Abstract: A Simultaneous Multithreading (SMT) Processor is
capable of executing instructions from multiple threads in the same
cycle. SMT in fact was introduced as a powerful architecture to
superscalar to increase the throughput of the processor.
Simultaneous Multithreading is a technique that permits multiple
instructions from multiple independent applications or threads to
compete limited resources each cycle. While the fetch unit has been
identified as one of the major bottlenecks of SMT architecture, several
fetch schemes were proposed by prior works to enhance the fetching
efficiency and overall performance.
In this paper, we propose a novel fetch policy called queue situation
identifier (QSI) which counts some kind of long latency instructions of
each thread each cycle then properly selects which threads to fetch
next cycle. Simulation results show that in best case our fetch policy
can achieve 30% on speedup and also can reduce the data cache level 1
miss rate.
Abstract: Innovations and innovative activity get the increasing
value for successful financial and economic activity of the countries
and regions. The level of innovative sphere development determines
place of a country or a region in world economy and forms a basis of
steady economic growth. This article is devoted to different aspects
of organization of the national economic safety in the conditions of
innovative development, its problems, risks and threats. Economy
can be considered as aspiring for transition to innovative way only
with finding of economic safety: financial independence, power
stability and technological progress. There are statistical indicators,
defining the level of economic security and factors, threatening
economic safety of the state. The research is based on the analysis of
factors and indicators in conditions of innovative development. The
paper is illustrated by the examples of possible estimated system of
the economic safety level.
Abstract: Quantum cryptography offers a way of key agreement,
which is unbreakable by any external adversary. Authentication is
of crucial importance, as perfect secrecy is worthless if the identity
of the addressee cannot be ensured before sending important information.
Message authentication has been studied thoroughly, but no
approach seems to be able to explicitly counter meet-in-the-middle
impersonation attacks. The goal of this paper is the development of
an authentication scheme being resistant against active adversaries
controlling the communication channel. The scheme is built on top
of a key-establishment protocol and is unconditionally secure if built
upon quantum cryptographic key exchange. In general, the security
is the same as for the key-agreement protocol lying underneath.
Abstract: Viral influenza A subtypes H5N1 and pandemic
H1N1 (pH1N1) have worldwide emerged and transmitted. The most
common anti-influenza drug for treatment of both seasonal and
pandemic influenza viruses is oseltamivir that nowadays becomes
resistance to influenza neuraminidase. The novel long-acting drug,
laninamivir, was discovered for treatment of the patients infected
with influenza B and influenza A viruses. In the present study,
laninamivir complexed with wild-type strain of both H5N1 and
pH1N1 viruses were comparatively determined the structures and
drug-target interactions by means of molecular dynamics (MD)
simulations. The results show that the hydrogen bonding interactions
formed between laninamivir and its binding residues are likely
similar for the two systems. Additionally, the presence of
intermolecular interactions from laninamivir to the residues in the
binding pocket is established through their side chains in accordance
with hydrogen bond interactions.
Abstract: In this paper an efficient implementation of Ripemd-
160 hash function is presented. Hash functions are a special family
of cryptographic algorithms, which is used in technological
applications with requirements for security, confidentiality and
validity. Applications like PKI, IPSec, DSA, MAC-s incorporate
hash functions and are used widely today. The Ripemd-160 is
emanated from the necessity for existence of very strong algorithms
in cryptanalysis. The proposed hardware implementation can be
synthesized easily for a variety of FPGA and ASIC technologies.
Simulation results, using commercial tools, verified the efficiency of
the implementation in terms of performance and throughput. Special
care has been taken so that the proposed implementation doesn-t
introduce extra design complexity; while in parallel functionality was
kept to the required levels.
Abstract: The aim of this study was to examine and identify the
type of Iranian financial market in terms of being symmetrical or
asymmetrical and to measure relationship between type of market
and the market's indices. In this study, daily information on the
market-s Share Price Index, Industrial Index and Top Fifty Most
Active Companies during the years 1999-2010 has been used. In
addition, to determine type of the financial market, rate of return on
Security is taken into account. In this research, by using logistic
regression analysis methods, relationship of the market type with the
above mentioned indices have been examined. The results showed
that the type of the financial market has a positive significant
association with market share price index and Industrial Index. Index
of Top Fifty Most Active Companies is significantly associated with
type of financial market, however this relationship is inverse.
Abstract: There was studied dynamic of the number of
nematodes fauna of various ecosystems of Gombori Mountain Ridge
that belongs to peak of fauna dynamic. The nature of dynamic is in
general similar in all six biotypes and the difference is evident only in
total number of nematodes.
Abstract: Chikungunya virus (CHICKV) is an arboviruses belonging to family Tagoviridae and is transmitted to human through by mosquito (Aedes aegypti and Aedes albopictus) bite. A large outbreak of chikungunya has been reported in India between 2006 and 2007, along with several other countries from South-East Asia and for the first time in Europe. It was for the first time that the CHICKV outbreak has been reported with mortality from Reunion Island and increased mortality from Asian countries. CHICKV affects all age groups, and currently there are no specific drugs or vaccine to cure the disease. The need of antiviral agents for the treatment of CHICKV infection and the success of virtual screening against many therapeutically valuable targets led us to carry out the structure based drug design against Chikungunya nSP2 protease (PDB: 3TRK). Highthroughput virtual screening of publicly available databases, ZINC12 and BindingDB, has been carried out using the Openeye tools and Schrodinger LLC software packages. Openeye Filter program has been used to filter the database and the filtered outputs were docked using HTVS protocol implemented in GLIDE package of Schrodinger LLC. The top HITS were further used for enriching the similar molecules from the database through vROCS; a shape based screening protocol implemented in Openeye. The approach adopted has provided different scaffolds as HITS against CHICKV protease. Three scaffolds: Indole, Pyrazole and Sulphone derivatives were selected based on the docking score and synthetic feasibility. Derivatives of Pyrazole were synthesized and submitted for antiviral screening against CHICKV.
Abstract: Electro-hydraulic power steering (EHPS) system for
the fuel rate reduction and steering feel improvement is comprised of
ECU including the logic which controls the steering system and BL
DC motor and produces the best suited cornering force, BLDC motor,
high pressure pump integrated module and basic oil-hydraulic circuit
of the commercial HPS system.
Electro-hydraulic system can be studied in two ways such as
experimental and computer simulation. To get accurate results in
experimental study of EHPS system, the real boundary management is
necessary which is difficult task. And the accuracy of the experimental
results depends on the preparation of the experimental setup and
accuracy of the data collection. The computer simulation gives
accurate and reliable results if the simulation is carried out considering
proper boundary conditions. So, in this paper, each component of
EHPS was modeled, and the model-based analysis and control logic
was designed by using AMESim
Abstract: In rotating machinery one of the critical components
that is prone to premature failure is the rolling bearing.
Consequently, early warning of an imminent bearing failure is much
critical to the safety and reliability of any high speed rotating
machines. This study is concerned with the application of Recurrence
Quantification Analysis (RQA) in fault detection of rolling element
bearings in rotating machinery. Based on the results from this study it
is reported that the RQA variable, percent determinism, is sensitive
to the type of fault investigated and therefore can provide useful
information on bearing damage in rolling element bearings.
Abstract: In sport, human resources management gives special
attention to method of applying volunteers, their maintenance, and
participation of volunteers with each other and management
approaches for better operation of events celebrants. The recognition
of volunteers- characteristics and motives is important to notice,
because it makes the basis of their participation and commitment at
sport environment. The motivation and commitment of 281
volunteers were assessed using the organizational commitment scale,
motivation scale and personal characteristics questionnaire.The
descriptive results showed that; 64% of volunteers were women with
age average 21/24 years old. They were physical education student,
single (71/9%), without occupation (53%) and with average of 5
years sport experience. Their most important motivation was career
factor and the most important commitment factor was normative
factor. The results of examining the hypothesized showed that; age,
sport experience and education are effective in the amount of
volunteers- commitment. And the motive factors such as career,
material, purposive and protective factors also have the power to
predict the amount of sports volunteers- commitment value.
Therefore it is recommended to provide possible opportunities for
volunteers and carrying out appropriate instructional courses by
events executive managers.
Abstract: Encryption protects communication partners from
disclosure of their secret messages but cannot prevent traffic analysis
and the leakage of information about “who communicates with
whom". In the presence of collaborating adversaries, this linkability
of actions can danger anonymity. However, reliably providing
anonymity is crucial in many applications. Especially in contextaware
mobile business, where mobile users equipped with PDAs
request and receive services from service providers, providing
anonymous communication is mission-critical and challenging at the
same time. Firstly, the limited performance of mobile devices does
not allow for heavy use of expensive public-key operations which are
commonly used in anonymity protocols. Moreover, the demands for
security depend on the application (e.g., mobile dating vs. pizza
delivery service), but different users (e.g., a celebrity vs. a normal
person) may even require different security levels for the same
application. Considering both hardware limitations of mobile devices
and different sensitivity of users, we propose an anonymity
framework that is dynamically configurable according to user and
application preferences. Our framework is based on Chaum-s mixnet.
We explain the proposed framework, its configuration
parameters for the dynamic behavior and the algorithm to enforce
dynamic anonymity.
Abstract: Application of neural networks in execution of
programmed pulse width modulation (PPWM) of a voltage source
inverter (VSI) is studied in this paper. Using the proposed method it is
possible to cancel out the desired harmonics in output of VSI in
addition to control the magnitude of fundamental harmonic,
contineously. By checking the non-trained values and a performance
index, the most appropriate neural network is proposed. It is shown
that neural networks may solve the custom difficulties of practical
utilization of PPWM such as large size of memory, complex digital
circuits and controlling the magnitude of output voltage in a discrete
manner.
Abstract: Frequently a group of people jointly decide and authorize
a specific person as a representative in some business/poitical
occasions, e.g., the board of a company authorizes the chief executive
officer to close a multi-billion acquisition deal. In this paper, an
integrated proxy multi-signature scheme that allows anonymously
vetoable delegation is proposed. This protocol integrates mechanisms
of private veto, distributed proxy key generation, secure transmission
of proxy key, and existentially unforgeable proxy multi-signature
scheme. First, a provably secure Guillou-Quisquater proxy signature
scheme is presented, then the “zero-sharing" protocol is extended
over a composite modulus multiplicative group, and finally the above
two are combined to realize the GQ proxy multi-signature with
anonymously vetoable delegation. As a proxy signature scheme, this
protocol protects both the original signers and the proxy signer.
The modular design allows simplified implementation with less
communication overheads and better computation performance than
a general secure multi-party protocol.
Abstract: The possibility of intrinsic electromagnetic fields
within living cells and their resonant self-interaction and interaction
with ambient electromagnetic fields is suggested on the basis of a
theoretical and experimental study. It is reported that intrinsic
electromagnetic fields are produced in the form of radio-frequency
and infra-red photons within atoms (which may be coupled or
uncoupled) in cellular structures, such as the cell cytoskeleton and
plasma membrane. A model is presented for the interaction of these
photons among themselves or with atoms under a dipole-dipole
coupling, induced by single-photon or two-photon processes. This
resonance is manifested by conspicuous field amplification and it is
argued that it is possible for these resonant photons to undergo
tunnelling in the form of evanescent waves to a short range (of a few
nanometers to micrometres). This effect, suggested as a resonant
photon tunnelling mechanism in this report, may enable these fields
to act as intracellular signal communication devices and as bridges
between macromolecules or cellular structures in the cell
cytoskeleton, organelles or membrane. A brief overview of an
experimental technique and a review of some preliminary results are
presented, in the detection of these fields produced in living cell
membranes under physiological conditions.
Abstract: EPC Class-1 Generation-2 UHF tags, one of Radio
frequency identification or RFID tag types, is expected that most
companies are planning to use it in the supply chain in the short term
and in consumer packaging in the long term due to its inexpensive
cost. Because of the very cost, however, its resources are extremely
scarce and it is hard to have any valuable security algorithms in it. It
causes security vulnerabilities, in particular cloning the tags for
counterfeits. In this paper, we propose a product authentication
solution for anti-counterfeiting at application level in the supply chain
and mobile RFID environment. It aims to become aware of
distribution of spurious products with fake RFID tags and to provide a
product authentication service to general consumers with mobile
RFID devices like mobile phone or PDA which has a mobile RFID
reader. We will discuss anti-counterfeiting mechanisms which are
required to our proposed solution and address requirements that the
mechanisms should have.
Abstract: Contractor selection in Saudi Arabia is very important due to the large construction boom and the contractor role to get over construction risks. The need for investigating contractor selection is due to the following reasons; large number of defaulted or failed projects (18%), large number of disputes attributed to contractor during the project execution stage (almost twofold), the extension of the General Agreement on Tariffs and Trade (GATT) into construction industry, and finally the few number of researches. The selection strategy is not perfect and considered as the reason behind irresponsible contractors. As a response, this research was conducted to review the contractor selection strategies as an integral part of a long advanced research to develop a good selection model. Many techniques can be used to form a selection strategy; multi criteria for optimizing decision, prequalification to discover contractor-s responsibility, bidding process for competition, third party guarantee to enhance the selection, and fuzzy techniques for ambiguities and incomplete information.
Abstract: Commercially available lipases (Candida antarctica lipase B, Novozyme 435, Thermomyces lanuginosus lipase, and Lipozyme TL IM), as well as sol-gel immobilized lipases, have been screened for their ability to acylate regioselectively xylitol, sorbitol, and mannitol with a phenolic ester in a binary mixture of t-butanol and dimethylsulfoxide. HPLC and MALDI-TOF MS analysis revealed the exclusive formation of monoesters for all studied sugar alcohols. The lipases immobilized by the sol-gel entrapment method proved to be efficient catalysts, leading to high conversions (up to 60%) in the investigated acylation reactions. From a sequence of silane precursors with different nonhydrolyzable groups in their structure, the presence of octyl and i-butyl group was most beneficial for the catalytic activity of sol-gel entrapped lipases in the studied process.
Abstract: Polymer-like organic thin films were deposited on both
aluminum alloy type 6061 and glass substrates at room temperature by
Plasma Enhanced Chemical Vapor Deposition (PECVD) methodusing
benzene and hexamethyldisiloxane (HMDSO) as precursor materials.
The surface and physical properties of plasma-polymerized organic
thin films were investigated at different r.f. powers. The effects of
benzene/argon ratio on the properties of plasma polymerized benzene
films were also investigated. It is found that using benzene alone
results in a non-coherent and non-adherent powdery deposited
material. The chemical structure and surface properties of the asgrown
plasma polymerized thin films were analyzed on glass
substrates with FTIR and contact angle measurements. FTIR spectra
of benzene deposited film indicated that the benzene rings are
preserved when increasing benzene ratio and/or decreasing r.f.
powers. FTIR spectra of HMDSO deposited films indicated an
increase of the hydrogen concentration and a decrease of the oxygen
concentration with the increase of r.f. power. The contact angle (θ) of
the films prepared from benzene was found to increase by about 43%
as benzene ratio increases from 10% to 20%. θ was then found to
decrease to the original value (51°) when the benzene ratio increases
to 100%. The contact angle, θ, for both benzene and HMDSO
deposited films were found to increase with r.f. power. This signifies
that the plasma polymerized organic films have substantially low
surface energy as the r.f power increases. The corrosion resistance of
aluminum alloy substrate both bare and covered with plasma
polymerized thin films was carried out by potentiodynamic
polarization measurements in standard 3.5 wt. % NaCl solution at
room temperature. The results indicate that the benzene and HMDSO
deposited films are suitable for protection of the aluminum substrate
against corrosion. The changes in the processing parameters seem to
have a strong influence on the film protective ability. Surface
roughness of films deposited on aluminum alloy substrate was
investigated using scanning electron microscopy (SEM). The SEM
images indicate that the surface roughness of benzene deposited films
increase with decreasing the benzene ratio. SEM images of benzene
and HMDSO deposited films indicate that the surface roughness
decreases with increasing r.f. power. Studying the above parameters
indicate that the films produced are suitable for specific practical
applications.
Abstract: As the information age matures, major social
infrastructures such as communication, finance, military and energy,
have become ever more dependent on information communication
systems. And since these infrastructures are connected to the Internet,
electronic intrusions such as hacking and viruses have become a new
security threat. Especially, disturbance or neutralization of a major
social infrastructure can result in extensive material damage and social
disorder. To address this issue, many nations around the world are
researching and developing various techniques and information
security policies as a government-wide effort to protect their
infrastructures from newly emerging threats. This paper proposes an
evaluation method for information security levels of CIIP (Critical
Information Infrastructure Protection), which can enhance the security
level of critical information infrastructure by checking the current
security status and establish security measures accordingly to protect
infrastructures effectively.