Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.
Abstract: This paper proposes a declarative language for
knowledge representation (Ibn Rochd), and its environment of
exploitation (DeGSE). This DeGSE system was designed and
developed to facilitate Ibn Rochd writing applications. The system
was tested on several knowledge bases by ascending complexity,
culminating in a system for recognition of a plant or a tree, and
advisors to purchase a car, for pedagogical and academic guidance,
or for bank savings and credit. Finally, the limits of the language and
research perspectives are stated.
Abstract: The European countries that during the past two
decades based their exchange rate regimes on currency board
arrangement (CBA) are usually analysed from the perspective of
corner solution choice’s stabilisation effects. There is an open
discussion on the positive and negative background of a strict
exchange rate regime choice, although it should be seen as part of the
transition process towards the monetary union membership. The
focus of the paper is on the Baltic countries that after two decades of
a rigid exchange rate arrangement and strongly influenced by global
crisis are finishing their path towards the euro zone. Besides the
stabilising capacity, the CBA is highly vulnerable regime, with
limited developing potential. The rigidity of the exchange rate (and
monetary) system, despite the ensured credibility, do not leave
enough (or any) space for the adjustment and/or active crisis
management. Still, the Baltics are in a process of recovery, with fiscal
consolidation measures combined with (painful and politically
unpopular) measures of internal devaluation. Today, two of them
(Estonia and Latvia) are members of euro zone, fulfilling their
ultimate transition targets, but de facto exchanging one fixed regime
with another.
The paper analyses the challenges for the CBA in unstable
environment since the fixed regimes rely on imported stability and
are sensitive to external shocks. With limited monetary instruments,
these countries were oriented to the fiscal policies and used a
combination of internal devaluation and tax policy measures. Despite
their rather quick recovery, our second goal is to analyse the long
term influence that the measures had on the national economy.
Abstract: The main purpose of this research was to analyze Socio-Cultural obstacles of disseminating of nanotechnology in Iran's agricultural section. One hundred twenty eight out of a total of 190 researchers with different levels of expertise in and familiarity with nanotechnology were randomly selected and questionnaires completed by them. Face validity have been done by expert's suggestion and correction, reliability by using Cronbakh-Alpha formula. The results of a factor analysis showed variation for different factors. For cultural factors 19/475 percent, for management 13/139 percent, information factor 11/277 percent, production factor 9/703 percent, social factor 9/267 percent, and for attitude factor it became 8/947 percent. Also results indicated that socio-cultural factors were the most important obstacle for nanotechnology dissemination in agricultural section in Iran.
Abstract: Although services play a crucial role in economy,
service did not gain as much importance as productivity management
in manufacturing. This paper presents key findings from literature
and practice. Based on an initial definition of complex services, seven
productivity concepts are briefly presented and assessed by relevant,
complex service specific criteria. Following the findings a complex
service productivity model is proposed. The novel model comprises
of all specific dimensions of service provision from both, the
provider-s as well as costumer-s perspective. A clear assignment of
identified value drivers and relationships between them is presented.
In order to verify the conceptual service productivity model a case
study from a project engineering department of a chemical plant
development and construction company is presented.
Abstract: Phishing, or stealing of sensitive information on the
web, has dealt a major blow to Internet Security in recent times. Most
of the existing anti-phishing solutions fail to handle the fuzziness
involved in phish detection, thus leading to a large number of false
positives. This fuzziness is attributed to the use of highly flexible and
at the same time, highly ambiguous HTML language. We introduce a
new perspective against phishing, that tries to systematically prove,
whether a given page is phished or not, using the corresponding
original page as the basis of the comparison. It analyzes the layout of
the pages under consideration to determine the percentage distortion
between them, indicative of any form of malicious alteration. The
system design represents an intelligent system, employing dynamic
assessment which accurately identifies brand new phishing attacks
and will prove effective in reducing the number of false positives.
This framework could potentially be used as a knowledge base, in
educating the internet users against phishing.
Abstract: This study proposes a conceptual model and
empirically tests the relationships between customers and librarians
(i.e. tangibles, responsiveness, assurance, reliability and empathy)
with a dependent variable (customer satisfaction) regarding library
services. The SERVQUAL instrument was administered to 100
respondents which comprises of staff and students at a public higher
learning institution in the Federal Territory of Labuan, Malaysia.
They were public university library users. Results revealed that all
service quality dimensions tested were significant and influenced
customer satisfaction of visitors to a public university library.
Assurance is the most important factor that influences customer
satisfaction with the services rendered by the librarian. It is
imperative for the library management to take note that the top five
service attributes that gained greatest attention from library visitors-
perspective includes employee willingness to help customers,
availability of customer representatives online for response to
queries, library staff actively and promptly provide services, signs in
the building are clear and library staff are friendly and courteous.
This study provides valuable results concerning the determinants of
the service quality and customer satisfaction of public university
library services from the users' perspective.
Abstract: Most routing protocols (DSR, AODV etc.) that have
been designed for wireless adhoc networks incorporate the broadcasting
operation in their route discovery scheme. Probabilistic broadcasting
techniques have been developed to optimize the broadcast operation
which is otherwise very expensive in terms of the redundancy
and the traffic it generates. In this paper we have explored percolation
theory to gain a different perspective on probabilistic broadcasting
schemes which have been actively researched in the recent years.
This theory has helped us estimate the value of broadcast probability
in a wireless adhoc network as a function of the size of the network.
We also show that, operating at those optimal values of broadcast
probability there is at least 25-30% reduction in packet regeneration
during successful broadcasting.
Abstract: Baltic competitiveness is quite controversial. In a
situation with the rapid structural changes, economy develops in
balance very rarely - in different fields will always be more rapid
changes in another more stagnation.
Analyzing different economic indices developed by international
organizations the situation in three Baltic countries are described
from a different competitiveness positions highlighting strengths and
weaknesses of each country.
Exploring the openness of the economy, it is possible to observe
certain risks included in the reports describing situation of
competitiveness where government policies competing in the tax
system, the rates of labour market policies, investment environment,
etc. This is a very important factor resulting in competitive
advantage.
Baltic countries are still at a weak position from a technological
perspective, and need to borrow the knowledge and technology from
more developed countries.
Abstract: The challenge for software development house in
Bangladesh is to find a path of using minimum process rather than CMMI or ISO type gigantic practice and process area. The small and medium size organization in Bangladesh wants to ensure minimum
basic Software Process Improvement (SPI) in day to day operational
activities. Perhaps, the basic practices will ensure to realize their company's improvement goals. This paper focuses on the key issues in basic software practices for small and medium size software
organizations, who are unable to effort the CMMI, ISO, ITIL etc. compliance certifications. This research also suggests a basic software process practices model for Bangladesh and it will show the mapping of our suggestions with international best practice. In this IT
competitive world for software process improvement, Small and medium size software companies that require collaboration and
strengthening to transform their current perspective into inseparable global IT scenario. This research performed some investigations and analysis on some projects- life cycle, current good practice, effective approach, reality and pain area of practitioners, etc. We did some
reasoning, root cause analysis, comparative analysis of various
approach, method, practice and justifications of CMMI and real life. We did avoid reinventing the wheel, where our focus is for minimal
practice, which will ensure a dignified satisfaction between
organizations and software customer.
Abstract: Whole genome duplication (WGD) increased the
number of yeast Saccharomyces cerevisiae chromosomes from 8 to
16. In spite of retention the number of chromosomes in the genome
of this organism after WGD to date, chromosomal rearrangement
events have caused an evolutionary distance between current genome
and its ancestor. Studies under evolutionary-based approaches on
eukaryotic genomes have shown that the rearrangement distance is an
approximable problem. In the case of S. cerevisiae, we describe that
rearrangement distance is accessible by using dedoubled adjacency
graph drawn for 55 large paired chromosomal regions originated
from WGD. Then, we provide a program extracted from a C program
database to draw a dedoubled genome adjacency graph for S.
cerevisiae. From a bioinformatical perspective, using the duplicated
blocks of current genome in S. cerevisiae, we infer that genomic
organization of eukaryotes has the potential to provide valuable
detailed information about their ancestrygenome.
Abstract: Knowledge Discovery of Databases (KDD) is the
process of extracting previously unknown but useful and significant
information from large massive volume of databases. Data Mining is
a stage in the entire process of KDD which applies an algorithm to
extract interesting patterns. Usually, such algorithms generate huge
volume of patterns. These patterns have to be evaluated by using
interestingness measures to reflect the user requirements.
Interestingness is defined in different ways, (i) Objective measures
(ii) Subjective measures. Objective measures such as support and
confidence extract meaningful patterns based on the structure of the
patterns, while subjective measures such as unexpectedness and
novelty reflect the user perspective. In this report, we try to brief the
more widely spread and successful subjective measures and propose
a new subjective measure of interestingness, i.e. shocking.
Abstract: Technology or lack of it will play an important role in Africa-s effort to achieve inclusive development. Although a key determinant of competitiveness, new technology can exacerbate exclusion of the majority from the mainstream economic activities. To minimise potential technology exclusion while leveraging its critical role in African-s development, requires insight into technology diffusion process. Using system dynamics approach, a technology diffusion model is presented. The frequency of interaction of people exposed to and those not exposed to technology, and the technology adoption rate - the fraction of people who embrace new technologies once they are exposed, are identified as the broad factors critical to technology diffusion to wider society enabling more people to be part of the economic growth process. Based on simulation results, it is recommends that these two broad factors should form part of national policy aimed at achieving inclusive and sustainable development in Africa.
Abstract: When consistently innovative business-models can
give companies a competitive advantage, longitudinal empirical
research, which can reflect dynamic business-model changes, has yet
to prove a definitive connection. This study consequently employs a
dynamic perspective in conjunction with innovation theory to examine
the relationship between the types of business-model innovation and
firm value. This study tries to examine various types of
business-model innovation in high-end and low-end technology
industries such as HTC and the 7-Eleven chain stores with research
periods of 14 years and 32 years, respectively. The empirical results
suggest that adopting radical business-model innovation in addition to
expanding new target markets can successfully lead to a competitive
advantage. Sustained advanced technological competences and
service/product innovation are the key successful factors in high-end
and low-end technology industry business-models respectively. In
sum up, the business-model innovation can yield a higher market value
and financial value in high-end technology industries than low-end
ones.
Abstract: Perhaps no single issue has been cited as either the root
cause and / or the greatest challenge to the restructured power system then the lack of adequate reliable transmission. Probabilistic transmission planning has become increasingly necessary and important in recent
years. The transmission planning analysis carried out by the authors,
spans a 10-year horizon, taking into consideration a value of 2 % load
increase / year at each consumer. Taking into consideration this increased
load, a probabilistic power flow was carried out, all the system components
being regarded from probabilistic point of view. Several contingencies
have been generated, for assessing the security of the power system. The results have been analyzed and several important conclusions were pointed. The objective is to achieve a network that works without limit violations for all (or most of) scenario realizations. The case study is represented by the IEEE 14 buses test power system.
Abstract: The scientific perspective, the practice area of physical education and sports activities improve power capacity in all its forms of expression, being a generator of the research topics. Today theories that strength training athletes and slow down development progress will affect the strength and flexibility are discredited. On the other hand there are sectors and / or samples whose results are sports of the way higher manifestation of power as a result of the composition of the force and velocity, being based in this respect on the systematic and continuous development of both bio-motric capacities said. Training of force for children was and is controversial. Teama de accidentări sau a stopării premature a procesului de creştere a făcut ca în trecut copiii să fie ţinuţi departe de lucrul cu diferite greutăţi.Fear of injury or premature stop the growth process in the past made the children to be kept away from working with different weights. Recent studies have shown that the risk of accidents is relatively small and the strength training can help prevent them. For example, most accidents occur at the level of athletics ligaments and tendons. From this point of view, it can be said that a progressive intervention of force training, optimal design, will help enhancing their process, such as athlete much better prepared to meet training requests and competitions. Preparation of force provides a solid basis for further phases in the highest performance.
Abstract: Open urban public spaces comprise an important
element for the development of social, cultural and economic
activities of the population in the modern cities. These spaces are also
considered regulators of the region-s climate conditions, providing
better thermal, visual and auditory conditions which can be optimized
by the application of appropriate strategies of bioclimatic design. The
paper focuses on the analysis and evaluation of the recent unification
of the open spaces in the centre of Xanthi, a medium – size city in
northern Greece, from a bioclimatic perspective, as well as in the
creation of suitable methodology. It is based both on qualitative
observation of the interventions by fieldwork research and
assessment and on quantitative analysis and modeling of the research
area.
Abstract: The evolution in project management was triggered by
the changes in management philosophy and practices in order to
maintain competitive advantage and continuous success in the field.
The purpose of this paper is to highlight the practicality of cognitive
style and unlearning approach in influencing the achievement of
project success by project managers. It introduces the concept of
planning, knowing and creating style from cognitive style field in the
light of achieving time, cost, quality and stakeholders appreciation in
project success context. Further it takes up a discussion of the
unlearning approach as a moderator in enhancing the relationship
between cognitive style and project success. The paper bases itself on
literature review from established disciplines like psychology,
sociology and philosophy regarding cognitive style, unlearning and
project success in general. The analysis and synthesis of literature in
the subject area a conceptual paper is utilized as the basis of future
research to form a comprehensive framework for project managers in
enhancing the project management competency.
Abstract: This paper presents an environmental and technoeconomic
evaluation of light duty vehicles in Iran. A comprehensive
well-to-wheel (WTW) analysis is applied to compare different
automotive fuel chains, conventional internal combustion engines and
innovative vehicle powertrains. The study examines the
competitiveness of 15 various pathways in terms of energy
efficiencies, GHG emissions, and levelized cost of different energy
carriers. The results indicate that electric vehicles including battery
electric vehicles (BEV), fuel cell vehicles (FCV) and plug-in hybrid
electric vehicles (PHEV) increase the WTW energy efficiency by
54%, 51% and 46%, respectively, compared to common internal
combustion engines powered by gasoline. On the other hand,
greenhouse gas (GHG) emissions per kilometer of FCV and BEV
would be 48% lower than that of gasoline engines. It is concluded
that BEV has the lowest total cost of energy consumption and
external cost of emission, followed by internal combustion engines
(ICE) fueled by CNG. Conventional internal combustion engines
fueled by gasoline, on the other hand, would have the highest costs.
Abstract: The purpose of the current study is to gain insight into the relative role of professional self-image (PSI) for service providers among leader-member exchange (LMX), career success. Lack of studies demonstrated that PSI of service providers affect on their CS. So, it is necessary to, according to service providers- perspective, explore the relationship among LMX and CS in hospitality industry. The result of the current study can suggest strategic directions for hospitality practitioners in terms of constructing LMX relationship, so as to make service providers realize and build their PSI, and to promote their CS. Implications of these findings for hospitality implementations as well as future research directions are subsequently discussed.