Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.
Abstract: Video watermarking is usually considered as watermarking of a set of still images. In frame-by-frame watermarking approach, each video frame is seen as a single watermarked image, so collusion attack is more critical in video watermarking. If the same or redundant watermark is used for embedding in every frame of video, the watermark can be estimated and then removed by watermark estimate remodolulation (WER) attack. Also if uncorrelated watermarks are used for every frame, these watermarks can be washed out with frame temporal filtering (FTF). Switching watermark system or so-called SS-N system has better performance against WER and FTF attacks. In this system, for each frame, the watermark is randomly picked up from a finite pool of watermark patterns. At first SS-N system will be surveyed and then a new collusion attack for SS-N system will be proposed using a new algorithm for separating video frame based on watermark pattern. So N sets will be built in which every set contains frames carrying the same watermark. After that, using WER attack in every set, N different watermark patterns will be estimated and removed later.
Abstract: Most, if not all, public hospitals in Thailand have encountered a common problem regarding the increasing demand for medical services. The increasing number of patients causes so much strain on the hospital-s services, over-crowded, overloaded working hours, staff fatigue, medical error and long waiting time. This research studied the characteristics of operational processes of the medical care services at the medicine department in a large public university hospital. The research focuses on details regarding methods, procedures, processes, resources, and time management in overall processes. The simulation model is used as a tool to analyze the impact of various improvement strategies.
Abstract: Until recently, energy security and climate change
were considered separate issues to be dealt with by policymakers.
The two issues are now converging, challenging the security and
climate communities to develop a better understanding of how to deal
with both issues simultaneously. Although Egypt is not a major
contributor to the world's total GHG emissions, it is particularly
vulnerable to the potential effects of global climate change such as
rising sea levels and changed patterns of rainfall in the Nile Basin.
Climate change is a major threat to sustainable growth and
development in Egypt, and the achievement of the Millennium
Development Goals. Egypt-s capacity to respond to the challenges of
climate instability will be expanded by improving overall resilience,
integrating climate change goals into sustainable development
strategies, increasing the use of modern energy systems with reduced
carbon intensity, and strengthening international initiatives. This
study seeks to establish a framework for considering the complex and
evolving links between energy security and climate change,
applicable to Egypt.
Abstract: This paper presents the benchmarking results and
performance evaluation of differentclustersbuilt atthe National Center
for High-Performance Computingin Taiwan. Performance of
processor, memory subsystem andinterconnect is a critical factor in the
overall performance of high performance computing platforms. The
evaluation compares different system architecture and software
platforms. Most supercomputer used HPL to benchmark their system
performance, in accordance with the requirement of the TOP500 List.
In this paper we consider system memory access factors that affect
benchmark performance, such as processor and memory
performance.We hope these works will provide useful information for
future development and construct cluster system.
Abstract: Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Abstract: This study carried out in order to investigate the
effects of salinity on carbon isotope discrimination (Δ) of shoots and
roots of four sugar beet cultivars (cv) including Madison (British
origin) and three Iranian culivars (7233-P12, 7233-P21 and 7233-P29).
Plants were grown in sand culture medium in greenhouse conditions.
Plants irrigated with saline water (tap water as control, 50 mM, 150
mM, 250 mM and 350 mM of NaCl + CaCl2 in 5 to 1 molar ratio)
from 4 leaves stage for 16 weeks. Carbon isotope discrimination
significantly decreased with increasing salinity. Significant
differences of Δ between shoot and root were observed in all cvs and
all levels of salinity. Madison cv showed lower Δ in shoot and root
than other three cvs at all levels of salinity expect control, but cv
7233-P29 had significantly higher Δ values at saline conditions of 150
mM and above. Therefore, Δ might be applicable, as a useful tool, for
study of salinity tolerance of sugar beet genotypes.
Abstract: Optimization of extraction of phenolic compounds
from Avicennia marina using response surface methodology was
carried out during the present study. Five levels, three factors
rotatable design (CCRD) was utilized to examine the optimum
combination of extraction variables based on the TPC of Avicennia
marina leaves. The best combination of response function was 78.41
°C, drying temperature; 26.18°C; extraction temperature and 36.53
minutes of extraction time. However, the procedure can be promptly
extended to the study of several others pharmaceutical processes like
purification of bioactive substances, drying of extracts and
development of the pharmaceutical dosage forms for the benefit of
consumers.
Abstract: Modern applications realized onto FPGAs exhibit high connectivity demands. Throughout this paper we study the routing constraints of Virtex devices and we propose a systematic methodology for designing a novel general-purpose interconnection network targeting to reconfigurable architectures. This network consists of multiple segment wires and SB patterns, appropriately selected and assigned across the device. The goal of our proposed methodology is to maximize the hardware utilization of fabricated routing resources. The derived interconnection scheme is integrated on a Virtex style FPGA. This device is characterized both for its high-performance, as well as for its low-energy requirements. Due to this, the design criterion that guides our architecture selections was the minimal Energy×Delay Product (EDP). The methodology is fully-supported by three new software tools, which belong to MEANDER Design Framework. Using a typical set of MCNC benchmarks, extensive comparison study in terms of several critical parameters proves the effectiveness of the derived interconnection network. More specifically, we achieve average Energy×Delay Product reduction by 63%, performance increase by 26%, reduction in leakage power by 21%, reduction in total energy consumption by 11%, at the expense of increase of channel width by 20%.
Abstract: In this paper our aim is to explore the construction of schoolgirl femininities, drawing on the results of an ethnographic study conducted in a high school in Ankara, Turkey. In this case study which tries to explore the complexities of gender discourses, we were initially motivated by the questions that have been put forward by critical and feminist literature on education which emphasize the necessarily conflicting and partial nature of both reproduction and resistance and the importance of gendered power relations in the school context. Drawing on this paradigm our research tries to address to a more specific question: how are multiple schoolgirl femininities constructed within the context of gendered school culture, and especially in relation to hegemonic masculinity? Our study reveals that the general framework of multiple femininities is engendered by a tension between two inter-related positions. The first one is different strategies of accommodation and resistance to the gender-related problems of education. The second one is the school experience of girls which is conditioned by their differential position vis-à-vis the masculine resistance culture that is dominant in the school.
Abstract: Impinging jets are used in various industrial areas as a cooling and drying technique. The current research is concerned with the means of improving the heat transfer for configurations with a minimum distance of the nozzle to the impingement surface. The impingement heat transfer is described using numerical methods over a wide range of parameters for an array of planar jets. These parameters include varying jet flow speed, width of nozzle, distance of nozzle, angle of the jet flow, velocity and geometry of the impingement surface. Normal pressure and shear stress are computed as additional parameters. Using dimensionless characteristic numbers the parameters and the results are correlated to gain generalized equations. The results demonstrate the effect of the investigated parameters on the flow.
Abstract: Thermal load calculations have been performed for
multi-layered walls that are composed of three different parts; a
common (sand and cement) plaster, and two types of locally
produced soft and hard bricks. The masonry construction of these
layered walls was based on concrete-backed stone masonry made of
limestone bricks joined by mortar. These multilayered walls are
forming the outer walls of the building envelope of a typical Libyan
house. Based on the periodic seasonal weather conditions, within the
Libyan cost region during summer and winter, measured thermal
conductivity values were used to implement such seasonal variation
of heat flow and the temperature variations through the walls. The
experimental measured thermal conductivity values were obtained
using the Hot Disk technique. The estimation of the thermal
resistance of the wall layers ( R-values) is based on measurements
and calculations. The numerical calculations were done using a
simplified analytical model that considers two different wall
constructions which are characteristics of such houses. According to
the obtained results, the R-values were quite low and therefore,
several suggestions have been proposed to improve the thermal
loading performance that will lead to a reasonable human comfort
and reduce energy consumption.
Abstract: Analytical seismic response of multi-story building
supported on base isolation system is investigated under real
earthquake motion. The superstructure is idealized as a shear type
flexible building with lateral degree-of-freedom at each floor. The
force-deformation behaviour of the isolation system is modelled by
the bi-linear behaviour which can be effectively used to model all
isolation systems in practice. The governing equations of motion of
the isolated structural system are derived. The response of the system
is obtained numerically by step-by-method under three real recorded
earthquake motions and pulse motions associated in the near-fault
earthquake motion. The variation of the top floor acceleration, interstory
drift, base shear and bearing displacement of the isolated
building is studied under different initial stiffness of the bi-linear
isolation system. It was observed that the high initial stiffness of the
isolation system excites higher modes in base-isolated structure and
generate floor accelerations and story drift. Such behaviour of the
base-isolated building especially supported on sliding type of
isolation systems can be detrimental to sensitive equipment installed
in the building. On the other hand, the bearing displacement and base
shear found to reduce marginally with the increase of the initial
stiffness of the initial stiffness of the isolation system. Further, the
above behaviour of the base-isolated building was observed for
different parameters of the bearing (i.e. post-yield stiffness and
characteristic strength) and earthquake motions (i.e. real time history
as well as pulse type motion).
Abstract: The present energy situation and the concerns
about global warming has stimulated active research interest
in non-petroleum, carbon free compounds and non-polluting
fuels, particularly for transportation, power generation, and
agricultural sectors. Environmental concerns and limited
amount of petroleum fuels have caused interests in the
development of alternative fuels for internal combustion (IC)
engines. The petroleum crude reserves however, are declining
and consumption of transport fuels particularly in the
developing countries is increasing at high rates. Severe
shortage of liquid fuels derived from petroleum may be faced
in the second half of this century. Recently more and more
stringent environmental regulations being enacted in the USA
and Europe have led to the research and development
activities on clean alternative fuels. Among the gaseous fuels
hydrogen is considered to be one of the clean alternative fuel.
Hydrogen is an interesting candidate for future internal
combustion engine based power trains. In this experimental
investigation, the performance and combustion analysis were
carried out on a direct injection (DI) diesel engine using
hydrogen with diesel following the TMI(Time Manifold
Injection) technique at different injection timings of 10
degree,45 degree and 80 degree ATDC using an electronic
control unit (ECU) and injection durations were controlled.
Further, the tests have been carried out at a constant speed of
1500rpm at different load conditions and it can be observed
that brake thermal efficiency increases with increase in load
conditions with a maximum gain of 15% at full load
conditions during all injection strategies of hydrogen. It was
also observed that with the increase in hydrogen energy share
BSEC started reducing and it reduced to a maximum of 9% as
compared to baseline diesel at 10deg ATDC injection during
maximum injection proving the exceptional combustion
properties of hydrogen.
Abstract: To understand the material characteristics of singleand
poly-crystals of pure copper, the respective relationships between
crystallographic orientations and microstructures, and the bending
and mechanical properties were examined. And texture distribution
is also analyzed. A bending test is performed in a SEM apparatus and
while its behaviors are observed in situ. Furthermore, some
analytical results related to crystal direction maps, inverse pole
figures, and textures were obtained from EBSD analyses.
Abstract: The new status generated by technological advancements and changes in the global economy raises important issues on how communities and organisations need to innovate upon their traditional processes in order to adapt to the challenges of the Knowledge Society. The DialogoS+ European project aims to study the role of and promote social dialogue in the banking sector, strengthen the link between old and new members and make social dialogue at the European level a force for innovation and change, also given the context of the international crisis emerging in 2008- 2009. Under the scope of DialogoS+, this paper describes how the community of Europe-s banking sector trade unions attempted to adapt to the challenges of the Knowledge Society by exploiting the benefits of new channels of communication, learning, knowledge generation and diffusion focusing on the concept of roadmapping. Important dimensions of social dialogue such as collective bargaining and working conditions are addressed.
Abstract: Graduate attributes have received increasing attention
over recent years as universities incorporate these attributes into the
curriculum. Graduates who have adequate technical knowledge only
are not sufficiently equipped to compete effectively in the work
place; they also need non disciplinary skills ie, graduate attributes.
The purpose of this paper is to investigate the impact of an eportfolio
in a technical communication course to enhance engineering
students- graduate attributes: namely, learning of communication,
critical thinking and problem solving and teamwork skills. Two
questionnaires were used to elicit information from the students: one
on their preferred and the other on the actual learning process. In
addition, student perceptions of the use of eportfolio as a learning
tool were investigated. Preliminary findings showed that most of the
students- expectations have been met with their actual learning. This
indicated that eportfolio has the potential as a tool to enhance
students- graduate attributes.
Abstract: To solve the quick and accurate level-adjusting
problem in the process of spacecraft precise mating, automatic leveling
and equalizing hoist device for spacecraft is developed. Based on
lifting point adjustment by utilizing XY-workbench, the leveling and
equalizing controller by a self-adaptive control algorithm is proposed.
By simulation analysis and lifting test using engineering prototype,
validity and reliability of the hoist device is verified, which can meet
the precision mating requirements of practical applications for
spacecraft.
Abstract: The purpose of this research is to establish the experimental conditions for removal of Cibacron Brilliant Yellow 3G-P dye (CBY) from aqueous solutions by sorption onto coffee husks as a low-cost sorbent. The effects of various experimental parameters (e.g. initial CBY dye concentration, sorbent mass, pH, temperature) were examined and the optimal experimental conditions were determined. The results indicated that the removal of the dye was pH dependent and at initial pH of 2, the dye was removed effectively. The CBY dye sorption data were fitted to Langmuir, Freundlich, Temkin and Dubinin-Radushkevich equilibrium models. The maximum sorption capacity of CBY dye ions onto coffee husks increased from 24.04 to 35.04 mg g-1 when the temperature was increased from 293 to 313 K. The calculated sorption thermodynamic parameters including ΔG°, ΔH°, and ΔS° indicated that the CBY dye sorption onto coffee husks is a spontaneous, endothermic and mainly physical in nature.
Abstract: In this paper, we argue the security protocols of
ZigBee wireless sensor network in MAC layer. AES 128-bit
encryption algorithm in CCM* mode is secure transferred data;
however, AES-s secret key will be break within nearest future.
Efficient public key algorithm, ECC has been mixed with AES to
rescue the ZigBee wireless sensor from cipher text and replay attack.
Also, the proposed protocol can parallelize the integrity function to
increase system performance.