Abstract: In today's day and age, one of the important topics in
information security is authentication. There are several alternatives
to text-based authentication of which includes Graphical Password
(GP) or Graphical User Authentication (GUA). These methods stems
from the fact that humans recognized and remembers images better
than alphanumerical text characters. This paper will focus on the
security aspect of GP algorithms and what most researchers have
been working on trying to define these security features and
attributes. The goal of this study is to develop a fuzzy decision model
that allows automatic selection of available GP algorithms by taking
into considerations the subjective judgments of the decision makers
who are more than 50 postgraduate students of computer science. The
approach that is being proposed is based on the Fuzzy Analytic
Hierarchy Process (FAHP) which determines the criteria weight as a
linear formula.
Abstract: In the recent past Learning Classifier Systems have
been successfully used for data mining. Learning Classifier System
(LCS) is basically a machine learning technique which combines
evolutionary computing, reinforcement learning, supervised or
unsupervised learning and heuristics to produce adaptive systems. A
LCS learns by interacting with an environment from which it
receives feedback in the form of numerical reward. Learning is
achieved by trying to maximize the amount of reward received. All
LCSs models more or less, comprise four main components; a finite
population of condition–action rules, called classifiers; the
performance component, which governs the interaction with the
environment; the credit assignment component, which distributes the
reward received from the environment to the classifiers accountable
for the rewards obtained; the discovery component, which is
responsible for discovering better rules and improving existing ones
through a genetic algorithm. The concatenate of the production rules
in the LCS form the genotype, and therefore the GA should operate
on a population of classifier systems. This approach is known as the
'Pittsburgh' Classifier Systems. Other LCS that perform their GA at
the rule level within a population are known as 'Mitchigan' Classifier
Systems. The most predominant representation of the discovered
knowledge is the standard production rules (PRs) in the form of IF P
THEN D. The PRs, however, are unable to handle exceptions and do
not exhibit variable precision. The Censored Production Rules
(CPRs), an extension of PRs, were proposed by Michalski and
Winston that exhibit variable precision and supports an efficient
mechanism for handling exceptions. A CPR is an augmented
production rule of the form: IF P THEN D UNLESS C, where
Censor C is an exception to the rule. Such rules are employed in
situations, in which conditional statement IF P THEN D holds
frequently and the assertion C holds rarely. By using a rule of this
type we are free to ignore the exception conditions, when the
resources needed to establish its presence are tight or there is simply
no information available as to whether it holds or not. Thus, the IF P
THEN D part of CPR expresses important information, while the
UNLESS C part acts only as a switch and changes the polarity of D
to ~D. In this paper Pittsburgh style LCSs approach is used for
automated discovery of CPRs. An appropriate encoding scheme is
suggested to represent a chromosome consisting of fixed size set of
CPRs. Suitable genetic operators are designed for the set of CPRs
and individual CPRs and also appropriate fitness function is proposed
that incorporates basic constraints on CPR. Experimental results are
presented to demonstrate the performance of the proposed learning
classifier system.
Abstract: In recent years, scanning probe atomic force
microscopy SPM AFM has gained acceptance over a wide spectrum
of research and science applications. Most fields focuses on physical,
chemical, biological while less attention is devoted to manufacturing
and machining aspects. The purpose of the current study is to assess
the possible implementation of the SPM AFM features and its
NanoScope software in general machining applications with special
attention to the tribological aspects of cutting tool. The surface
morphology of coated and uncoated as-received carbide inserts is
examined, analyzed, and characterized through the determination of
the appropriate scanning setting, the suitable data type imaging
techniques and the most representative data analysis parameters
using the MultiMode SPM AFM in contact mode. The NanoScope
operating software is used to capture realtime three data types
images: “Height", “Deflection" and “Friction". Three scan sizes are
independently performed: 2, 6, and 12 μm with a 2.5 μm vertical
range (Z). Offline mode analysis includes the determination of three
functional topographical parameters: surface “Roughness", power
spectral density “PSD" and “Section". The 12 μm scan size in
association with “Height" imaging is found efficient to capture every
tiny features and tribological aspects of the examined surface. Also,
“Friction" analysis is found to produce a comprehensive explanation
about the lateral characteristics of the scanned surface. Configuration
of many surface defects and drawbacks has been precisely detected
and analyzed.
Abstract: Trust management and Reputation models are
becoming integral part of Internet based applications such as CSCW,
E-commerce and Grid Computing. Also the trust dimension is a
significant social structure and key to social relations within a
collaborative community. Collaborative Decision Making (CDM) is
a difficult task in the context of distributed environment (information
across different geographical locations) and multidisciplinary
decisions are involved such as Virtual Organization (VO). To aid
team decision making in VO, Decision Support System and social
network analysis approaches are integrated. In such situations social
learning helps an organization in terms of relationship, team
formation, partner selection etc. In this paper we focus on trust
learning. Trust learning is an important activity in terms of
information exchange, negotiation, collaboration and trust
assessment for cooperation among virtual team members. In this
paper we have proposed a reinforcement learning which enhances the
trust decision making capability of interacting agents during
collaboration in problem solving activity. Trust computational model
with learning that we present is adapted for best alternate selection of
new project in the organization. We verify our model in a multi-agent
simulation where the agents in the community learn to identify
trustworthy members, inconsistent behavior and conflicting behavior
of agents.
Abstract: This paper presents a experiment to estimate the
influences of cutting conditions in microstructure changes of
machining austenitic 304 stainless steel, especially for wear insert. The
wear insert were prefabricated with a width of 0.5 mm. And the forces,
temperature distribution, RS, and microstructure changes were
measured by force dynamometer, infrared thermal camera, X-ray
diffraction, XRD, SEM, respectively. The results told that the different
combinations of machining condition have a significant influence on
machined surface microstructure changes. In addition to that, the
ANOVA and AOMwere used to tell the different influences of cutting
speed, feed rate, and wear insert.
Abstract: Obfuscation is a low cost software protection
methodology to avoid reverse engineering and re engineering of
applications. Source code obfuscation aims in obscuring the source
code to hide the functionality of the codes. This paper proposes an
Array data transformation in order to obfuscate the source code
which uses arrays. The applications using the proposed data
structures force the programmer to obscure the logic manually. It
makes the developed obscured codes hard to reverse engineer and
also protects the functionality of the codes.
Abstract: In this study we investigate silica nanoparticle (SiO2- NP) effects on the structure and phase properties of supported lipid monolayers and bilayers, coupling surface pressure measurements, fluorescence microscopy and atomic force microscopy. SiO2-NPs typically in size range of 10nm to 100 nm in diameter are tested. Our results suggest first that lipid molecules organization depends to their nature. Secondly, lipid molecules in the vinicity of big aggregates nanoparticles organize in liquid condensed phase whereas small aggregates are localized in both fluid liquid-expanded (LE) and liquid-condenced (LC). We demonstrated also by atomic force microscopy that by measuring friction forces it is possible to get information as if nanoparticle aggregates are recovered or not by lipid monolayers and bilayers.
Abstract: In this paper, Lattice Boltzmann Method (LBM) is used to study laminar flow with mixed convection heat transfer inside a two-dimensional inclined lid-driven rectangular cavity with aspect ratio AR = 3. Bottom wall of the cavity is maintained at lower temperature than the top lid, and its vertical walls are assumed insulated. Top lid motion results in fluid motion inside the cavity. Inclination of the cavity causes horizontal and vertical components of velocity to be affected by buoyancy force. To include this effect, calculation procedure of macroscopic properties by LBM is changed and collision term of Boltzmann equation is modified. A computer program is developed to simulate this problem using BGK model of lattice Boltzmann method. The effects of the variations of Richardson number and inclination angle on the thermal and flow behavior of the fluid inside the cavity are investigated. The results are presented as velocity and temperature profiles, stream function contours and isotherms. It is concluded that LBM has good potential to simulate mixed convection heat transfer problems.
Abstract: There are many debates now regarding undervalued
and overvalued currencies currently traded on the world financial
market. This paper contributes to these debates from a theoretical
point of view. We present the three most commonly used methods of
estimating the equilibrium real effective exchange rate (REER):
macroeconomic balance approach, external sustainability approach
and equilibrium real effective exchange rate approach in the reduced
form. Moreover, we discuss key concepts of the calculation of the
real exchange rate (RER) based on applied explanatory variables:
nominal exchange rates, terms of trade and tradable and non-tradable
goods. Last but not least, we discuss the three main driving forces
behind real exchange rates movements which include terms of trade,
relative productivity growth and the interest rate differential.
Abstract: Coverage is one of the main research interests in wireless sensor networks (WSN), it is used to determine the quality of service (QoS) of the networks. Therefore this paper aims to review the common strategies use in solving coverage problem in WSN. The strategies studied are used during deployment phase where the coverage is calculated based on the placement of the sensors on the region of interest (ROI). The strategies reviewed are categorized into three groups based on the approaches used, namely; force based, grid based or computational geometry based approach.
Abstract: This research details a Computational Fluid Dynamics (CFD) approach to model fluid flow in a journal bearing with 8 equispaced semi-circular axial grooves. Water is used as the lubricant and is fed from one end of the bearing to the other, under pressure. The geometry of the bearing is modeled using a commercially available modeling software GAMBIT and the flow analysis is performed using a dedicated CFD analysis software FLUENT. The pressure distribution in the bearing clearance is obtained from FLUENT for various whirl ratios and is used to calculate the hydrodynamic force components in the radial and tangential direction of the bearing. These values along with the various whirl speeds can be used to do a regression analysis to determine the stiffness and damping coefficients. The values obtained are then compared with the stiffness and damping coefficients of a 3 Axial groove water lubricated journal bearing and those obtained from a FORTRAN code for a similar bearing.
Abstract: This paper discusses a curriculum approach that will
give emphasis on practical portions of teaching network security
subjects in information and communication technology courses. As
we are well aware, the need to use a practice and application oriented
approach in education is paramount. Research on active learning and
cooperative groups have shown that students grasps more and have
more tendency towards obtaining and realizing soft skills like
leadership, communication and team work as opposed to the more
traditional theory and exam based teaching and learning. While this
teaching and learning paradigm is relatively new in Malaysia, it has
been practiced widely in the West. This paper examines a certain
approach whereby students learning wireless security are divided into
and work in small and manageable groups where there will be 2
teams which consist of black hat and white hat teams. The former
will try to find and expose vulnerabilities in a wireless network while
the latter will try their best to prevent such attacks on their wireless
networks using hardware, software, design and enforcement of
security policy and etc. This paper will try to show that the approach
taken plus the use of relevant and up to date software and hardware
and with suitable environment setting will hopefully expose students
to a more fruitful outcome in terms of understanding of concepts,
theories and their motivation to learn.
Abstract: This paper investigates the development of weld zone
in Resistance Spot Welding (RSW) which focuses on weld nugget and Heat Affected Zone (HAZ). The effects of four factors namely
weld current, weld time, electrode force and hold time were studied using a general 24 factorial design augmented by five centre points. The results of the analysis showed that all selected factors except
hold time exhibit significant effect on weld nugget radius and HAZ size. Optimization of the welding parameters (weld current, weld
time and electrode force) to normalize weld nugget and to minimize
HAZ size was then conducted using Central Composite Design (CCD) in Response Surface Methodology (RSM) and the optimum
parameters were determined. A regression model for radius of weld nugget and HAZ size was developed and its adequacy was evaluated.
The experimental results obtained under optimum operating conditions were then compared with the predicted values and were
found to agree satisfactorily with each other
Abstract: Feeder is one of the airships of the Multibody Advanced Airship for Transport (MAAT) system, under development within the EU FP7 project. MAAT is based on a modular concept composed of two different parts that have the possibility to join; respectively they are the so-called Cruiser and Feeder, designed on the lighter than air principle. Feeder, also named ATEN (Airship Transport Elevator Network), is the smaller one which joins the bigger one, Cruiser, also named PTAH (Photovoltaic modular Transport Airship for High altitude),envisaged to happen at 15km altitude. During the MAAT design phase, the aerodynamic studies of the both airships and their interactions are analyzed. The objective of these studies is to understand the aerodynamic behavior of all the preselected configurations, as an important element in the overall MAAT system design. The most of these configurations are only simulated by CFD, while the most feasible one is experimentally analyzed in order to validate and thrust the CFD predictions. This paper presents the numerical and experimental investigation of the Feeder “conical like" shape configuration. The experiments are focused on the aerodynamic force coefficients and the pressure distribution over the Feeder outer surface, while the numerical simulation cover also the analysis of the velocity and pressure distribution. Finally, the wind tunnel experiment is compared with its CFD model in order to validate such specific simulations with respective experiments and to better understand the difference between the wind tunnel and in-flight circumstances.
Abstract: Earth reinforcing techniques have become useful and economical to solve problems related to difficult grounds and provide satisfactory foundation performance. In this context, this paper uses radial basis function neural network (RBFNN) for predicting the bearing pressure of strip footing on reinforced granular bed overlying weak soil. The inputs for the neural network models included plate width, thickness of granular bed and number of layers of reinforcements, settlement ratio, water content, dry density, cohesion and angle of friction. The results indicated that RBFNN model exhibited more than 84 % prediction accuracy, thereby demonstrating its application in a geotechnical problem.
Abstract: Green propellants used for satellite-level propulsion
system become attractive in recent years because the non-toxicity and
lower requirements of safety protection. One of the green propellants,
high-concentration hydrogen peroxide H2O2 solution (≥70% w/w,
weight concentration percentage), often known as high-test peroxide
(HTP), is considered because it is ITAR-free, easy to manufacture and
the operating temperature is lower than traditional monopropellant
propulsion. To establish satellite propulsion technology, the National
Space Organization (NSPO) in Taiwan has initialized a long-term
cooperation project with the National Cheng Kung University to
develop compatible tank and thruster. An experimental propulsion
payload has been allocated for the future self-reliant satellite to
perform orbit transfer and maintenance operations. In the present
research, an 1-Newton thruster prototype is designed and the thrusting
force is measured by a pendulum-type platform. The preliminary
hot-firing test at ambient environment showed the generated thrust and
the specific impulse are about 0.7 Newton and 102 seconds,
respectively.
Abstract: According to the masonry standard the compressive
strength is basically dependent on factors such as the mortar strength
and the relative values of unit and mortar strength. However
interlocking brick has none or less use of mortar. Therefore there is a need to investigate the behavior of masonry walls using interlocking
bricks. In this study a series of tests have been conducted; physical
properties and compressive strength of brick units and masonry walls
were constructed from interlocking bricks and tested under constant
vertical load at different eccentricities. The purpose of the
experimental investigations is to obtain the force displacement curves, analyze the behavior of masonry walls. The results showed
that the brick is categorized as common brick (BS 3921:1985) and severe weathering grade (ASTM C62). The maximum compressive stress of interlocking brick wall is 3.6 N/mm2 and fulfilled the requirement of standard for residential building.
Abstract: The Economic factors are leading to the rise of
infrastructures provides software and computing facilities as a
service, known as cloud services or cloud computing. Cloud services
can provide efficiencies for application providers, both by limiting
up-front capital expenses, and by reducing the cost of ownership over
time. Such services are made available in a data center, using shared
commodity hardware for computation and storage. There is a varied
set of cloud services available today, including application services
(salesforce.com), storage services (Amazon S3), compute services
(Google App Engine, Amazon EC2) and data services (Amazon
SimpleDB, Microsoft SQL Server Data Services, Google-s Data
store). These services represent a variety of reformations of data
management architectures, and more are on the horizon.
Abstract: This paper focuses on PSS/E modeling of wind farms
of Doubly-fed Induction Generator (DFIG) type and their impact on
issues of power system operation. Since Wind Turbine Generators
(WTG) don-t have the same characteristics as synchronous
generators, the appropriate modeling of wind farms is essential for
transmission system operators to analyze the best options of
transmission grid reinforcements as well as to evaluate the wind
power impact on reliability and security of supply. With the high
excepted penetration of wind power into the power system a
simultaneous loss of Wind Farm generation will put at risk power
system security and reliability. Therefore, the main wind grid code
requirements concern the fault ride through capability and frequency
operation range of wind turbines. In case of grid faults wind turbines
have to supply a definite reactive power depending on the
instantaneous voltage and to return quickly to normal operation.
Abstract: Alkali treated oil palm empty fruit bunch (EFB) fibres
(TEFBF) and untreated EFBF fibers (UEFBF) were incorporated in
polypropylene (PP) with and without malic anhydride grafted PP
(MAPP) and magnesium hydroxide as flame retardant (FR) to
produce TEFBF-PP and UEFBF-PP composites by the melt casting
method. The composites were characterized by mechanical and
burning tests along with a scanning electron microscope and Fourier
transform infrared spectroscopy. The significant improvement in
flexural modulus (133%) and flame retardant property (60%) of
TEFBF-PP composite with MAPP and FR is observed. The improved
mechanical property is discussed by the development of encapsulated
textures.