Abstract: Biological, psychological and social experiences and
perceptions of healthcare services in patients medically diagnosed of
coronary heart disease were investigated using a sample of 10
participants whose responses to the in-depth interview questions
were analyzed based on inter-and-intra-case analyses. The results
obtained revealed that advancing age, single status, divorce and/or
death of spouse and the issue of single parenting negatively impacted
patients- biopsychosocial experiences. The patients- experiences of
physical signs and symptoms, anxiety and depression, past serious
medical conditions, use of self-prescribed medications, family
history of poor mental/medical or physical health, nutritional
problems and insufficient physical activities heightened their risk of
coronary attack. Collectivist culture served as a big source of relieve
to the patients. Patients- temperament, experience of different
chronic life stresses/challenges, mood alteration, regular drinking,
smoking/gambling, and family/social impairments compounded their
health situation. Patients were satisfied with the biomedical services
rendered by the healthcare personnel, whereas their psychological
and social needs were not attended to. Effective procedural treatment
model, a holistic and multidimensional approach to the treatment of
heart disease patients was proposed.
Abstract: This paper presents a model for the evaluation of
energy performance and aerodynamic forces acting on a small
straight-bladed Darrieus-type vertical axis wind turbine depending on
blade geometrical section. It consists of an analytical code coupled to
a solid modeling software, capable of generating the desired blade
geometry based on the desired blade design geometric parameters.
Such module is then linked to a finite volume commercial CFD code
for the calculation of rotor performance by integration of the
aerodynamic forces along the perimeter of each blade for a full period
of revolution.After describing and validating the computational
model with experimental data, the results of numerical simulations
are proposed on the bases of two candidate airfoil sections, that is a
classical symmetrical NACA 0021 blade profile and the recently
developed DU 06-W-200 non-symmetric and laminar blade
profile.Through a full CFD campaign of analysis, the effects of blade
geometrical section on angle of attack are first investigated and then
the overall rotor torque and power are analyzed as a function of blade
azimuthal position, achieving a numerical quantification of the
influence of airfoil geometry on overall rotor performance.
Abstract: The aerodynamics characteristics of a blended-wing body (BWB) aircraft were obtained in Universiti Teknologi MARA low speed wind tunnel. The scaled-down of BWB model consisted of a canard as its horizontal stabilizer. There were four canards with different aspect ratio used in the experiments. Canard setting angles were varied from -20q to 20q. All tests were conducted at velocity of 35 m/s, with Mach number 0.1. At low angles of attacks, the increment of lift slope for various canards aspect ratio is small and almost constant. Higher canard aspect ratio will cause higher drag. However, canard has a high effect to the moment at zero lift, CM,0.The visualization using mini tuff was performed to observe the airflow at the upper surface of canard. KeywordsAerodynamics,blended-wing body, canard, wind tunnel.
Abstract: Key management represents a major and the most
sensitive part of cryptographic systems. It includes key generation,
key distribution, key storage, and key deletion. It is also considered
the hardest part of cryptography. Designing secure cryptographic
algorithms is hard, and keeping the keys secret is much harder.
Cryptanalysts usually attack both symmetric and public key
cryptosystems through their key management. We introduce a
protocol to exchange cipher keys over insecure communication
channel. This protocol is based on public key cryptosystem,
especially elliptic curve cryptosystem. Meanwhile, it tests the cipher
keys and selects only the good keys and rejects the weak one.
Abstract: Cardiovascular diseases, principally atherosclerosis, are responsible for 30% of world deaths. Atherosclerosis is due to the formation of plaque. The fatty plaque may be at risk of rupture, leading typically to stroke and heart attack. The plaque is usually associated with a high degree of lumen reduction, called a stenosis.It is increasingly recognized that the initiation and progression of disease and the occurrence of clinical events is a complex interplay between the local biomechanical environment and the local vascular biology. The aim of this study is to investigate the flow behavior through a stenosed artery. A physical experiment was performed using an artery model and blood analogue fluid. An axisymmetric model constructed consists of contraction and expansion region that follow a mathematical form of cosine function. A 30% diameter reduction was used in this study. The flow field was measured using particle image velocimetry (PIV). Spherical particles with 20μm diameter were seeded in a water-glycerol-NaCl mixture. Steady flow Reynolds numbers are 250. The area of interest is the region after the stenosis where the flow separation occurs. The velocity field was measured and the velocity gradient was investigated. There was high particle concentration in the recirculation zone. High velocity gradient formed immediately after the stenosis throat created a lift force that enhanced particle migration to the flow separation area.
Abstract: In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false reports during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and overhead. In this paper, we propose a fuzzy logic for determining a security threshold value in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the number of partitions in a global key pool, the number of compromised partitions, and the energy level of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.
Abstract: The huge development of new technologies and the
apparition of open communication system more and more
sophisticated create a new challenge to protect digital content from
piracy. Digital watermarking is a recent research axis and a new
technique suggested as a solution to these problems. This technique
consists in inserting identification information (watermark) into
digital data (audio, video, image, databases...) in an invisible and
indelible manner and in such a way not to degrade original medium-s
quality. Moreover, we must be able to correctly extract the
watermark despite the deterioration of the watermarked medium (i.e
attacks). In this paper we propose a system for watermarking satellite
images. We chose to embed the watermark into frequency domain,
precisely the discrete wavelet transform (DWT). We applied our
algorithm on satellite images of Tunisian center. The experiments
show satisfying results. In addition, our algorithm showed an
important resistance facing different attacks, notably the compression
(JEPG, JPEG2000), the filtering, the histogram-s manipulation and
geometric distortions such as rotation, cropping, scaling.
Abstract: Least Significant Bit (LSB) technique is the earliest
developed technique in watermarking and it is also the most simple,
direct and common technique. It essentially involves embedding the
watermark by replacing the least significant bit of the image data with
a bit of the watermark data. The disadvantage of LSB is that it is not
robust against attacks. In this study intermediate significant bit (ISB)
has been used in order to improve the robustness of the watermarking
system. The aim of this model is to replace the watermarked image
pixels by new pixels that can protect the watermark data against
attacks and at the same time keeping the new pixels very close to the
original pixels in order to protect the quality of watermarked image.
The technique is based on testing the value of the watermark pixel
according to the range of each bit-plane.
Abstract: Random Oracle Model (ROM) is an effective method
for measuring the practical security of cryptograph. In this paper, we
try to use it into information hiding system (IHS). Because IHS has its
own properties, the ROM must be modified if it is used into IHS.
Firstly, we fully discuss why and how to modify each part of ROM
respectively. The main changes include: 1) Divide the attacks that IHS
may be suffered into two phases and divide the attacks of each phase
into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3)
Define Oracle and four Black-boxes that IHS used. 4) Propose the
formalized adversary model. And 5) Give the definition of judge.
Secondly, based on ROM of IHS, the security against known original
cover attack (KOCA-KOCA-security) is defined. Then, we give an
actual information hiding scheme and prove that it is
KOCA-KOCA-secure. Finally, we conclude the paper and propose the
open problems of further research.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
Abstract: This paper introduces a hardware solution to password
exposure problem caused by direct accesses to the keyboard hardware
interfaces through which a possible attacker is able to grab user-s
password even where existing countermeasures are deployed. Several
researches have proposed reasonable software based solutions to the
problem for years. However, recently introduced hardware
vulnerability problems have neutralized the software approaches and
yet proposed any effective software solution to the vulnerability.
Hardware approach in this paper is expected as the only solution to the
vulnerability
Abstract: The aim of this paper is to explore the security issues
that significantly affect the performance of Mobile Adhoc Networks
(MANET)and limit the services provided to their intended users. The
MANETs are more vulnerable to Distributed Denial of Service
attacks (DDoS) because of their properties like shared medium,
dynamic topologies etc. A DDoS attack is a coordinated attempt
made by malicious users to flood the victim network with the large
amount of data such that the resources of the victim network are
exhausted resulting in the deterioration of the network performance.
This paper highlights the effects of different types of DDoS attacks
in MANETs and categorizes them according to their behavior.
Abstract: This paper proposes a technique to protect against
email bombing. The technique employs a statistical approach, Naïve
Bayes (NB), and Neural Networks to show that it is possible to
differentiate between good and bad traffic to protect against email
bombing attacks. Neural networks and Naïve Bayes can be trained
by utilizing many email messages that include both input and output
data for legitimate and non-legitimate emails. The input to the model
includes the contents of the body of the messages, the subject, and
the headers. This information will be used to determine if the email
is normal or an attack email. Preliminary tests suggest that Naïve
Bayes can be trained to produce an accurate response to confirm
which email represents an attack.
Abstract: This current research focused on development of degradable starch based packaging film with enhanced mechanical properties. A series of low density polyethylene (LDPE)/tapioca starch compounds with various tapioca starch contents were prepared by twin screw extrusion with the addition of maleic anhydride grafted polyethylene as compatibilizer. Palm cooking oil was used as processing aid to ease the blown film process, thus, degradable film can be processed via conventional blown film machine. Studies on their characteristics, mechanical properties and biodegradation were carried out by Fourier Transform Infrared (FTIR) spectroscopy and optical properties, tensile test and exposure to fungi environment respectively. The presence of high starch contents had an adverse effect on the tensile properties of LDPE/tapioca starch blends. However, the addition of compatibilizer to the blends improved the interfacial adhesion between the two materials, hence, improved the tensile properties of the films. High content of starch amount also was found to increase the rate of biodegradability of LDPE/tapioca starch films. It can be proved by exposure of the film to fungi environment. A growth of microbes colony can be seen on the surface of LDPE/tapioca starch film indicates that the granular starch present on the surface of the polymer film is attacked by microorganisms, until most of it is assimilated as a carbon source.
Abstract: In this work, we examine fluid mixing in a full three-stream mixing channel with longitudinal vortex generators (LVGs) built on the channel bottom by numerical simulation and experiment. The effects of the asymmetrical arrangement and the attack angle of the LVGs on fluid mixing are investigated. The results show that the micromixer with LVGs at a small asymmetry index (defined by the ratio of the distance from the center plane of the gap between the winglets to the center plane of the main channel to the width of the main channel) is superior to the micromixer with symmetric LVGs and that with LVGs at a large asymmetry index. The micromixer using five mixing modules of the LVGs with an attack angle between 16.5 degrees and 22.5 degrees can achieve excellent mixing over a wide range of Reynolds numbers. Here, we call a section of channel with two pairs of staggered asymmetrical LVGs a mixing module. Besides, the micromixer with LVGs at a small attack angle is more efficient than that with a larger attack angle when pressure losses are taken into account.
Abstract: This study extends research on the relationship
between marketing strategy and market segmentation by
investigating on market segments in the cement industry.
Competitive strength and rivals distance from the factory were used
as business environment. A three segment (positive, neutral or
indifferent and zero zones) were identified as strategic segments. For
each segment a marketing strategy (aggressive, defensive and
decline) were developed. This study employed data from cement
industry to fulfill two objectives, the first is to give a framework to
the segmentation of cement industry and the second is developing
marketing strategy with varying competitive strength. Fifty six
questionnaires containing close-and open-ended questions were
collected and analyzed. Results supported the theory that segments
tend to be more aggressive than defensive when competitive strength
increases. It is concluded that high strength segments follow total
market coverage, concentric diversification and frontal attack to their
competitors. With decreased competitive strength, Business tends to
follow multi-market strategy, product modification/improvement and
flank attack to direct competitors for this kind of segments. Segments
with weak competitive strength followed focus strategy and decline
strategy.
Abstract: In a recent year usage of VoIP subscription has increased tremendously as compare to Public Switching Telephone System(PSTN). A VoIP subscriber would like to know the exact tariffs of the calls made using VoIP. As the usage increases, the rate of fraud is also increases, causing users complain about excess billing. This in turn hampers the growth of VoIP .This paper describe the common frauds and attack on VoIP based system and make an attempt to solve the billing attack by creating secured channel between caller and callee.
Abstract: Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.
Abstract: Medical images require special safety and confidentiality because critical judgment is done on the information provided by medical images. Transmission of medical image via internet or mobile phones demands strong security and copyright protection in telemedicine applications. Here, highly secured and robust watermarking technique is proposed for transmission of image data via internet and mobile phones. The Region of Interest (ROI) and Non Region of Interest (RONI) of medical image are separated. Only RONI is used for watermark embedding. This technique results in exact recovery of watermark with standard medical database images of size 512x512, giving 'correlation factor' equals to 1. The correlation factor for different attacks like noise addition, filtering, rotation and compression ranges from 0.90 to 0.95. The PSNR with weighting factor 0.02 is up to 48.53 dBs. The presented scheme is non blind and embeds hospital logo of 64x64 size.