Abstract: The lack of security obstructs a large scale de- ployment of the multicast communication model. There- fore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, in- tegrity and access control. Many applications require au- thenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source au- thentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simu- lated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category.
Abstract: Availability of raw materials is important for
Indonesia as a furniture exporting country. Teak log as raw materials
is supplied to the furniture industry by Perum Perhutani (PP). PP
needs to involve carbon trading for nature conservation. PP also has
an obligation in the Corporate Social Responsibility program. PP and
furniture industry also must prosecute the regulations related to
ecological issues and labor rights. This study has the objective to
create the relationship model between supplier and manufacturer to
fulfill teak log demand that involving teak forest carbon
sequestration. A model is formulated as Goal Programming to get the
favorable solution for teak log procurement and support carbon
sequestration that considering economical, ecological, and social
aspects of both supplier and manufacturer. The results show that the
proposed model can be used to determine the teak log quantity
involving carbon trading to achieve the seven goals to be satisfied the
sustainability considerations.
Abstract: Number Link is a Japanese logic puzzle where pairs of same numbers are connected using lines. Number Link can be regarded as a dynamic multiple travelers, multiple entries and exits maze, where the walls and passages are dynamically changing as the travelers move. In this paper, we apply the Tremaux’s algorithm to solve Number Link puzzles of size 8x8, 10x10 and 15x20. The algorithm works well and produces a solution for puzzles of size 8x8 and 10x10. However, solving a puzzle of size 15x20 requires high computer processing power and is time consuming.
Abstract: The increase on the demand of IT resources diverts
the enterprises to use the cloud as a cheap and scalable solution.
Cloud computing promises achieved by using the virtual machine as a
basic unite of computation. However, the virtual machine pre-defined
settings might be not enough to handle jobs QoS requirements. This
paper addresses the problem of mapping jobs have critical start
deadlines to virtual machines that have predefined specifications.
These virtual machines hosted by physical machines and shared a
fixed amount of bandwidth. This paper proposed an algorithm that
uses the idle virtual machines bandwidth to increase the quote of other
virtual machines nominated as executors to urgent jobs. An algorithm
with empirical study have been given to evaluate the impact of the
proposed model on impatient jobs. The results show the importance
of dynamic bandwidth allocation in virtualized environment and its
affect on throughput metric.
Abstract: Segmenting the lungs in medical images is a
challenging and important task for many applications. In particular,
automatic segmentation of lung cavities from multiple magnetic
resonance (MR) images is very useful for oncological applications
such as radiotherapy treatment planning. However, distinguishing of
the lung areas is not trivial due to largely changing lung shapes, low
contrast and poorly defined boundaries. In this paper, we address
lung segmentation problem from pulmonary magnetic resonance
images and propose an automated method based on a robust regionaided
geometric snake with a modified diffused region force into the
standard geometric model definition. The extra region force gives the
snake a global complementary view of the lung boundary
information within the image which along with the local gradient
flow, helps detect fuzzy boundaries. The proposed method has been
successful in segmenting the lungs in every slice of 30 magnetic
resonance images with 80 consecutive slices in each image. We
present results by comparing our automatic method to manually
segmented lung cavities provided by an expert radiologist and with
those of previous works, showing encouraging results and high
robustness of our approach.
Abstract: The building of a factory can be a strategic investment
owing to its long service life. An evaluation that only focuses, for
example, on payments for the building, the technical equipment of
the factory, and the personnel for the enterprise is – considering the
complexity of the system factory – not sufficient for this long-term
view. The success of an investment is secured, among other things,
by the attainment of nonmonetary goals, too, like transformability.
Such aspects are not considered in traditional investment calculations
like the net present value method. This paper closes this gap with the
enhanced economic evaluation (EWR) for factory planning. The
procedure and the first results of an application in a project are
presented.
Abstract: In this paper, a mathematical model for data object replication in ad hoc networks is formulated. The derived model is general, flexible and adaptable to cater for various applications in ad hoc networks. We propose a game theoretical technique in which players (mobile hosts) continuously compete in a non-cooperative environment to improve data accessibility by replicating data objects. The technique incorporates the access frequency from mobile hosts to each data object, the status of the network connectivity, and communication costs. The proposed technique is extensively evaluated against four well-known ad hoc network replica allocation methods. The experimental results reveal that the proposed approach outperforms the four techniques in both the execution time and solution quality
Abstract: One of the main issues in Computer Vision is to extract the movement of one or several points or objects of interest in an image or video sequence to conduct any kind of study or control process. Different techniques to solve this problem have been applied in numerous areas such as surveillance systems, analysis of traffic, motion capture, image compression, navigation systems and others, where the specific characteristics of each scenario determine the approximation to the problem. This paper puts forward a Computer Vision based algorithm to analyze fish trajectories in high turbulence conditions in artificial structures called vertical slot fishways, designed to allow the upstream migration of fish through obstructions in rivers. The suggested algorithm calculates the position of the fish at every instant starting from images recorded with a camera and using neural networks to execute fish detection on images. Different laboratory tests have been carried out in a full scale fishway model and with living fishes, allowing the reconstruction of the fish trajectory and the measurement of velocities and accelerations of the fish. These data can provide useful information to design more effective vertical slot fishways.
Abstract: To motivate users to adopt and use information
systems effectively, the nature of motivation should be carefully
investigated. People are usually motivated within ongoing processes
which include a chain of states such as perception, stimulation,
motivation, actions and reactions and finally, satisfaction. This study
assumes that the relevant motivation processes should be executed in
a proper and continuous manner to be able to persistently motivate
and re-motivate people in organizational settings and towards
information systems. On this basis, the study attempts to propose
possible relationships between this process-nature view of
motivation in terms of the common chain of states and the nearly
unique properties of information systems as is perceived by users in
the sense of a knowledgeable and authoritative entity. In the
conclusion section, some guidelines for practitioners are suggested to
ease their tasks for motivating people to adopt and use information
systems.
Abstract: This paper describes reactive neural control used to
generate phototaxis and obstacle avoidance behavior of walking
machines. It utilizes discrete-time neurodynamics and consists of
two main neural modules: neural preprocessing and modular neural
control. The neural preprocessing network acts as a sensory fusion
unit. It filters sensory noise and shapes sensory data to drive the
corresponding reactive behavior. On the other hand, modular neural
control based on a central pattern generator is applied for locomotion
of walking machines. It coordinates leg movements and can generate
omnidirectional walking. As a result, through a sensorimotor loop this
reactive neural controller enables the machines to explore a dynamic
environment by avoiding obstacles, turn toward a light source, and
then stop near to it.
Abstract: Graph rewriting-based visual model processing is a
widely used technique for model transformation. Visual model
transformations often need to follow an algorithm that requires a
strict control over the execution sequence of the transformation steps.
Therefore, in Visual Model Processors (VMPs) the execution order
of the transformation steps is crucial. This paper presents the visual
control flow support of Visual Modeling and Transformation System
(VMTS), which facilitates composing complex model
transformations of simple transformation steps and executing them.
The VMTS Visual Control Flow Language (VCFL) uses stereotyped
activity diagrams to specify control flow structures and OCL
constraints to choose between different control flow branches. This
paper introduces VCFL, discusses its termination properties and
provides an algorithm to support the termination analysis of VCFL
transformations.
Abstract: The supported Pd catalysts were analyzed by X-ray
diffraction and X-ray absorption spectroscopy in order to determine
their global and local structure. The average particle size of the
supported Pd catalysts was determined by X-ray diffraction method.
One of the main purposes of the present contribution is to focus on
understanding the specific role of the Pd particle size determined by
X-ray diffraction and that of the support oxide. Based on X-ray
absorption fine structure spectroscopy analysis we consider that the
whole local structure of the investigated samples are distorted
concerning the atomic number but the distances between atoms are
almost the same as for standard Pd sample. Due to the strong
modifications of the Pd cluster local structure, the metal-support
interface may influence the electronic properties of metal clusters
and thus their reactivity for absorption of the reactant molecules.
Abstract: This paper presents the results related to the
interference reduction technique in multistage multiuser detector for
asynchronous DS-CDMA system. To meet the real-time
requirements for asynchronous multiuser detection, a bit streaming,
cascade architecture is used. An asynchronous multiuser detection
involves block-based computations and matrix inversions. The paper
covers iterative-based suboptimal schemes that have been studied to
decrease the computational complexity, eliminate the need for matrix
inversions, decreases the execution time, reduces the memory
requirements and uses joint estimation and detection process that
gives better performance than the independent parameter estimation
method. The stages of the iteration use cascaded and bits processed
in a streaming fashion. The simulation has been carried out for
asynchronous DS-CDMA system by varying one parameter, i.e.,
number of users. The simulation result exhibits that system gives
optimum bit error rate (BER) at 3rd stage for 15-users.
Abstract: In data mining, the association rules are used to find
for the associations between the different items of the transactions
database. As the data collected and stored, rules of value can be found
through association rules, which can be applied to help managers
execute marketing strategies and establish sound market frameworks.
This paper aims to use Fuzzy Frequent Pattern growth (FFP-growth)
to derive from fuzzy association rules. At first, we apply fuzzy
partition methods and decide a membership function of quantitative
value for each transaction item. Next, we implement FFP-growth
to deal with the process of data mining. In addition, in order to
understand the impact of Apriori algorithm and FFP-growth algorithm
on the execution time and the number of generated association
rules, the experiment will be performed by using different sizes of
databases and thresholds. Lastly, the experiment results show FFPgrowth
algorithm is more efficient than other existing methods.
Abstract: Hypertension is characterized with stress on the heart and blood vessels thus increasing the risk of heart attack and renal diseases. The Renin angiotensin system (RAS) plays a major role in blood pressure control. Renin is the enzyme that controls the RAS at the rate-limiting step. Our aim is to develop new drug-like leads which can inhibit renin and thereby emerge as therapeutics for hypertension. To achieve this, molecular dynamics (MD) simulation and receptor-based pharmacophore modeling were implemented, and three rennin-inhibitor complex structures were selected based on IC50 value and scaffolds of inhibitors. Three pharmacophore models were generated considering conformations induced by inhibitor. The compounds mapped to these models were selected and subjected to drug-like screening. The identified hits were docked into the active site of renin. Finally, hit1 satisfying the binding mode and interaction energy was selected as possible lead candidate to be used in novel renin inhibitors.
Abstract: This work presents a recursive identification algorithm. This algorithm relates to the identification of closed loop system with Variable Structure Controller. The approach suggested includes two stages. In the first stage a genetic algorithm is used to obtain the parameters of switching function which gives a control signal rich in commutations (i.e. a control signal whose spectral characteristics are closest possible to those of a white noise signal). The second stage consists in the identification of the system parameters by the instrumental variable method and using the optimal switching function parameters obtained with the genetic algorithm. In order to test the validity of this algorithm a simulation example is presented.
Abstract: The comparative analysis of different taxonomic
groups of microorganisms isolated from dark chernozem soils under
different agricultures (alfalfa, melilot, sainfoin, soybean, rapeseed) at
Almaty region of Kazakhstan was conducted. It was shown that the
greatest number of micromycetes was typical to the soil planted with
alfalfa and canola. Species diversity of micromycetes markedly
decreases as it approaches the surface of the root, so that the species
composition in the rhizosphere is much more uniform than in the
virgin soil. Promising strains of microscopic fungi and yeast with
plant growth-promoting activity to agricultures were selected. Among
the selected fungi there are representatives of Penicillium bilaiae,
Trichoderma koningii, Fusarium equiseti, Aspergillus ustus. The
highest rates of growth and development of seedlings of plants
observed under the influence of yeasts Aureobasidium pullulans,
Rhodotorula mucilaginosa, Metschnikovia pulcherrima. Using
molecular - genetic techniques confirmation of the identification
results of selected micromycetes was conducted.
Abstract: In this paper the optimal control strategy for
Permanent Magnet Synchronous Motor (PMSM) based drive system
is presented. The designed full optimal control is available for speed
operating range up to base speed. The optimal voltage space-vector
assures input energy reduction and stator loss minimization,
maintaining the output energy in the same limits with the
conventional PMSM electrical drive. The optimal control with three
components is based on the energetically criteria and it is applicable
in numerical version, being a nonrecursive solution. The simulation
results confirm the increased efficiency of the optimal PMSM drive.
The properties of the optimal voltage space vector are shown.
Abstract: A virtualized and virtual approach is presented on
academically preparing students to successfully engage at a strategic
perspective to understand those concerns and measures that are both
structured and not structured in the area of cyber security and
information assurance. The Master of Science in Cyber Security and
Information Assurance (MSCSIA) is a professional degree for those
who endeavor through technical and managerial measures to ensure
the security, confidentiality, integrity, authenticity, control,
availability and utility of the world-s computing and information
systems infrastructure. The National University Cyber Security and
Information Assurance program is offered as a Master-s degree. The
emphasis of the MSCSIA program uniquely includes hands-on
academic instruction using virtual computers. This past year, 2011,
the NU facility has become fully operational using system
architecture to provide a Virtual Education Laboratory (VEL)
accessible to both onsite and online students. The first student cohort
completed their MSCSIA training this past March 2, 2012 after
fulfilling 12 courses, for a total of 54 units of college credits. The
rapid pace scheduling of one course per month is immensely
challenging, perpetually changing, and virtually multifaceted. This
paper analyses these descriptive terms in consideration of those
globalization penetration breaches as present in today-s world of
cyber security. In addition, we present current NU practices to
mitigate risks.
Abstract: Within dental-guided surgery, there has been a lack
of analytical methods for optimizing the treatment of the
rehabilitation concepts regarding geometrical variation. The purpose
of this study is to find the source of the greatest geometrical variation
contributor and sensitivity contributor with the help of virtual
variation simulation of a dental drill- and implant-guided surgery
process using a methodical approach. It is believed that lower
geometrical variation will lead to better patient security and higher
quality of dental drill- and implant-guided surgeries. It was found
that the origin of the greatest contributor to the most variation, and
hence where the foci should be set, in order to minimize geometrical
variation was in the assembly category (surgery). This was also the
category that was the most sensitive for geometrical variation.