Abstract: Random Oracle Model (ROM) is an effective method
for measuring the practical security of cryptograph. In this paper, we
try to use it into information hiding system (IHS). Because IHS has its
own properties, the ROM must be modified if it is used into IHS.
Firstly, we fully discuss why and how to modify each part of ROM
respectively. The main changes include: 1) Divide the attacks that IHS
may be suffered into two phases and divide the attacks of each phase
into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3)
Define Oracle and four Black-boxes that IHS used. 4) Propose the
formalized adversary model. And 5) Give the definition of judge.
Secondly, based on ROM of IHS, the security against known original
cover attack (KOCA-KOCA-security) is defined. Then, we give an
actual information hiding scheme and prove that it is
KOCA-KOCA-secure. Finally, we conclude the paper and propose the
open problems of further research.
Abstract: This paper aims to argue that religion and Faith-based
Organizations (FBOs) contribute to building democratic process
through the provision of education in Sierra Leone. Sierra Leone
experienced a civil war from 1991 to 2002 and about 70 percent of the
population lives in poverty. While the government has been in the
process of rebuilding the nation, many forms of Civil Society
Organizations (CSOs), including FBOs, have played a significant role
in promoting social development. Education plays an important role in
supporting people-s democratic movements through knowledge
acquisition, spiritual enlightenment and empowerment. This paper
discusses religious tolerance in Sierra Leone and how FBOs have
contributed to the provision of primary education in Sierra Leone. This
study is based on the author-s field research, which involved
interviews with teachers and development stakeholders, notably
government officials, Non-governmental Organizations (NGOs) and
FBOs, as well as questionnaires completed by pupils, parents and
teachers.
Abstract: Classification is one of the primary themes in
computational biology. The accuracy of classification strongly
depends on quality of a dataset, and we need some method to
evaluate this quality. In this paper, we propose a new graphical
analysis method using 'Membership-Deviation Graph (MDG)' for
analyzing quality of a dataset. MDG represents degree of
membership and deviations for instances of a class in the dataset. The
result of MDG analysis is used for understanding specific feature and
for selecting best feature for classification.
Abstract: The goal of this work is to improve the efficiency and the reliability of the automatic artifact rejection, in particular from the Electroencephalographic (EEG) recordings. Artifact rejection is a key topic in signal processing. The artifacts are unwelcome signals that may occur during the signal acquisition and that may alter the analysis of the signals themselves. A technique for the automatic artifact rejection, based on the Independent Component Analysis (ICA) for the artifact extraction and on some high order statistics such as kurtosis and Shannon-s entropy, was proposed some years ago in literature. In this paper we enhance this technique introducing the Renyi-s entropy. The performance of our method was tested exploiting the Independent Component scalp maps and it was compared to the performance of the method in literature and it showed to outperform it.
Abstract: Due to the non- intuitive nature of Quantum
algorithms, it becomes difficult for a classically trained person to
efficiently construct new ones. So rather than designing new
algorithms manually, lately, Genetic algorithms (GA) are being
implemented for this purpose. GA is a technique to automatically
solve a problem using principles of Darwinian evolution. This has
been implemented to explore the possibility of evolving an n-qubit
circuit when the circuit matrix has been provided using a set of
single, two and three qubit gates. Using a variable length population
and universal stochastic selection procedure, a number of possible
solution circuits, with different number of gates can be obtained for
the same input matrix during different runs of GA. The given
algorithm has also been successfully implemented to obtain two and
three qubit Boolean circuits using Quantum gates. The results
demonstrate the effectiveness of the GA procedure even when the
search spaces are large.
Abstract: Transportation is of great importance in the current
life of human beings. The transportation system plays many roles,
from economical development to after-catastrophe aids such as
rescue operation in the first hours and days after an earthquake. In
after earthquakes response phase, transportation system acts as a
basis for ground operations including rescue and relief operation,
food providing for victims and etc. It is obvious that partial or
complete obstruction of this system results in the stop of these
operations. Bridges are one of the most important elements of
transportation network. Failure of a bridge, in the most optimistic
case, cuts the relation between two regions and in more developed
countries, cuts the relation of numerous regions. In this paper, to
evaluate the vulnerability and estimate the damage level of Tehran
bridges, HAZUS method, developed by Federal Emergency
Management Agency (FEMA) with the aid of National Institute of
Building Science (NIBS), is used for the first time in Iran. In this
method, to evaluate the collapse probability, fragility curves are
used. Iran is located on seismic belt and thus, it is vulnerable to
earthquakes. Thus, the study of the probability of bridge collapses, as
an important part of transportation system, during earthquakes is of
great importance. The purpose of this study is to provide fragility
curves for Gisha Bridge, one of the longest steel bridges in Tehran,
as an important lifeline element. Besides, the damage probability for
this bridge during a specific earthquake, introduced as scenario
earthquakes, is calculated. The fragility curves show that for the
considered scenario, the probability of occurrence of complete
collapse for the bridge is 8.6%.
Abstract: Recent quasi-experimental evaluation of the Canadian Active Labour Market Policies (ALMP) by Human Resources and Skills Development Canada (HRSDC) has provided an opportunity to examine alternative methods to estimating the incremental effects of Employment Benefits and Support Measures (EBSMs) on program participants. The focus of this paper is to assess the efficiency and robustness of inverse probability weighting (IPW) relative to kernel matching (KM) in the estimation of program effects. To accomplish this objective, the authors compare pairs of 1,080 estimates, along with their associated standard errors, to assess which type of estimate is generally more efficient and robust. In the interest of practicality, the authorsalso document the computationaltime it took to produce the IPW and KM estimates, respectively.
Abstract: In spite of the advent of new materials, clay bricks
remain, arguably, the most popular construction materials today.
Nevertheless the low cost and versatility of clay bricks cannot always
be associated with high environmental and sustainable values,
especially in terms of raw material sources and manufacturing
processes. At the same time, the worldwide agricultural footprint is
fast growing, with vast agricultural land cultivation and active
expansion of the agro-based industry. The resulting large quantities of
agricultural wastes, unfortunately, are not always well managed or
utilised. These wastes can be recycled, such as by retrieving fibres
from disposed leaves and fruit bunches, and then incorporated in
brick-making. This way the clay bricks are made a 'greener' building
material and the discarded natural wastes can be reutilised, avoiding
otherwise wasteful landfill and harmful open incineration. This study
examined the physical and mechanical properties of clay bricks made
by adding two natural fibres to a clay-water mixture, with baked and
non-baked conditions. The fibres were sourced from pineapple leaves
(PF) and oil palm fruit bunch (OF), and added within the range of
0.25-0.75 %. Cement was added as a binder to the mixture at 5-15 %.
Although the two fibres had different effects on the bricks produced,
cement appeared to dominate the compressive strength. The
non-baked bricks disintegrated when submerged in water, while the
baked ones displayed cement-dependent characteristics in
water-absorption and density changes. Interestingly, further increase
in fibre content did not cause significant density decrease in both the
baked and non-baked bricks.
Abstract: A universal current-mode biquad is described which
represents an economical variant of well-known KHN (Kerwin,
Huelsman, Newcomb) voltage-mode filter. The circuit consists of
two multiple-output OTAs and of two grounded capacitors. Utilizing
simple splitter of the input current and a pair of jumpers, all the basic
2nd-order transfer functions can be implemented. The principle is
verified by Spice simulation on the level of a CMOS structure of
OTAs.
Abstract: Nowadays, quasi-continuous wave diode lasers are
used in a widespread variety of applications. Temperature effects in
these lasers can strongly influence their performance. In this paper,
the effects of temperature have been experimentally investigated on
different features of a 60W-QCW diode laser. The obtained results
indicate that the conversion efficiency and operation voltage of diode
laser decrease with the augmentation of the working temperature
associated with a redshift in the laser peak wavelength. Experimental
results show the emission peak wavelength of laser shifts 0.26 nm
and the conversion efficiency decreases 1.76 % with the increase of
temperature from 40 to 50 ̊C. Present study also shows the slope
efficiency decreases gradually at low temperatures and rapidly at
higher temperatures. Regarding the close dependence of the
mentioned parameters to the operating temperature, it is of great
importance to carefully control the working temperature of diode
laser, particularly for medical applications.
Abstract: In the given article the creative arts is being
investigated in the modern era and from the aspect of the artistic
interrelationship, having created by the character of his personality
and as the viewer. A study in the identity formation terms, the
definition of its being unique, unity and similarity as a global issue of
the XXI century has been conducted by the analyzing the definitions
which characterize the human nature in the arts. Spiritual universality
and human existence have been considered in the art system as a
human who is a creator, as the man hero and as the character who is
the recipient as well as the analyses which have been conducted
along with the worldwide cultural and historical processes.
Abstract: Unlike Christianity and Buddhism, Islam, being one
of the three universal world religions, actively penetrates into
people-s everyday life. The main reason for this is that in Islam the
religion and ideology, philosophy, religious organizations and state
bodies are closely interrelated. In order to analyze the state of being
of interrelations of religion and civil society in Kazakhstan, it is
necessary to study Islam and its relations with spiritual culture of the
society. According to the Constitution of the Republic of Kazakhstan
the religion is separated from the state, i.e. each performs its own
function without interfering into each other-s affairs. The right of the
citizens of our republic to freedom of thinking and faith is based on
the Constitution of the RK, Civil Code, Law “On freedom of faith
and religious unions in the Republic of Kazakhstan".
Legislatively secured separation of the mosque and church from
the state does not mean that religion has no influence on the latter.
The state, consisting of citizens with their own beliefs, including
religious ones, cannot be isolated from the influence of religion.
Nowadays it is commonly accepted that it is not possible to
understand and forecast key social processes without taking into
account the religious factor.
Abstract: The most severe damage of the turbine rotor is its
distortion. The rotor straightening process must lead, at the first
stage, to removal of the stresses from the material by annealing and
next, to straightening of the plastic distortion without leaving any
stress by hot spotting. The straightening method does not produce
stress accumulations and the heating technique, developed
specifically for solid forged rotors and disks, enables to avoid local
overheating and structural changes in the material. This process also
does not leave stresses in the shaft material. An experimental study
of hot spotting is carried out on a large turbine rotor and some of the
most important effective parameters that must be considered on
annealing and hot spotting processes are investigated in this paper.
Abstract: The need for multilingual communication in Japan has
increased due to an increase in the number of foreigners in the
country. When people communicate in their nonnative language,
the differences in language prevent mutual understanding among
the communicating individuals. In the medical field, communication
between the hospital staff and patients is a serious problem. Currently,
medical translators accompany patients to medical care facilities, and
the demand for medical translators is increasing. However, medical
translators cannot necessarily provide support, especially in cases in
which round-the-clock support is required or in case of emergencies.
The medical field has high expectations from information technology.
Hence, a system that supports accurate multilingual communication is
required. Despite recent advances in machine translation technology,
it is very difficult to obtain highly accurate translations. We have
developed a support system called M3 for multilingual medical
reception. M3 provides support functions that aid foreign patients in
the following respects: conversation, questionnaires, reception procedures,
and hospital navigation; it also has a Q&A function. Users
can operate M3 using a touch screen and receive text-based support.
In addition, M3 uses accurate translation tools called parallel texts
to facilitate reliable communication through conversations between
the hospital staff and the patients. However, if there is no parallel
text that expresses what users want to communicate, the users cannot
communicate. In this study, we have developed a circulating support
environment for multilingual medical communication using parallel
texts. The proposed environment can circulate necessary parallel texts
through the following procedure: (1) a user provides feedback about
the necessary parallel texts, following which (2) these parallel texts
are created and evaluated.
Abstract: The new idea of analyze of power system failure with
use of artificial neural network is proposed. An analysis of the
possibility of simulating phenomena accompanying system faults and
restitution is described. It was indicated that the universal model for
the simulation of phenomena in whole analyzed range does not exist.
The main classic method of search of optimal structure and
parameter identification are described shortly. The example with
results of calculation is shown.
Abstract: This paper is mainly concerned with the application of
a novel technique of data interpretation for classifying measurements
of plasma columns in Tokamak reactors for nuclear fusion
applications. The proposed method exploits several concepts derived
from soft computing theory. In particular, Artificial Neural Networks
and Multi-Class Support Vector Machines have been exploited to
classify magnetic variables useful to determine shape and position of
the plasma with a reduced computational complexity. The proposed
technique is used to analyze simulated databases of plasma equilibria
based on ITER geometry configuration. As well as demonstrating the
successful recovery of scalar equilibrium parameters, we show that
the technique can yield practical advantages compared with earlier
methods.
Abstract: Cryptographic algorithms play a crucial role in the
information society by providing protection from unauthorized
access to sensitive data. It is clear that information technology will
become increasingly pervasive, Hence we can expect the emergence
of ubiquitous or pervasive computing, ambient intelligence. These
new environments and applications will present new security
challenges, and there is no doubt that cryptographic algorithms and
protocols will form a part of the solution. The efficiency of a public
key cryptosystem is mainly measured in computational overheads,
key size and bandwidth. In particular the RSA algorithm is used in
many applications for providing the security. Although the security
of RSA is beyond doubt, the evolution in computing power has
caused a growth in the necessary key length. The fact that most chips
on smart cards can-t process key extending 1024 bit shows that there
is need for alternative. NTRU is such an alternative and it is a
collection of mathematical algorithm based on manipulating lists of
very small integers and polynomials. This allows NTRU to high
speeds with the use of minimal computing power. NTRU (Nth degree
Truncated Polynomial Ring Unit) is the first secure public key
cryptosystem not based on factorization or discrete logarithm
problem. This means that given sufficient computational resources
and time, an adversary, should not be able to break the key. The
multi-party communication and requirement of optimal resource
utilization necessitated the need for the present day demand of
applications that need security enforcement technique .and can be
enhanced with high-end computing. This has promoted us to develop
high-performance NTRU schemes using approaches such as the use
of high-end computing hardware. Peer-to-peer (P2P) or enterprise
grids are proven as one of the approaches for developing high-end
computing systems. By utilizing them one can improve the
performance of NTRU through parallel execution. In this paper we
propose and develop an application for NTRU using enterprise grid
middleware called Alchemi. An analysis and comparison of its
performance for various text files is presented.
Abstract: Automatic Extraction of Event information from
social text stream (emails, social network sites, blogs etc) is a vital
requirement for many applications like Event Planning and
Management systems and security applications. The key information
components needed from Event related text are Event title, location,
participants, date and time. Emails have very unique distinctions over
other social text streams from the perspective of layout and format
and conversation style and are the most commonly used
communication channel for broadcasting and planning events.
Therefore we have chosen emails as our dataset. In our work, we
have employed two statistical NLP methods, named as Finite State
Machines (FSM) and Hidden Markov Model (HMM) for the
extraction of event related contextual information. An application
has been developed providing a comparison among the two methods
over the event extraction task. It comprises of two modules, one for
each method, and works for both bulk as well as direct user input.
The results are evaluated using Precision, Recall and F-Score.
Experiments show that both methods produce high performance and
accuracy, however HMM was good enough over Title extraction and
FSM proved to be better for Venue, Date, and time.
Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.
Abstract: Intermittent aeration process can be easily applied on
the existing activated sludge system and is highly reliable against the loading changes. It can be operated in a relatively simple way as well.
Since the moving-bed biofilm reactor method processes pollutants by attaching and securing the microorganisms on the media, the process
efficiency can be higher compared to the suspended growth biological
treatment process, and can reduce the return of sludge. In this study,
the existing intermittent aeration process with alternating flow being
applied on the oxidation ditch is applied on the continuous flow stirred tank reactor with advantages from both processes, and we would like
to develop the process to significantly reduce the return of sludge in the clarifier and to secure the reliable quality of treated water by
adding the moving media. Corresponding process has the appropriate
form as an infrastructure based on u- environment in future u- City and
is expected to accelerate the implementation of u-Eco city in conjunction with city based services. The system being conducted in a
laboratory scale has been operated in HRT 8hours except for the final
clarifier and showed the removal efficiency of 97.7 %, 73.1 % and 9.4
% in organic matters, TN and TP, respectively with operating range of
4hour cycle on system SRT 10days. After adding the media, the removal efficiency of phosphorus showed a similar level compared to
that before the addition, but the removal efficiency of nitrogen was
improved by 7~10 %. In addition, the solids which were maintained in
MLSS 1200~1400 at 25 % of media packing were attached all onto the
media, which produced no sludge entering the clarifier. Therefore, the
return of sludge is not needed any longer.