Abstract: Various security APIs (Application Programming
Interfaces) are being used in a variety of application areas requiring
the information security function. However, these standards are not
compatible, and the developer must use those APIs selectively
depending on the application environment or the programming
language. To resolve this problem, we propose the standard draft of
the information security component, while SSL (Secure Sockets
Layer) using the confidentiality and integrity component interface has
been implemented to verify validity of the standard proposal. The
implemented SSL uses the lower-level SSL component when
establishing the RMI (Remote Method Invocation) communication
between components, as if the security algorithm had been
implemented by adding one more layer on the TCP/IP.
Abstract: A potentially serious problem with current payment systems is that their underlying hard problems from number theory may be solved by either a quantum computer or unanticipated future advances in algorithms and hardware. A new quantum payment system is proposed in this paper. The suggested system makes use of fundamental principles of quantum mechanics to ensure the unconditional security without prior arrangements between customers and vendors. More specifically, the new system uses Greenberger-Home-Zeilinger (GHZ) states and Quantum Key Distribution to authenticate the vendors and guarantee the transaction integrity.
Abstract: Quaternary InxAlyGa1-x-yN semiconductors have
attracted much research interest because the use of this quaternary
offer the great flexibility in tailoring their band gap profile while
maintaining their lattice-matching and structural integrity. The
structural and optical properties of InxAlyGa1-x-yN alloys grown by
molecular beam epitaxy (MBE) is presented. The structural quality of
InxAlyGa1-x-yN layers was characterized using high-resolution X-ray
diffraction (HRXRD). The results confirm that the InxAlyGa1-x-yN
films had wurtzite structure and without phase separation. As the In
composition increases, the Bragg angle of the (0002) InxAlyGa1-x-yN
peak gradually decreases, indicating the increase in the lattice constant
c of the alloys. FWHM of (0002) InxAlyGa1-x-yN decreases with
increasing In composition from 0 to 0.04, that could indicate the
decrease of quality of the samples due to point defects leading to
non-uniformity of the epilayers. UV-VIS spectroscopy have been used
to study the energy band gap of InxAlyGa1-x-yN. As the indium (In)
compositions increases, the energy band gap decreases. However, for
InxAlyGa1-x-yN with In composition of 0.1, the band gap shows a
sudden increase in energy. This is probably due to local alloy
compositional fluctuations in the epilayer. The bowing parameter
which appears also to be very sensitive on In content is investigated
and obtained b = 50.08 for quaternary InxAlyGa1-x-yN alloys. From
photoluminescence (PL) measurement, green luminescence (GL)
appears at PL spectrum of InxAlyGa1-x-yN, emitted for all x at ~530 nm
and it become more pronounced as the In composition (x) increased,
which is believed cause by gallium vacancies and related to isolated
native defects.
Abstract: Among all mechanical joining processes, welding has
been employed for its advantage in design flexibility, cost saving,
reduced overall weight and enhanced structural performance.
However, for structures made of relatively thin components, welding
can introduce significant buckling distortion which causes loss of
dimensional control, structural integrity and increased fabrication
costs. Different parameters can affect buckling behavior of welded
thin structures such as, heat input, welding sequence, dimension of
structure. In this work, a 3-D thermo elastic-viscoplastic finite
element analysis technique is applied to evaluate the effect of shell
dimensions on buckling behavior and entropy generation of welded
thin shells. Also, in the present work, the approximated longitudinal
transient stresses which produced in each time step, is applied to the
3D-eigenvalue analysis to ratify predicted buckling time and
corresponding eigenmode. Besides, the possibility of buckling
prediction by entropy generation at each time is investigated and it is
found that one can predict time of buckling with drawing entropy
generation versus out of plane deformation. The results of finite
element analysis show that the length, span and thickness of welded
thin shells affect the number of local buckling, mode shape of global
buckling and post-buckling behavior of welded thin shells.
Abstract: The issue of leadership has been investigated from
several perspectives; however, very less from ethical perspective.
With the growing number of corporate scandals and unethical roles
played by business leaders in several parts of the world, the need to
examine leadership from ethical perspective cannot be over
emphasized. The importance of leadership credibility has been
discussed in the authentic model of leadership. Authentic leaders
display high degree of integrity, have deep sense of purpose, and
committed to their core values. As a result they promote a more
trusting relationship in their work groups that translates into several
positive outcomes. The present study examined how authentic
leadership contribute to subordinates- trust in leadership and how this
trust, in turn, predicts subordinates- work engagement. A sample of
395 employees was randomly selected from several local banks
operating in Malaysia. Standardized tools such as ALQ, OTI, and
EEQ were employed. Results indicated that authentic leadership
promoted subordinates- trust in leader, and contributed to work
engagement. Also, interpersonal trust predicted employees- work
engagement as well as mediated the relationship between this style of
leadership and employees- work engagement.
Abstract: Insider abuse has recently been reported as one of
the more frequently occurring security incidents, suggesting that
more security is required for detecting and preventing unauthorised
financial transactions entered by authorised users. To address the
problem, and based on the observation that all authorised interbanking
financial transactions trigger or are triggered by other
transactions in a workflow, we have developed a security solution
based on a redefined understanding of an audit workflow. One audit
workflow where there is a log file containing the complete workflow
activity of financial transactions directly related to one financial
transaction (an electronic deal recorded at an e-trading system). The
new security solution contemplates any two parties interacting on
the basis of financial transactions recorded by their users in related
but distinct automated financial systems. In the new definition interorganizational
and intra-organization interactions can be described
in one unique audit trail. This concept expands the current ideas of
audit trails by adapting them to actual e-trading workflow activity, i.e.
intra-organizational and inter-organizational activity. With the above,
a security auditing service is designed to detect integrity drifts with
and between organizations in order to detect unauthorised financial
transactions entered by authorised users.
Abstract: In this paper, the detection of a fault in the Global Positioning System (GPS) measurement is addressed. The class of faults considered is a bias in the GPS pseudorange measurements. This bias is modeled as an unknown constant. The fault could be the result of a receiver fault or signal fault such as multipath error. A bias bank is constructed based on set of possible fault hypotheses. Initially, there is equal probability of occurrence for any of the biases in the bank. Subsequently, as the measurements are processed, the probability of occurrence for each of the biases is sequentially updated. The fault with a probability approaching unity will be declared as the current fault in the GPS measurement. The residual formed from the GPS and Inertial Measurement Unit (IMU) measurements is used to update the probability of each fault. Results will be presented to show the performance of the presented algorithm.
Abstract: Optimization of cutting parameters important in precision machining in regards to efficiency and surface integrity of the machined part. Usually productivity and precision in machining is limited by the forces emanating from the cutting process. Due to the inherent varying nature of the workpiece in terms of geometry and material composition, the peak cutting forces vary from point to point during machining process. In order to increase productivity without compromising on machining accuracy, it is important to control these cutting forces. In this paper a fuzzy logic control algorithm is developed that can be applied in the control of peak cutting forces in milling of spherical surfaces using ball end mills. The controller can adaptively vary the feedrate to maintain allowable cutting force on the tool. This control algorithm is implemented in a computer numerical control (CNC) machine. It has been demonstrated that the controller can provide stable machining and improve the performance of the CNC milling process by varying feedrate.
Abstract: In recent years image watermarking has become an
important research area in data security, confidentiality and image
integrity. Many watermarking techniques were proposed for medical
images. However, medical images, unlike most of images, require
extreme care when embedding additional data within them because
the additional information must not affect the image quality and
readability. Also the medical records, electronic or not, are linked to
the medical secrecy, for that reason, the records must be confidential.
To fulfill those requirements, this paper presents a lossless
watermarking scheme for DICOM images. The proposed a fragile
scheme combines two reversible techniques based on difference
expansion for patient's data hiding and protecting the region of
interest (ROI) with tamper detection and recovery capability.
Patient's data are embedded into ROI, while recovery data are
embedded into region of non-interest (RONI). The experimental
results show that the original image can be exactly extracted from the
watermarked one in case of no tampering. In case of tampered ROI,
tampered area can be localized and recovered with a high quality
version of the original area.
Abstract: 'Secure routing in Mobile Ad hoc networks' and
'Internet connectivity to Mobile Ad hoc networks' have been dealt
separately in the past research. This paper proposes a light weight
solution for secure routing in integrated Mobile Ad hoc Network
(MANET)-Internet. The proposed framework ensures mutual
authentication of Mobile Node (MN), Foreign Agent (FA) and Home
Agent (HA) to avoid various attacks on global connectivity and
employs light weight hop-by-hop authentication and end-to-end
integrity to protect the network from most of the potential security
attacks. The framework also uses dynamic security monitoring
mechanism to monitor the misbehavior of internal nodes. Security
and performance analysis show that our proposed framework
achieves good security while keeping the overhead and latency
minimal.
Abstract: Information hiding for authenticating and verifying the content integrity of the multimedia has been exploited extensively in the last decade. We propose the idea of using genetic algorithm and non-deterministic dependence by involving the un-watermarkable coefficients for digital image authentication. Genetic algorithm is used to intelligently select coefficients for watermarking in a DCT based image authentication scheme, which implicitly watermark all the un-watermarkable coefficients also, in order to thwart different attacks. Experimental results show that such intelligent selection results in improvement of imperceptibility of the watermarked image, and implicit watermarking of all the coefficients improves security against attacks such as cover-up, vector quantization and transplantation.
Abstract: Considering complexity of products, new geometrical
design and investment tolerances that are necessary, measuring and
dimensional controlling involve modern and more precise methods.
Photo digitizing method using two cameras to record pictures and
utilization of conventional method named “cloud points" and data
analysis by the use of ATOUS software, is known as modern and
efficient in mentioned context. In this paper, benefits of photo
digitizing method in evaluating sampling of machining processes
have been put forward. For example, assessment of geometrical
integrity surface in 5-axis milling process and measurement of
carbide tool wear in turning process, can be can be brought forward.
Advantages of this method comparing to conventional methods have
been expressed.
Abstract: Nowadays data backup format doesn-t cease to appear raising so the anxiety on their accessibility and their perpetuity. XML is one of the most promising formats to guarantee the integrity of data. This article suggests while showing one thing man can do with XML. Indeed XML will help to create a data backup model. The main task will consist in defining an application in JAVA able to convert information of a database in XML format and restore them later.
Abstract: Relational databases are often used as a basis for persistent storage of ontologies to facilitate rapid operations such as search and retrieval, and to utilize the benefits of relational databases management systems such as transaction management, security and integrity control. On the other hand, there appear more and more OWL files that contain ontologies. Therefore, this paper proposes to extract ontologies from OWL files and then store them in relational databases. A prerequisite for this storing is transformation of ontologies to relational databases, which is the purpose of this paper.
Abstract: This paper highlights the importance of the selection
of the building-s wall material,and the shortcomings of the most
commonly used framed structures with masonry infills .The
objective of this study is investigating the behavior of infill walls as
structural components in existing structures.Structural infill walls are
very important in structural behavior under earthquake effects.
Structural capacity under the effect of earthquake,displacement and
relative story displacement are affected by the structural irregularities
.The presence of nonstructural masonry infill walls can modify
extensively the global seismic behavior of framed buildings .The
stability and integrity of reinforced concrete frames are enhanced by
masonry infill walls. Masonry infill walls alter displacement and
base shear of the frame as well. Short columns have great
importance during earthquakes,because their failure may lead to
additional structural failures and result in total building collapse.
Consequently the effects of short columns are considered in this
study.
Abstract: The protection of the contents of digital products is
referred to as content authentication. In some applications, to be able
to authenticate a digital product could be extremely essential. For
example, if a digital product is used as a piece of evidence in the
court, its integrity could mean life or death of the accused. Generally,
the problem of content authentication can be solved using semifragile
digital watermarking techniques. Recently many authors have
proposed Computer Generated Hologram Watermarking (CGHWatermarking)
techniques. Starting from these studies, in this paper
a semi-fragile Computer Generated Hologram coding technique is
proposed, which is able to detect malicious tampering while
tolerating some incidental distortions. The proposed technique uses
as watermark an encrypted image, and it is well suitable for digital
image authentication.
Abstract: The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.
Abstract: Increasing energy absorption is a significant parameter
in vehicle design. Absorbing more energy results in decreasing
occupant damage. Limitation of the deflection in a side impact results
in decreased energy absorption (SEA) and increased peak load (PL).
Hence a high crash force jeopardizes passenger safety and vehicle
integrity. The aims of this paper are to determine suitable dimensions
and material of a square beam subjected to side impact, in order to
maximize SEA and minimize PL. To achieve this novel goal, the
geometric parameters of a square beam are optimized using the
response surface method (RSM).multi-objective optimization is
performed, and the optimum design for different response features is
obtained.
Abstract: Impaired fertility may be the result of indirect
consumption of anti-fertility agents through food. Monosodium
glutamate (MSG) has been widely used as food additive, flavour
enhancer and included in vaccines. This study focuses in determining
the gonadotoxic and cytotoxic effect of MSG on selected sperm
parameters such as sperm viability, sperm membrane integrity and
testes cytoarchitecture of male mice via histological examination to
determine its effect on spermatogenesis. Twenty-four Mus musculus
were randomly divided into 4 groups and given intraperitoneal
injections (IP) daily for 14 days of different MSG concentrations at
250, 500 and 1000mg/kg MSG to body weight to induce obesity.
Saline was given to control group. Mice were sacrificed and analysis
revealed abnormalities in values for sperm parameters and damages
to testes cytoarchitecture of male mice. The results recorded
decreased viability (p0.05) with degenerative structures in seminiferous tubule of
testes. The results indicated various implications of MSG on male
mice reproductive system which has consequences in fertility
potential.
Abstract: This paper describes the results of an extensive study
and comparison of popular hash functions SHA-1, SHA-256,
RIPEMD-160 and RIPEMD-320 with JERIM-320, a 320-bit hash
function. The compression functions of hash functions like SHA-1
and SHA-256 are designed using serial successive iteration whereas
those like RIPEMD-160 and RIPEMD-320 are designed using two
parallel lines of message processing. JERIM-320 uses four parallel
lines of message processing resulting in higher level of security than
other hash functions at comparable speed and memory requirement.
The performance evaluation of these methods has been done by using
practical implementation and also by using step computation
methods. JERIM-320 proves to be secure and ensures the integrity of
messages at a higher degree. The focus of this work is to establish
JERIM-320 as an alternative of the present day hash functions for the
fast growing internet applications.