Web Service Security Method To SOA Development

Web services provide significant new benefits for SOAbased applications, but they also expose significant new security risks. There are huge number of WS security standards and processes. At present, there is still a lack of a comprehensive approach which offers a methodical development in the construction of secure WS-based SOA. Thus, the main objective of this paper is to address this needs, presenting a comprehensive method for Web Services Security guaranty in SOA. The proposed method defines three stages, Initial Security Analysis, Architectural Security Guaranty and WS Security Standards Identification. These facilitate, respectively, the definition and analysis of WS-specific security requirements, the development of a WS-based security architecture and the identification of the related WS security standards that the security architecture must articulate in order to implement the security services.

QoS Management in the Future Internet

The talks about technological convergence had been around for almost twenty years. Today Internet made it possible. And this is not only technical evolution. The way it changed our lives reflected in variety of applications, services and technologies used in day-to-day life. Such benefits imposed even more requirements on heterogeneous and unreliable IP networks. Current paper outlines QoS management system developed in the NetQoS [1] project. It describes an overall architecture of management system for heterogeneous networks and proposes automated multi-layer QoS management. Paper focuses on the structure of the most crucial modules of the system that enable autonomous and multi-layer provisioning and dynamic adaptation.

The Quality Maintenance and Extending Storage Life of Mango Fruit after Postharvest Treatments

The quality attributes and storage life of 'Jinhwang' mango fruit can be effectively maintained with 1-methylcyclopropene (1-MCP) application and/or chitosan coating. 'Jinhwang' mango fruit was treated with 5 μl l-1 1-MCP for 12 h, dipped with 0.5 % chitosan, 5 μl l-1 1-MCP combine with 0.5 % chitosan and untreated (control) then stored at 10oC. Mango treated with 1-MCP maintained firmness, sucrose and starch content. Chitosan coating delayed firmness loss, sucrose content and the fruit decay when compare with control. Application of 1-MCP combine with chitosan also delayed firmness loss, sucrose content and starch content during storage. Furthermore, chitosan coating and combine treatment prolonged storage life of mango up to 29 days after storage while 1-MCP extended to 28 days after storage. Therefore, using all application of chitosan coating or 1-MCP combine with chitosan or 1-MCP in mango at 10oC is a feasible technology for maintains quality and prolongs storage life in order to expand marketability and export options.

Simulation of Thermal Storage Phase Change Material in Buildings

One of the potential and effective ways of storing thermal energy in buildings is the integration of brick with phase change materials (PCMs). This paper presents a two-dimensional model for simulating and analyzing of PCM in order to minimize energy consumption in the buildings. The numerical approach has been used with the real weather data of a selected city of Iran (Tehran). Two kinds of brick integrated PCM are investigated and compared base on outdoor weather conditions and the amount of energy consumption. The results show a significant reduction in maximum entering heat flux to building about 32.8% depending on PCM quantity. The results are analyzed by various temperature contour plots. The contour plots illustrated the time dependent mechanism of entering heat flux for a brick integrated with PCM. Further analysis is developed to investigate the effect of PCM location on the inlet heat flux. The results demonstrated that to achieve maximum performance of PCM it is better to locate PCM near the outdoor.

Determinants of Capital Structure in Malaysia Electrical and Electronic Sector

Capital structure is one of the most important financial decisions in corporate financing strategy. It involves the choice of debt and equity level in financing a company-s operations. This study aims to investigate whether the capital structure choice of Malaysian electrical and electronic manufacturing companies that are listed in the Bursa Malaysia can be explained by factors that have been found by most studies as dominant determinants of capital structure (company size, profitability, asset tangibility, liquidity and growth). Using debt ratio as the proxy for capital structure and applying pooled ordinary least square multiple regression estimation, the results showed that on average, Malaysian electrical and electronic manufacturing companies used less debt in funding their business operations. The findings also showed that size and asset tangibility has a significant positive relationship with debt level, while liquidity has a negative significant relationship with leverage.

Collaborative E-Learning with Multiple Imaginary Co-Learner: Design, Issues and Implementation

Collaborative problem solving in e-learning can take in the form of discussion among learner, creating a highly social learning environment and characterized by participation and interactivity. This paper, designed a collaborative learning environment where agent act as co-learner, can play different roles during interaction. Since different roles have been assigned to the agent, learner will assume that multiple co-learner exists to help and guide him all throughout the collaborative problem solving process, but in fact, alone during the learning process. Specifically, it answers the questions what roles of the agent should be incorporated to contribute better learning outcomes, how agent will facilitate the communication process to provide social learning and interactivity and what are the specific instructional strategies that facilitate learner participation, increased skill acquisition and develop critical thinking.

A Calibration Approach towards Reducing ASM2d Parameter Subsets in Phosphorus Removal Processes

A novel calibration approach that aims to reduce ASM2d parameter subsets and decrease the model complexity is presented. This approach does not require high computational demand and reduces the number of modeling parameters required to achieve the ASMs calibration by employing a sensitivity and iteration methodology. Parameter sensitivity is a crucial factor and the iteration methodology enables refinement of the simulation parameter values. When completing the iteration process, parameters values are determined in descending order of their sensitivities. The number of iterations required is equal to the number of model parameters of the parameter significance ranking. This approach was used for the ASM2d model to the evaluated EBPR phosphorus removal and it was successful. Results of the simulation provide calibration parameters. These included YPAO, YPO4, YPHA, qPHA, qPP, μPAO, bPAO, bPP, bPHA, KPS, YA, μAUT, bAUT, KO2 AUT, and KNH4 AUT. Those parameters were corresponding to the experimental data available.

Terminal Velocity of a Bubble Rise in a Liquid Column

As it is known, buoyancy and drag forces rule bubble's rise velocity in a liquid column. These forces are strongly dependent on fluid properties, gravity as well as equivalent's diameter. This study reports a set of bubble rising velocity experiments in a liquid column using water or glycerol. Several records of terminal velocity were obtained. The results show that bubble's rise terminal velocity is strongly dependent on dynamic viscosity effect. The data set allowed to have some terminal velocities data interval of 8.0 ? 32.9 cm/s with Reynolds number interval 1.3 -7490. The bubble's movement was recorded with a video camera. The main goal is to present an original set data and results that will be discussed based on two-phase flow's theory. It will also discussed, the prediction of terminal velocity of a single bubble in liquid, as well as the range of its applicability. In conclusion, this study presents general expressions for the determination of the terminal velocity of isolated gas bubbles of a Reynolds number range, when the fluid proprieties are known.

Does the Polysemic Nature of Energy Security Make it a 'Wicked' Problem?

Governments around the world are expending considerable time and resources framing strategies and policies to deliver energy security. The term 'energy security' has quietly slipped into the energy lexicon without any meaningful discourse about its meaning or assumptions. An examination of explicit and inferred definitions finds that the concept is inherently slippery because it is polysemic in nature having multiple dimensions and taking on different specificities depending on the country (or continent), timeframe or energy source to which it is applied. But what does this mean for policymakers? Can traditional policy approaches be used to address the problem of energy security or does its- polysemic qualities mean that it should be treated as a 'wicked' problem? To answer this question, the paper assesses energy security against nine commonly cited characteristics of wicked policy problems and finds strong evidence of 'wickedness'.

Development of Improved Three Dimensional Unstructured Tetrahedral Mesh Generator

Meshing is the process of discretizing problem domain into many sub domains before the numerical calculation can be performed. One of the most popular meshes among many types of meshes is tetrahedral mesh, due to their flexibility to fit into almost any domain shape. In both 2D and 3D domains, triangular and tetrahedral meshes can be generated by using Delaunay triangulation. The quality of mesh is an important factor in performing any Computational Fluid Dynamics (CFD) simulations as the results is highly affected by the mesh quality. Many efforts had been done in order to improve the quality of the mesh. The paper describes a mesh generation routine which has been developed capable of generating high quality tetrahedral cells in arbitrary complex geometry. A few test cases in CFD problems are used for testing the mesh generator. The result of the mesh is compared with the one generated by a commercial software. The results show that no sliver exists for the meshes generated, and the overall quality is acceptable since the percentage of the bad tetrahedral is relatively small. The boundary recovery was also successfully done where all the missing faces are rebuilt.

Numerical Simulation of Conjugated Heat Transfer Characteristics of Laminar Air Flows in Parallel-Plate Dimpled Channels

This paper presents a numerical study on surface heat transfer characteristics of laminar air flows in parallel-plate dimpled channels. The two-dimensional numerical model is provided by commercial code FLUENT and the results are obtained for channels with symmetrically opposing hemi-cylindrical cavities onto both walls for Reynolds number ranging from 1000 to 2500. The influence of variations in relative depth of dimples (the ratio of cavity depth to the cavity curvature diameter), the number of them and the thermophysical properties of channel walls on heat transfer enhancement is studied. The results are evident for existence of an optimum value for the relative depth of dimples in which the largest wall heat flux and average Nusselt number can be achieved. In addition, the results of conjugation simulation indicate that the overall influence of the ratio of wall thermal conductivity to the one of the fluid on heat transfer rate is not much significant and can be ignored.

Neuro Fuzzy and Self Tunging Fuzzy Controller to Improve Pitch and Yaw Control Systems Resposes of Twin Rotor MIMO System

In this paper, Neuro-Fuzzy based Fuzzy Subtractive Clustering Method (FSCM) and Self Tuning Fuzzy PD-like Controller (STFPDC) were used to solve non-linearity and trajectory problems of pitch AND yaw angles of Twin Rotor MIMO system (TRMS). The control objective is to make the beams of TRMS reach a desired position quickly and accurately. The proposed method could achieve control objectives with simpler controller. To simplify the complexity of STFPDC, ANFIS based FSCM was used to simplify the controller and improve the response. The proposed controllers could achieve satisfactory objectives under different input signals. Simulation results under MATLAB/Simulink® proved the improvement of response and superiority of simplified STFPDC on Fuzzy Logic Controller (FLC).

Effect of Buoyancy Ratio on Non-Darcy Mixed Convection in a Vertical Channel: A Thermal Non-equilibrium Approach

This article presents a numerical study of the doublediffusive mixed convection in a vertical channel filled with porous medium by using non-equilibrium model. The flow is assumed fully developed, uni-directional and steady state. The controlling parameters are thermal Rayleigh number (RaT ), Darcy number (Da), Forchheimer number (F), buoyancy ratio (N), inter phase heat transfer coefficient (H), and porosity scaled thermal conductivity ratio (γ). The Brinkman-extended non-Darcy model is considered. The governing equations are solved by spectral collocation method. The main emphasize is given on flow profiles as well as heat and solute transfer rates, when two diffusive components in terms of buoyancy ratio are in favor (against) of each other and solid matrix and fluid are thermally non-equilibrium. The results show that, for aiding flow (RaT = 1000), the heat transfer rate of fluid (Nuf ) increases upto a certain value of H, beyond that decreases smoothly and converges to a constant, whereas in case of opposing flow (RaT = -1000), the result is same for N = 0 and 1. The variation of Nuf in (N, Nuf )-plane shows sinusoidal pattern for RaT = -1000. For both cases (aiding and opposing) the flow destabilize on increasing N by inviting point of inflection or flow separation on the velocity profile. Overall, the buoyancy force have significant impact on the non-Darcy mixed convection under LTNE conditions.

Treatment of Acid Mine Drainage Using Un- Activated Bentonite and Limestone

The use of un-activated bentonite, and un-activated bentonite blended with limestone for the treatment of acid mine drainage (AMD) was investigated. Batch experiments were conducted in a 5 L PVC reactor. Un-activated bentonite on its own did not effectively neutralize and remove heavy metals from AMD. The final pH obtained was below 4 and the metal removal efficiency was below 50% for all the metals when bentonite solid loadings of 1, 5 and 10% were used. With un-activated bentonite (1%) blended with 1% limestone, the final pH obtained was approximately 7 and metal removal efficiencies were greater than 60% for most of the metals. The Langmuir isotherm gave the best fit for the experimental data giving correlation coefficient (R2) very close to 1. Thus, it was concluded that un-activated bentonite blended with limestone is suitable for potential applications in removing heavy metals and neutralizing AMD.

The Application of Regulatory Impact Assessment (RIA) on the Czech Financial Market

The impact assessment in its various forms has recently become a very important part of policy-making and legislation in many different countries. Regulatory impact assessment (RIA) is yet another set of analytical methods deployed in the legislation of the European Union, of many developed countries as well as in many developing ones such as Mexico, Malaysia and Philippines. The aim of this paper is to provide a theoretical background for economic models in regulatory impact assessment and an overview of their application especially on the financial market in the Czech Republic. We found out an inadequate application of these models, what makes room for further research in this field.

A Study on Energy-efficient Temperature Control

The top-heavy demographic of low birth-rate and longer lifespan is a growing social problem, and one of its expected effects will be a shortage of young workers and a growing reliance on a workforce of middle-aged and older people. However, the environment of today's industrial workplace is not particularly suited to middle-aged and older workers, one notable problem being temperature control. Higher temperatures can cause health problems such as heat stroke, and the number of cases increases sharply in people over 65. Moreover, in conditions above 33°C, older people can develop circulatory system disorders, and also have a higher chance of suffering a fatal heart attack. We therefore propose a new method for controlling temperature in the indoor workplace. In this study two different verification experiments were conducted, with the proposed temperature control method being tested in cargo containers and conventional houses. The method's effectiveness was apparent in measurements of temperature and electricity consumption

Some Physico-chemical and Nutritional Properties of Russion Olive (Elaeagnus angustifolia L.) Fruit Grown in Turkey

In this research, several physical and chemical properties and mineral contents of Russion olive (Elaeagnus angustifolia L.) fruit grown in Turkey were determined. In the fruit, length, width, thickness, weight were determined as 2.866cm, 1.880cm, 1.870cm, 2.90g; total soluble solids and colour were determined as 13.14% and S33O60Y99, respectively. In the seed, mean length, width, thickness, and weight were found to be 2.420cm, 0.508cm, 0.503cm, and 0.38g, respectively. In the fruit, 28 minerals (K, P, Ca, Na, Mg, S, Pb, Ba, Ga, As, In, Ti, Fe, Mn, Zn, Cu, Co, B, Cd, Se, Li, Sr, Al, Ni, Ag, V, Cr, Bi) were analyzed and 19 minerals were present at detectable levels. Russion olive fruit was richest in potassium (10296.906ppm), Mg (762.314ppm), P (609.694ppm), Ca (547.647ppm), and Na (222.749ppm).

Knowledge and Skills Requirements for Software Developer Students

It is widely acknowledged that there is a shortage of software developers, not only in South Africa, but also worldwide. Despite reports on a gap between industry needs and software education, the gap has mostly been explored in quantitative studies. This paper reports on the qualitative data of a mixed method study of the perceptions of professional software developers regarding what topics they learned from their formal education and the importance of these topics to their actual work. The analysis suggests that there is a gap between industry’s needs and software development education and the following recommendations are made: 1) Real-life projects must be included in students’ education; 2) Soft skills and business skills must be included in curricula; 3) Universities must keep the curriculum up to date; 4) Software development education must be made accessible to a diverse range of students.

Wormhole Attack Detection in Wireless Sensor Networks

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending mechanism and then proposes round trip time (RTT) and neighbor numbers based wormhole detection mechanism. The consideration of proposed mechanism is the RTT between two successive nodes and those nodes- neighbor number which is needed to compare those values of other successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of neighbors of the nodes within its radius. This system does not require any specific hardware, has good performance and little overhead and also does not consume extra energy. The proposed system is designed in ad hoc on-demand distance vector (AODV) routing protocol and analysis and simulations of the proposed system are performed in network simulator (ns-2).

Analysis of Bit Error Rate Improvement in MFSK Communication Link

Data rate, tolerable bit error rate or frame error rate and range & coverage are the key performance requirement of a communication link. In this paper performance of MFSK link is analyzed in terms of bit error rate, number of errors and total number of data processed. In the communication link model proposed, which is implemented using MATLAB block set, an improvement in BER is observed. Different parameters which effects and enables to keep BER low in M-ary communication system are also identified.