Abstract: Many electronic voting systems, classified mainly as homomorphic cryptography based, mix-net based and blind signature based, appear after the eighties when zero knowledge proofs were introduced. The common ground for all these three systems is that none of them works without real time cryptologic calculations that should be held on a server. As far as known, the agent-based approach has not been used in a secure electronic voting system. In this study, an agent-based electronic voting schema, which does not contain real time calculations on the server side, is proposed. Conventional cryptologic methods are used in the proposed schema and some of the requirements of an electronic voting system are constructed within the schema. The schema seems quite secure if the used cryptologic methods and agents are secure. In this paper, proposed schema will be explained and compared with already known electronic voting systems.
Abstract: Developments in communication technologies
especially in wireless have enabled the progress of low-cost and lowpower
wireless sensor networks (WSNs). The features of such WSN
are holding minimal energy, weak computational capabilities,
wireless communication and an open-medium nature where sensors
are deployed. WSN is underpinned by application driven such as
military applications, the health sector, etc. Due to the intrinsic nature
of the network and application scenario, WSNs are vulnerable to
many attacks externally and internally. In this paper we have focused
on the types of internal attacks of WSNs based on OSI model and
discussed some security requirements, characterizers and challenges
of WSNs, by which to contribute to the WSN-s security research.
Abstract: Authentication plays a vital role in many secure
systems. Most of these systems require user to log in with his or her
secret password or pass phrase before entering it. This is to ensure all
the valuables information is kept confidential guaranteeing also its
integrity and availability. However, to achieve this goal, users are
required to memorize high entropy passwords or pass phrases.
Unfortunately, this sometimes causes difficulty for user to remember
meaningless strings of data. This paper presents a new scheme which
assigns a weight to each personal question given to the user in
revealing the encrypted secrets or password. Concentration of this
scheme is to offer fault tolerance to users by allowing them to forget
the specific password to a subset of questions and still recover the
secret and achieve successful authentication. Comparison on level of
security for weight-based and weightless secret recovery scheme is
also discussed. The paper concludes with the few areas that requires
more investigation in this research.
Abstract: The binary phase-only filter digital watermarking
embeds the phase information of the discrete Fourier transform of the
image into the corresponding magnitudes for better image authentication.
The paper proposed an approach of how to implement watermark
embedding by quantizing the magnitude, with discussing how to
regulate the quantization steps based on the frequencies of the magnitude
coefficients of the embedded watermark, and how to embed the
watermark at low frequency quantization. The theoretical analysis and
simulation results show that algorithm flexibility, security, watermark
imperceptibility and detection performance of the binary phase-only
filter digital watermarking can be effectively improved with quantization
based watermark embedding, and the robustness against JPEG
compression will also be increased to some extent.
Abstract: Matrix metalloproteinases (MMP) are a class of
structural and functional related enzymes involved in altering the
natural elements of the extracellular matrix. Most of the MMP
structures are cristalographycally determined and published in
WorldWide ProteinDataBank, isolated, in full structure or bound to
natural or synthetic inhibitors. This study proposes an algorithm to
replace missing crystallographic structures in PDB database. We
have compared the results of a chosen docking algorithm with a
known crystallographic structure in order to validate enzyme sites
reconstruction there where crystallographic data are missing.
Abstract: Kojic acid is an organic acid that is widely used as an ingredient for dermatological products, precursor for flavor enhancer and also as anti-inflammatory drug. The present study was undertaken to test the feasibility of pineapple residues as substrate for kojic acid production by Aspergillus flavus Link 44-1 via solid-state fermentation. The effect of initial moisture content, pH and incubation time on kojic acid fermentation was investigated. The best initial moisture content for kojic acid production from pineapple residues was observed at 70% (v/w) whereas initial culture pH 2.5 was identified to give high production of kojic acid. The optimal range of incubation time was identified between 8 and 14 days of incubation which corresponded to highest range of kojic acid produced. The results from this study pronounce the promising usability of pineapple residues as alternative substrate for kojic acid production by A. flavus Link 44-1.
Abstract: As the network based technologies become
omnipresent, demands to secure networks/systems against threat
increase. One of the effective ways to achieve higher security is
through the use of intrusion detection systems (IDS), which are a
software tool to detect anomalous in the computer or network. In this
paper, an IDS has been developed using an improved machine
learning based algorithm, Locally Linear Neuro Fuzzy Model
(LLNF) for classification whereas this model is originally used for
system identification. A key technical challenge in IDS and LLNF
learning is the curse of high dimensionality. Therefore a feature
selection phase is proposed which is applicable to any IDS. While
investigating the use of three feature selection algorithms, in this
model, it is shown that adding feature selection phase reduces
computational complexity of our model. Feature selection algorithms
require the use of a feature goodness measure. The use of both a
linear and a non-linear measure - linear correlation coefficient and
mutual information- is investigated respectively
Abstract: Team efficacy beliefs show promise in enhancing
team performance. Using a model-based quantitative research design,
we investigated the antecedents and performance consequences of
generalized team efficacy (potency) in a sample of 56 capital projects
executed by 15 Fortune 500 companies in the process industries.
Empirical analysis of our field survey identified that generalized
team efficacy beliefs were positively associated with an objective
measure of project cost performance. Regression analysis revealed
that team competence, empowering leadership, and performance
feedback all predicted generalized team efficacy beliefs. Tests of
mediation revealed that generalized team efficacy fully mediated
between these three inputs and project cost performance.
Abstract: A new mechanism responsible for structural life
consumption due to resonant fatigue in turbine blades, or vanes, is
presented and explained. A rotating blade or vane in a gas turbine can
change its contour due to erosion and/or material build up, in any of
these instances, the surface pressure distribution occurring on the
suction and pressure sides of blades-vanes can suffer substantial
modification of their pressure and temperatures envelopes and flow
characteristics. Meanwhile, the relative rotation between the blade
and duct vane while the pressurized gas flows and the consequent
wake crossings, will induce a fluctuating thrust force or lift that will
excite the blade.
An actual totally used up set of vane-blade components in a HP
turbine power stage in a gas turbine is analyzed. The blade suffered
some material erosion mostly at the trailing edge provoking a
peculiar surface pressure envelope which evolved as the relative
position between the vane and the blade passed in front of each other.
Interestingly preliminary modal analysis for this eroded blade
indicates several natural frequencies within the aeromechanic power
spectrum, moreover, the highest frequency component is 94% of one
natural frequency indicating near resonant condition.
Independently of other simultaneously occurring fatigue cycles
(such as thermal, centrifugal stresses).
Abstract: Until recently it would have been unusual to consider classifying population movements and refugees as security problem. However, efforts at shaping our world to make ourselves secure have paradoxically led to ever greater insecurity. The feeling of uncertainty, pertinent throughout all discourses of security, has led to the creation of security production into seemingly benign routines of everyday life. Yet, the paper argues, neither of security discourses accounted for, disclosed and challenged the fundamental aporias embedded in Western security narratives. In turn, the paper aims to unpick the conventional security wisdom, which is haunted with strong ontologies, embedded in the politics of Orientalism, and (in)security nexus. The paper concludes that current security affair conceals the integral impossibility of fulfilling its very own promise of assured security. The paper also provides suggestions about alternative security discourse based on mutual dialogue.
Abstract: Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. These protocols utilize zone partitioning to establish distinct key infrastructure under Certificate Authority (CA) supervision in different regions. Secure anonymous broadcasting (SAB) is one of these protocols that preserves most of security aspects but it has some deficiencies in practice. A very important issue is region change of a vehicle for its mobility. Changing regions leads to change of CA and necessity of having new key set to resume communication. In this paper, we propose solutions for informing vehicles about region change to obtain new key set before entering next region. This hinders attackers- intrusion, packet loss and lessons time delay. We also make key request messages secure by confirming old CA-s public key to the message, hence stronger security for safety message broadcasting is attained.
Abstract: detecting the deadlock is one of the important
problems in distributed systems and different solutions have been
proposed for it. Among the many deadlock detection algorithms,
Edge-chasing has been the most widely used. In Edge-chasing
algorithm, a special message called probe is made and sent along
dependency edges. When the initiator of a probe receives the probe
back the existence of a deadlock is revealed. But these algorithms are
not problem-free. One of the problems associated with them is that
they cannot detect some deadlocks and they even identify false
deadlocks. A key point not mentioned in the literature is that when
the process is waiting to obtain the required resources and its
execution has been blocked, how it can actually respond to probe
messages in the system. Also the question of 'which process should
be victimized in order to achieve a better performance when multiple
cycles exist within one single process in the system' has received
little attention. In this paper, one of the basic concepts of the
operating system - daemon - will be used to solve the problems
mentioned. The proposed Algorithm becomes engaged in sending
probe messages to the mandatory daemons and collects enough
information to effectively identify and resolve multi-cycle deadlocks
in distributed systems.
Abstract: New graph similarity methods have been proposed in this work with the aim to refining the chemical information extracted from molecules matching. For this purpose, data fusion of the isomorphic and nonisomorphic subgraphs into a new similarity measure, the Approximate Similarity, was carried out by several approaches. The application of the proposed method to the development of quantitative structure-activity relationships (QSAR) has provided reliable tools for predicting several pharmacological parameters: binding of steroids to the globulin-corticosteroid receptor, the activity of benzodiazepine receptor compounds, and the blood brain barrier permeability. Acceptable results were obtained for the models presented here.
Abstract: The aspiration of this research article is to target and
focus the gains of university-Industry (U-I) collaborations and
exploring those hurdles which are the obstacles for attaining these
gains. University-Industry collaborations have attained great
importance since 1980 in USA due to its application in all fields of
life. U-I collaboration is a bilateral process where academia is a
proactive member to make such alliances. Universities want to
ameliorate their academic-base with the technicalities of technobabbles.
U-I collaboration is becoming an essential lane for achieving
innovative goals in this century. Many developed nations have set
successful examples to prove this phenomenon as a catalyst to reduce
costs, efforts and personnel for R&D projects. This study is exploits
amplitudes of UI collaboration incentives in the light of success
stories of developed countries. Many universities in USA, UK,
Canada and various European Countries have been engaged with
enterprises for numerous collaborative agreements. A long list of
strategic and short term R&D projects has been executed in
developed countries to accomplish their intended purposes. Due to
the lack of intentions, genuine research and research-oriented
environment, the mentioned field could not grow very well in
developing countries. During last decade, a new wave of research
has induced the institutes of developing countries to promote R&D
culture especially in Pakistan. Higher Education Commission (HEC)
has initiated many projects and funding supports for universities
which have collaborative intentions with industry.
Findings show that rapid innovation, overwhelm the technological
complexities and articulated intellectual-base are major incentives
which steer both partners to establish faculty-industry alliances. Everchanging
technologies, concerned about intellectual property,
different research environment and culture, research relevancy (Basic
or applied), exposure differences and diversity of knowledge
(bookish or practical) are main barriers to establish and retain joint
ventures. Findings also concluded that, it is dire need to support and
enhance cooperation among academia and industry to promote highly
coordinated research behaviors. Author has proposed a roadmap for
developing countries to promote R&D clusters among faculty and
industry to deal the technological challenges and innovation
complexities. Based on our research findings, Model for R&D
Collaboration for developing countries also have been proposed to
promote articulated R&D environment. If developing countries
follow this phenomenon, rapid innovations can be achieved with
limited R&D budget heads.
Abstract: A novel robust audio watermarking scheme is
proposed in this paper. In the proposed scheme, the host audio signals
are segmented into frames. Two consecutive frames are assessed if
they are suitable to represent a watermark bit. If so, frequency
transform is performed on these two frames. The compressionexpansion
technique is adopted to generate distortion over the two
frames. The distortion is used to represent one watermark bit.
Psychoacoustic model is applied to calculate local auditory mask to
ensure that the distortion is not audible. The watermarking schemes
using mono and stereo audio signals are designed differently. The
correlation-based detection method is used to detect the distortion
and extract embedded watermark bits. The experimental results show
that the quality degradation caused by the embedded watermarks is
perceptually transparent and the proposed schemes are very robust
against different types of attacks.
Abstract: With the rapid development of wireless mobile communication, applications for mobile devices must focus on network security. In 2008, Chang-Chang proposed security improvements on the Lu et al.-s elliptic curve authentication key agreement protocol for wireless mobile networks. However, this paper shows that Chang- Chang-s improved protocol is still vulnerable to off-line password guessing attacks unlike their claims.
Abstract: Recent changes in food retailing structure have led to the development of large supercenters in suburban areas of the United States. These changes have led some authors to suggest that there are food deserts in some urban areas, where food is difficult to access, especially for disadvantaged consumers. This study tests the food desert hypothesis by comparing the distance from food retailers to food secure and food insecure households in one urban, Midwest neighborhood. This study utilizes GIS to compare household survey respondent locations against the location of various types of area food retailers. Results of this study indicate no apparent difference between food secure and insecure households in the reported importance of distance on the decision to shop at various retailers. However, there were differences in the spatial relationship between households and retailers. Food insecure households tended to be located slightly farther from large food retailers and slightly closer to convenience stores. Furthermore, food insecure households reported traveling slightly farther to their primary food retailer. The differences between the two groups was, however, relatively small.
Abstract: Power System Security is a major concern in real time
operation. Conventional method of security evaluation consists of
performing continuous load flow and transient stability studies by
simulation program. This is highly time consuming and infeasible
for on-line application. Pattern Recognition (PR) is a promising
tool for on-line security evaluation. This paper proposes a Support
Vector Machine (SVM) based binary classification for static and
transient security evaluation. The proposed SVM based PR approach
is implemented on New England 39 Bus and IEEE 57 Bus systems.
The simulation results of SVM classifier is compared with the other
classifier algorithms like Method of Least Squares (MLS), Multi-
Layer Perceptron (MLP) and Linear Discriminant Analysis (LDA)
classifiers.
Abstract: As we know, most differential equations concerning
physical phenomenon could not be solved by analytical method. Even if we use Series Method, some times we need an appropriate change of variable, and even when we can, their closed form solution may be
so complicated that using it to obtain an image or to examine the structure of the system is impossible. For example, if we consider Schrodinger equation, i.e.,
We come to a three-term recursion relations, which work with it takes, at least, a little bit time to get a series solution[6]. For this
reason we use a change of variable such as or when we consider the orbital angular momentum[1], it will be
necessary to solve. As we can observe, working with this equation is tedious. In this paper, after introducing Clenshaw method, which is a kind of Spectral method, we try to solve some of such equations.
Abstract: Due to rapid economic growth, Indonesia's energy needs is rapidly increasing. Indonesia-s primary energy consumption has doubled in 2007 compared to 2003. Indonesia's status change from oil net-exporter to oil net-importer country recently has increased Indonesia's concern over energy security. Due to this, oil import becomes center of attention in the dynamics of Indonesia's energy security. Conventional studies addressing Indonesia's energy security have focused on energy production sector. This study explores Indonesia-s energy security considering energy import sector by modeling and simulating Indonesia-s energy-related policies using system dynamics. Simulation result of Indonesia's energy security in 2020 in Business-As-Usual scenario shows that in term of supply demand ratio, energy security will be very high, but also it poses high dependence on energy import. The Alternative scenario result shows lower energy security in term of supply demand ratio and much lower dependence on energy import. It is also found that the Alternative scenario produce lower GDP growth.