the inverse pendulum benchmark problem. From comparison between three different controllers (robust, optimal and ARPDC) follows, that ARPDC control is almost optimal with the robustness close to the robust controller. The results indicate that ARPDC algorithm can be a good alternative not only for a robust control, but in some cases also to an adaptive control of nonlinear systems.
Abstract: This research aims to study the preferable tourism and
the elements of choosing tourist destination from domestic tourist in
Bangkok and the nearby areas in Thailand.The data were collected by
using 1249 set of questionnaires, in mid-August 2012. The result
illustrates that religious destinations are the most preferable places
for the tourist. The average expense per travel is approximately 47
USD a time. Travellers travel based on the advertisement in the
television and internet and their decisions is based on the reputation
of the destinations.
The result on a place dimension demonstrates the neatness and
well managed location play a crucial role on tourist destination.
Gender, age, marriage status and their origins are affecting their
spending and travelling behaviour. The researcher reckon that
providing the area of arcade, selling the souvenir and promoting
tourism among a young professional group would be an important
key follow the income distribution policy, including managing the
destination to welcome the family group, which the result is to
identified as the highest spending.
Abstract: A spatial classification technique incorporating a State of Art Feature Extraction algorithm is proposed in this paper for classifying a heterogeneous classes present in hyper spectral images. The classification accuracy can be improved if and only if both the feature extraction and classifier selection are proper. As the classes in the hyper spectral images are assumed to have different textures, textural classification is entertained. Run Length feature extraction is entailed along with the Principal Components and Independent Components. A Hyperspectral Image of Indiana Site taken by AVIRIS is inducted for the experiment. Among the original 220 bands, a subset of 120 bands is selected. Gray Level Run Length Matrix (GLRLM) is calculated for the selected forty bands. From GLRLMs the Run Length features for individual pixels are calculated. The Principle Components are calculated for other forty bands. Independent Components are calculated for next forty bands. As Principal & Independent Components have the ability to represent the textural content of pixels, they are treated as features. The summation of Run Length features, Principal Components, and Independent Components forms the Combined Features which are used for classification. SVM with Binary Hierarchical Tree is used to classify the hyper spectral image. Results are validated with ground truth and accuracies are calculated.
Abstract: Unsteady boundary layer flow of an incompressible
micropolar fluid over a stretching sheet when the sheet is stretched in
its own plane is studied in this paper. The stretching velocity is
assumed to vary linearly with the distance along the sheet. Two equal
and opposite forces are impulsively applied along the x-axis so that the
sheet is stretched, keeping the origin fixed in a micropolar fluid. The
transformed unsteady boundary layer equations are solved
numerically using the Keller-box method for the whole transient from
the initial state to final steady-state flow. Numerical results are
obtained for the velocity and microrotation distributions as well as the
skin friction coefficient for various values of the material parameter K.
It is found that there is a smooth transition from the small-time
solution to the large-time solution.
Abstract: Key management is a vital component in any modern security protocol. Due to scalability and practical implementation considerations automatic key management seems a natural choice in significantly large virtual private networks (VPNs). In this context IETF Internet Key Exchange (IKE) is the most promising protocol under permanent review. We have made a humble effort to pinpoint IKEv2 net gain over IKEv1 due to recent modifications in its original structure, along with a brief overview of salient improvements between the two versions. We have used US National Institute of Technology NIIST VPN simulator to get some comparisons of important performance metrics.
Abstract: Organ motion, especially respiratory motion, is a technical challenge to radiation therapy planning and dosimetry. This motion induces displacements and deformation of the organ tissues within the irradiated region which need to be taken into account when simulating dose distribution during treatment. Finite element modeling (FEM) can provide a great insight into the mechanical behavior of the organs, since they are based on the biomechanical material properties, complex geometry of organs, and anatomical boundary conditions. In this paper we present an original approach that offers the possibility to combine image-based biomechanical models with particle transport simulations. We propose a new method to map material density information issued from CT images to deformable tetrahedral meshes. Based on the principle of mass conservation our method can correlate density variation of organ tissues with geometrical deformations during the different phases of the respiratory cycle. The first results are particularly encouraging, as local error quantification of density mapping on organ geometry and density variation with organ motion are performed to evaluate and validate our approach.
Abstract: Since dealing with high dimensional data is
computationally complex and sometimes even intractable, recently
several feature reductions methods have been developed to reduce
the dimensionality of the data in order to simplify the calculation
analysis in various applications such as text categorization, signal
processing, image retrieval, gene expressions and etc. Among feature
reduction techniques, feature selection is one the most popular
methods due to the preservation of the original features.
In this paper, we propose a new unsupervised feature selection
method which will remove redundant features from the original
feature space by the use of probability density functions of various
features. To show the effectiveness of the proposed method, popular
feature selection methods have been implemented and compared.
Experimental results on the several datasets derived from UCI
repository database, illustrate the effectiveness of our proposed
methods in comparison with the other compared methods in terms of
both classification accuracy and the number of selected features.
Abstract: Our adaptive multimodal system aims at correctly
presenting a mathematical expression to visually impaired users.
Given an interaction context (i.e. combination of user, environment
and system resources) as well as the complexity of the expression
itself and the user-s preferences, the suitability scores of different
presentation format are calculated. Unlike the current state-of-the art
solutions, our approach takes into account the user-s situation and not
imposes a solution that is not suitable to his context and capacity. In
this wok, we present our methodology for calculating the
mathematical expression complexity and the results of our
experiment. Finally, this paper discusses the concepts and principles
applied on our system as well as their validation through cases
studies. This work is our original contribution to an ongoing research
to make informatics more accessible to handicapped users.
Abstract: Vibration characteristics of subcooled flow boiling on
thin and long structures such as a heating rod were recently
investigated by the author. The results show that the intensity of the
subcooled boiling-induced vibration (SBIV) was influenced strongly
by the conditions of the subcooling temperature, linear power density
and flow velocity. Implosive bubble formation and collapse are the
main nature of subcooled boiling, and their behaviors are the only
sources to originate from SBIV. Therefore, in order to explain the
phenomenon of SBIV, it is essential to obtain reliable information
about bubble behavior in subcooled boiling conditions. This was
investigated at different conditions of coolant subcooling
temperatures of 25 to 75°C, coolant flow velocities of 0.16 to
0.53m/s, and linear power densities of 100 to 600 W/cm. High speed
photography at 13,500 frames per second was performed at these
conditions. The results show that even at the highest subcooling
condition, the absolute majority of bubbles collapse very close to the
surface after detaching from the heating surface. Based on these
observations, a simple model of surface tension and momentum
change is introduced to offer a rough quantitative estimate of the
force exerted on the heating surface during the bubble ebullition. The
formation of a typical bubble in subcooled boiling is predicted to
exert an excitation force in the order of 10-4 N.