Abstract: Security management has changed from the
management of security equipments and useful interface to manager.
It analyzes the whole security conditions of network and preserves the
network services from attacks. Secure router technology has security
functions, such as intrusion detection, IPsec(IP Security) and access
control, are applied to legacy router for secure networking. It controls
an unauthorized router access and detects an illegal network intrusion.
This paper relates to a security engine management of router based on
a security policy, which is the definition of security function against a
network intrusion. This paper explains the security policy and designs
the structure of security engine management framework.
Abstract: This paper introduces our first efforts of developing a
new team for RoboCup Middle Size Competition. In our robots we
have applied omni directional based mobile system with omnidirectional
vision system and fuzzy control algorithm to navigate
robots. The control architecture of MRL middle-size robots is a three
layered architecture, Planning, Sequencing, and Executing. It also
uses Blackboard system to achieve coordination among agents.
Moreover, the architecture should have minimum dependency on low
level structure and have a uniform protocol to interact with real
robot.
Abstract: We decribe a formal specification and verification of the Rabin public-key scheme in the formal proof system Is-abelle/HOL. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. The analysis presented uses a given database to prove formal properties of our implemented functions with computer support. Thema in task in designing a practical formalization of correctness as well as security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as eficient formal proofs. This yields the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Consequently, we get reliable proofs with a minimal error rate augmenting the used database. This provides a formal basis for more computer proof constructions in this area.
Abstract: The history of money is described in relationship to the history of computing. With the transformation and acceptance of money as information, major challenges to the security of money have involved engineering, computer science, and management. Research opportunities and challenges are described as money continues its transformation into information.
Abstract: This study1 holds for the formation of international financial crisis and political factors for economic crisis in Turkey, are evaluated in chronological order. The international arena and relevant studies conducted in Turkey work in the literature are assessed. The main purpose of the study is to hold the linkage between the crises and political stability in Turkey in details, and to examine the position of Turkey in this regard. The introduction part follows the literature survey on the models explaining causes and results of the crises, the second part of the study. In the third part, the formations of the world financial crises are studied. The fourth part, financial crisis in Turkey in 1994, 2000, 2001 and 2008 are reviewed and their political reasons are analyzed. In the last part of the study the results and recommendations are held. Political administrations have laid the grounds for an economic crisis in Turkey. In this study, the emergence of an economic crisis in Turkey and the developments after the crisis are chronologically examined and an explanation is offered as to the cause and effect relationship between the political administration and economic equilibrium in the country. Economic crises can be characterized as follows: high prices of consumables, high interest rates, current account deficits, budget deficits, structural defects in government finance, rising inflation and fixed currency applications, rising government debt, declining savings rates and increased dependency on foreign capital stock. Entering into the conditions of crisis during a time when the exchange value of the country-s national currency was rising, speculative finance movements and shrinking of foreign currency reserves happened due to expectations for devaluation and because of foreign investors- resistance to financing national debt, and a financial risk occurs. During the February 2001 crisis and immediately following, devaluation and reduction of value occurred in Turkey-s stock market. While changing over to the system of floating exchange rates in the midst of this crisis, the effects of the crisis on the real economy are discussed in this study. Administered politics include financial reforms, such as the rearrangement of banking systems. These reforms followed with the provision of foreign financial support. There have been winners and losers in the imbalance of income distribution, which has recently become more evident in Turkey-s fragile economy.
Abstract: The objective of this research was to study the career
success and the satisfaction of female executives working for schools
in Bangkok, Thailand. This paper drew upon the survey data
collected from 68 female executives. The survey conducted in on
Bangkok schools. The statistics utilized in this paper included
percentage, mean, standard deviation as well as t-test. The findings
revealed that the majority of samples had more than 30 years of
experience, held a master degree, and had an average income of less
than 40,000 baht. The majority of respondents worked not more than
50 hours per week. In addition, the mean score revealed career
development was ranked as their number one career satisfaction and
having a job related to education was ranked as their number one job
satisfaction. Also, the mean score of all categories of satisfaction was
4.61 with standard deviation of 1.677 which indicated that female
executive level of satisfaction was high. In terms of the subjectivity
career success, the hypothesis testing’s result disclosed that female
executives with different married status had a difference in their job
satisfaction which was significant at the 0.05 confidence level.
Abstract: Recent communications environment significantly
expands the mobile environment. The popularization of smartphones
with various mobile services has emerged, and smartphone users are
rapidly increasing. Because of these symptoms, existing wired
environment in a variety of mobile traffic entering to mobile network
has threatened the stability of the mobile network. Unlike traditional
wired infrastructure, mobile networks has limited radio resources and
signaling procedures for complex radio resource management. So
these traffic is not a problem in wired networks but mobile networks, it
can be a threat. In this paper, we analyze the security threats in mobile
networks and provide direction to solve it.
Abstract: Topological changes in mobile ad hoc networks
frequently render routing paths unusable. Such recurrent path failures
have detrimental effects on quality of service. A suitable technique
for eliminating this problem is to use multiple backup paths between
the source and the destination in the network. This paper proposes an
effective and efficient protocol for backup and disjoint path set in ad
hoc wireless network. This protocol converges to a highly reliable
path set very fast with no message exchange overhead. The paths
selection according to this algorithm is beneficial for mobile ad hoc
networks, since it produce a set of backup paths with more high
reliability. Simulation experiments are conducted to evaluate the
performance of our algorithm in terms of route numbers in the path
set and its reliability. In order to acquire link reliability estimates, we
use link expiration time (LET) between two nodes.
Abstract: Semnan is a city in semnan province, northern Iran
with a population estimated at 119,778 inhabitants. It is the
provincial capital of semnan province. Iran is a developing country
and construction is a basic factor of developing too. Hence, Semnan
city needs to a special programming for construction of buildings,
structures and infrastructures. Semnan municipality tries to begin this
program. In addition to, city has some historical monuments which
can be interesting for tourists. Hence, Semnan inhabitants can benefit
from tourist industry. Optimization of Energy in construction
industry is another activity of this municipality and the inhabitants
who execute these regulations receive some discounts. Many parts of
Iran such as semnan are located in highly seismic zones and
structures must be constructed safe e.g., according to recent seismic
codes. In this paper opportunities of IT in construction industry of
Iran are investigated in three categories. Pre-construction phase,
construction phase and earthquake disaster mitigation are studied.
Studies show that information technology can be used in these items
for reducing the losses and increasing the benefits. Both government
and private sectors must contribute to this strategic project for
obtaining the best result.
Abstract: In recent times, corporations are increasingly under pressure to ensure diversity within their boardrooms and a large number of academic research have reported findings consistent with the view that boards perform better when they include a diverse range of people. Women have unique characteristics needed to positively influence the strategic direction of a corporation and contribute to the growth of firms. In spite of such revelations, evidence suggests that women are under-represented in senior executive and board positions. In many parts of Africa, socio-cultural traditions inhibit women from attaining these roles. Given the emphasis placed on board diversity and inclusion of women as an essential part of good corporate governance, the relationship between gender diversity and board effectiveness deserves both theoretical and empirical investigation. This research is important because it represents the first theoretical review on gender diversity in corporate boards in Nigeria.
Abstract: This manuscript presents a fast blind signature scheme
with extremely low computation for users. Only several modular additions
and multiplications are required for a user to obtain and verify
a signature in the proposed scheme. Comparing with the existing
ones in the literature, the scheme greatly reduces the computations
for users.
Abstract: In this paper, we extend the compound binomial model to the case where the premium income process, based on a binomial process, is no longer a linear function. First, a mathematically recursive formula is derived for non ruin probability, and then, we examine the expected discounted penalty function, satisfy a defect renewal equation. Third, the asymptotic estimate for the expected discounted penalty function is then given. Finally, we give two examples of ruin quantities to illustrate applications of the recursive formula and the asymptotic estimate for penalty function.
Abstract: In this paper, the robust exponential stability problem of uncertain discrete-time recurrent neural networks with timevarying delay is investigated. By constructing a new augmented Lyapunov-Krasovskii function, some new improved stability criteria are obtained in forms of linear matrix inequality (LMI). Compared with some recent results in literature, the conservatism of the new criteria is reduced notably. Two numerical examples are provided to demonstrate the less conservatism and effectiveness of the proposed results.
Abstract: Vinegar or sour wine is a product of alcoholic and
subsequent acetous fermentation of sugary precursors derived from
several fruits or starchy substrates. This delicious food additive and
supplement contains not less than 4 grams of acetic acid in 100 cubic
centimeters at 20°C. Among the large number of bacteria that are
able to produce acetic acid, only few genera are used in vinegar
industry most significant of which are Acetobacter and
Gluconobacter. In this research we isolated and identified an
Acetobacter strain from Iranian apricot, a very delicious and sensitive
summer fruit to decay, we gathered from fruit's stores in Isfahan,
Iran. The main culture media we used were Carr, GYC, Frateur and
an industrial medium for vinegar production. We isolated this strain
using a novel miniature fermentor we made at Pars Yeema
Biotechnologists Co., Isfahan Science and Technology Town (ISTT),
Isfahan, Iran. The microscopic examinations of isolated strain from
Iranian apricot showed gram negative rods to cocobacilli. Their
catalase reaction was positive and oxidase reaction was negative and
could ferment ethanol to acetic acid. Also it showed an acceptable
growth in 5%, 7% and 9% ethanol concentrations at 30°C using
modified Carr media after 24, 48 and 96 hours incubation
respectively. According to its tolerance against high concentrations of
ethanol after four days incubation and its high acetic acid production,
8.53%, after 144 hours, this strain could be considered as a suitable
industrial strain for a production of a new type of vinegar, apricot
vinegar, with a new and delicious taste. In conclusion this is the first
report of isolation and identification of an Acetobacter strain from
Iranian apricot with a very good tolerance against high ethanol
concentrations as well as high acetic acid productivity in an
acceptable incubation period of time industrially. This strain could be
used in vinegar industry to convert apricot spoilage to a beneficiary
product and mentioned characteristics have made it as an amenable
strain in food and agricultural biotechnology.
Abstract: In this paper, novel statistical sampling based equalization techniques and CNN based detection are proposed to increase the spectral efficiency of multiuser communication systems over fading channels. Multiuser communication combined with selective fading can result in interferences which severely deteriorate the quality of service in wireless data transmission (e.g. CDMA in mobile communication). The paper introduces new equalization methods to combat interferences by minimizing the Bit Error Rate (BER) as a function of the equalizer coefficients. This provides higher performance than the traditional Minimum Mean Square Error equalization. Since the calculation of BER as a function of the equalizer coefficients is of exponential complexity, statistical sampling methods are proposed to approximate the gradient which yields fast equalization and superior performance to the traditional algorithms. Efficient estimation of the gradient is achieved by using stratified sampling and the Li-Silvester bounds. A simple mechanism is derived to identify the dominant samples in real-time, for the sake of efficient estimation. The equalizer weights are adapted recursively by minimizing the estimated BER. The near-optimal performance of the new algorithms is also demonstrated by extensive simulations. The paper has also developed a (Cellular Neural Network) CNN based approach to detection. In this case fast quadratic optimization has been carried out by t, whereas the task of equalizer is to ensure the required template structure (sparseness) for the CNN. The performance of the method has also been analyzed by simulations.
Abstract: Signal processing applications which are iterative in
nature are best represented by data flow graphs (DFG). In these
applications, the maximum sampling frequency is dependent on the
topology of the DFG, the cyclic dependencies in particular. The
determination of the iteration bound, which is the reciprocal of the
maximum sampling frequency, is critical in the process of hardware
implementation of signal processing applications. In this paper, a
novel technique to compute the iteration bound is proposed. This
technique is different from all previously proposed techniques, in the
sense that it is based on the natural flow of tokens into the DFG
rather than the topology of the graph. The proposed algorithm has
lower run-time complexity than all known algorithms. The
performance of the proposed algorithm is illustrated through
analytical analysis of the time complexity, as well as through
simulation of some benchmark problems.
Abstract: As a security mechanism, authorization is to provide access control to the system resources according to the polices and rules specified by the security strategies. Either by update or in the initial specification, conflicts in authorization is an issue needs to be solved. In this paper, we propose a new approach to solve conflict by using prioritized logic programs and discuss the uniqueness of its answer set. Addressing conflict resolution from logic programming viewpoint and the uniqueness analysis of the answer set provide a novel, efficient approach for authorization conflict resolution.
Abstract: It has been recognized that due to the autonomy and
heterogeneity, of Web services and the Web itself, new approaches
should be developed to describe and advertise Web services. The
most notable approaches rely on the description of Web services
using semantics. This new breed of Web services, termed semantic
Web services, will enable the automatic annotation, advertisement,
discovery, selection, composition, and execution of interorganization
business logic, making the Internet become a common
global platform where organizations and individuals communicate
with each other to carry out various commercial activities and to
provide value-added services. This paper deals with two of the
hottest R&D and technology areas currently associated with the Web
– Web services and the semantic Web. It describes how semantic
Web services extend Web services as the semantic Web improves the
current Web, and presents three different conceptual approaches to
deploying semantic Web services, namely, WSDL-S, OWL-S, and
WSMO.
Abstract: The development of biomimetic micro-aerial-vehicles
(MAVs) with flapping wings is the future trend in military/domestic
field. The successful flight of MAVs is strongly related to the
understanding of unsteady aerodynamic performance of low Reynolds
number airfoils under dynamic flapping motion. This study explored
the effects of flapping frequency, stroke amplitude, and the inclined
angle of stroke plane on lift force and thrust force of a bio-inspiration
corrugated airfoil with 33 full factorial design of experiment and
ANOVA analysis. Unsteady vorticity flows over a corrugated thin
airfoil executing flapping motion are computed with time-dependent
two-dimensional laminar incompressible Reynolds-averaged
Navier-Stokes equations with the conformal hybrid mesh. The tested
freestream Reynolds number based on the chord length of airfoil as
characteristic length is fixed of 103. The dynamic mesh technique is
applied to model the flapping motion of a corrugated airfoil. Instant
vorticity contours over a complete flapping cycle clearly reveals the
flow mechanisms for lift force generation are dynamic stall, rotational
circulation, and wake capture. The thrust force is produced as the
leading edge vortex shedding from the trailing edge of airfoil to form a
reverse von Karman vortex. Results also indicated that the inclined
angle is the most significant factor on both the lift force and thrust
force. There are strong interactions between tested factors which mean
an optimization study on parameters should be conducted in further
runs.
Abstract: Home Automation is a field that, among other
subjects, is concerned with the comfort, security and energy
requirements of private homes. The configuration of automatic
functions in this type of houses is not always simple to its inhabitants
requiring the initial setup and regular adjustments. In this work, the
ubiquitous computing system vision is used, where the users- action
patterns are captured, recorded and used to create the contextawareness
that allows the self-configuration of the home automation
system. The system will try to free the users from setup adjustments
as the home tries to adapt to its inhabitants- real habits. In this paper
it is described a completely automated process to determine the light
state and act on them, taking in account the users- daily habits.
Artificial Neural Network (ANN) is used as a pattern recognition
method, classifying for each moment the light state. The work
presented uses data from a real house where a family is actually
living.