Abstract: Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. These protocols utilize zone partitioning to establish distinct key infrastructure under Certificate Authority (CA) supervision in different regions. Secure anonymous broadcasting (SAB) is one of these protocols that preserves most of security aspects but it has some deficiencies in practice. A very important issue is region change of a vehicle for its mobility. Changing regions leads to change of CA and necessity of having new key set to resume communication. In this paper, we propose solutions for informing vehicles about region change to obtain new key set before entering next region. This hinders attackers- intrusion, packet loss and lessons time delay. We also make key request messages secure by confirming old CA-s public key to the message, hence stronger security for safety message broadcasting is attained.
Abstract: The aspiration of this research article is to target and
focus the gains of university-Industry (U-I) collaborations and
exploring those hurdles which are the obstacles for attaining these
gains. University-Industry collaborations have attained great
importance since 1980 in USA due to its application in all fields of
life. U-I collaboration is a bilateral process where academia is a
proactive member to make such alliances. Universities want to
ameliorate their academic-base with the technicalities of technobabbles.
U-I collaboration is becoming an essential lane for achieving
innovative goals in this century. Many developed nations have set
successful examples to prove this phenomenon as a catalyst to reduce
costs, efforts and personnel for R&D projects. This study is exploits
amplitudes of UI collaboration incentives in the light of success
stories of developed countries. Many universities in USA, UK,
Canada and various European Countries have been engaged with
enterprises for numerous collaborative agreements. A long list of
strategic and short term R&D projects has been executed in
developed countries to accomplish their intended purposes. Due to
the lack of intentions, genuine research and research-oriented
environment, the mentioned field could not grow very well in
developing countries. During last decade, a new wave of research
has induced the institutes of developing countries to promote R&D
culture especially in Pakistan. Higher Education Commission (HEC)
has initiated many projects and funding supports for universities
which have collaborative intentions with industry.
Findings show that rapid innovation, overwhelm the technological
complexities and articulated intellectual-base are major incentives
which steer both partners to establish faculty-industry alliances. Everchanging
technologies, concerned about intellectual property,
different research environment and culture, research relevancy (Basic
or applied), exposure differences and diversity of knowledge
(bookish or practical) are main barriers to establish and retain joint
ventures. Findings also concluded that, it is dire need to support and
enhance cooperation among academia and industry to promote highly
coordinated research behaviors. Author has proposed a roadmap for
developing countries to promote R&D clusters among faculty and
industry to deal the technological challenges and innovation
complexities. Based on our research findings, Model for R&D
Collaboration for developing countries also have been proposed to
promote articulated R&D environment. If developing countries
follow this phenomenon, rapid innovations can be achieved with
limited R&D budget heads.
Abstract: Several recent studies have shown that the
transparency of financial reporting have a significant influence on investor-s decisions. Thus, regulation authorities and professional
organizations (IFAC) have emphasized the role of XBRL (eXtensible Business Reporting Language) and interactive data as a means of
promoting transparency and monitoring corporate reporting. In this
context, this paper has as objective the analysis of interactive reporting through XBRL and its use as a support in the process of
taking decisions in corporate governance, namely the potential of interactive reports in XBRL to increase the transparency and
monitoring process of corporate governance.
Abstract: Recent changes in food retailing structure have led to the development of large supercenters in suburban areas of the United States. These changes have led some authors to suggest that there are food deserts in some urban areas, where food is difficult to access, especially for disadvantaged consumers. This study tests the food desert hypothesis by comparing the distance from food retailers to food secure and food insecure households in one urban, Midwest neighborhood. This study utilizes GIS to compare household survey respondent locations against the location of various types of area food retailers. Results of this study indicate no apparent difference between food secure and insecure households in the reported importance of distance on the decision to shop at various retailers. However, there were differences in the spatial relationship between households and retailers. Food insecure households tended to be located slightly farther from large food retailers and slightly closer to convenience stores. Furthermore, food insecure households reported traveling slightly farther to their primary food retailer. The differences between the two groups was, however, relatively small.
Abstract: This paper presents an authoring tool which makes a
user easily and intuitively design vibrotactile sensation. A mobile
hardware platform powered by ANDROID, a multi-purpose haptic
driver and a linear resonance actuator are used to implement the
system of the presented authoring tool. The tool allows users to easily
and simply create a vibrotactile sensation by drawing vibrotactile
images and to feel the sensation by rubbing drawn images on the touch
screen of a mobile device. The tool supports a graphical interface for
designing, editing and playing vibrotactile images as well as a
pre-defined file format for save and open.
Abstract: Through the analysis of the process digital design
based on digital mockup, the fact indicates that a distributed
cooperative supporting environment is the foundation conditions to
adopt design approach based on DMU. Data access authorization is
concerned firstly because the value and sensitivity of the data for the
enterprise. The access control for administrators is often rather weak
other than business user. So authors established an enhanced system to
avoid the administrators accessing the engineering data by potential
approach and without authorization. Thus the data security is
improved.
Abstract: The iris recognition technology is the most accurate,
fast and less invasive one compared to other biometric techniques
using for example fingerprints, face, retina, hand geometry, voice or
signature patterns. The system developed in this study has the
potential to play a key role in areas of high-risk security and can
enable organizations with means allowing only to the authorized
personnel a fast and secure way to gain access to such areas. The
paper aim is to perform the iris region detection and iris inner and
outer boundaries localization. The system was implemented on
windows platform using Visual C# programming language. It is easy
and efficient tool for image processing to get great performance
accuracy. In particular, the system includes two main parts. The first
is to preprocess the iris images by using Canny edge detection
methods, segments the iris region from the rest of the image and
determine the location of the iris boundaries by applying Hough
transform. The proposed system tested on 756 iris images from 60
eyes of CASIA iris database images.
Abstract: The authors present optimization parameters of rotary
positioner controller in hard disk drive servo track writing process
using coefficient diagram method; CDM. Due to estimation
parameters in PI Positioning Control System by expected ratio
method cannot meet the required specification of response
effectively, we suggest coefficient diagram method for defining
controller parameters under the requirement of the system. Finally,
the simulation results show that our proposed method can improve
the problem in tuning parameter of rotary positioner controller. It is
satisfied specification of performance of control system. Furthermore,
it is very convenient as a fast adjustment damping ratio as well as a
high speed response.
Abstract: Data Warehousing tools have become very popular and currently many of them have moved to Web-based user interfaces to make it easier to access and use the tools. The next step is to enable these tools to be used within a portal framework. The portal framework consists of pages having several small windows that contain individual data warehouse query results. There are several issues that need to be considered when designing the architecture for a portal enabled data warehouse query tool. Some issues need special techniques that can overcome the limitations that are imposed by the nature of data warehouse queries. Issues such as single sign-on, query result caching and sharing, customization, scheduling and authorization need to be considered. This paper discusses such issues and suggests an architecture to support data warehouse queries within Web portal frameworks.
Abstract: A low cost Short Message System (SMS) based Home security system equipped with motion, smoke, temperature, humidity and light sensors has been studied and tested. The sensors are controlled by a microprocessor PIC 18F4520 through the SMS having password protection code for the secure operation. The user is able to switch light and the appliances and get instant feedback. Also in cases of emergencies such as fire or robbery the system will send alert message to occupant and relevant civil authorities. The operation of the home security has been tested on Vodafone- Fiji network and Digicel Fiji Network for emergency and feedback responses for 25 samples. The experiment showed that it takes about 8-10s for the security system to respond in case of emergency. It takes about 18-22s for the occupant to switch and monitor lights and appliances and then get feedback depending upon the network traffic.
Abstract: Group contribution based models are widely used in
industrial applications for its convenience and flexibility. Although a
number of group contribution models have been proposed, there were
certain limitations inherent to those models. Models based on group
contribution excess Gibbs free energy are limited to low pressures and
models based on equation of state (EOS) cannot properly describe
highly nonideal mixtures including acids without introducing
additional modification such as chemical theory. In the present study
new a new approach derived from quantum chemistry have been used
to calculate necessary EOS group interaction parameters. The
COSMO-RS method, based on quantum mechanics, provides a
reliable tool for fluid phase thermodynamics. Benefits of the group
contribution EOS are the consistent extension to hydrogen-bonded
mixtures and the capability to predict polymer-solvent equilibria up to
high pressures. The authors are confident that with a sufficient
parameter matrix the performance of the lattice EOS can be improved
significantly.
Abstract: Cities denote instantaneously a challenge and an
opportunity for climate change policy. Cities are the place where
most energy services are needed because urbanization is closely
linked to high population densities and concentration of economic
activities and production (Urban energy demand). Consequently, it is
critical to explain about the role of cities within the world-s energy
systems and its correlation with the climate change issue. With more
than half of the world-s population already living in urban areas, and
that percentage expected to rise to 75 per cent by 2050, it is clear that
the path to sustainable development must pass through cities. Cities
expanding in size and population pose increased challenges to the
environment, of which energy is part as a natural resource, and to the
quality of life. Nowadays, most cities have already understood the
importance of sustainability, both at their local scale as in terms of
their contribution to sustainability at higher geographical scales. It
requires the perception of a city as a complex and dynamic
ecosystem, an open system, or cluster of systems, where the energy
as well as the other natural resources is transformed to satisfy the
needs of the different urban activities. In fact, buildings and
transportation generally represent most of cities direct energy
demand, i.e., between 60 per cent and 80 per cent of the overall
consumption. Buildings, both residential and services are usually
influenced by the local physical and social conditions. In terms of
transport, the energy demand is also strongly linked with the specific
characteristics of a city (urban mobility).The concept of a “smart
city" builds on statistics as seven key axes of a city-s success in
moving towards common platform (brain nerve)of sustainable urban
energy systems.
With the aforesaid knowledge, the authors have suggested a frame
work to role of cities, as energy actors for smart city management.
The authors have discusses the potential elements needed for energy
in smart cities and also identified potential energy actions and
relevant barriers. Furthermore, three levels of city smartness in cities
actions to overcome market /institutional failures with a local
approach are distinguished. The authors have made an attempt to
conceive and implement concepts of city smartness by adopting the
city or local government as nerve center through an integrated
planning approach. Finally, concluding with recommendations for
the organization of the Smart Sustainable Cities for positive changes
of urban India.
Abstract: More and more natural disasters are happening every
year: floods, earthquakes, volcanic eruptions, etc. In order to reduce
the risk of possible damages, governments all around the world are
investing into development of Early Warning Systems (EWS) for
environmental applications. The most important task of the EWS is
identification of the onset of critical situations affecting environment
and population, early enough to inform the authorities and general
public. This paper describes an approach for monitoring of flood
protections systems based on machine learning methods. An
Artificial Intelligence (AI) component has been developed for
detection of abnormal dike behaviour. The AI module has been
integrated into an EWS platform of the UrbanFlood project (EU
Seventh Framework Programme) and validated on real-time
measurements from the sensors installed in a dike.
Abstract: Insider abuse has recently been reported as one of
the more frequently occurring security incidents, suggesting that
more security is required for detecting and preventing unauthorised
financial transactions entered by authorised users. To address the
problem, and based on the observation that all authorised interbanking
financial transactions trigger or are triggered by other
transactions in a workflow, we have developed a security solution
based on a redefined understanding of an audit workflow. One audit
workflow where there is a log file containing the complete workflow
activity of financial transactions directly related to one financial
transaction (an electronic deal recorded at an e-trading system). The
new security solution contemplates any two parties interacting on
the basis of financial transactions recorded by their users in related
but distinct automated financial systems. In the new definition interorganizational
and intra-organization interactions can be described
in one unique audit trail. This concept expands the current ideas of
audit trails by adapting them to actual e-trading workflow activity, i.e.
intra-organizational and inter-organizational activity. With the above,
a security auditing service is designed to detect integrity drifts with
and between organizations in order to detect unauthorised financial
transactions entered by authorised users.
Abstract: The tracing methods determine the contribution the
power system sources have in their supplying. These methods can be
used to assess the transmission prices, but also to recover the
transmission fixed cost. In this paper is presented the influence of the
modification of commons structure has on the specific price of transfer
and on active power losses. The authors propose a power losses
allocation method, based on Kirschen-s method. The system operator
must make use of a few basic principles about allocation. The only
necessary information is the power flows on system branches and the
modifications applied to power system buses. In order to illustrate this
method, the 25-bus test system is used, elaborated within the Electrical
Power Engineering Department, from Timisoara, Romania.
Abstract: Transport and logistics are the lifeblood of societies.
There is a strong correlation between overall growth in economic
activity and growth of transport. The movement of people and goods
has the potential for creating wealth and prosperity, therefore the
state of transportation infrastructure and especially the condition of
road networks is often a governmental priority. The design, building
and maintenance of national roads constitute a substantial share of
government budgets. Taking into account the magnitude and
importance of these investments, the expedience, efficiency and
sustainability of these projects are of great public interest. This paper
provides an overview of supply chain management principles applied
to road construction. In addition, road construction performance
measurement systems and ICT solutions are discussed. Road
construction in Estonia is analyzed. The authors propose the
development of a national performance measurement system for road
construction.
Abstract: The study of proteomics reached unexpected levels of
interest, as a direct consequence of its discovered influence over some
complex biological phenomena, such as problematic diseases like
cancer. This paper presents the latest authors- achievements regarding
the analysis of the networks of proteins (interactome networks), by
computing more efficiently the betweenness centrality measure. The
paper introduces the concept of betweenness centrality, and then
describes how betweenness computation can help the interactome net-
work analysis. Current sequential implementations for the between-
ness computation do not perform satisfactory in terms of execution
times. The paper-s main contribution is centered towards introducing
a speedup technique for the betweenness computation, based on
modified shortest path algorithms for sparse graphs. Three optimized
generic algorithms for betweenness computation are described and
implemented, and their performance tested against real biological
data, which is part of the IntAct dataset.
Abstract: In this paper the Analytic Network Process (ANP) is
applied to the selection of photovoltaic (PV) solar power projects.
These projects follow a long management and execution process
from plant site selection to plant start-up. As a consequence, there are
many risks of time delays and even of project stoppage.
In the case study presented in this paper a top manager of an
important Spanish company that operates in the power market has to
decide on the best PV project (from four alternative projects) to
invest based on risk minimization. The manager identified 50 project
execution delay and/or stoppage risks.
The influences among elements of the network (groups of risks
and alternatives) were identified and analyzed using the ANP
multicriteria decision analysis method. After analyzing the results the
main conclusion is that the network model can manage all the
information of the real-world problem and thus it is a decision
analysis model recommended by the authors. The strengths and
weaknesses ANP as a multicriteria decision analysis tool are also
described in the paper.
Abstract: A new target detection technique is presented in this
paper for the identification of small boats in coastal surveillance. The
proposed technique employs an adaptive progressive thresholding (APT) scheme to first process the given input scene to separate any
objects present in the scene from the background. The preprocessing
step results in an image having only the foreground objects, such as
boats, trees and other cluttered regions, and hence reduces the search
region for the correlation step significantly. The processed image is then fed to the shifted phase-encoded fringe-adjusted joint transform
correlator (SPFJTC) technique which produces single and delta-like
correlation peak for a potential target present in the input scene. A
post-processing step involves using a peak-to-clutter ratio (PCR) to determine whether the boat in the input scene is authorized or unauthorized. Simulation results are presented to show that the
proposed technique can successfully determine the presence of an authorized boat and identify any intruding boat present in the given input scene.
Abstract: During recent years, the traditional learning
approaches have undergone fundamental changes due to the
emergence of new technologies such as multimedia, hypermedia and
telecommunication. E-learning is a modern world phenomenon that
has come into existence in the information age and in a knowledgebased
society. E-learning has developed significantly within a short
period of time. Thus it is of a great significant to secure information,
allow a confident access and prevent unauthorized accesses. Making
use of individuals- physiologic or behavioral (biometric) properties is
a confident method to make the information secure. Among the
biometrics, fingerprint is more acceptable and most countries use it as
an efficient methods of identification. This article provides a new
method to compare the fingerprint comparison by pattern recognition
and image processing techniques. To verify fingerprint, the shortest
distance method is used together with perceptronic multilayer neural
network functioning based on minutiae. This method is highly
accurate in the extraction of minutiae and it accelerates comparisons
due to elimination of false minutiae and is more reliable compared
with methods that merely use directional images.