Abstract: Attack graph is an integral part of modeling the
overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine
what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at
the whole network, which makes the process of AGG complex and
non-scalable. In this paper, we propose a new approach which is
simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications
among all the atomic domains. Our approach simplifies the process
of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic
domains which makes the process of AGG scalable.
Abstract: This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.
Abstract: In studies on psychological health and children-s personality development and in researches on emotional distresses, children-s behavioral disorders associated with mother deprivation, are known as the major cause of mental disorders. Therefore, for identification of children-s attachment styles in nursery-s children are of significant importance. For this purpose, to compare the attachment styles between children of nursery with those provided care by their families, the Separation Anxiety Test (SAT) of Slough and et al was administered on 72 children (36 in nursery and 36 family-cared). The results indicated, almost half of children in both groups have insecure attachment styles. Tendency ratio of both groups of children towards Secure and Ambivalent Insecure styles are almost the same. However the avoidant style of attachment in children of nursery is more than those provided care by their families. The children under family care compared to the children of nursery, in the situations of separation from their mothers in the first day of school and sleeping in their room, have shown more self reliance.
Abstract: In this study integral form and new recursive formulas
for Favard constants and some connected with them numeric and
Fourier series are obtained. The method is based on preliminary
integration of Fourier series which allows for establishing finite
recursive representations for the summation. It is shown that the
derived recursive representations are numerically more effective than
known representations of the considered objects.
Abstract: Current advancements in nanotechnology are dependent
on the capabilities that can enable nano-scientists to extend their eyes
and hands into the nano-world. For this purpose, a haptics (devices
capable of recreating tactile or force sensations) based system for
AFM (Atomic Force Microscope) is proposed. The system enables
the nano-scientists to touch and feel the sample surfaces, viewed
through AFM, in order to provide them with better understanding of
the physical properties of the surface, such as roughness, stiffness and
shape of molecular architecture. At this stage, the proposed work uses
of ine images produced using AFM and perform image analysis to
create virtual surfaces suitable for haptics force analysis. The research
work is in the process of extension from of ine to online process
where interaction will be done directly on the material surface for
realistic analysis.
Abstract: The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time secure image processing. In this research, Embedded Zerotree Wavelet (EZW) encoder which specially designs for wavelet compression is examined. With this algorithm, three methods are proposed to reduce the processing time, space and security protection that will be secured enough to protect the data.
Abstract: The excessive use of agricultural pesticides and the
resulting contamination of food and beds of rivers have been a
recurring problem nowadays. Some of these substances can cause
changes in endocrine balance and impair reproductive function of
human and animal population. In the present study, we evaluated the
possible effects of the fungicide cuprous copper oxide Sandoz® on
pregnant Wistar rats. They received a daily oral administration of 103
or 3.103 mg/kg of the fungicide from the 6th to the 15th day of
gestation. On day 21 of gestation, the maternal and fetal toxicity
parameters and indices were determined. The administration of
cuprous oxide (Copper Sandoz) in Wistar rats, the period of
organogenesis, revealed no evidence of maternal toxicity or embryo
at the studied doses.
Abstract: A high-performance Monte Carlo simulation, which
simultaneously takes diffusion-controlled and chain-length-dependent
bimolecular termination reactions into account, is developed to
simulate atom transfer radical copolymerization of styrene and nbutyl
acrylate. As expected, increasing initial feed fraction of styrene
raises the fraction of styrene-styrene dyads (fAA) and reduces that of
n-butyl acrylate dyads (fBB). The trend of variation in randomness
parameter (fAB) during the copolymerization also varies significantly.
Also, there is a drift in copolymer heterogeneity and the highest drift
occurs in the initial feeds containing lower percentages of styrene, i.e.
20% and 5%.
Abstract: When dealing with safety in structures, the connections between structural components play an important role. Robustness of a structure as a whole depends both on the load- bearing capacity of the structural component and on the structures capacity to resist total failure, even though a local failure occurs in a component or a connection between components. To avoid progressive collapse it is necessary to be able to carry out a design for connections. A connection may be executed with anchors to withstand local failure of the connection in structures built with prefabricated components. For the design of these anchors, a model is developed for connections in structures performed in prefabricated autoclaved aerated concrete components. The design model takes into account the effect of anchors placed close to the edge, which may result in splitting failure. Further the model is developed to consider the effect of reinforcement diameter and anchor depth. The model is analytical and theoretically derived assuming a static equilibrium stress distribution along the anchor. The theory is compared to laboratory test, including the relevant parameters and the model is refined and theoretically argued analyzing the observed test results. The method presented can be used to improve safety in structures or even optimize the design of the connections
Abstract: A new approach to predict the 3D structures of proteins by combining the knowledge-based method and Molecular Dynamics Simulation is presented on the chicken villin headpiece subdomain (HP-36). Comparative modeling is employed as the knowledge-based method to predict the core region (Ala9-Asn28) of the protein while the remaining residues are built as extended regions (Met1-Lys8; Leu29-Phe36) which then further refined using Molecular Dynamics Simulation for 120 ns. Since the core region is built based on a high sequence identity to the template (65%) resulting in RMSD of 1.39 Å from the native, it is believed that this well-developed core region can act as a 'nucleation center' for subsequent rapid downhill folding. Results also demonstrate that the formation of the non-native contact which tends to hamper folding rate can be avoided. The best 3D model that exhibits most of the native characteristics is identified using clustering method which then further ranked based on the conformational free energies. It is found that the backbone RMSD of the best model compared to the NMR-MDavg is 1.01 Å and 3.53 Å, for the core region and the complete protein, respectively. In addition to this, the conformational free energy of the best model is lower by 5.85 kcal/mol as compared to the NMR-MDavg. This structure prediction protocol is shown to be effective in predicting the 3D structure of small globular protein with a considerable accuracy in much shorter time compared to the conventional Molecular Dynamics simulation alone.
Abstract: Advances in processors architecture, such as multicore,
increase the size of complexity of parallel computer systems.
With multi-core architecture there are different parallel languages
that can be used to run parallel programs. One of these languages is
OpenMP which embedded in C/Cµ or FORTRAN. Because of this
new architecture and the complexity, it is very important to evaluate
the performance of OpenMP constructs, kernels, and application
program on multi-core systems. Performance is the activity of
collecting the information about the execution characteristics of a
program. Performance tools consists of at least three interfacing
software layers, including instrumentation, measurement, and
analysis. The instrumentation layer defines the measured
performance events. The measurement layer determines what
performance event is actually captured and how it is measured by the
tool. The analysis layer processes the performance data and
summarizes it into a form that can be displayed in performance tools.
In this paper, a number of OpenMP performance tools are surveyed,
explaining how each is used to collect, analyse, and display data
collection.
Abstract: Nowadays, keyless entry systems are widely adopted
for vehicle immobilizer systems due to both advantages of security and
convenience. Keyless entry systems could overcome brute-force key
guessing attack, statistics attack and masquerade attack, however,
they can't prevent from thieves stealing behavior. In this paper, we
proposed a new architecture try to improve the existent flaws. The
integration of the keyless entry system and the fingerprint
identification technology is more suitable to implement on the
portable transponder to achieve higher security needs. We also adopt
and modify AES security protocol for life expectancy and security of
the portable transponder. In addition, the identification of a driver's
fingerprint makes the service of automatic reinstatement of a driver's
preferences become possible. Our design can satisfy not only the three
kinds of previous illegal attacks, but also the stealing situation.
Furthermore, many practical factors, such as costs, life expectancy and
performance, have been well considered in the design of portable
transponder.
Abstract: This paper will present the implementation of QoS
policy based system by utilizing rules on Access Control List (ACL)
over Layer 3 (L3) switch. Also presented is the architecture on that
implementation; the tools being used and the result were gathered.
The system architecture has an ability to control ACL rules which are
installed inside an external L3 switch. ACL rules used to instruct the
way of access control being executed, in order to entertain all traffics
through that particular switch. The main advantage of using this
approach is that the single point of failure could be prevented when
there are any changes on ACL rules inside L3 switches. Another
advantage is that the agent could instruct ACL rules automatically
straight away based on the changes occur on policy database without
configuring them one by one. Other than that, when QoS policy
based system was implemented in distributed environment, the
monitoring process can be synchronized easily due to the automate
process running by agent over external policy devices.
Abstract: Proton transfer and hydrogen bonding are two aspects
of the chemistry of hydrogen that respectively govern the behaviour
and structure of many molecules, both simple and complex. All the
theoretical enol and keto conformations of 1,3-diphenyl-1,3-
propandion known as dibenzoylmethane (DBM), have been
investigated by means of atoms in molecules (AIM) theory. It was
found that the most stable conformers are those stabilized by
hydrogen bridges.The aim of the present paper is a thorough
conformational analysis of DBM (with special attention on chelated
cis-enol conformers) in order to obtain detailed information on the
geometrical parameters, relative stabilities and rotational motion of
the phenyl groups. It is also important to estimate the barrier height
for ptoton transfer and hydrogen bond strength, which are the main
factors governing conformational stability.
Abstract: The present paper is a case study about exploitation of
Kheir Abad river (Khoozestan, Iran) water resources and the
problems caused by river sediments around the pumping stations.
The weak points and strong points of Boneh Basht pumping station
have been studied by experienced experts, work teams, and
consulting engineers and technical and executive solutions have been
suggested. Therefore, the suggestions of this article are based on the
performed studies and are proposed in order to evaluate the logical
solutions.
Rather complicated processes resulting from the interaction of
water flows and sediments observed at Boneh Basht pumping station
occur at other pumping stations in almost the same way. Therefore,
Boneh Basht pumping station can be selected as a sample (pilot) and
up-to-date theories and experiences can be applied to this station and
the results can be offered to other stations.
Abstract: This paper analysis performance of disbursement
procedure of public works project in Thailand. The results of
research were summarised based on contracts, submitted invoice,
inspection dated, copies of disbursement dated between client and
their main contractor and interviewed with persons involved in
central and local government projects during 1994-2008 in Thailand.
The data collection was to investigate the disbursement procedure
related to performance in disbursement during construction period
(Planned duration of contract against Actual execution date in each
month). A graphical presentation of a duration analysis of the
projects illustrated significant disbursement formation in each
project. It was established that the shortage of staff, the financial
stability of clients, bureaucratic, method of disbursement and
economics situation has play major role on performance of
disbursement to their main contractors.
Abstract: Spatial understanding and the understanding of
dynamic change in the spatial structure of molecules during a
reaction is essential for designing new molecules. Knowing the
physical processes in the reactions helps to speed up the designing
process. To support the designer with the correct representation of
the designed molecule as well as showing the dynamic behavior of
the whole reacting system is the goal of our application. Our system
shows the spatial deformation of the molecules at every time interval
by minimizing the energy level of the molecules. The position and
orientation of the molecules can be intuitively controlled by
manipulating objects of the real world using Augmented Reality
techniques. Our approach has the potential to speed up the design of
new molecules and help students to understand the chemical
processes better.
Abstract: Electronic banking must be secure and easy to use and
many banks heavily advertise an apparent of 100% secure system
which is contestable in many points. In this work, an alternative
approach to the design of e-banking system, through a new solution
for user authentication and security with digital certificate called
LumaCert is introduced. The certificate applies new algorithm for
asymmetric encryption by utilizing two mathematical operators
called Pentors and UltraPentors. The public and private key in this
algorithm represent a quadruple of parameters which are directly
dependent from the above mentioned operators. The strength of the
algorithm resides in the inability to find the respective Pentor and
UltraPentor operator from the mentioned parameters.
Abstract: In this work we report the recent progresses that have been achieved by our group in the last half decade on the field of computational proteomics. Specifically, we discuss the application of Molecular Dynamics Simulations and Electronic Structure Calculations in drug design, in the clarification of the structural and dynamic properties of proteins and enzymes and in the understanding of the catalytic and inhibition mechanism of cancer-related enzymes. A set of examples illustrate the concepts and help to introduce the reader into this important and fast moving field.
Abstract: Most of researches for conventional simulations were
studied focusing on flocks with a single species. While there exist the
flocking behaviors with a single species in nature, the flocking
behaviors are frequently observed with multi-species. This paper
studies on the flocking simulation for heterogeneous agents. In order
to simulate the flocks for heterogeneous agents, the conventional
method uses the identifier of flock, while the proposed method defines
the feature vector of agent and uses the similarity between agents by
comparing with those feature vectors. Based on the similarity, the
paper proposed the attractive force and repulsive force and then
executed the simulation by applying two forces. The results of
simulation showed that flock formation with heterogeneous agents is
very natural in both cases. In addition, it showed that unlike the
existing method, the proposed method can not only control the density
of the flocks, but also be possible for two different groups of agents to
flock close to each other if they have a high similarity.