Abstract: This paper introduces a hardware solution to password
exposure problem caused by direct accesses to the keyboard hardware
interfaces through which a possible attacker is able to grab user-s
password even where existing countermeasures are deployed. Several
researches have proposed reasonable software based solutions to the
problem for years. However, recently introduced hardware
vulnerability problems have neutralized the software approaches and
yet proposed any effective software solution to the vulnerability.
Hardware approach in this paper is expected as the only solution to the
vulnerability
Abstract: We try to give a solution of version control for
documents in web service, that-s why we propose a new approach
used specially for the XML documents. The new approach is applied
in a centralized repository, this repository coexist with other
repositories in a decentralized system. To achieve the activities of
this approach in a standard model we use the ECA active rules. We
also show how the Event-Condition-Action rules (ECA rules) have
been incorporated as a mechanism for the version control of
documents. The need to integrate ECA rules is that it provides a clear
declarative semantics and induces an immediate operational
realization in the system without the need for human intervention.
Abstract: Based on a theoretical erbium-doped fiber amplifier
(EDFA) model, we have proposed an application of disturbance
observer(DOB) with proportional/integral/differential(PID) controller
to EDFA for minimizing gain-transient time of wavelength
-division-multiplexing (WDM) multi channels in optical amplifier in
channel add/drop networks. We have dramatically reduced the
gain-transient time to less than 30μsec by applying DOB with PID
controller to the control of amplifier gain. The proposed DOB-based
gain control algorithm for EDFA was implemented as a digital control
system using TI's DSP(TMS320C28346) chip and experimental
results of the system verify the excellent performance of the proposed
gain control methodology.
Abstract: In this paper, we present a framework to determine Haar solutions of Bratu-type equations that are widely applicable in fuel ignition of the combustion theory and heat transfer. The method is proposed by applying Haar series for the highest derivatives and integrate the series. Several examples are given to confirm the efficiency and the accuracy of the proposed algorithm. The results show that the proposed way is quite reasonable when compared to exact solution.
Abstract: The state of melt viscosity in injection process is significantly influenced by the setting parameters due to that the shear rate of injection process is higher than other processes. How to determine plastic melt viscosity during injection process is important to understand the influence of setting parameters on the melt viscosity. An apparatus named as pressure sensor bushing (PSB) module that is used to evaluate the melt viscosity during injection process is developed in this work. The formulations to coupling melt viscosity with fill time and injection pressure are derived and then the melt viscosity is determined. A test mold is prepared to evaluate the accuracy on viscosity calculations between the PSB module and the conventional approaches. The influence of melt viscosity on the tensile strength of molded part is proposed to study the consistency of injection quality.
Abstract: The paper presents a one-dimensional transient
mathematical model of thermal oil-water two-phase emulsion flows
in pipes. The set of the mass, momentum and enthalpy conservation
equations for the continuous fluid and droplet phases are solved. Two
friction correlations for the continuous fluid phase to wall friction are
accounted for in the model and tested. The aerodynamic drag force
between the continuous fluid phase and droplets is modeled, too. The
density and viscosity of both phases are assumed to be constant due
to adiabatic experimental conditions. The proposed mathematical
model is validated on the experimental measurements of oil-water
emulsion flows in horizontal pipe [1,2]. Numerical analysis on
single- and two-phase oil-water flows in a pipe is presented in the
paper. The continuous oil flow having water droplets is simulated.
Predictions, which are performed by using the presented model, show
excellent agreement with the experimental data if the water fraction is
equal or less than 10%. Disagreement between simulations and
measurements is increased if the water fraction is larger than 10%.
Abstract: The Elliptic Curve Digital Signature Algorithm
(ECDSA) is the elliptic curve analogue of DSA, where it is a digital
signature scheme designed to provide a digital signature based on a
secret number known only to the signer and also on the actual
message being signed. These digital signatures are considered the
digital counterparts to handwritten signatures, and are the basis for
validating the authenticity of a connection. The security of these
schemes results from the infeasibility to compute the signature
without the private key. In this paper we introduce a proposed to
development the original ECDSA with more complexity.
Abstract: In this paper we present a new method for coin
identification. The proposed method adopts a hybrid scheme using
Eigenvalues of covariance matrix, Circular Hough Transform (CHT)
and Bresenham-s circle algorithm. The statistical and geometrical
properties of the small and large Eigenvalues of the covariance
matrix of a set of edge pixels over a connected region of support are
explored for the purpose of circular object detection. Sparse matrix
technique is used to perform CHT. Since sparse matrices squeeze
zero elements and contain only a small number of non-zero elements,
they provide an advantage of matrix storage space and computational
time. Neighborhood suppression scheme is used to find the valid
Hough peaks. The accurate position of the circumference pixels is
identified using Raster scan algorithm which uses geometrical
symmetry property. After finding circular objects, the proposed
method uses the texture on the surface of the coins called texton,
which are unique properties of coins, refers to the fundamental micro
structure in generic natural images. This method has been tested on
several real world images including coin and non-coin images. The
performance is also evaluated based on the noise withstanding
capability.
Abstract: This paper presents an integrated knowledge-based
approach to multi-scale modeling of aquatic systems, with a view to
enhancing predictive power and aiding environmental management
and policy-making. The basic phases of this approach have been
exemplified in the case of a bay in Saronicos Gulf (Attiki, Greece).
The results showed a significant problem with rising phytoplankton
blooms linked to excessive microbial growth, arisen mostly due to
increased nitrogen inflows; therefore, the nitrification/denitrification
processes of the benthic and water column sub-systems have
provided the quality variables to be monitored for assessing
environmental status. It is thereby demonstrated that the proposed
approach facilitates modeling choices and implementation option
decisions, while it provides substantial support for knowledge and
experience capitalization in long-term water management.
Abstract: Classification is one of the primary themes in
computational biology. The accuracy of classification strongly
depends on quality of a dataset, and we need some method to
evaluate this quality. In this paper, we propose a new graphical
analysis method using 'Membership-Deviation Graph (MDG)' for
analyzing quality of a dataset. MDG represents degree of
membership and deviations for instances of a class in the dataset. The
result of MDG analysis is used for understanding specific feature and
for selecting best feature for classification.
Abstract: Current tools for data migration between documentoriented
and relational databases have several disadvantages. We
propose a new approach for data migration between documentoriented
and relational databases. During data migration the relational
schema of the target (relational database) is automatically created
from collection of XML documents. Proposed approach is verified on
data migration between document-oriented database IBM Lotus/
Notes Domino and relational database implemented in relational
database management system (RDBMS) MySQL.
Abstract: When the profile information of an existing road is
missing or not up-to-date and the parameters of the vertical
alignment are needed for engineering analysis, the engineer has to recreate
the geometric design features of the road alignment using
collected profile data. The profile data may be collected using
traditional surveying methods, global positioning systems, or digital
imagery. This paper develops a method that estimates the parameters
of the geometric features that best characterize the existing vertical
alignments in terms of tangents and the expressions of the curve, that
may be symmetrical, asymmetrical, reverse, and complex vertical
curves. The method is implemented using an Excel-based
optimization method that minimizes the differences between the
observed profile and the profiles estimated from the equations of the
vertical curve. The method uses a 'wireframe' representation of the
profile that makes the proposed method applicable to all types of
vertical curves. A secondary contribution of this paper is to introduce
the properties of the equal-arc asymmetrical curve that has been
recently developed in the highway geometric design field.
Abstract: In this paper, real-coded genetic algorithm (RCGA) optimization technique has been applied for large-scale linear dynamic multi-input-multi-output (MIMO) system. The method is based on error minimization technique where the integral square error between the transient responses of original and reduced order models has been minimized by RCGA. The reduction procedure is simple computer oriented and the approach is comparable in quality with the other well-known reduction techniques. Also, the proposed method guarantees stability of the reduced model if the original high-order MIMO system is stable. The proposed approach of MIMO system order reduction is illustrated with the help of an example and the results are compared with the recently published other well-known reduction techniques to show its superiority.
Abstract: In this paper we will develop further the sequential life test approach presented in a previous article by [1] using an underlying two parameter Inverse Weibull sampling distribution. The location parameter or minimum life will be considered equal to zero. Once again we will provide rules for making one of the three possible decisions as each observation becomes available; that is: accept the null hypothesis H0; reject the null hypothesis H0; or obtain additional information by making another observation. The product being analyzed is a new electronic component. There is little information available about the possible values the parameters of the corresponding Inverse Weibull underlying sampling distribution could have.To estimate the shape and the scale parameters of the underlying Inverse Weibull model we will use a maximum likelihood approach for censored failure data. A new example will further develop the proposed sequential life testing approach.
Abstract: Samples of CoFe2-xCrxO4 where x varies from 0.0 to 0.5 were prepared by co-precipitation route. These samples were sintered at 750°C for 2 hours. These particles were characterized by X-ray diffraction (XRD) at room temperature. The FCC spinel structure was confirmed by XRD patterns of the samples. The crystallite sizes of these particles were calculated from the most intense peak by Scherrer formula. The crystallite sizes lie in the range of 37-60 nm. The lattice parameter was found decreasing upon substitution of Cr. DC electrical resistivity was measured as a function of temperature. The room temperature thermoelectric power was measured for the prepared samples. The magnitude of Seebeck coefficient depends on the composition and resistivity of the samples.
Abstract: The goal of this work is to improve the efficiency and the reliability of the automatic artifact rejection, in particular from the Electroencephalographic (EEG) recordings. Artifact rejection is a key topic in signal processing. The artifacts are unwelcome signals that may occur during the signal acquisition and that may alter the analysis of the signals themselves. A technique for the automatic artifact rejection, based on the Independent Component Analysis (ICA) for the artifact extraction and on some high order statistics such as kurtosis and Shannon-s entropy, was proposed some years ago in literature. In this paper we enhance this technique introducing the Renyi-s entropy. The performance of our method was tested exploiting the Independent Component scalp maps and it was compared to the performance of the method in literature and it showed to outperform it.
Abstract: The aim of this paper is to explore the security issues
that significantly affect the performance of Mobile Adhoc Networks
(MANET)and limit the services provided to their intended users. The
MANETs are more vulnerable to Distributed Denial of Service
attacks (DDoS) because of their properties like shared medium,
dynamic topologies etc. A DDoS attack is a coordinated attempt
made by malicious users to flood the victim network with the large
amount of data such that the resources of the victim network are
exhausted resulting in the deterioration of the network performance.
This paper highlights the effects of different types of DDoS attacks
in MANETs and categorizes them according to their behavior.
Abstract: The primary education system in Indonesia involved the community recognized as the school committee, to take a part in the process of achieving the quality of education via the school facility performance, the low level of school committee involvement in the education system has become the issue in the development of education and reflected to the quality of education. This paper will discuss the conceptual framework and methodology for the performance of school committees within the management of school facilities in Batubara district of Indonesia. The concepts of Community based Facility Management (CbFM) and Logometrix are used as a basis to measure the school committee performance in order to address the needs of quality school management. The data will be taken from questionnaires distributed for those who work and use school facilities spread over seven sub district of Batubara, Indonesia. The result of this study is expected to provide a guide for evaluating the performance of existing school committee in improving the quality of education in Indonesia.
Abstract: This paper proposes a technique to protect against
email bombing. The technique employs a statistical approach, Naïve
Bayes (NB), and Neural Networks to show that it is possible to
differentiate between good and bad traffic to protect against email
bombing attacks. Neural networks and Naïve Bayes can be trained
by utilizing many email messages that include both input and output
data for legitimate and non-legitimate emails. The input to the model
includes the contents of the body of the messages, the subject, and
the headers. This information will be used to determine if the email
is normal or an attack email. Preliminary tests suggest that Naïve
Bayes can be trained to produce an accurate response to confirm
which email represents an attack.
Abstract: In the real application of active control systems to
mitigate the response of structures subjected to sever external
excitations such as earthquake and wind induced vibrations, since the
capacity of actuators is limited then the actuators saturate. Hence, in
designing controllers for linear and nonlinear structures under sever
earthquakes, the actuator saturation should be considered as a
constraint. In this paper optimal design of active controllers for
nonlinear structures by considering the actuator saturation has been
studied. To this end a method has been proposed based on defining
an optimization problem which considers the minimizing of the
maximum displacement of the structure as objective when a limited
capacity for actuator has been used as a constraint in optimization
problem. To evaluate the effectiveness of the proposed method, a
single degree of freedom (SDF) structure with a bilinear hysteretic
behavior has been simulated under a white noise ground acceleration
of different amplitudes. Active tendon control mechanism, comprised
of pre-stressed tendons and an actuator, and extended nonlinear
Newmark method based instantaneous optimal control algorithm
have been used as active control mechanism and algorithm. To
enhance the efficiency of the controllers, the weights corresponding
to displacement, velocity, acceleration and control force in the
performance index have been found by using the Distributed Genetic
Algorithm (DGA). According to the results it has been concluded
that the proposed method has been effective in considering the
actuator saturation in designing optimal controllers for nonlinear
frames. Also it has been shown that the actuator capacity and the
average value of required control force are two important factors in
designing nonlinear controllers for considering the actuator
saturation.