An Atomic-Domains-Based Approach for Attack Graph Generation

Attack graph is an integral part of modeling the overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at the whole network, which makes the process of AGG complex and non-scalable. In this paper, we propose a new approach which is simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications among all the atomic domains. Our approach simplifies the process of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic domains which makes the process of AGG scalable.

BPR Effect on ERP Implementation: a Comparative Case Study

Business Process Reengineering (BPR) is an essential tool before an information system project implementation. Enterprise Resource Planning (ERP) projects definitely require the standardization and fixation of business processes from customer order to shipment. Therefore, ERP implementations are well proven to be coupled with BPR, although the extend and timing of BPR with respect to ERP implementation differ. This study aims at analyzing the effects of BPR on ERP implementation success. Basing on two Turkish ERP implementations in pharmaceutical sector, a comparative study is performed. One of the ERP implementations took place after a BPR implementation, whereas the other implementation was without a prior BPR application. Both implementations have been realized with the same consultant team, the case with prior BPR implementation going live first. The results of the case study reveal that if business processes are not optimized and improved before an ERP implementation, ERP live system would face with disharmony problems of processes and processes automated by ERP. This suggests a definite precedence relationship between BPR and ERP applications

A New Algorithm for Enhanced Robustness of Copyright Mark

This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.

An Accurate Computation of Block Hybrid Method for Solving Stiff Ordinary Differential Equations

In this paper, self-starting block hybrid method of order (5,5,5,5)T is proposed for the solution of the special second order ordinary differential equations with associated initial or boundary conditions. The continuous hybrid formulations enable us to differentiate and evaluate at some grids and off – grid points to obtain four discrete schemes, which were used in block form for parallel or sequential solutions of the problems. The computational burden and computer time wastage involved in the usual reduction of second order problem into system of first order equations are avoided by this approach. Furthermore, a stability analysis and efficiency of the block method are tested on stiff ordinary differential equations, and the results obtained compared favorably with the exact solution.

Attachment Styles of Children Raised in Nursery vs. Those Who are Raised in the Family in Iran

In studies on psychological health and children-s personality development and in researches on emotional distresses, children-s behavioral disorders associated with mother deprivation, are known as the major cause of mental disorders. Therefore, for identification of children-s attachment styles in nursery-s children are of significant importance. For this purpose, to compare the attachment styles between children of nursery with those provided care by their families, the Separation Anxiety Test (SAT) of Slough and et al was administered on 72 children (36 in nursery and 36 family-cared). The results indicated, almost half of children in both groups have insecure attachment styles. Tendency ratio of both groups of children towards Secure and Ambivalent Insecure styles are almost the same. However the avoidant style of attachment in children of nursery is more than those provided care by their families. The children under family care compared to the children of nursery, in the situations of separation from their mothers in the first day of school and sleeping in their room, have shown more self reliance.

Influence of Number Parallels Paths of a Winding on Overvoltage in the Asynchronous Motors Fed by PWM- converters

This work is devoted to the calculation of the undulatory parameters and the study of the influence of te number parallel path of a winding on overvoltage compared to the frame and between turns (sections) in a multiturn random winding of an asynchronous motors supplied with PWM- converters.

Enhance Performance of Secure Image Using Wavelet Compression

The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time secure image processing. In this research, Embedded Zerotree Wavelet (EZW) encoder which specially designs for wavelet compression is examined. With this algorithm, three methods are proposed to reduce the processing time, space and security protection that will be secured enough to protect the data.

Mucus Secretion Responses to Various Sublethal Copper (II) Concentrations in the Mussel Perna perna

The purpose of this study was to evaluate the use of mucus production as a biomarker. This was done by exposing the mussel Perna perna to various sublethal concentrations of Cu. Mussels are effective as a bioindicator species as they accumulate Cu in their tissues. Differences in mucus production rates were evaluated at different Cu concentrations. The findings of this study indicate that increasing Cu concentrations had a significant effect on the mucus production rates over a 24 hour exposure. There were also significant differences between the mucus production rates at different Cu concentrations (p < 0.05). Thus, mucus is an essential detoxification mechanism.

Optimization of Kinematics for Birds and UAVs Using Evolutionary Algorithms

The aim of this work is to present a multi-objective optimization method to find maximum efficiency kinematics for a flapping wing unmanned aerial vehicle. We restrained our study to rectangular wings with the same profile along the span and to harmonic dihedral motion. It is assumed that the birdlike aerial vehicle (whose span and surface area were fixed respectively to 1m and 0.15m2) is in horizontal mechanically balanced motion at fixed speed. We used two flight physics models to describe the vehicle aerodynamic performances, namely DeLaurier-s model, which has been used in many studies dealing with flapping wings, and the model proposed by Dae-Kwan et al. Then, a constrained multi-objective optimization of the propulsive efficiency is performed using a recent evolutionary multi-objective algorithm called є-MOEA. Firstly, we show that feasible solutions (i.e. solutions that fulfil the imposed constraints) can be obtained using Dae-Kwan et al.-s model. Secondly, we highlight that a single objective optimization approach (weighted sum method for example) can also give optimal solutions as good as the multi-objective one which nevertheless offers the advantage of directly generating the set of the best trade-offs. Finally, we show that the DeLaurier-s model does not yield feasible solutions.

Observations about the Principal Components Analysis and Data Clustering Techniques in the Study of Medical Data

The medical data statistical analysis often requires the using of some special techniques, because of the particularities of these data. The principal components analysis and the data clustering are two statistical methods for data mining very useful in the medical field, the first one as a method to decrease the number of studied parameters, and the second one as a method to analyze the connections between diagnosis and the data about the patient-s condition. In this paper we investigate the implications obtained from a specific data analysis technique: the data clustering preceded by a selection of the most relevant parameters, made using the principal components analysis. Our assumption was that, using the principal components analysis before data clustering - in order to select and to classify only the most relevant parameters – the accuracy of clustering is improved, but the practical results showed the opposite fact: the clustering accuracy decreases, with a percentage approximately equal with the percentage of information loss reported by the principal components analysis.

The Classification Model for Hard Disk Drive Functional Tests under Sparse Data Conditions

This paper proposed classification models that would be used as a proxy for hard disk drive (HDD) functional test equitant which required approximately more than two weeks to perform the HDD status classification in either “Pass" or “Fail". These models were constructed by using committee network which consisted of a number of single neural networks. This paper also included the method to solve the problem of sparseness data in failed part, which was called “enforce learning method". Our results reveal that the constructed classification models with the proposed method could perform well in the sparse data conditions and thus the models, which used a few seconds for HDD classification, could be used to substitute the HDD functional tests.

Knowledge Management: The Need for a Total Knowledge Transfer Model to Diffuse Innovation of the Public Health Workforce

The purpose of this article is to propose a model designed to achieve Total Knowledge Transfer in the public health sector. The Total Knowledge Transfer Model integrated four essential organizational factors which have been under examined in totality in the literature. The research design was inductive in nature and used a case study for accomplishing the research objectives. The researcher investigated the factors that created a base to design a framework for total knowledge transfer in the public health sector. The results of this study are drawn from a fairly large sample in only two hospitals. A further research can be conducted to cover more responses from a wider health sector. The Total Knowledge Transfer Model is essential to improve the transfer and application of total common health knowledge.

Faculty Stress at Higher Education: A Study on the Business Schools of Pakistan

Job stress is one of the most important concepts for the today-s corporate as well as institutional world. The current study is conducted to identify the causes of faculty stress at Higher Education in Pakistan. For the purpose, Public & Private Business Schools of Punjab is selected as representative of Pakistan. A sample of 300 faculty members (214 males, 86 females) responded to the survey. Regression analysis shows that the Workload, Student Related issues and Role Conflicts are the major sources contributing significantly towards producing stress. The study also revealed that Private sector faculty members experienced more stress as compared to faculty in Public sector Business Schools. Moreover, females, younger ages, lower designation & low qualification faculty members experience more stress as compared to males, older ages, higher designation and high qualification. The study yield many significant results for the policy makers of Business Institutions.

Heavy Metals Transport in the Soil Profiles under the Application of Sludge and Wastewater

Heavy metal transfer in soil profiles is a major environmental concern because even slow transport through the soil may eventually lead to deterioration of groundwater quality. The use of sewage sludge and effluents from wastewater treatment plants for irrigation of agricultural lands is on the rise particularly in peri-urban area of developing countries. In this study soil samples under sludge application and wastewater irrigation were studied and soil samples were collected in the soil profiles from the surface to 100 cm in depth. For this purpose, three plots were made in a treatment plant in south of Tehran-Iran. First plot was irrigated just with effluent from wastewater treatment plant, second plot with simulated heavy metals concentration equal 50 years irrigation and in third plot sewage sludge and effluent was used. Trace metals concentration (Cd, Cu) were determined for soil samples. The results indicate movement of metals was observed, but the most concentration of metals was found in topsoil samples. The most of Cadmium concentration was measured in the topsoil of plot 3, 4.5mg/kg and Maximum cadmium movement was observed in 0-20 cm. The most concentration of copper was 27.76mg/kg, and maximum percolation in 0-20 cm. Metals (Cd, Cu) were measured in leached water. Preferential flow and metal complexation with soluble organic apparently allow leaching of heavy metals.

Problems that Impede Sustainable Tourism Development in Egypt

This paper analysis the tourism development on the Red Sea in Egypt (west bank) and the needed ongoing action toward a sustainable approach. It addresses, at the first, the development's evolution occurred in the coastal area, the environmental effects it left, and how to minimize those impacts in the future. The second main point is dealing with the most important issues that hinder the achievement of sustainable tourism development on the Red Sea coast and how we can overcome them in the future.

Capacity of Anchors in Structural Connections

When dealing with safety in structures, the connections between structural components play an important role. Robustness of a structure as a whole depends both on the load- bearing capacity of the structural component and on the structures capacity to resist total failure, even though a local failure occurs in a component or a connection between components. To avoid progressive collapse it is necessary to be able to carry out a design for connections. A connection may be executed with anchors to withstand local failure of the connection in structures built with prefabricated components. For the design of these anchors, a model is developed for connections in structures performed in prefabricated autoclaved aerated concrete components. The design model takes into account the effect of anchors placed close to the edge, which may result in splitting failure. Further the model is developed to consider the effect of reinforcement diameter and anchor depth. The model is analytical and theoretically derived assuming a static equilibrium stress distribution along the anchor. The theory is compared to laboratory test, including the relevant parameters and the model is refined and theoretically argued analyzing the observed test results. The method presented can be used to improve safety in structures or even optimize the design of the connections

The Capacity of Government to Deliver Sustainable and Integrated Transport: The Case of Transit Oriented Development in Perth, Australia

There is a renewed interest in land use transport integration as a means of achieving sustainable accessibility. Such accessibility requires designing more than simply the transport network; it also requires attention to place (built form). Transitoriented development would appear to capture many of the criteria deemed important in land use transport integration. In Perth, Australia, there have been planning policies for the past 20 years requiring transit-oriented development around railway stations throughout the metropolitan area. While the policy intent, particularly at the State level, is clear the implementation of policy has been fairly ineffective. The first part of this paper provides an examination of state and local government planning and transport policies, evaluating them using a set of land use transport integration criteria considered all encompassing. This provides some insight into the extent of state and local government capacity to deliver land use transport integration. The second part of this paper examines the extent of implementation by examining existing and proposed land use around station precincts throughout metropolitan Perth. The findings of this research suggest that the capacity of state and local government to deliver land use transport integration is reasonable in a planning policy sense. Implementation, despite long policy lead times, has been lacking. It appears to be more effective where local planning controls have been suspended with new redevelopment authorities given powers to develop land around railway stations.

Fingerprint Identification Keyless Entry System

Nowadays, keyless entry systems are widely adopted for vehicle immobilizer systems due to both advantages of security and convenience. Keyless entry systems could overcome brute-force key guessing attack, statistics attack and masquerade attack, however, they can't prevent from thieves stealing behavior. In this paper, we proposed a new architecture try to improve the existent flaws. The integration of the keyless entry system and the fingerprint identification technology is more suitable to implement on the portable transponder to achieve higher security needs. We also adopt and modify AES security protocol for life expectancy and security of the portable transponder. In addition, the identification of a driver's fingerprint makes the service of automatic reinstatement of a driver's preferences become possible. Our design can satisfy not only the three kinds of previous illegal attacks, but also the stealing situation. Furthermore, many practical factors, such as costs, life expectancy and performance, have been well considered in the design of portable transponder.

On The Comparison of Fuzzy Logic and State Space Averaging based Sliding Control Methods Applied onan Arc Welding Machine

In this study, the performance of a high-frequency arc welding machine including a two-switch inverter is analyzed. The control of the system is achieved using two different control techniques i- fuzzy logic control (FLC) ii- state space averaging based sliding control. Fuzzy logic control does not need accurate mathematical model of a plant and can be used in nonlinear applications. The second method needs the mathematical model of the system. In this method the state space equations of the system are derived for two different “on" and “off" states of the switches. The derived state equations are combined with the sliding control rule considering the duty-cycle of the converter. The performance of the system is analyzed by simulating the system using SIMULINK tool box of MATLAB. The simulation results show that fuzzy logic controller is more robust and less sensitive to parameter variations.

Description of Kinetics of Propane Fragmentation with a Support of Ab Initio Simulation

Using ab initio theoretical calculations, we present analysis of fragmentation process. The analysis is performed in two steps. The first step is calculation of fragmentation energies by ab initio calculations. The second step is application of the energies to kinetic description of process. The energies of fragments are presented in this paper. The kinetics of fragmentation process can be described by numerical models. The method for kinetic analysis is described in this paper. The result - composition of fragmentation products - will be calculated in future. The results from model can be compared to the concentrations of fragments from mass spectrum.