Abstract: Frequently a group of people jointly decide and authorize
a specific person as a representative in some business/poitical
occasions, e.g., the board of a company authorizes the chief executive
officer to close a multi-billion acquisition deal. In this paper, an
integrated proxy multi-signature scheme that allows anonymously
vetoable delegation is proposed. This protocol integrates mechanisms
of private veto, distributed proxy key generation, secure transmission
of proxy key, and existentially unforgeable proxy multi-signature
scheme. First, a provably secure Guillou-Quisquater proxy signature
scheme is presented, then the “zero-sharing" protocol is extended
over a composite modulus multiplicative group, and finally the above
two are combined to realize the GQ proxy multi-signature with
anonymously vetoable delegation. As a proxy signature scheme, this
protocol protects both the original signers and the proxy signer.
The modular design allows simplified implementation with less
communication overheads and better computation performance than
a general secure multi-party protocol.
Abstract: The possibility of intrinsic electromagnetic fields
within living cells and their resonant self-interaction and interaction
with ambient electromagnetic fields is suggested on the basis of a
theoretical and experimental study. It is reported that intrinsic
electromagnetic fields are produced in the form of radio-frequency
and infra-red photons within atoms (which may be coupled or
uncoupled) in cellular structures, such as the cell cytoskeleton and
plasma membrane. A model is presented for the interaction of these
photons among themselves or with atoms under a dipole-dipole
coupling, induced by single-photon or two-photon processes. This
resonance is manifested by conspicuous field amplification and it is
argued that it is possible for these resonant photons to undergo
tunnelling in the form of evanescent waves to a short range (of a few
nanometers to micrometres). This effect, suggested as a resonant
photon tunnelling mechanism in this report, may enable these fields
to act as intracellular signal communication devices and as bridges
between macromolecules or cellular structures in the cell
cytoskeleton, organelles or membrane. A brief overview of an
experimental technique and a review of some preliminary results are
presented, in the detection of these fields produced in living cell
membranes under physiological conditions.
Abstract: In this paper, we show that C*-tensor product of an arbitrary C*-algebra A, (not unital necessary) and C*-algebra B without ground state, have no approximately inner strongly continuous one-parameter group of *-automorphisms.
Abstract: A shaft-type activated sludge reactor has been
developed in order to study the feasibility of high-rate wastewater
treatment. The reactor having volume of about 14.5 L was operated
with the acclimated mixed activated sludge under batch and
continuous mode using a synthetic wastewater as feed. The batch
study was performed with varying chemical oxygen demand (COD)
concentrations of 1000–3500 mg·L-1 for a batch period up to 9 h. The
kinetic coefficients: Ks, k, Y and kd were obtained as 2040.2 mg·L-1
and 0.105 h-1, 0.878 and 0.0025 h-1 respectively from Monod-s
approach. The continuous study showed a stable and steady state
operation for a hydraulic retention time (HRT) of 8 h and influent
COD of about 1000 mg·L-1. A maximum COD removal efficiency of
about 80% was attained at a COD loading rate and food-tomicroorganism
(F/M) ratio (COD basis) of 3.42 kg·m-3d-1 and 1.0
kg·kg-1d-1 respectively under a HRT of 8 h. The reactor was also
found to handle COD loading rate and F/M ratio of 10.8 kg·m-3d-1
and 2.20 kg·kg-1d-1 respectively showing a COD removal efficiency
of about 46%.
Abstract: Thermally insulating ceramic coatings also known as
thermal barrier coatings (TBCs) have been essential technologies to
improve the performance and efficiency of advanced gas turbines in
service at extremely high temperatures. The damage mechanisms of
air-plasma sprayed YSZ thermal barrier coatings (TBC) with various
microstructures were studied by microscopic techniques after thermal
cycling. The typical degradation of plasma TBCs that occurs during
cyclic furnace testing of an YSZ and alumina coating on a Titanium
alloy are analyzed. During the present investigation the effects of
topcoat thickness, bond coat oxidation, thermal cycle lengths and test
temperature are investigated using thermal cycling. These results
were correlated with stresses measured by a spectroscopic technique
in order to understand specific damage mechanism. The failure
mechanism of former bond coats was found to involve fracture
initiation at the thermally grown oxide (TGO) interface and at the
TGO bond coat interface. The failure mechanism of the YZ was
found to involve combination of fracture along the interface between
TGO and bond coat.
Abstract: Surgical site infections (SSIs) are the most common
nosocomial infection in surgical patients resulting in significant
increases in postoperative morbidity and mortality. The commonly
causative bacteria developed resistance to virtually all antibiotics
available. The aim of this study was to isolation and identification the
most common bacteria that cause SSIs in Medical Research Institute,
and to compare their sensitivity to selected group of antibiotics and
natural products (garlic, oregano, olive, and Nigella sativa oils). The
isolated pathogens collected from infected surgical wounds were
identified, and their sensitivities to the antibiotics commonly
available for clinical use, and also to the different concentrations of
the used natural products were investigated. The results indicate to
the potential therapeutic effect of the tested natural products in
treatment of surgical wound infections.
Abstract: Each year many people are reported missing in most of the countries in the world owing to various reasons. Arrangements have to be made to find these people after some time. So the investigating agencies are compelled to make out these people by using manpower. But in many cases, the investigations carried out to find out an absconding for a long time may not be successful. At a time like that it may be difficult to identify these people by examining their old photographs, because their facial appearance might have changed mainly due to the natural aging process. On some occasions in forensic medicine if a dead body is found, investigations should be held to make sure that this corpse belongs to the same person disappeared some time ago. With the passage of time the face of the person might have changed and there should be a mechanism to reveal the person-s identity. In order to make this process easy, we must guess and decide as to how he will look like by now. To address this problem this paper presents a way of synthesizing a facial image with the aging effects.
Abstract: For the sensor network to operate successfully, the active nodes should maintain both sensing coverage and network connectivity. Furthermore, scheduling sleep intervals plays critical role for energy efficiency of wireless sensor networks. Traditional methods for sensor scheduling use either sensing coverage or network connectivity, but rarely both. In this paper, we use random scheduling for sensing coverage and then turn on extra sensor nodes, if necessary, for network connectivity. Simulation results have demonstrated that the number of extra nodes that is on with upper bound of around 9%, is small compared to the total number of deployed sensor nodes. Thus energy consumption for switching on extra sensor node is small.
Abstract: EPC Class-1 Generation-2 UHF tags, one of Radio
frequency identification or RFID tag types, is expected that most
companies are planning to use it in the supply chain in the short term
and in consumer packaging in the long term due to its inexpensive
cost. Because of the very cost, however, its resources are extremely
scarce and it is hard to have any valuable security algorithms in it. It
causes security vulnerabilities, in particular cloning the tags for
counterfeits. In this paper, we propose a product authentication
solution for anti-counterfeiting at application level in the supply chain
and mobile RFID environment. It aims to become aware of
distribution of spurious products with fake RFID tags and to provide a
product authentication service to general consumers with mobile
RFID devices like mobile phone or PDA which has a mobile RFID
reader. We will discuss anti-counterfeiting mechanisms which are
required to our proposed solution and address requirements that the
mechanisms should have.
Abstract: Dynamic bandwidth allocation in EPONs can be
generally separated into inter-ONU scheduling and intra-ONU scheduling. In our previous work, the active intra-ONU scheduling
(AS) utilizes multiple queue reports (QRs) in each report message to cooperate with the inter-ONU scheduling and makes the granted
bandwidth fully utilized without leaving unused slot remainder (USR).
This scheme successfully solves the USR problem originating from the
inseparability of Ethernet frame. However, without proper setting of
threshold value in AS, the number of QRs constrained by the IEEE
802.3ah standard is not enough, especially in the unbalanced traffic
environment. This limitation may be solved by enlarging the threshold
value. The large threshold implies the large gap between the adjacent QRs, thus resulting in the large difference between the best granted bandwidth and the real granted bandwidth. In this paper, we integrate
AS with a cooperative prediction mechanism and distribute multiple
QRs to reduce the penalty brought by the prediction error.
Furthermore, to improve the QoS and save the usage of queue reports,
the highest priority (EF) traffic which comes during the waiting time is
granted automatically by OLT and is not considered in the requested
bandwidth of ONU. The simulation results show that the proposed
scheme has better performance metrics in terms of bandwidth
utilization and average delay for different classes of packets.
Abstract: Conventional concentrically-braced frame (CBF)
systems have limited drift capacity before brace buckling and related
damage leads to deterioration in strength and stiffness. Self-centering
concentrically-braced frame (SC-CBF) systems have been developed
to increase drift capacity prior to initiation of damage and minimize
residual drift. SC-CBFs differ from conventional CBFs in that the
SC-CBF columns are designed to uplift from the foundation at a
specified level of lateral loading, initiating a rigid-body rotation
(rocking) of the frame. Vertically-aligned post-tensioning bars resist
uplift and provide a restoring force to return the SC-CBF columns to
the foundation (self-centering the system). This paper presents a
parametric study of different prototype buildings using SC-CBFs.
The bay widths of the SC-CBFs have been varied in these buildings
to study different geometries. Nonlinear numerical analyses of the
different SC-CBFs are presented to illustrate the effect of frame
geometry on the behavior and dynamic response of the SC-CBF
system.
Abstract: An appropriate project delivery system (PDS) is crucial
to the success of a construction projects. Case-based Reasoning (CBR)
is a useful support for PDS selection. However, the traditional CBR
approach represents cases as attribute-value vectors without taking
relations among attributes into consideration, and could not calculate
the similarity when the structures of cases are not strictly same.
Therefore, this paper solves this problem by adopting the Relational
Case-based Reasoning (RCBR) approach for PDS selection,
considering both the structural similarity and feature similarity. To
develop the feature terms of the construction projects, the criteria and
factors governing PDS selection process are first identified. Then
feature terms for the construction projects are developed. Finally, the
mechanism of similarity calculation and a case study indicate how
RCBR works for PDS selection. The adoption of RCBR in PDS
selection expands the scope of application of traditional CBR method
and improves the accuracy of the PDS selection system.
Abstract: Graph transformation has recently become more and
more popular as a general visual modeling language to formally state
the dynamic semantics of the designed models. Especially, it is a
very natural formalism for languages which basically are graph (e.g.
UML). Using this technique, we present a highly understandable yet
precise approach to formally model and analyze the behavioral
semantics of UML 2.0 Activity diagrams. In our proposal, AGG is
used to design Activities, then using our previous approach to model
checking graph transformation systems, designers can verify and
analyze designed Activity diagrams by checking the interesting
properties as combination of graph rules and LTL (Linear Temporal
Logic) formulas on the Activities.
Abstract: The objective of this work is to explicit knowledge on the interactions between the chlorophyll-a and nine meroplankton larvae of epibenthonic fauna. The studied case is the Arraial do Cabo upwelling system, Southeastern of Brazil, which provides different environmental conditions. To assess this information a network approach based in probability estimative was used. Comparisons among the generated graphs are made in the light of different water masses, application of Shannon biodiversity index, and the closeness and betweenness centralities measurements. Our results show the main pattern among different water masses and how the core organisms belonging to the network skeleton are correlated to the main environmental variable. We conclude that the approach of complex networks is a promising tool for environmental diagnostic.
Abstract: Novel polystrene-bound Schiff bases and their Pt(IV)
complexes have been prepared from condensation reaction of
polystyrene-A-NH2 with 2-hydroxybenzaldehyde and 5-fluoro-3-
bromo-2-hydroxybenzaldehyde. The structures of Pt(IV) complexes
with polystyrene including Schiff bases have been determined by
elemental analyses, magnetic susceptibility, IR, 1H-NMR, UV-vis,
TG/DTA and AAS. The antibacterial and antifungal activities of the
synthesized compounds have been studied by the well-diffusion
method against some selected microorganisms: (Bacillus cereus spp.,
Listeria monocytogenes 4b, Micrococcus luteus, Staphylococcus
aureus, Staphylococcus epidermis, Brucella abortus, Escherichia
coli, Pseudomonas putida spp., Shigella dysenteria type 10,
Salmonella typhi H).
Abstract: One of the biggest drawbacks of the wireless
environment is the limited bandwidth. However, the users sharing
this limited bandwidth have been increasing considerably. SDMA
technique which entails using directional antennas allows to increase
the capacity of a wireless network by separating users in the medium.
In this paper, it has been presented how the capacity can be enhanced
while the mean delay is reduced by using directional antennas in
wireless networks employing TDMA/FDD MAC. Computer
modeling and simulation of the wireless system studied are realized
using OPNET Modeler. Preliminary simulation results are presented
and the performance of the model using directional antennas is
evaluated and compared consistently with the one using
omnidirectional antennas.
Abstract: In the recent past, there has been an increasing interest
in applying evolutionary methods to Knowledge Discovery in
Databases (KDD) and a number of successful applications of Genetic
Algorithms (GA) and Genetic Programming (GP) to KDD have been
demonstrated. The most predominant representation of the
discovered knowledge is the standard Production Rules (PRs) in the
form If P Then D. The PRs, however, are unable to handle
exceptions and do not exhibit variable precision. The Censored
Production Rules (CPRs), an extension of PRs, were proposed by
Michalski & Winston that exhibit variable precision and supports an
efficient mechanism for handling exceptions. A CPR is an
augmented production rule of the form:
If P Then D Unless C, where C (Censor) is an exception to the rule.
Such rules are employed in situations, in which the conditional
statement 'If P Then D' holds frequently and the assertion C holds
rarely. By using a rule of this type we are free to ignore the exception
conditions, when the resources needed to establish its presence are
tight or there is simply no information available as to whether it
holds or not. Thus, the 'If P Then D' part of the CPR expresses
important information, while the Unless C part acts only as a switch
and changes the polarity of D to ~D.
This paper presents a classification algorithm based on evolutionary
approach that discovers comprehensible rules with exceptions in the
form of CPRs.
The proposed approach has flexible chromosome encoding, where
each chromosome corresponds to a CPR. Appropriate genetic
operators are suggested and a fitness function is proposed that
incorporates the basic constraints on CPRs. Experimental results are
presented to demonstrate the performance of the proposed algorithm.
Abstract: Internet is nowadays included to all National Curriculums of the elementary school. A comparative study of their
goals leads to the conclusion that a complete curriculum should aim to student-s acquisition of the abilities to navigate and search for
information and additionally to emphasize on the evaluation of the information provided by the World Wide Web. In a constructivistic knowledge framework the design of a course has to take under
consideration the conceptual representations of students. The following paper presents the conceptual representation of students of eleven years old, attending the Sixth Grade of Greek Elementary School about World Wide Web and their use in the design and
implementation of an innovative course.
Abstract: This article proposes modeling, simulation and
kinematic and workspace analysis of a spatial cable suspended robot
as incompletely Restrained Positioning Mechanism (IRPM). These
types of robots have six cables equal to the number of degrees of
freedom. After modeling, the kinds of workspace are defined then an
statically reachable combined workspace for different geometric
structures of fixed and moving platform is obtained. This workspace
is defined as the situations of reference point of the moving platform
(center of mass) which under external forces such as weight and with
ignorance of inertial effects, the moving platform should be in static
equilibrium under conditions that length of all cables must not be
exceeded from the maximum value and all of cables must be at
tension (they must have non-negative tension forces). Then the effect
of various parameters such as the size of moving platform, the size of
fixed platform, geometric configuration of robots, magnitude of
applied forces and moments to moving platform on workspace of
these robots with different geometric configuration are investigated.
Obtained results should be effective in employing these robots under
different conditions of applied wrench for increasing the workspace
volume.
Abstract: Wireless Sensor Network (WSN) comprises of sensor
nodes which are designed to sense the environment, transmit sensed
data back to the base station via multi-hop routing to reconstruct
physical phenomena. Since physical phenomena exists significant
overlaps between temporal redundancy and spatial redundancy, it is
necessary to use Redundancy Suppression Algorithms (RSA) for sensor
node to lower energy consumption by reducing the transmission
of redundancy. A conventional algorithm of RSAs is threshold-based
RSA, which sets threshold to suppress redundant data. Although
many temporal and spatial RSAs are proposed, temporal-spatial RSA
are seldom to be proposed because it is difficult to determine when
to utilize temporal or spatial RSAs. In this paper, we proposed a
novel temporal-spatial redundancy suppression algorithm, Codebookbase
Redundancy Suppression Mechanism (CRSM). CRSM adopts
vector quantization to generate a codebook, which is easily used to
implement temporal-spatial RSA. CRSM not only achieves power
saving and reliability for WSN, but also provides the predictability
of network lifetime. Simulation result shows that the network lifetime
of CRSM outperforms at least 23% of that of other RSAs.