Abstract: TiO2 thin films have been prepared by the sol-gel dipcoating
technique in order to elaborate antireflective thin films for
monocrystalline silicon (mono-Si). The titanium isopropoxyde was
chosen as a precursor with hydrochloric acid as a catalyser for
preparing a stable solution. The optical properties have been tailored
with varying the solution concentration, the withdrawn speed, and the
heat-treatment. We showed that using a TiO2 single layer with 64.5
nm in thickness, heat-treated at 450°C or 300°C reduces the mono-Si
reflection at a level lower than 3% over the broadband spectral
domains [669-834] nm and [786-1006] nm respectively. Those latter
performances are similar to the ones obtained with double layers of
low and high refractive index glasses respectively.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: Medulloblastoma (MB) is one of the most prevalent
brain tumours among paediatrics. Although its management has
evolved over time still there is need to find new therapeutic targets
for MB that can result in less normal tissue toxicity while improving
survival and reducing recurrence. This literature review is aimed at
finding new potential therapeutic targets for MB focusing on viruses
that can be used as potential targets for MB. The review also gives an
over-view of management of paediatric Medulloblastoma focusing on
Radiotherapy management.
Abstract: The focal aspire of e-Government (eGovt) is to offer
citizen-centered service delivery. Accordingly, the citizenry
consumes services from multiple government agencies through
national portal. Thus, eGovt is an enterprise with the primary
business motive of transparent, efficient and effective public services
to its citizenry and its logical structure is the eGovernment Enterprise
Architecture (eGEA). Since eGovt is IT oriented multifaceted
service-centric system, EA doesn’t do much on an automated
enterprise other than the business artifacts. Service-Oriented
Architecture (SOA) manifestation led some governments to pertain
this in their eGovts, but it limits the source of business artifacts. The
concurrent use of EA and SOA in eGovt executes interoperability and
integration and leads to Service-Oriented e-Government Enterprise
(SOeGE). Consequently, agile eGovt system becomes a reality. As an
IT perspective eGovt comprises of centralized public service artifacts
with the existing application logics belong to various departments at
central, state and local level. The eGovt is renovating to SOeGE by
apply the Service-Orientation (SO) principles in the entire system.
This paper explores IT perspective of SOeGE in India which
encompasses the public service models and illustrated with a case
study the Passport service of India.
Abstract: Cloud computing has provided the impetus for change
in the demand, sourcing, and consumption of IT-enabled services.
The technology developed from an emerging trend towards a ‘musthave’.
Many organizations harnessed on the quick-wins of cloud
computing within the last five years but nowadays reach a plateau
when it comes to sustainable savings and performance. This study
aims to investigate what is needed from an organizational perspective
to make cloud computing a sustainable success. The study was
carried out in Germany among senior IT professionals, both in
management and delivery positions. Our research shows that IT
executives must be prepared to realign their IT workforce to sustain
the advantage of cloud computing for today and the near future.
While new roles will undoubtedly emerge, roles alone cannot ensure
the success of cloud deployments. What is needed is a change in the
IT workforce’s business behaviour, or put more simply, the ways in
which the IT personnel works. It gives clear guidance on which
dimensions of an employees’ working behaviour need to be adapted.
The practical implications are drawn from a series of semi-structured
interviews, resulting in a high-level workforce enablement plan.
Lastly, it elaborates on tools and gives clear guidance on which
pitfalls might arise along the proposed workforce enablement
process.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: The inspection of underneath vehicle system has been
given significant attention by governments after the threat of
terrorism become more prevalent. New technologies such as mobile
robots and computer vision are led to have more secure environment.
This paper proposed that a mobile robot like Aria robot can be used
to search and inspect the bombs under parking a lot vehicle. This
robot is using fuzzy logic and subsumption algorithms to control the
robot that movies underneath the vehicle. An OpenCV library and
laser Hokuyo are added to Aria robot to complete the experiment for
under vehicle inspection. This experiment was conducted at the
indoor environment to demonstrate the efficiency of our methods to
search objects and control the robot movements under vehicle. We
got excellent results not only by controlling the robot movement but
also inspecting object by the robot camera at same time. This success
allowed us to know the requirement to construct a new cost effective
robot with more functionality.
Abstract: The Smart Help for persons with disability (PWD) is a
part of the project SMARTDISABLE which aims to develop relevant
solution for PWD that target to provide an adequate workplace
environment for them. It would support PWD needs smartly through
smart help to allow them access to relevant information and
communicate with other effectively and flexibly, and smart editor
that assist them in their daily work. It will assist PWD in knowledge
processing and creation as well as being able to be productive at the
work place. The technical work of the project involves design of a
technological scenario for the Ambient Intelligence (AmI) - based
assistive technologies at the workplace consisting of an integrated
universal smart solution that suits many different impairment
conditions and will be designed to empower the Physically disabled
persons (PDP) with the capability to access and effectively utilize the
ICTs in order to execute knowledge rich working tasks with
minimum efforts and with sufficient comfort level. The proposed
technology solution for PWD will support voice recognition along
with normal keyboard and mouse to control the smart help and smart
editor with dynamic auto display interface that satisfies the
requirements for different PWD group. In addition, a smart help will
provide intelligent intervention based on the behavior of PWD to
guide them and warn them about possible misbehavior. PWD can
communicate with others using Voice over IP controlled by voice
recognition. Moreover, Auto Emergency Help Response would be
supported to assist PWD in case of emergency. This proposed
technology solution intended to make PWD very effective at the
work environment and flexible using voice to conduct their tasks at
the work environment. The proposed solution aims to provide
favorable outcomes that assist PWD at the work place, with the
opportunity to participate in PWD assistive technology innovation
market which is still small and rapidly growing as well as upgrading
their quality of life to become similar to the normal people at the
workplace. Finally, the proposed smart help solution is applicable in
all workplace setting, including offices, manufacturing, hospital, etc.
Abstract: Urban public spaces are sutured with a range of
surveillance and sensor technologies that claim to enable new forms
of ‘data based citizen participation’, but also increase the tendency
for ‘function-creep’, whereby vast amounts of data are gathered,
stored and analysed in a broad application of urban surveillance. This
kind of monitoring and capacity for surveillance connects with
attempts by civic authorities to regulate, restrict, rebrand and reframe
urban public spaces. A direct consequence of the increasingly
security driven, policed, privatised and surveilled nature of public
space is the exclusion or ‘unfavourable inclusion’ of those considered
flawed and unwelcome in the ‘spectacular’ consumption spaces of
many major urban centres. In the name of urban regeneration,
programs of securitisation, ‘gentrification’ and ‘creative’ and ‘smart’
city initiatives refashion public space as sites of selective inclusion
and exclusion. In this context of monitoring and control procedures,
in particular, children and young people’s use of space in parks,
neighbourhoods, shopping malls and streets is often viewed as a
threat to the social order, requiring various forms of remedial action.
This paper suggests that cities, places and spaces and those who
seek to use them, can be resilient in working to maintain and extend
democratic freedoms and processes enshrined in Marshall’s concept
of citizenship, calling sensor and surveillance systems to account.
Such accountability could better inform the implementation of public
policy around the design, build and governance of public space and
also understandings of urban citizenship in the sensor saturated urban
environment.
Abstract: Today’s modern interconnected power system is
highly complex in nature. In this, one of the most important
requirements during the operation of the electric power system is the
reliability and security. Power and frequency oscillation damping
mechanism improve the reliability. Because of power system
stabilizer (PSS) low speed response against of major fault such as
three phase short circuit, FACTs devise that can control the network
condition in very fast time, are becoming popular. But FACTs
capability can be seen in a major fault present when nonlinear models
of FACTs devise and power system equipment are applied. To realize
this aim, the model of multi-machine power system with FACTs
controller is developed in MATLAB/SIMULINK using Sim Power
System (SPS) blockiest. Among the FACTs device, Static
synchronous series compensator (SSSC) due to high speed changes
its reactance characteristic inductive to capacitive, is effective power
flow controller. Tuning process of controller parameter can be
performed using different method. But Genetic Algorithm (GA)
ability tends to use it in controller parameter tuning process. In this
paper firstly POD controller is used to power oscillation damping.
But in this station, frequency oscillation dos not has proper damping
situation. So FOD controller that is tuned using GA is using that
cause to damp out frequency oscillation properly and power
oscillation damping has suitable situation.
Abstract: Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.
Abstract: E-service quality plays a significant role to achieve
success or failure in any organization, offering services online. It will
increase the competition among the organizations, to attract the
customers on the basis of the quality of service provided by the
organization. Better e-service quality will enhance the relationship
with customers and their satisfaction. So the measurement of eservice
quality is very important but it is a complex process due to
the complex nature of services. Literature predicts that there is a lack
of universal definition of e-service quality. The e-service quality
measures in banking have great importance in achieving high
customer base. This paper proposes a conceptual model for
measuring e-service quality in Indian Banking Industry. Nine
dimensions reliability, ease of use, personalization, security and trust,
website aesthetic, responsiveness, contact and fulfillment had been
identified. The results of this paper may help to develop a proper
scale to measure the e-service quality in Indian Banking Industry,
which may assist to maintain and improve the performance and
effectiveness of e-service quality to retain customers.
Abstract: This paper describes a logical method to enhance
security on the grid computing to restrict the misuse of the grid
resources. This method is an economic and efficient one to avoid the
usage of the special devices. The security issues, techniques and
solutions needed to provide a secure grid computing environment are
described. A well defined process for security management among
the resource accesses and key holding algorithm is also proposed. In
this method, the identity management, access control and
authorization and authentication are effectively handled.
Abstract: Aim of this work was to study the genetic basis for oil
accumulation in olive fruit via tracking DGAT2 (Diacylglycerol
acyltransferase type-2) gene in three Egyptian Origen Olive cultivars
namely Toffahi, Hamed and Maraki using molecular marker
techniques and bioinformatics tools. Results illustrate that, firstly:
specific genomic band of Maraki cultivars was identified as DGAT2
(Diacylglycerol acyltransferase type-2) and identical for this gene in
Olea europaea with 100% of similarity. Secondly, differential
genomic band of Maraki cultivars which produced from RAPD
fingerprinting technique reflected predicted distinguished sequence
which identified as DGAT2 (Diacylglycerol acyltransferase type-2)
in Fragaria vesca subsp. Vesca with 76% of sequential similarity.
Third and finally, specific genomic specific band of Hamed cultivars
was identified as two fragments, 1- Olea europaea cultivar Koroneiki
diacylglycerol acyltransferase type 2 mRNA, complete cds with two
matches regions with 99% or 2- Predicted: Fragaria vesca subsp.
vesca diacylglycerol O-acyltransferase 2-like (LOC101313050),
mRNA with 86 % of similarity.
Abstract: Wireless sensor network is vulnerable to a wide range
of attacks. Recover secrecy after compromise, to develop technique
that can detect intrusions and able to resilient networks that isolates
the point(s) of intrusion while maintaining network connectivity for
other legitimate users. To define new security metrics to evaluate
collaborative intrusion resilience protocol, by leveraging the sensor
mobility that allows compromised sensors to recover secure state
after compromise. This is obtained with very low overhead and in a
fully distributed fashion using extensive simulations support our
findings.
Abstract: We propose a new alternative method for imposing
fluid-solid boundary conditions in simulations of Multiparticle
Collision Dynamics. Our method is based on the introduction of
an explicit potential force acting between the fluid particles and a
surface representing a solid boundary. We show that our method can
be used in simulations of plane Poiseuille flows. Important quantities
characterizing the flow and the fluid-solid interaction like the slip
coefficient at the solid boundary and the effective viscosity of the
fluid, are measured in terms of the set of independent parameters
defining the numerical implementation. We find that our method can
be used to simulate the correct hydrodynamic flow within a wide
range of values of these parameters.
Abstract: In the cloud computing hierarchy IaaS is the lowest
layer, all other layers are built over it. Thus it is the most important
layer of cloud and requisite more importance. Along with advantages
IaaS faces some serious security related issue. Mainly Security
focuses on Integrity, confidentiality and availability. Cloud
computing facilitate to share the resources inside as well as outside of
the cloud. On the other hand, cloud still not in the state to provide
surety to 100% data security. Cloud provider must ensure that end
user/client get a Quality of Service. In this report we describe
possible aspects of cloud related security.
Abstract: In this paper it was examined the influence of margin
regulation on stock market volatility in EU 1993 – 2014. Regulating
margin requirements or haircuts for securities financing transactions
has for a long time been considered as a potential tool to limit the
build-up of leverage and dampen volatility in financial markets. The
margin requirement dictates how much investors can borrow against
these securities. Margin can be an important part of investment.
Using daily and monthly stock returns and there is no convincing
evidence that EU Regulation margin requirements have served to
dampen stock market volatility. In this paper was detected the
expected negative relation between margin requirements and the
amount of margin credit outstanding. Also, it confirmed that changes
in margin requirements by the EU regulation have tended to follow
than lead changes in market volatility. For the analysis have been
used the modified Levene statistics to test whether the standard
deviation of stock returns in the 25, 50 and 100 days preceding
margin changes is the same as that in the succeeding 25, 50 and 100
days. The analysis started in May 1993 when it was first empowered
to set the initial margin requirement and the last sample was in May
2014. To test whether margin requirements influence stock market
volatility over the long term, the sample of stock returns was divided
into 14 periods, according to the 14 changes in margin requirements.
Abstract: In this paper, we have proposed a parallel IDS and
honeypot based approach to detect and analyze the unknown and
known attack taxonomy for improving the IDS performance and
protecting the network from intruders. The main theme of our
approach is to record and analyze the intruder activities by using both
the low and high interaction honeypots. Our architecture aims to
achieve the required goals by combing signature based IDS,
honeypots and generate the new signatures. The paper describes the
basic component, design and implementation of this approach and
also demonstrates the effectiveness of this approach to reduce the
probability of network attacks.