Abstract: SIP (Session Initiation Protocol), using HTML based
call control messaging which is quite simple and efficient, is being
replaced for VoIP networks recently. As for authentication and
authorization purposes there are many approaches and considerations
for securing SIP to eliminate forgery on the integrity of SIP
messages. On the other hand Elliptic Curve Cryptography has
significant advantages like smaller key sizes, faster computations on
behalf of other Public Key Cryptography (PKC) systems that obtain
data transmission more secure and efficient. In this work a new
approach is proposed for secure SIP authentication by using a public
key exchange mechanism using ECC. Total execution times and
memory requirements of proposed scheme have been improved in
comparison with non-elliptic approaches by adopting elliptic-based
key exchange mechanism.
Abstract: Numerical integration of initial boundary problem for advection equation in 3 ℜ is considered. The method used is
conditionally stable semi-Lagrangian advection scheme with high order interpolation on unstructured mesh. In order to increase time step integration the BFECC method with limiter TVD correction is used. The method is adopted on parallel graphic processor unit environment using NVIDIA CUDA and applied in Navier-Stokes solver. It is shown that the calculation on NVIDIA GeForce 8800
GPU is 184 times faster than on one processor AMDX2 4800+ CPU. The method is extended to the incompressible fluid dynamics solver. Flow over a Cylinder for 3D case is compared to the experimental data.
Abstract: Cements, which are intrinsically brittle materials, can
exhibit a degree of pseudo-ductility when reinforced with a sufficient
volume fraction of a fibrous phase. This class of materials, called
Engineered Cement Composites (ECC) has the potential to be used in
future tunneling applications where a level of pseudo-ductility is
required to avoid brittle failures. However uncertainties remain
regarding mechanical performance. Previous work has focused on
comparatively thin specimens; however for future civil engineering
applications, it is imperative that the behavior in tension of thicker
specimens is understood. In the present work, specimens containing
cement powder and admixtures have been manufactured following
two different processes and tested in tension. Multiple matrix
cracking has been observed during tensile testing, leading to a
“strain-hardening" behavior, confirming the possible suitability of
ECC material when used as thick sections (greater than 50mm) in
tunneling applications.
Abstract: An attempt has been made to develop a
seminumerical model to study temperature variations in dermal
layers of human limbs. The model has been developed for two
dimensional steady state case. The human limb has been assumed to
have elliptical cross section. The dermal region has been divided
into three natural layers namely epidermis, dermis and subdermal
tissues. The model incorporates the effect of important physiological
parameters like blood mass flow rate, metabolic heat generation, and
thermal conductivity of the tissues. The outer surface of the limb is
exposed to the environment and it is assumed that heat loss takes
place at the outer surface by conduction, convection, radiation, and
evaporation. The temperature of inner core of the limb also varies at
the lower atmospheric temperature. Appropriate boundary conditions
have been framed based on the physical conditions of the problem.
Cubic splines approach has been employed along radial direction and
Fourier series along angular direction to obtain the solution. The
numerical results have been computed for different values of
eccentricity resembling with the elliptic cross section of the human
limbs. The numerical results have been used to obtain the
temperature profile and to study the relationships among the various
physiological parameters.
Abstract: A new automatic system for the recognition and re¬construction of resealed and/or rotated partially occluded objects is presented. The objects to be recognized are described by 2D views and each view is occluded by several half-planes. The whole object views and their visible parts (linear cuts) are then stored in a database. To establish if a region R of an input image represents an object possibly occluded, the system generates a set of linear cuts of R and compare them with the elements in the database. Each linear cut of R is associated to the most similar database linear cut. R is recognized as an instance of the object 0 if the majority of the linear cuts of R are associated to a linear cut of views of 0. In the case of recognition, the system reconstructs the occluded part of R and determines the scale factor and the orientation in the image plane of the recognized object view. The system has been tested on two different datasets of objects, showing good performance both in terms of recognition and reconstruction accuracy.
Abstract: In construction of any structure, the aesthetic and utility values should be considered in such a way as to make the structure cost-effective. Most structures are composed of elements and joints which are very critical in any skeletal space structure because they majorly determine the performance of the structure. In early times, most space structures were constructed using rigid joints which had the advantage of better performing structures as compared to pin-jointed structures but with the disadvantage of requiring all the construction work to be done on site. The discovery of semi-rigid joints now enables connections to be prefabricated and quickly assembled on site while maintaining good performance. In this paper, cost-effective is discussed basing on strength of connectors at the joints, buckling of joints and overall structure, and the effect of initial geometrical imperfections. Several existing joints are reviewed by classifying them into categories and discussing where they are most suited and how they perform structurally. Also, finite element modeling using ABAQUS is done to determine the buckling behavior. It is observed that some joints are more economical than others. The rise to span ratio and imperfections are also found to affect the buckling of the structures. Based on these, general principles that guide the design of cost-effective joints and structures are discussed.
Abstract: There are many views on how human decision makers behave. In this work, the Justices of the United States Supreme Court will be viewed in terms of constrained maximization and cognitivecybernetic theory. This paper will integrate research in such fields as law, political science, psychology, economics and decision making theory. It will be argued that due to its heavy workload, the Supreme Court is forced to make decisions in a boundedly rational manner. The ideas and theory put forward here will be tested in the area of the Court’s decisions involving religion. Therefore, the cases involving the U.S. Constitution’s Free Exercise Clause and Establishment Clause will be analyzed. Also, variables such as the U.S. government’s involvement in these cases will be considered. The years to be studied will be 1987-2011.
Abstract: A brushless DC motor with integrated drive circuit for air management system is presented. Using magnetic equivalent circuit model a basic design of the motor is determined, and specific configurations are inspected thanks to finite element analysis. In order to reduce an unbalanced magnetic force in an axial direction, induced forces between a stator core and a permanent magnet are calculated with respect to the relative positions of them. For the high efficiency, and high power density, BLDC motor and drive are developed. Also vibration mode and eccentricity of a rotor are considered at the rated and maximum rotational speed Through the experimental results, a validity of the simulated one is confirmed.
Abstract: In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on the ElGamal-s algorithm, for sending small amounts of data via an authentication server. The innovation of this approach is that there is no need for a symmetric algorithm or a safe communication channel such as SSL. The reason that ECC has been chosen instead of RSA is that it provides a methodology for obtaining high-speed implementations of authentication protocols and encrypted mail techniques while using fewer bits for the keys. This means that ECC systems require smaller chip size and less power consumption. The proposed protocol has been implemented in Java to analyse its features and vulnerabilities in the real world.
Abstract: The objective of this research is to examine the shear thinning behaviour of mixing flow of non-Newtonian fluid like toothpaste in the dissolution container with rotating stirrer. The problem under investigation is related to the chemical industry. Mixing of fluid is performed in a cylindrical container with rotating stirrer, where stirrer is eccentrically placed on the lid of the container. For the simulation purpose the associated motion of the fluid is considered as revolving of the container, with stick stirrer. For numerical prediction, a time-stepping finite element algorithm in a cylindrical polar coordinate system is adopted based on semi-implicit Taylor-Galerkin/pressure-correction scheme. Numerical solutions are obtained for non-Newtonian fluids employing power law model. Variations with power law index have been analysed, with respect to the flow structure and pressure drop.
Abstract: This paper analyzes the extent to which the justices of
the U.S. Supreme Court cast votes that support the positions of the
president, or more generally the Executive Branch. Can presidents
count on such deference from those justices they nominate or those
whom are nominated by other presidents of the same party? Or, do
the justices demonstrate judicial independence and impartiality such
that they are not so predisposed to vote in favor of arguments of their
nominating president-s party? The results suggest that while in
general the justices do not exhibit any marked tendency to partisan
support of presidents, more recent and conservative Supreme Court
justices are significantly more likely to support Republican
presidents.
Abstract: This research was to study effect of rotational speed
and eccentric factors, which were affected on looseness of bearing.
The experiment was conducted on three rotational speeds and five
eccentric distances with 5 replications. The results showed that
influenced factor affected to looseness of bearing was rotational
speed and eccentric distance which showed statistical significant.
Higher rotational speed would cause on high looseness. Moreover,
more eccentric distance, more looseness of bearing. Using bearing at
high rotational with high eccentric of shaft would be affected
bearing fault more than lower rotational speed. The prediction
equation of looseness was generated by regression analysis. The
prediction has an effected to the looseness of bearing at 91.5%.
Abstract: System MEMORI automatically detects and recognizes rotated and/or rescaled versions of the objects of a database within digital color images with cluttered background. This task is accomplished by means of a region grouping algorithm guided by heuristic rules, whose parameters concern some geometrical properties and the recognition score of the database objects. This paper focuses on the strategies implemented in MEMORI for the estimation of the heuristic rule parameters. This estimation, being automatic, makes the system a highly user-friendly tool.
Abstract: Thermal behavior of fuel channel under loss of coolant accident (LOCA) is a major concern for nuclear reactor safety. LOCA along with failure of emergency cooling water system (ECC) may leads to mechanical deformations like sagging and ballooning. In order to understand the phenomenon an experiment has been carried out using 19 pin fuel element simulator. Main purpose of the experiment was to trace temperature profiles over the pressure tube, calandria tube and clad tubes of Indian Pressurized Heavy Water Reactor (IPHWR) under symmetrical and asymmetrical heat-up conditions. For simulating the fully voided scenario, symmetrical heating of pressure was carried out by injecting 13.2 KW (2 % of nominal power) to all the 19 pins and the temperatures of pressure tube, calandria tube and clad tubes were measured. During symmetrical heating the sagging of fuel channel was initiated at 460 °C and the highest temperature attained by PT was 650 °C . The decay heat from clad tubes was dissipated to moderator mainly by radiation and natural convection. The highest temperature of 680 °C was observed over the outer ring of clad tubes of fuel simulator. Again, to simulate partially voided condition, asymmetrical heating of pressure was carried out by supplying 8.0 kW power to upper 8 pins of fuel simulator and temperature profiles were measured. Along the circumference of pressure tube (PT) the highest temperature difference of 320 °C was observed, which highlights the magnitude of thermal stresses under partially voided conditions.
Abstract: Research results and optimal parameters investigation
of laser cut and profiling of diamond and quartz substrates by
femtosecond laser pulses are presented. Profiles 10 μm in width, ~25
μm in depth and several millimeters long were made. Investigation of
boundaries quality has been carried out with the use of AFM
«Vecco». Possibility of technological formation of profiles and
micro-holes in diamond and quartz substrates with nanometer-scale
boundaries is shown. Experimental results of multilayer dielectric
cover treatment are also presented. Possibility of precise upper layer
(thickness of 70–140 nm) removal is demonstrated. Processes of thin
metal film (60 nm and 350 nm thick) treatment are considered.
Isolation tracks (conductance ~ 10-11 S) 1.6–2.5 μm in width in
conductive metal layers are formed.
Abstract: In recent five decades, textured yarns of polyester fiber produced by false twist method are the most
important and mass-produced manmade fibers. There are
many parameters of cross section which affect the physical and mechanical properties of textured yarns. These parameters
are surface area, perimeter, equivalent diameter, large
diameter, small diameter, convexity, stiffness, eccentricity, and hydraulic diameter. These parameters were evaluated by
digital image processing techniques. To find trends between production criteria and evaluated parameters of cross section, three criteria of production line have been adjusted and different types of yarns were produced. These criteria are
temperature, drafting ratio, and D/Y ratio. Finally the relations between production criteria and cross section parameters were
considered. The results showed that the presented technique can recognize and measure the parameters of fiber cross section in acceptable accuracy. Also, the optimum condition
of adjustments has been estimated from results of image analysis evaluation.
Abstract: Saudi Arabia is an arid country which depends on
costly desalination plants to satisfy the growing residential water
demand. Prediction of water demand is usually a challenging task
because the forecast model should consider variations in economic
progress, climate conditions and population growth. The task is
further complicated knowing that Mecca city is visited regularly by
large numbers during specific months in the year due to religious
occasions. In this paper, a neural networks model is proposed to
handle the prediction of the monthly and yearly water demand for
Mecca city, Saudi Arabia. The proposed model will be developed
based on historic records of water production and estimated visitors-
distribution. The driving variables for the model include annuallyvarying
variables such as household income, household density, and
city population, and monthly-varying variables such as expected
number of visitors each month and maximum monthly temperature.
Abstract: The prevalence of non organic constipation differs
from country to country and the reliability of the estimate rates is
uncertain. Moreover, the clinical relevance of subdividing the
heterogeneous functional constipation disorders into pre-defined
subgroups is largely unknown.. Aim: to estimate the prevalence of
constipation in a population-based sample and determine whether
clinical subgroups can be identified. An age and gender stratified
sample population from 5 Italian cities was evaluated using a
previously validated questionnaire. Data mining by cluster analysis
was used to determine constipation subgroups. Results: 1,500
complete interviews were obtained from 2,083 contacted households
(72%). Self-reported constipation correlated poorly with symptombased
constipation found in 496 subjects (33.1%). Cluster analysis
identified four constipation subgroups which correlated to subgroups
identified according to pre-defined symptom criteria. Significant
differences in socio-demographics and lifestyle were observed
among subgroups.
Abstract: Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.
Abstract: Reactiondiffusion systems are mathematical models that describe how the concentration of one or more substances distributed in space changes under the influence of local chemical reactions in which the substances are converted into each other, and diffusion which causes the substances to spread out in space. The classical representation of a reaction-diffusion system is given by semi-linear parabolic partial differential equations, whose general form is ÔêétX(x, t) = DΔX(x, t), where X(x, t) is the state vector, D is the matrix of the diffusion coefficients and Δ is the Laplace operator. If the solute move in an homogeneous system in thermal equilibrium, the diffusion coefficients are constants that do not depend on the local concentration of solvent and of solutes and on local temperature of the medium. In this paper a new stochastic reaction-diffusion model in which the diffusion coefficients are function of the local concentration, viscosity and frictional forces of solvent and solute is presented. Such a model provides a more realistic description of the molecular kinetics in non-homogenoeus and highly structured media as the intra- and inter-cellular spaces. The movement of a molecule A from a region i to a region j of the space is described as a first order reaction Ai k- → Aj , where the rate constant k depends on the diffusion coefficient. Representing the diffusional motion as a chemical reaction allows to assimilate a reaction-diffusion system to a pure reaction system and to simulate it with Gillespie-inspired stochastic simulation algorithms. The stochastic time evolution of the system is given by the occurrence of diffusion events and chemical reaction events. At each time step an event (reaction or diffusion) is selected from a probability distribution of waiting times determined by the specific speed of reaction and diffusion events. Redi is the software tool, developed to implement the model of reaction-diffusion kinetics and dynamics. It is a free software, that can be downloaded from http://www.cosbi.eu. To demonstrate the validity of the new reaction-diffusion model, the simulation results of the chaperone-assisted protein folding in cytoplasm obtained with Redi are reported. This case study is redrawing the attention of the scientific community due to current interests on protein aggregation as a potential cause for neurodegenerative diseases.