Abstract: Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.
Abstract: Mammography has been one of the most reliable
methods for early detection of breast cancer. There are different
lesions which are breast cancer characteristic such as
microcalcifications, masses, architectural distortions and bilateral
asymmetry. One of the major challenges of analysing digital
mammogram is how to extract efficient features from it for accurate
cancer classification. In this paper we proposed a hybrid feature
extraction method to detect and classify all four signs of breast
cancer. The proposed method is based on multiscale surrounding
region dependence method, Gabor filters, multi fractal analysis,
directional and morphological analysis. The extracted features are
input to self adaptive resource allocation network (SRAN) classifier
for classification. The validity of our approach is extensively
demonstrated using the two benchmark data sets Mammographic
Image Analysis Society (MIAS) and Digital Database for Screening
Mammograph (DDSM) and the results have been proved to be
progressive.
Abstract: Predicting earthquakes is an important issue in the
study of geography. Accurate prediction of earthquakes can help
people to take effective measures to minimize the loss of personal
and economic damage, such as large casualties, destruction of
buildings and broken of traffic, occurred within a few seconds.
United States Geological Survey (USGS) science organization
provides reliable scientific information about Earthquake Existed
throughout history & the Preliminary database from the National
Center Earthquake Information (NEIC) show some useful factors to
predict an earthquake in a seismic area like Aleutian Arc in the U.S.
state of Alaska. The main advantage of this prediction method that it
does not require any assumption, it makes prediction according to the
future evolution of the object's time series. The article compares
between simulation data result from trained BP and RBF neural
network versus actual output result from the system calculations.
Therefore, this article focuses on analysis of data relating to real
earthquakes. Evaluation results show better accuracy and higher
speed by using radial basis functions (RBF) neural network.
Abstract: Maturity models, used descriptively to explain
changes in reality or normatively to guide managers to make
interventions to make organizations more effective and efficient, are
based on the principles of statistical quality control and PDCA
continuous improvement (Plan, Do, Check, Act). Some frameworks
developed over the concept of maturity models include COBIT,
CMM, and ITIL.
This paper presents some limitations of traditional maturity
models, most of them related to the mechanistic and reductionist
principles over which those models are built. As systems theory helps
the understanding of the dynamics of organizations and
organizational change, the development of a systemic maturity model
can help to overcome some of those limitations.
This document proposes a systemic maturity model, based on a
systemic conceptualization of organizations, focused on the study of
the functioning of the parties, the relationships among them, and their
behavior as a whole. The concept of maturity from the system theory
perspective is conceptually defined as an emergent property of the
organization, which arises as a result of the degree of alignment and
integration of their processes. This concept is operationalized through
a systemic function that measures the maturity of organizations, and
finally validated by the measuring of maturity in some organizations.
For its operationalization and validation, the model was applied to
measure the maturity of organizational Governance, Risk and
Compliance (GRC) processes.
Abstract: Aim of this work was to study the genetic basis for oil
accumulation in olive fruit via tracking DGAT2 (Diacylglycerol
acyltransferase type-2) gene in three Egyptian Origen Olive cultivars
namely Toffahi, Hamed and Maraki using molecular marker
techniques and bioinformatics tools. Results illustrate that, firstly:
specific genomic band of Maraki cultivars was identified as DGAT2
(Diacylglycerol acyltransferase type-2) and identical for this gene in
Olea europaea with 100% of similarity. Secondly, differential
genomic band of Maraki cultivars which produced from RAPD
fingerprinting technique reflected predicted distinguished sequence
which identified as DGAT2 (Diacylglycerol acyltransferase type-2)
in Fragaria vesca subsp. Vesca with 76% of sequential similarity.
Third and finally, specific genomic specific band of Hamed cultivars
was identified as two fragments, 1- Olea europaea cultivar Koroneiki
diacylglycerol acyltransferase type 2 mRNA, complete cds with two
matches regions with 99% or 2- Predicted: Fragaria vesca subsp.
vesca diacylglycerol O-acyltransferase 2-like (LOC101313050),
mRNA with 86 % of similarity.
Abstract: The reliability of the filtered HVBK model is now
investigated via some large eddy simulations (LES) of freely
decaying isotropic superfluid turbulence. For homogeneous
turbulence at very high Reynolds numbers, comparison of the terms
in the spectral kinetic energy budget equation indicates, in the
energy-containing range, that the production and energy transfer
effects become significant except for dissipation. In the inertial range,
where the two fluids are perfectly locked, the mutual friction maybe
neglected with respect to other terms. Also, the LES results for the
other terms of the energy balance are presented.
Abstract: Violet Sr–Al–O:Eu2+ phosphor particles were
synthesized from a metal–ethylenediaminetetraacetic acid (EDTA)
solution of Sr, Al, Eu, and particulate alumina via spray drying and
sintering in a reducing atmosphere. The crystal structures and emission
properties at 85–300 K were investigated. The composition of the
violet Sr–Al–O:Eu2+ phosphor particles was determined from various
Sr–Al–O:Eu2+ phosphors by their emission properties’ dependence
on temperature. The highly crystalline SrAl12O19:Eu2+ emission phases
were confirmed by their crystallite sizes and the activation energies for
the 4f5d–8S7/2 transition of the Eu2+ ion. These results showed that the
material identification for the violet Sr–Al–O:Eu2+ phosphor was
accomplished by the low-temperature luminescence measurements.
Abstract: Powder metallurgy (P/M) is the only economic way to
produce porous parts/products. P/M can produce near net shape parts
hence reduces wastage of raw material and energy, avoids various
machining operations. The most vital use of P/M is in production of
metallic filters and self lubricating bush bearings and siding surfaces.
The porosity of the part can be controlled by varying compaction
pressure, sintering temperature and composition of metal powder
mix. The present work is aimed for experimental analysis of friction
and wear properties of self lubricating copper and tin bush bearing.
Experimental results confirm that wear rate of sintered component
is lesser for components having 10% tin by weight percentage. Wear
rate increases for high tin percentage (experimented for 20% tin and
30% tin) at same sintering temperature. Experimental results also
confirms that wear rate of sintered component is also dependent on
sintering temperature, soaking period, composition of the preform,
compacting pressure, powder particle shape and size.
Interfacial friction between die and punch, between inter powder
particles, between die face and powder particle depends on
compaction pressure, powder particle size and shape, size and shape
of component which decides size & shape of die & punch, material of
die & punch and material of powder particles.
Abstract: This paper proposes the designing direct adaptive
neural controller to apply for a class of a nonlinear pendulum
dynamic system. The radial basis function (RBF) neural adaptive
controller is robust in presence of external and internal uncertainties.
Both the effectiveness of the controller and robustness against
disturbances are importance of this paper. The simulation results
show the promising performance of the proposed controller.
Abstract: The use of mobile phones is growing tremendously all
over the world. In Tanzania there are a number of operators licensed
by Tanzania Communications Regulatory Authority (TCRA) aiming
at attracting customers into their networks. So far
telecommunications market competition has been very stiff. Various
measures are being taken by mobile operators to survive in the
market. Such measure include introducing of different air time
bundles on daily, weekly and monthly at lower tariffs. Other
measures include the introduction of normal tariff, tourist package
and one network. Despite of all these strategies, there is a dynamic
competition in the market which needs to be explored. Some
influences which attract customers to choose a certain mobile
operator are of particular interest. This paper is investigating if the
network effects and Quality of Services (QoS) influence mobile
customers in selection of their mobile network operators. Seventy
seven students from high learning institutions in Dodoma
Municipality in Tanzania participated in responding to prepared
questionnaires. The data was analyzed using Statistical Package for
Social Science (SPSS) Software. The results indicate that, network
coverage does influence customers in selection of mobile operators.
In addition, this paper proposes further research in some areas
especially where the study came up with different findings from what
the theory has in place.
Abstract: Artificial Immune Systems (AIS), inspired by the
human immune system, are algorithms and mechanisms which are
self-adaptive and self-learning classifiers capable of recognizing and
classifying by learning, long-term memory and association. Unlike
other human system inspired techniques like genetic algorithms and
neural networks, AIS includes a range of algorithms modeling on
different immune mechanism of the body. In this paper, a mechanism
of a human immune system based on apoptosis is adopted to build an
Intrusion Detection System (IDS) to protect computer networks.
Features are selected from network traffic using Fisher Score. Based
on the selected features, the record/connection is classified as either
an attack or normal traffic by the proposed methodology. Simulation
results demonstrates that the proposed AIS based on apoptosis
performs better than existing AIS for intrusion detection.
Abstract: Wireless sensor network is vulnerable to a wide range
of attacks. Recover secrecy after compromise, to develop technique
that can detect intrusions and able to resilient networks that isolates
the point(s) of intrusion while maintaining network connectivity for
other legitimate users. To define new security metrics to evaluate
collaborative intrusion resilience protocol, by leveraging the sensor
mobility that allows compromised sensors to recover secure state
after compromise. This is obtained with very low overhead and in a
fully distributed fashion using extensive simulations support our
findings.
Abstract: We have experimentally demonstrated bright-dark
pulses in a nonlinear polarization rotation (NPR) based mode-locked
Erbium-doped fiber laser (EDFL) with a long cavity configuration.
Bright–dark pulses could be achieved when the laser works in the
passively mode-locking regime and the net group velocity dispersion
is quite anomalous. The EDFL starts to generate a bright pulse train
with degenerated dark pulse at the mode-locking threshold pump
power of 35.09 mW by manipulating the polarization states of the
laser oscillation modes using a polarization controller (PC). A split
bright–dark pulse is generated when further increasing the pump
power up to 37.95 mW. Stable bright pulses with no obvious
evidence of a dark pulse can also be generated when further adjusting
PC and increasing the pump power up to 52.19 mW. At higher pump
power of 54.96 mW, a new form of bright-dark pulse emission was
successfully identified with the repetition rate of 29 kHz. The bright
and dark pulses have a duration of 795.5 ns and 640 ns, respectively.
Abstract: Domestic goats (Capra hircus) are extremely diverse
species and principal animal genetic resource of the developing
world. These facilitate a persistent supply of meat, milk, fibre, and
skin and are considered as important revenue generators in small
pastoral environments. This study aimed to fingerprint β-LG gene at
PCR-RFLP level in native Saudi goat breeds (Ardi, Habsi and Harri)
in an attempt to have a preliminary image of β-LG genotypic patterns
in Saudi breeds as compared to other foreign breeds such as Indian
and Egyptian. Also, the Phylogenetic analysis was done to investigate
evolutionary trends and similarities among the caprine β-LG gene
with that of the other domestic specie, viz. cow, buffalo and sheep.
Blood samples were collected from 300 animals (100 for each breed)
and genomic DNA was extracted. A fragment of the β-LG gene
(427bp) was amplified using specific primers. Subsequent digestion
with Sac II restriction endonuclease revealed two alleles (A and B)
and three different banding patterns or genotypes i.e. AA, AB and
BB. The statistical analysis showed a general trend that β-LG AA
genotype had higher milk yield than β-LG AB and β-LG BB
genotypes. Nucleotide sequencing of the selected β-LG fragments
was done and submitted to GenBank NCBI (Accession No.
KJ544248, KJ588275, KJ588276, KJ783455, KJ783456 and
KJ874959). Phylogenetic analysis on the basis of nucleotide
sequences of native Saudi goats indicated evolutional similarity with
the GenBank reference sequences of goat, Bubalus bubalis and Bos
taurus. However, the origin of sheep which is the most closely
related from the evolutionary point of view, was located some
distance away.
Abstract: The Quad Tree Decomposition based performance
analysis of compressed image data communication for lossy and
lossless through wireless sensor network is presented. Images have
considerably higher storage requirement than text. While transmitting
a multimedia content there is chance of the packets being dropped
due to noise and interference. At the receiver end the packets that
carry valuable information might be damaged or lost due to noise,
interference and congestion. In order to avoid the valuable
information from being dropped various retransmission schemes have
been proposed. In this proposed scheme QTD is used. QTD is an
image segmentation method that divides the image into homogeneous
areas. In this proposed scheme involves analysis of parameters such
as compression ratio, peak signal to noise ratio, mean square error,
bits per pixel in compressed image and analysis of difficulties during
data packet communication in Wireless Sensor Networks. By
considering the above, this paper is to use the QTD to improve the
compression ratio as well as visual quality and the algorithm in
MATLAB 7.1 and NS2 Simulator software tool.
Abstract: In the cloud computing hierarchy IaaS is the lowest
layer, all other layers are built over it. Thus it is the most important
layer of cloud and requisite more importance. Along with advantages
IaaS faces some serious security related issue. Mainly Security
focuses on Integrity, confidentiality and availability. Cloud
computing facilitate to share the resources inside as well as outside of
the cloud. On the other hand, cloud still not in the state to provide
surety to 100% data security. Cloud provider must ensure that end
user/client get a Quality of Service. In this report we describe
possible aspects of cloud related security.
Abstract: Botnets are one of the most serious and widespread
cyber threats. Today botnets have been facilitating many
cybercrimes, especially financial, top secret thefts. Botnets can be
available for lease in the market and are utilized by the
cybercriminals to launch massive attacks like DDoS, click fraud,
phishing attacks etc., Several large institutions, hospitals, banks,
government organizations and many social networks such as twitter,
facebook etc., became the target of the botmasters. Recently,
noteworthy researches have been carried out to detect bot, C&C
channels, botnet and botmasters. Using many sophisticated
technologies, botmasters made botnet a titan of the cyber world.
Innumerable challenges have been put forth by the botmasters to the
researchers in the detection of botnet. In this paper we present a
survey of different types of botnet C&C channels and also provide a
comparison of various botnet categories. Finally we hope that our
survey will create awareness for forthcoming botnet research
endeavors.
Abstract: Nowadays, the Web has become one of the most
pervasive platforms for information change and retrieval. It collects
the suitable and perfectly fitting information from websites that one
requires. Data mining is the form of extracting data’s available in the
internet. Web mining is one of the elements of data mining
Technique, which relates to various research communities such as
information recovery, folder managing system and simulated
intellects. In this Paper we have discussed the concepts of Web
mining. We contain generally focused on one of the categories of
Web mining, specifically the Web Content Mining and its various
farm duties. The mining tools are imperative to scanning the many
images, text, and HTML documents and then, the result is used by
the various search engines. We conclude by presenting a comparative
table of these tools based on some pertinent criteria.
Abstract: Two micromechanical models for 3D smart composite
with embedded periodic or nearly periodic network of generally
orthotropic reinforcements and actuators are developed and applied to
cubic structures with unidirectional orientation of constituents.
Analytical formulas for the effective piezothermoelastic coefficients
are derived using the Asymptotic Homogenization Method (AHM).
Finite Element Analysis (FEA) is subsequently developed and used
to examine the aforementioned periodic 3D network reinforced smart
structures. The deformation responses from the FE simulations are
used to extract effective coefficients. The results from both
techniques are compared. This work considers piezoelectric materials
that respond linearly to changes in electric field, electric
displacement, mechanical stress and strain and thermal effects. This
combination of electric fields and thermo-mechanical response in
smart composite structures is characterized by piezoelectric and
thermal expansion coefficients. The problem is represented by unitcell
and the models are developed using the AHM and the FEA to
determine the effective piezoelectric and thermal expansion
coefficients. Each unit cell contains a number of orthotropic
inclusions in the form of structural reinforcements and actuators.
Using matrix representation of the coupled response of the unit cell,
the effective piezoelectric and thermal expansion coefficients are
calculated and compared with results of the asymptotic
homogenization method. A very good agreement is shown between
these two approaches.
Abstract: The objective of the Economic Dispatch(ED) Problems
of electric power generation is to schedule the committed generating
units outputs so as to meet the required load demand at minimum
operating cost while satisfying all units and system equality and
inequality constraints. This paper presents a new method of ED
problems utilizing the Max-Min Ant System Optimization.
Historically, traditional optimizations techniques have been used,
such as linear and non-linear programming, but within the past
decade the focus has shifted on the utilization of Evolutionary
Algorithms, as an example Genetic Algorithms, Simulated Annealing
and recently Ant Colony Optimization (ACO). In this paper we
introduce the Max-Min Ant System based version of the Ant System.
This algorithm encourages local searching around the best solution
found in each iteration. To show its efficiency and effectiveness, the
proposed Max-Min Ant System is applied to sample ED problems
composed of 4 generators. Comparison to conventional genetic
algorithms is presented.