Abstract: Attack graph is an integral part of modeling the
overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine
what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at
the whole network, which makes the process of AGG complex and
non-scalable. In this paper, we propose a new approach which is
simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications
among all the atomic domains. Our approach simplifies the process
of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic
domains which makes the process of AGG scalable.
Abstract: Business Process Reengineering (BPR) is an essential tool before an information system project implementation. Enterprise Resource Planning (ERP) projects definitely require the standardization and fixation of business processes from customer order to shipment. Therefore, ERP implementations are well proven to be coupled with BPR, although the extend and timing of BPR with respect to ERP implementation differ. This study aims at analyzing the effects of BPR on ERP implementation success. Basing on two Turkish ERP implementations in pharmaceutical sector, a comparative study is performed. One of the ERP implementations took place after a BPR implementation, whereas the other implementation was without a prior BPR application. Both implementations have been realized with the same consultant team, the case with prior BPR implementation going live first. The results of the case study reveal that if business processes are not optimized and improved before an ERP implementation, ERP live system would face with disharmony problems of processes and processes automated by ERP. This suggests a definite precedence relationship between BPR and ERP applications
Abstract: This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.
Abstract: In this paper, self-starting block hybrid method of
order (5,5,5,5)T is proposed for the solution of the special second
order ordinary differential equations with associated initial or
boundary conditions. The continuous hybrid formulations enable us
to differentiate and evaluate at some grids and off – grid points to
obtain four discrete schemes, which were used in block form for
parallel or sequential solutions of the problems. The computational
burden and computer time wastage involved in the usual reduction of
second order problem into system of first order equations are avoided
by this approach. Furthermore, a stability analysis and efficiency of
the block method are tested on stiff ordinary differential equations,
and the results obtained compared favorably with the exact solution.
Abstract: In studies on psychological health and children-s personality development and in researches on emotional distresses, children-s behavioral disorders associated with mother deprivation, are known as the major cause of mental disorders. Therefore, for identification of children-s attachment styles in nursery-s children are of significant importance. For this purpose, to compare the attachment styles between children of nursery with those provided care by their families, the Separation Anxiety Test (SAT) of Slough and et al was administered on 72 children (36 in nursery and 36 family-cared). The results indicated, almost half of children in both groups have insecure attachment styles. Tendency ratio of both groups of children towards Secure and Ambivalent Insecure styles are almost the same. However the avoidant style of attachment in children of nursery is more than those provided care by their families. The children under family care compared to the children of nursery, in the situations of separation from their mothers in the first day of school and sleeping in their room, have shown more self reliance.
Abstract: This work is devoted to the calculation of the
undulatory parameters and the study of the influence of te number
parallel path of a winding on overvoltage compared to the frame and
between turns (sections) in a multiturn random winding of an
asynchronous motors supplied with PWM- converters.
Abstract: The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time secure image processing. In this research, Embedded Zerotree Wavelet (EZW) encoder which specially designs for wavelet compression is examined. With this algorithm, three methods are proposed to reduce the processing time, space and security protection that will be secured enough to protect the data.
Abstract: The purpose of this study was to evaluate the use of
mucus production as a biomarker. This was done by exposing the
mussel Perna perna to various sublethal concentrations of Cu.
Mussels are effective as a bioindicator species as they accumulate Cu
in their tissues. Differences in mucus production rates were evaluated
at different Cu concentrations. The findings of this study indicate that
increasing Cu concentrations had a significant effect on the mucus
production rates over a 24 hour exposure. There were also significant
differences between the mucus production rates at different Cu
concentrations (p < 0.05). Thus, mucus is an essential detoxification
mechanism.
Abstract: The aim of this work is to present a multi-objective optimization method to find maximum efficiency kinematics for a flapping wing unmanned aerial vehicle. We restrained our study to rectangular wings with the same profile along the span and to harmonic dihedral motion. It is assumed that the birdlike aerial vehicle (whose span and surface area were fixed respectively to 1m and 0.15m2) is in horizontal mechanically balanced motion at fixed speed. We used two flight physics models to describe the vehicle aerodynamic performances, namely DeLaurier-s model, which has been used in many studies dealing with flapping wings, and the model proposed by Dae-Kwan et al. Then, a constrained multi-objective optimization of the propulsive efficiency is performed using a recent evolutionary multi-objective algorithm called є-MOEA. Firstly, we show that feasible solutions (i.e. solutions that fulfil the imposed constraints) can be obtained using Dae-Kwan et al.-s model. Secondly, we highlight that a single objective optimization approach (weighted sum method for example) can also give optimal solutions as good as the multi-objective one which nevertheless offers the advantage of directly generating the set of the best trade-offs. Finally, we show that the DeLaurier-s model does not yield feasible solutions.
Abstract: The medical data statistical analysis often requires the
using of some special techniques, because of the particularities of
these data. The principal components analysis and the data clustering
are two statistical methods for data mining very useful in the medical
field, the first one as a method to decrease the number of studied
parameters, and the second one as a method to analyze the
connections between diagnosis and the data about the patient-s
condition. In this paper we investigate the implications obtained from
a specific data analysis technique: the data clustering preceded by a
selection of the most relevant parameters, made using the principal
components analysis. Our assumption was that, using the principal
components analysis before data clustering - in order to select and to
classify only the most relevant parameters – the accuracy of
clustering is improved, but the practical results showed the opposite
fact: the clustering accuracy decreases, with a percentage
approximately equal with the percentage of information loss reported
by the principal components analysis.
Abstract: This paper proposed classification models that would
be used as a proxy for hard disk drive (HDD) functional test equitant
which required approximately more than two weeks to perform the
HDD status classification in either “Pass" or “Fail". These models
were constructed by using committee network which consisted of a
number of single neural networks. This paper also included the
method to solve the problem of sparseness data in failed part, which
was called “enforce learning method". Our results reveal that the
constructed classification models with the proposed method could
perform well in the sparse data conditions and thus the models,
which used a few seconds for HDD classification, could be used to
substitute the HDD functional tests.
Abstract: The purpose of this article is to propose a model designed to achieve Total Knowledge Transfer in the public health sector. The Total Knowledge Transfer Model integrated four essential organizational factors which have been under examined in totality in the literature. The research design was inductive in nature and used a case study for accomplishing the research objectives. The researcher investigated the factors that created a base to design a framework for total knowledge transfer in the public health sector. The results of this study are drawn from a fairly large sample in only two hospitals. A further research can be conducted to cover more responses from a wider health sector. The Total Knowledge Transfer Model is essential to improve the transfer and application of total common health knowledge.
Abstract: Job stress is one of the most important concepts for
the today-s corporate as well as institutional world. The current study
is conducted to identify the causes of faculty stress at Higher
Education in Pakistan. For the purpose, Public & Private Business
Schools of Punjab is selected as representative of Pakistan. A sample
of 300 faculty members (214 males, 86 females) responded to the
survey. Regression analysis shows that the Workload, Student
Related issues and Role Conflicts are the major sources contributing
significantly towards producing stress. The study also revealed that
Private sector faculty members experienced more stress as compared
to faculty in Public sector Business Schools. Moreover, females,
younger ages, lower designation & low qualification faculty
members experience more stress as compared to males, older ages,
higher designation and high qualification. The study yield many
significant results for the policy makers of Business Institutions.
Abstract: Heavy metal transfer in soil profiles is a major
environmental concern because even slow transport through the soil
may eventually lead to deterioration of groundwater quality. The use
of sewage sludge and effluents from wastewater treatment plants for
irrigation of agricultural lands is on the rise particularly in peri-urban
area of developing countries. In this study soil samples under sludge
application and wastewater irrigation were studied and soil samples
were collected in the soil profiles from the surface to 100 cm in
depth. For this purpose, three plots were made in a treatment plant in
south of Tehran-Iran. First plot was irrigated just with effluent from
wastewater treatment plant, second plot with simulated heavy metals
concentration equal 50 years irrigation and in third plot sewage
sludge and effluent was used. Trace metals concentration (Cd, Cu)
were determined for soil samples. The results indicate movement of
metals was observed, but the most concentration of metals was found
in topsoil samples. The most of Cadmium concentration was
measured in the topsoil of plot 3, 4.5mg/kg and Maximum cadmium
movement was observed in 0-20 cm. The most concentration of
copper was 27.76mg/kg, and maximum percolation in 0-20 cm.
Metals (Cd, Cu) were measured in leached water. Preferential flow
and metal complexation with soluble organic apparently allow
leaching of heavy metals.
Abstract: This paper analysis the tourism development on the
Red Sea in Egypt (west bank) and the needed ongoing action toward
a sustainable approach. It addresses, at the first, the development's
evolution occurred in the coastal area, the environmental effects it
left, and how to minimize those impacts in the future. The second
main point is dealing with the most important issues that hinder the
achievement of sustainable tourism development on the Red Sea
coast and how we can overcome them in the future.
Abstract: When dealing with safety in structures, the connections between structural components play an important role. Robustness of a structure as a whole depends both on the load- bearing capacity of the structural component and on the structures capacity to resist total failure, even though a local failure occurs in a component or a connection between components. To avoid progressive collapse it is necessary to be able to carry out a design for connections. A connection may be executed with anchors to withstand local failure of the connection in structures built with prefabricated components. For the design of these anchors, a model is developed for connections in structures performed in prefabricated autoclaved aerated concrete components. The design model takes into account the effect of anchors placed close to the edge, which may result in splitting failure. Further the model is developed to consider the effect of reinforcement diameter and anchor depth. The model is analytical and theoretically derived assuming a static equilibrium stress distribution along the anchor. The theory is compared to laboratory test, including the relevant parameters and the model is refined and theoretically argued analyzing the observed test results. The method presented can be used to improve safety in structures or even optimize the design of the connections
Abstract: There is a renewed interest in land use transport integration as a means of achieving sustainable accessibility. Such accessibility requires designing more than simply the transport network; it also requires attention to place (built form). Transitoriented development would appear to capture many of the criteria deemed important in land use transport integration. In Perth, Australia, there have been planning policies for the past 20 years requiring transit-oriented development around railway stations throughout the metropolitan area. While the policy intent, particularly at the State level, is clear the implementation of policy has been fairly ineffective. The first part of this paper provides an examination of state and local government planning and transport policies, evaluating them using a set of land use transport integration criteria considered all encompassing. This provides some insight into the extent of state and local government capacity to deliver land use transport integration. The second part of this paper examines the extent of implementation by examining existing and proposed land use around station precincts throughout metropolitan Perth. The findings of this research suggest that the capacity of state and local government to deliver land use transport integration is reasonable in a planning policy sense. Implementation, despite long policy lead times, has been lacking. It appears to be more effective where local planning controls have been suspended with new redevelopment authorities given powers to develop land around railway stations.
Abstract: Nowadays, keyless entry systems are widely adopted
for vehicle immobilizer systems due to both advantages of security and
convenience. Keyless entry systems could overcome brute-force key
guessing attack, statistics attack and masquerade attack, however,
they can't prevent from thieves stealing behavior. In this paper, we
proposed a new architecture try to improve the existent flaws. The
integration of the keyless entry system and the fingerprint
identification technology is more suitable to implement on the
portable transponder to achieve higher security needs. We also adopt
and modify AES security protocol for life expectancy and security of
the portable transponder. In addition, the identification of a driver's
fingerprint makes the service of automatic reinstatement of a driver's
preferences become possible. Our design can satisfy not only the three
kinds of previous illegal attacks, but also the stealing situation.
Furthermore, many practical factors, such as costs, life expectancy and
performance, have been well considered in the design of portable
transponder.
Abstract: In this study, the performance of a high-frequency arc
welding machine including a two-switch inverter is analyzed. The
control of the system is achieved using two different control
techniques i- fuzzy logic control (FLC) ii- state space averaging
based sliding control. Fuzzy logic control does not need accurate
mathematical model of a plant and can be used in nonlinear
applications. The second method needs the mathematical model of
the system. In this method the state space equations of the system are
derived for two different “on" and “off" states of the switches. The
derived state equations are combined with the sliding control rule
considering the duty-cycle of the converter. The performance of the
system is analyzed by simulating the system using SIMULINK tool
box of MATLAB. The simulation results show that fuzzy logic
controller is more robust and less sensitive to parameter variations.
Abstract: Using ab initio theoretical calculations, we present
analysis of fragmentation process. The analysis is performed in two
steps. The first step is calculation of fragmentation energies by ab
initio calculations. The second step is application of the energies to
kinetic description of process. The energies of fragments are
presented in this paper. The kinetics of fragmentation process can be
described by numerical models. The method for kinetic analysis is
described in this paper. The result - composition of fragmentation
products - will be calculated in future. The results from model can be
compared to the concentrations of fragments from mass spectrum.