Abstract: The paper deals with the analysis of the dynamic
response of footbridges under human - induced dynamic loads.
This is a frequently occurring and often dominant load for
footbridges as it stems from the very purpose of a footbridge - to
convey pedestrian. Due to the emergence of new materials and
advanced engineering technology, slender footbridges are
increasingly becoming popular to satisfy the modern transportation
needs and the aesthetical requirements of the society. These
structures however are always lively with low stiffness, low mass,
low damping and low natural frequencies. As a consequence, they are
prone to vibration induced by human activities and can suffer severe
vibration serviceability problems, particularly in the lateral direction.
Pedestrian bridges are designed according to first and second limit
states, these are the criteria involved in response to static design load.
However, it is necessary to assess the dynamic response of bridge
design load on pedestrians and assess it impact on the comfort of the
user movement. Usually the load is considered a person or a small
group which can be assumed in perfect motion synchronization.
Already one person or small group can excite significant vibration of
the deck. In order to calculate the dynamic response to the movement
of people, designer needs available and suitable computational model
and criteria. For the calculation program ANSYS based on finite
element method was used.
Abstract: This article discusses the prospects of participation of
the Republic of Kazakhstan in Hague Conference on Private
International Law on the unification of collision law in the
international trade.
The article analyzes some conventions on international trade. The
appropriate conclusions based on the opinions of scientists and
experts in this field have been made. First, all issues presented in the
form of gaps or spaces in conventions should be the subject to direct
negotiations in the course of the activities of Hague Conference, and
have a comprehensive feature, be transparent and taken under
simplified procedure.
Secondly, one should not underestimate the value of conventions
that do not become active due to various reasons and having a
positive impact on the development and improvement of national
legislation and practice in the field of private international law.
Thirdly, Kazakhstan has to reconsider its attitude to Hague
Conference, having become its full member and aiming at providing
constructive and fruitful cooperation with both the organization itself
and its member states.
Abstract: As the Social network game(SNG) is rising
dramatically worldwide, an interesting aspect has appeared in the
demographic analysis. That is the ratio of the game users by gender.
Although the ratio of male and female users in online game was
60:40% previously, the ratio of male and female users in SNG stood at
47:53% which shows that the ratio of female users is higher than that
of male users. Here, it should be noted that 35% in those 53% female
users are the first-time users of game. This fact suggests that women
who were not interested in game previously has taken an interest in
SNG. Notwithstanding this issue, there have been little studies on the
female users of SNG although there are many studies that analyzed the
tendency of female users- online game play. This study conducted the
analyzed how the game-playing tendency of SNG gamers was
manifested in the game by gender. For that, this study will identify the
tendency of SNG users by gender based on the preceding studies that
analyzed the online game users by gender. The subject of this study
was confined to the farm and urban construction simulation games
which were offered based on the mobile application platform.
Regarding the methodology of study, the first focus group
interview(FGI) was conducted with the male and female users who
had played games on Social network service(SNS) until recently. Later,
the second one-on-one in-depth interview was conducted to gain an
insight into the psychological state of the subjects.
Abstract: In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Depending upon the channel selected two to three LSBs of each central 2×2 sub-block are set to zero to hold the ownership, authentication and recovery information. The size & position of sub-block is important for correct localization, enhanced security & fast computation. As YS ÔèÑ T so it is suitable to embed the recovery information apart from the ownership and authentication information, therefore 4×4 block of T channel along with ownership information is then deployed by SHA160 to compute the content based hash that is unique and invulnerable to birthday attack or hash collision instead of using MD5 that may raise the condition i.e. H(m)=H(m'). For recovery, intensity mean of 4x4 block of each channel is computed and encoded upto eight bits. For watermark embedding, key based mapping of blocks is performed using 2DTorus Automorphism. Our scheme is oblivious, generates highly imperceptible images with correct localization of tampering within reasonable time and has the ability to recover the original work with probability of near one.
Abstract: In recent years, the development of e-learning is very
rapid. E-learning is an attractive and efficient way for computer
education. Student interaction and collaboration also plays an
important role in e-learning. In this paper, a collaborative web-based
e-learning environment is presented. A wide range of interactive and
collaborative methods are integrated into a web-based environment.
This e-learning environment is designed for information security
curriculum.
Abstract: Deciding the numerous parameters involved in
designing a competent artificial neural network is a complicated task.
The existence of several options for selecting an appropriate
architecture for neural network adds to this complexity, especially
when different applications of heterogeneous natures are concerned.
Two completely different applications in engineering and medical
science were selected in the present study including prediction of
workpiece's surface roughness in ultrasonic-vibration assisted turning
and papilloma viruses oncogenicity. Several neural network
architectures with different parameters were developed for each
application and the results were compared. It was illustrated in this
paper that some applications such as the first one mentioned above
are apt to be modeled by a single network with sufficient accuracy,
whereas others such as the second application can be best modeled
by different expert networks for different ranges of output.
Development of knowledge about the essentials of neural networks
for different applications is regarded as the cornerstone of
multidisciplinary network design programs to be developed as a
means of reducing inconsistencies and the burden of the user
intervention.
Abstract: Two completely different approaches for a Gigabit
Ethernet compliant stream transmission over 50m of 1mm PMMA SI-POF have been experimentally demonstrated and are compared in this paper. The first solution is based on a commercial RC-LED
transmission and a careful optimization of the physical layer architecture, realized during the POF-PLUS EU Project. The second solution exploits the performance of an edge-emitting laser at the
transmitter side in order to avoid any sort of electrical equalization at the receiver side.
Abstract: Low frequency power oscillations may be triggered
by many events in the system. Most oscillations are damped by the
system, but undamped oscillations can lead to system collapse.
Oscillations develop as a result of rotor acceleration/deceleration
following a change in active power transfer from a generator. Like
the operations limits, the monitoring of power system oscillating
modes is a relevant aspect of power system operation and control.
Unprevented low-frequency power swings can be cause of cascading
outages that can rapidly extend effect on wide region. On this regard,
a Wide Area Monitoring, Protection and Control Systems
(WAMPCS) help in detecting such phenomena and assess power
system dynamics security. The monitoring of power system
electromechanical oscillations is very important in the frame of
modern power system management and control. In first part, this
paper compares the different technique for identification of power
system oscillations. Second part analyzes possible identification
some power system dynamics behaviors Using Wide Area
Monitoring Systems (WAMS) based on Phasor Measurement Units
(PMUs) and wavelet technique.
Abstract: In this paper, a framework is presented trying to make
the most secure web system out of the available generic and web
security technology which can be used as a guideline for
organizations building their web sites. The framework is designed to
provide necessary security services, to address the known security
threats, and to provide some cover to other security problems
especially unknown threats. The requirements for the design are
discussed which guided us to the design of secure web system. The
designed security framework is then simulated and various quality of
service (QoS) metrics are calculated to measure the performance of
this system.
Abstract: In this paper, a novel method for a biometric system based on the ECG signal is proposed, using spectral coefficients computed through linear predictive coding (LPC). ECG biometric systems have traditionally incorporated characteristics of fiducial points of the ECG signal as the feature set. These systems have been shown to contain loopholes and thus a non-fiducial system allows for tighter security. In the proposed system, incorporating non-fiducial features from the LPC spectrum produced a segment and subject recognition rate of 99.52% and 100% respectively. The recognition rates outperformed the biometric system that is based on the wavelet packet decomposition (WPD) algorithm in terms of recognition rates and computation time. This allows for LPC to be used in a practical ECG biometric system that requires fast, stringent and accurate recognition.
Abstract: Some theoretical and experimental aspects related to
the conceptual analyses concerning the direct correspondence
identification between the shape, area and orientation of plantar
pressure and obtaining adequate corrective insoles by rapid
prototyping are presented in this paper. In the first part of the paper
there is the theoretical-correlative concept, which is the fundament of
correspondence deduction between plantar surface characteristics and
respectively corrective insoles. In the second part of the paper the
experimental equipment used to analyze and perform the
correspondence stages and then the integral ones between the
analyzed foot shapes and the ones with corrective insoles is
presented. In the final parte the results used to adapt the insoles
obtained by rapid prototyping but also some specific aspects and
conclusions of the conceptual analysis of direct and rapid
correspondence are shown.
Abstract: In this research, the researchers have managed to
design a model to investigate the current trend of stock price of the
"IRAN KHODRO corporation" at Tehran Stock Exchange by
utilizing an Adaptive Neuro - Fuzzy Inference system. For the Longterm
Period, a Neuro-Fuzzy with two Triangular membership
functions and four independent Variables including trade volume,
Dividend Per Share (DPS), Price to Earning Ratio (P/E), and also
closing Price and Stock Price fluctuation as an dependent variable are
selected as an optimal model. For the short-term Period, a neureo –
fuzzy model with two triangular membership functions for the first
quarter of a year, two trapezoidal membership functions for the
Second quarter of a year, two Gaussian combination membership
functions for the third quarter of a year and two trapezoidal
membership functions for the fourth quarter of a year were selected
as an optimal model for the stock price forecasting. In addition, three
independent variables including trade volume, price to earning ratio,
closing Stock Price and a dependent variable of stock price
fluctuation were selected as an optimal model. The findings of the
research demonstrate that the trend of stock price could be forecasted
with the lower level of error.
Abstract: The main purpose of the research is to address the role of psychological harassment behaviors (mobbing) to which employees are exposed and personality characteristics over work alienation. Research population was composed of the employees of Provincial Special Administration. A survey with four sections was created to measure variables and reach out the basic goals of the research. Correlation and step-wise regression analyses were performed to investigate the separate and overall effects of sub-dimensions of psychological harassment behaviors and personality characteristic on work alienation of employees. Correlation analysis revealed significant but weak relationships between work alienation and psychological harassment and personality characteristics. Step-wise regression analysis revealed also significant relationships between work alienation variable and assault to personality, direct negative behaviors (sub dimensions of mobbing) and openness (sub-dimension of personality characteristics). Each variable was introduced into the model step by step to investigate the effects of significant variables in explaining the variations in work alienation. While the explanation ratio of the first model was 13%, the last model including three variables had an explanation ratio of 24%.
Abstract: Many attempts have been made to strengthen Feistel based block ciphers. Among the successful proposals is the key- dependent S-box which was implemented in some of the high-profile ciphers. In this paper a key-dependent permutation box is proposed and implemented on DES as a case study. The new modified DES, MDES, was tested against Diehard Tests, avalanche test, and performance test. The results showed that in general MDES is more resistible to attacks than DES with negligible overhead. Therefore, it is believed that the proposed key-dependent permutation should be considered as a valuable primitive that can help strengthen the security of Substitution-Permutation Network which is a core design in many Feistel based block ciphers.
Abstract: The small interfering RNA (siRNA) alters the
regulatory role of mRNA during gene expression by translational
inhibition. Recent studies show that upregulation of mRNA because
serious diseases like cancer. So designing effective siRNA with good
knockdown effects plays an important role in gene silencing. Various
siRNA design tools had been developed earlier. In this work, we are
trying to analyze the existing good scoring second generation siRNA
predicting tools and to optimize the efficiency of siRNA prediction
by designing a computational model using Artificial Neural Network
and whole stacking energy (%G), which may help in gene silencing
and drug design in cancer therapy. Our model is trained and tested
against a large data set of siRNA sequences. Validation of our results
is done by finding correlation coefficient of experimental versus
observed inhibition efficacy of siRNA. We achieved a correlation
coefficient of 0.727 in our previous computational model and we
could improve the correlation coefficient up to 0.753 when the
threshold of whole tacking energy is greater than or equal to -32.5
kcal/mol.
Abstract: As the performance of the filtering system depends
upon the accuracy of the noise detection scheme, in this paper, we
present a new scheme for impulse noise detection based on two
levels of decision. In this scheme in the first stage we coarsely
identify the corrupted pixels and in the second stage we finally
decide whether the pixel under consideration is really corrupt or not.
The efficacy of the proposed filter has been confirmed by extensive
simulations.
Abstract: The aim of this study was to develop a storm water quality improvement strategy plan (WQISP) which assists managers and decision makers of local city councils in enhancing their activities to improve regional water quality. City of Gosnells in Western Australia has been considered as a case study. The procedure on developing the WQISP consists of reviewing existing water quality data, identifying water quality issues in the study areas and developing a decision making tool for the officers, managers and decision makers. It was found that land use type is the main factor affecting the water quality. Therefore, activities, sources and pollutants related to different land use types including residential, industrial, agricultural and commercial are given high importance during the study. Semi-structured interviews were carried out with coordinators of different management sections of the regional councils in order to understand the associated management framework and issues. The issues identified from these interviews were used in preparing the decision making tool. Variables associated with the defined “value versus threat" decision making tool are obtained from the intensive literature review. The main recommendations provided for improvement of water quality in local city councils, include non-structural, structural and management controls and potential impacts of climate change.
Abstract: In order to accelerate the similarity search in highdimensional database, we propose a new hierarchical indexing method. It is composed of offline and online phases. Our contribution concerns both phases. In the offline phase, after gathering the whole of the data in clusters and constructing a hierarchical index, the main originality of our contribution consists to develop a method to construct bounding forms of clusters to avoid overlapping. For the online phase, our idea improves considerably performances of similarity search. However, for this second phase, we have also developed an adapted search algorithm. Our method baptized NOHIS (Non-Overlapping Hierarchical Index Structure) use the Principal Direction Divisive Partitioning (PDDP) as algorithm of clustering. The principle of the PDDP is to divide data recursively into two sub-clusters; division is done by using the hyper-plane orthogonal to the principal direction derived from the covariance matrix and passing through the centroid of the cluster to divide. Data of each two sub-clusters obtained are including by a minimum bounding rectangle (MBR). The two MBRs are directed according to the principal direction. Consequently, the nonoverlapping between the two forms is assured. Experiments use databases containing image descriptors. Results show that the proposed method outperforms sequential scan and SRtree in processing k-nearest neighbors.
Abstract: Distributed denial-of-service (DDoS) attacks pose a
serious threat to network security. There have been a lot of
methodologies and tools devised to detect DDoS attacks and reduce
the damage they cause. Still, most of the methods cannot
simultaneously achieve (1) efficient detection with a small number of
false alarms and (2) real-time transfer of packets. Here, we introduce
a method for proactive detection of DDoS attacks, by classifying the
network status, to be utilized in the detection stage of the proposed
anti-DDoS framework. Initially, we analyse the DDoS architecture
and obtain details of its phases. Then, we investigate the procedures
of DDoS attacks and select variables based on these features. Finally,
we apply the k-nearest neighbour (k-NN) method to classify the
network status into each phase of DDoS attack. The simulation result
showed that each phase of the attack scenario is classified well and
we could detect DDoS attack in the early stage.
Abstract: This paper investigates the performance of Multiple- Input Multiple-Output (MIMO) feedback system combined with Orthogonal Frequency Division Multiplexing (OFDM). Two types of codebook based channel feedback techniques are used in this work. The first feedback technique uses a combination of both the long-term and short-term channel state information (CSI) at the transmitter, whereas the second technique uses only the short term CSI. The long-term and short-term CSI at the transmitter is used for efficient channel utilization. OFDM is a powerful technique employed in communication systems suffering from frequency selectivity. Combined with multiple antennas at the transmitter and receiver, OFDM proves to be robust against delay spread. Moreover, it leads to significant data rates with improved bit error performance over links having only a single antenna at both the transmitter and receiver. The effectiveness of these techniques has been demonstrated through the simulation of a MIMO-OFDM feedback system. The results have been evaluated for 4x4 MIMO channels. Simulation results indicate the benefits of the MIMO-OFDM channel feedback system over the one without incorporating OFDM. Performance gain of about 3 dB is observed for MIMO-OFDM feedback system as compared to the one without employing OFDM. Hence MIMO-OFDM becomes an attractive approach for future high speed wireless communication systems.