Abstract: Investigations of the unimolecular decomposition of
vinyl ethyl ether (VEE), vinyl propyl ether (VPE) and vinyl butyl
ether (VBE) have shown that activation of the molecule of a ether
results in formation of a cyclic construction - the transition state (TS),
which may lead to the displacement of the thermodynamic
equilibrium towards the reaction products. The TS is obtained by
applying energy minimization relative to the ground state of an ether
under the program MM2 when taking into account the hydrogen bond
formation between a hydrogen atom of alkyl residue and the extreme
atom of carbon of the vinyl group. The dissociation of TS up to the
products is studied by energy minimization procedure using the
mathematical program Gaussian. The obtained calculation data for
VEE testify that the decomposition of this ether may be conditioned
by hydrogen bond formation for two possible versions: when α- or β-
hydrogen atoms of the ethyl group are bound to carbon atom of the
vinyl group. Applying the same calculation methods to other ethers
(VPE and VBE) it is shown that only in the case of hydrogen bonding
between α-hydrogen atom of the alkyl residue and the extreme atom
of carbon of the vinyl group (αH---C) results in decay of theses
ethers.
Abstract: In this era of technology, fueled by the pervasive usage of the internet, security is a prime concern. The number of new attacks by the so-called “bots", which are automated programs, is increasing at an alarming rate. They are most likely to attack online registration systems. Technology, called “CAPTCHA" (Completely Automated Public Turing test to tell Computers and Humans Apart) do exist, which can differentiate between automated programs and humans and prevent replay attacks. Traditionally CAPTCHA-s have been implemented with the challenge involved in recognizing textual images and reproducing the same. We propose an approach where the visual challenge has to be read out from which randomly selected keywords are used to verify the correctness of spoken text and in turn detect the presence of human. This is supplemented with a speaker recognition system which can identify the speaker also. Thus, this framework fulfills both the objectives – it can determine whether the user is a human or not and if it is a human, it can verify its identity.
Abstract: Now a days, a significant part of commercial and governmental organisations like museums, cultural organizations, libraries, commercial enterprises, etc. invest intensively in new technologies for image digitization, digital libraries, image archiving and retrieval. Hence image authorization, authentication and security has become prime need. In this paper, we present a semi-fragile watermarking scheme for color images. The method converts the host image into YIQ color space followed by application of orthogonal dual domains of DCT and DWT transforms. The DCT helps to separate relevant from irrelevant image content to generate silent image features. DWT has excellent spatial localisation to help aid in spatial tamper characterisation. Thus image adaptive watermark is generated based of image features which allows the sharp detection of microscopic changes to locate modifications in the image. Further, the scheme utilises the multipurpose watermark consisting of soft authenticator watermark and chrominance watermark. Which has been proved fragile to some predefined processing like intentinal fabrication of the image or forgery and robust to other incidental attacks caused in the communication channel.
Abstract: The aim of this study was to establish the relationship between the principles of Educational Sport and the objectives of Physical Education in two brasilian laws: National Curriculum Guidelines (PCNs) for the Elementary and Middle School Levels and the Guidelines and Basis Legislation (LDB). The method used was the survey analysis in order to determine the practices present in, or the opinions of, a specific population. The instrument used in this research was a questionnaire. After a broad review of the bibliography and according to the methodological procedures, the aim was to set the relationships between the Principles of Educational Sport and the objectives of Physical Education, according to the Brazilian Law (LDB) and National Curriculum Guidelines (PCNs) in a table made under the analysis of a group of specialists. As the relation between the principles of Educational Sport and the objectives of School Physical Education have shown, we can state that School Physical Education has gained pedagogical security for the potential use of Educational Sport as part of its contents.
Abstract: Noble metal participation in nanostructured
semiconductor catalysts has drawn much interest because of their
improved properties. Recently, it has been discussed by many
researchers that Ag participation in TiO2, CuO, ZnO semiconductors
showed improved photocatalytic and optical properties. In this
research, Ag/ZnO nanocomposite particles were prepared by
Ultrasonic Spray Pyrolysis(USP) Method. 0.1M silver and zinc
nitrate aqueous solutions were used as precursor solutions. The
Ag:Zn atomic ratio of the solution was selected 1:1. Experiments
were taken place under constant air flow of 400 mL/min at 800°C
furnace temperature. Particles were characterized by X-Ray
Diffraction (XRD), Scanning Electron Microscope (SEM) and
Energy Dispersive Spectroscopy (EDS). The crystallite sizes of Ag
and ZnO in composite particles are 24.6 nm, 19.7 nm respectively.
Although, spherical nanocomposite particles are in a range of 300-
800 nm, these particles are formed by the aggregation of primary
particles which are in a range of 20-60 nm.
Abstract: This paper presents an exact pruning algorithm with
adaptive pruning interval for general dynamic neural networks
(GDNN). GDNNs are artificial neural networks with internal dynamics.
All layers have feedback connections with time delays to the
same and to all other layers. The structure of the plant is unknown, so
the identification process is started with a larger network architecture
than necessary. During parameter optimization with the Levenberg-
Marquardt (LM) algorithm irrelevant weights of the dynamic neural
network are deleted in order to find a model for the plant as
simple as possible. The weights to be pruned are found by direct
evaluation of the training data within a sliding time window. The
influence of pruning on the identification system depends on the
network architecture at pruning time and the selected weight to be
deleted. As the architecture of the model is changed drastically during
the identification and pruning process, it is suggested to adapt the
pruning interval online. Two system identification examples show
the architecture selection ability of the proposed pruning approach.
Abstract: Bacterial molecular chaperone DnaK plays an essential role in protein folding, stress response and transmembrane targeting of proteins. DnaKs from many bacterial species, including Escherichia coli, Salmonella typhimurium and Haemophilus infleunzae are the molecular targets for the insect-derived antimicrobial peptide pyrrhocoricin. Pyrrhocoricin-like peptides bind in the substrate recognition tunnel. Despite the high degree of crossspecies sequence conservation in the substrate-binding tunnel, some bacteria are not sensitive to pyrrhocoricin. This work addresses the molecular mechanism of resistance of Helicobacter pylori DnaK to pyrrhocoricin. Homology modelling, structural and sequence analysis identify a single aminoacid substitution at the interface between the lid and the β-sandwich subdomains of the DnaK substrate-binding domain as the major determinant for its resistance.
Abstract: In this paper, we introduce an effective strategy for
subgoal division and ordering based upon recursive subgoals and
combine this strategy with a genetic-based planning approach. This
strategy can be applied to domains with conjunctive goals. The main
idea is to recursively decompose a goal into a set of serializable
subgoals and to specify a strict ordering among the subgoals.
Empirical results show that the recursive subgoal strategy reduces the
size of the search space and improves the quality of solutions to
planning problems.
Abstract: A strategy is implemented to find the improved configuration design of an existing aircraft structure by executing topology and shape optimizations. Structural analysis of the Initial Design Space is performed in ANSYS under the loads pertinent to operating and ground conditions. By using the FEA results and data, an initial optimized layout configuration is attained by exploiting nonparametric topology optimization in TOSCA software. Topological optimized surfaces are then smoothened and imported in ANSYS to develop the geometrical features. Nodes at the critical locations of resulting voids are selected for sketching rough profiles. Rough profiles are further refined and CAD feasible geometric features are generated. The modified model is then analyzed under the same loadings and constraints as defined for topology optimization. Shape at the peak stress concentration areas are further optimized by exploiting the shape optimization in TOSCA.shape module. The harmonized stressed model with the modified surfaces is then imported in CATIA to develop the final design.
Abstract: The concept of e-government has begun to spread among countries. It is based on the use of information communication technology (ICT) to fully utilize government resources, as well as to provide government services to citizens, investors and foreigners. Critical factors are the factors that are determined by the senior management of each organization; the success or failure of the organization depends on the effective implementation of critical factors. These factors vary from one organization to another according to their activity, size and functions. It is very important that organizations identify them in order to avoid the risk of implementing initiatives that may fail to work, while simultaneously exploiting opportunities that may succeed in working. The main focus of this paper is to investigate the majority of critical success factors (CSFs) associated with the implementation of e-government projects. This study concentrates on both technical and nontechnical factors. This paper concludes by listing the majority of CSFs relating to successful e-government implementation in Bahrain.
Abstract: In this paper we investigate the watermarking authentication when applied to medical imagery field. We first give an overview of watermarking technology by paying attention to fragile watermarking since it is the usual scheme for authentication.We then analyze the requirements for image authentication and integrity in medical imagery, and we show finally that invertible schemes are the best suited for this particular field. A well known authentication method is studied. This technique is then adapted here for interleaving patient information and message authentication code with medical images in a reversible manner, that is using lossless compression. The resulting scheme enables on a side the exact recovery of the original image that can be unambiguously authenticated, and on the other side, the patient information to be saved or transmitted in a confidential way. To ensure greater security the patient information is encrypted before being embedded into images.
Abstract: The general purpose processors that are used in
embedded systems must support constraints like execution time,
power consumption, code size and so on. On the other hand an
Application Specific Instruction-set Processor (ASIP) has advantages
in terms of power consumption, performance and flexibility. In this
paper, a 16-bit Application Specific Instruction-set processor for the
sensor data transfer is proposed. The designed processor architecture
consists of on-chip transmitter and receiver modules along with the
processing and controlling units to enable the data transmission and
reception on a single die. The data transfer is accomplished with less
number of instructions as compared with the general purpose
processor. The ASIP core operates at a maximum clock frequency of
1.132GHz with a delay of 0.883ns and consumes 569.63mW power
at an operating voltage of 1.2V. The ASIP is implemented in Verilog
HDL using the Xilinx platform on Virtex4.
Abstract: Nowaday-s, many organizations use systems that
support business process as a whole or partially. However, in some
application domains, like software development and health care
processes, a normative Process Aware System (PAS) is not suitable,
because a flexible support is needed to respond rapidly to new
process models. On the other hand, a flexible Process Aware System
may be vulnerable to undesirable and fraudulent executions, which
imposes a tradeoff between flexibility and security. In order to make
this tradeoff available, a genetic-based anomaly detection model for
logs of Process Aware Systems is presented in this paper. The
detection of an anomalous trace is based on discovering an
appropriate process model by using genetic process mining and
detecting traces that do not fit the appropriate model as anomalous
trace; therefore, when used in PAS, this model is an automated
solution that can support coexistence of flexibility and security.
Abstract: Scolothrips longicornis Priesner is one of the
important predators of tetranychid mites with a wide distribution
throughout Iran. Life table and population growth parameters of S.
longicornis feeding on two-spotted spider mite, Tetranychus
turkestani Ugarov & Nikolski were investigated under laboratory
condition (26±1ºC, 65±5% R.H. and 16L: 8D). To carry of these
experiments, S. longicornis collections reared on cowpea infested
with T. turkestani were prepared. The eggs with less than 24 hours
old were selected and reared. The emerged larvae feeding directly on
cowpea leaf discs which were infested with T. turkestani. Thirty
females of S. longicornis with 24 hours age were selected and
released on infested leaf discs. They replaced daily to a new leaf disc
and the laying eggs have counted. The experiment continued till the
last thrips had died. The result showed that the mean age mortality of
the adult female thrips were between 21-25 days which is nearly
equal life expectancy (ex) at the time of adult eclosion. Parameters
related to reproductive table including gross reproductive rate, net
reproductive rate, intrinsic rate of natural increase and finite rate of
increase were 48.91, 37.63, 0.26 and 2.3, respectively. Mean age per
female/day, mean fertile egg per female/day, gross hatch rate, mean
net age fertility, mean net age fecundity, net fertility rate and net
fecundity rate were 2.23, 1.76, 0.87, 13.87, 14.26, 69.1 and 78.5,
respectively. Sex ratio of offspring also recorded daily. The highest
sex ratio for females was 0.88 in first day of oviposition. The sex
ratio decreased gradually and reached under 0.46 after the day 26 and
the oviposition rate declined. Then it seems that maintenance of
rearing culture of predatory thrips for mass rearing later than 26 days
after egg-laying commence is not profitable.
Abstract: In the last decade, carbohydrates have attracted great
attention as renewable resources for the chemical industry.
Carbohydrates are abundantly found in nature in the form of
monomers, oligomers and polymers, or as components of
biopolymers and other naturally occurring substances. As natural
products, they play important roles in conferring certain physical,
chemical, and biological properties to their carrier molecules.The
synthesis of this particular carbohydrate glycomonomer is part of our
work to obtain biodegradable polymers. Our current paper describes
the synthesis and characterization of a novel carbohydrate
glycomonomer starting from D-glucose, in several synthesis steps,
that involve the protection/deprotection of the D-glucose ring via
acetylation, tritylation, then selective deprotection of the aromaticaliphatic
protective group, in order to obtain 1,2,3,4-tetra-O-acetyl-
6-O-allyl-β-D-glucopyranose. The glycomonomer was then obtained
by the allylation in drastic conditions of 1,2,3,4-tetra-O-acetyl-6-Oallyl-
β-D-glucopyranose with allylic alcohol in the presence of
stannic chloride, in methylene chloride, at room temperature. The
proposed structure of the glycomonomer, 2,3,4-tri-O-acetyl-1,6-di-
O-allyl-β-D-glucopyranose, was confirmed by FTIR, NMR and
HPLC-MS spectrometry. This glycomonomer will be further
submitted to copolymerization with certain acrylic or methacrylic
monomers in order to obtain competitive plastic materials for
applications in the biomedical field.
Abstract: Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. The product of mean and standard and standard deviation of each block is computed. The second level wavelet transformed image is divided into 8x8 blocks. The product of block mean and the standard deviation are computed. The difference between products in the two levels forms the watermark. The watermark is inserted by modulating the coefficients of the mid frequencies. The modulated image is inverse wavelet transformed and inverse moment normalized to generate the watermarked image. The watermarked image is now ready for transmission. The proposed scheme can be used to validate identification cards and financial instruments. The performance of this scheme has been evaluated using a set of parameters. Experimental results show the effectiveness of this scheme.
Abstract: The goal of steganography is to avoid drawing
suspicion to the transmission of a hidden message. If suspicion is
raised, steganography may fail. The success of steganography
depends on the secrecy of the action. If steganography is detected,
the system will fail but data security depends on the robustness of the
applied algorithm. In this paper, we propose a novel plausible
deniability scheme in steganography by using a diversionary message
and encrypt it with a DES-based algorithm. Then, we compress the
secret message and encrypt it by the receiver-s public key along with
the stego key and embed both messages in a carrier using an
embedding algorithm. It will be demonstrated how this method can
support plausible deniability and is robust against steganalysis.
Abstract: In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get furtherdiscussions among the security of SDN virtualization.
Abstract: The noteworthy point in the advancement of Brain Machine Interface (BMI) research is the ability to accurately extract features of the brain signals and to classify them into targeted control action with the easiest procedures since the expected beneficiaries are of disabled. In this paper, a new feature extraction method using the combination of adaptive band pass filters and adaptive autoregressive (AAR) modelling is proposed and applied to the classification of right and left motor imagery signals extracted from the brain. The introduction of the adaptive bandpass filter improves the characterization process of the autocorrelation functions of the AAR models, as it enhances and strengthens the EEG signal, which is noisy and stochastic in nature. The experimental results on the Graz BCI data set have shown that by implementing the proposed feature extraction method, a LDA and SVM classifier outperforms other AAR approaches of the BCI 2003 competition in terms of the mutual information, the competition criterion, or misclassification rate.
Abstract: The paper deals with the possibilities of modelling
vapour propagation of explosive substances in the FLUENT
software. With regard to very low tensions of explosive substance
vapours the experiment has been verified as exemplified by
mononitrotoluene. Either constant or time variable meteorological
conditions have been used for calculation. Further, it has been
verified that the eluent source may be time-dependent and may reflect
a real situation or the liberation rate may be constant. The execution
of the experiment as well as evaluation were clear and it could also
be used for modelling vapour and aerosol propagation of selected
explosive substances in the atmospheric boundary layer.