Abstract: Random Oracle Model (ROM) is an effective method
for measuring the practical security of cryptograph. In this paper, we
try to use it into information hiding system (IHS). Because IHS has its
own properties, the ROM must be modified if it is used into IHS.
Firstly, we fully discuss why and how to modify each part of ROM
respectively. The main changes include: 1) Divide the attacks that IHS
may be suffered into two phases and divide the attacks of each phase
into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3)
Define Oracle and four Black-boxes that IHS used. 4) Propose the
formalized adversary model. And 5) Give the definition of judge.
Secondly, based on ROM of IHS, the security against known original
cover attack (KOCA-KOCA-security) is defined. Then, we give an
actual information hiding scheme and prove that it is
KOCA-KOCA-secure. Finally, we conclude the paper and propose the
open problems of further research.
Abstract: In this paper first, Two buildings have been modeled
and then analyzed using nonlinear static analysis method under two
different conditions in Nonlinear SAP 2000 software. In the first
condition the interaction of soil adjacent to the walls of basement are
ignored while in the second case this interaction have been modeled
using Gap elements of nonlinear SAP2000 software. Finally,
comparing the results of two models, the effects of soil-structure on
period, target point displacement, internal forces, shape deformations
and base shears have been studied. According to the results, this
interaction has always increased the base shear of buildings,
decreased the period of structure and target point displacement, and
often decreased the internal forces and displacements.
Abstract: Real-time 3D applications have to guarantee
interactive rendering speed. There is a restriction for the number of
polygons which is rendered due to performance of a graphics hardware
or graphics algorithms. Generally, the rendering performance will be
drastically increased when handling only the dynamic 3d models,
which is much fewer than the static ones. Since shapes and colors of
the static objects don-t change when the viewing direction is fixed, the
information can be reused. We render huge amounts of polygon those
cannot handled by conventional rendering techniques in real-time by
using a static object image and merging it with rendering result of the
dynamic objects. The performance must be decreased as a
consequence of updating the static object image including removing
an static object that starts to move, re-rending the other static objects
being overlapped by the moving ones. Based on visibility of the object
beginning to move, we can skip the updating process. As a result, we
enhance rendering performance and reduce differences of rendering
speed between each frame. Proposed method renders total
200,000,000 polygons that consist of 500,000 dynamic polygons and
the rest are static polygons in about 100 frames per second.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: This paper is concerned with motion recognition based fuzzy WP(Wavelet Packet) feature extraction approach from Vicon physical data sets. For this purpose, we use an efficient fuzzy mutual-information-based WP transform for feature extraction. This method estimates the required mutual information using a novel approach based on fuzzy membership function. The physical action data set includes 10 normal and 10 aggressive physical actions that measure the human activity. The data have been collected from 10 subjects using the Vicon 3D tracker. The experiments consist of running, seating, and walking as physical activity motion among various activities. The experimental results revealed that the presented feature extraction approach showed good recognition performance.
Abstract: The inability to implement the principles of good
corporate governance (GCG) as demonstrated in the surveys is due to
a number of constraints which can be classified into three; namely internal constraints, external constraints, and constraints coming
from the structure of ownership. The issues in the internal constraints
mentioned are related to the function of several elements of the company. As a business organization, corporation is unable to
achieve its goal to successfully implement GCG principles since it is
not support by its internal elements- functions. Two of several numbers of internal elements of a company are ethical work climate
and leadership style of the top management.
To prove the correlation between internal function of organization
(in this case ethical work climate and transformational leadership)
and the successful implementation of GCG principles, this study
proposes two hypotheses to be empirically tested on thirty surveyed organizations; eleven of which are state-owned companies and
nineteen are private companies. These thirty corporations are listed in
the Jakarta Stock Exchange. All state-owned companies in the
samples are those which have been privatized.
The research showed that internal function of organization give
support to the successful implementation of GCG principle. In this
research we can prove that : (i) ethical work climate has positive
significance of correlation with the successful implementation of
social awareness principle (one of principles on GCG) and, (ii) only
at the state-owned companies, transformational leadership have
positive significance effect to forming the ethical work climate.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
Abstract: Within the framework of a method of the information
theory it is offered statistics and probabilistic model for definition of
cause-and-effect relations in the coupled multicomponent
subsystems. The quantitative parameter which is defined through
conditional and unconditional entropy functions is introduced. The
method is applied to the analysis of the experimental data on
dynamics of change of the chemical elements composition of plants
organs (roots, reproductive organs, leafs and stems). Experiment is
directed on studying of temporal processes of primary soil formation
and their connection with redistribution dynamics of chemical
elements in plant organs. This statistics and probabilistic model
allows also quantitatively and unambiguously to specify the
directions of the information streams on plant organs.
Abstract: We present analysis of spatial patterns of generic
disease spread simulated by a stochastic long-range correlation SIR
model, where individuals can be infected at long distance in a power
law distribution. We integrated various tools, namely perimeter,
circularity, fractal dimension, and aggregation index to characterize
and investigate spatial pattern formations. Our primary goal was to
understand for a given model of interest which tool has an advantage
over the other and to what extent. We found that perimeter and
circularity give information only for a case of strong correlation–
while the fractal dimension and aggregation index exhibit the growth
rule of pattern formation, depending on the degree of the correlation
exponent (β). The aggregation index method used as an alternative
method to describe the degree of pathogenic ratio (α). This study may
provide a useful approach to characterize and analyze the pattern
formation of epidemic spreading
Abstract: In article are analyzed value of audiovisual sources which possesses high integrative potential and allows studying movement of information in the history - information movement from generation to the generation, in essence providing continuity of historical development and inheritance of traditions. Information thus fixed in them is considered as a source not only about last condition of society, but also significant for programming of its subsequent activity.
Abstract: Major social changes in the last century had significant impact on the Kazakh literature. Participants of the World War II, writers and poets imprisoned during the war, formed the Kazakh literature in emigration within the framework of 'Turkistan Legion'. This was a topic which remained closed until Kazakhstan gained its independence, though even after the independence, there were few research works done about the literature in emigration. The article studies the formation of the Kazakh literature in emigration, its prominent figures, its artistic heritage, and notes of emigration in works of poets and writers.
Abstract: When the profile information of an existing road is
missing or not up-to-date and the parameters of the vertical
alignment are needed for engineering analysis, the engineer has to recreate
the geometric design features of the road alignment using
collected profile data. The profile data may be collected using
traditional surveying methods, global positioning systems, or digital
imagery. This paper develops a method that estimates the parameters
of the geometric features that best characterize the existing vertical
alignments in terms of tangents and the expressions of the curve, that
may be symmetrical, asymmetrical, reverse, and complex vertical
curves. The method is implemented using an Excel-based
optimization method that minimizes the differences between the
observed profile and the profiles estimated from the equations of the
vertical curve. The method uses a 'wireframe' representation of the
profile that makes the proposed method applicable to all types of
vertical curves. A secondary contribution of this paper is to introduce
the properties of the equal-arc asymmetrical curve that has been
recently developed in the highway geometric design field.
Abstract: In this paper we will develop further the sequential life test approach presented in a previous article by [1] using an underlying two parameter Inverse Weibull sampling distribution. The location parameter or minimum life will be considered equal to zero. Once again we will provide rules for making one of the three possible decisions as each observation becomes available; that is: accept the null hypothesis H0; reject the null hypothesis H0; or obtain additional information by making another observation. The product being analyzed is a new electronic component. There is little information available about the possible values the parameters of the corresponding Inverse Weibull underlying sampling distribution could have.To estimate the shape and the scale parameters of the underlying Inverse Weibull model we will use a maximum likelihood approach for censored failure data. A new example will further develop the proposed sequential life testing approach.
Abstract: This paper proposes a technique to protect against
email bombing. The technique employs a statistical approach, Naïve
Bayes (NB), and Neural Networks to show that it is possible to
differentiate between good and bad traffic to protect against email
bombing attacks. Neural networks and Naïve Bayes can be trained
by utilizing many email messages that include both input and output
data for legitimate and non-legitimate emails. The input to the model
includes the contents of the body of the messages, the subject, and
the headers. This information will be used to determine if the email
is normal or an attack email. Preliminary tests suggest that Naïve
Bayes can be trained to produce an accurate response to confirm
which email represents an attack.
Abstract: Lurking behavior is common in information-seeking oriented communities. Transferring users with lurking behavior to be contributors can assist virtual communities to obtain competitive advantages. Based on the ecological cognition framework, this study proposes a model to examine the antecedents of lurking behavior in information-seeking oriented virtual communities. This study argues desire for emotional support, desire for information support, desire for performance-approach, desire for performance -avoidance, desire for mastery-approach, desire for mastery-avoidance, desire for ability trust, desire for benevolence trust, and desire for integrity trust effect on lurking behavior. This study offers an approach to understanding the determinants of lurking behavior in online contexts.
Abstract: Thailand is the agriculture country as the weather and geography are suitable for agriculture environment. In 2011, the quantity of exported fresh vegetable was 126,069 tons which valued 117.1 million US dollars. Although the fresh vegetable has a high potential in exporting, there also have a lack of knowledge such as chemical usage, land usage, marketing and also the transportation and logistics. Nakorn Pathom province is the area which the farmer and manufacturer of fresh vegetable located. The objectives of this study are to study the basic information of the local fresh vegetable farmers in Nakorn Pathom province, to study the factor which effects the management of the fresh vegetable supply chain in Nakorn Pathom province and to study the problems and obstacle of the fresh vegetable supply chain in Nakorn Pathom province. This study is limited to the flow of the Nakorn Pathom province fresh vegetable from the farmers to the country which import the vegetable from Thailand. The populations of this study are 100 local farmers in Nakorn Pathom province. The result of this study shows that the key process of the fresh vegetable supply chain is in the supply sourcing process and manufacturing process.
Abstract: We proposes a way of removing noises and reducing the number of colors contained in a JPEG image. Main purpose of this project is to convert color images to monochrome images for the color blinds. We treat the crispy color images like the Tokyo subway map. Each color in the image has an important information. But for the color blinds, similar colors cannot be distinguished. If we can convert those colors to different gray values, they can distinguish them.
Abstract: Web 2.0 (social networking, blogging and online
forums) can serve as a data source for social science research because
it contains vast amount of information from many different users.
The volume of that information has been growing at a very high rate
and becoming a network of heterogeneous data; this makes things
difficult to find and is therefore not almost useful. We have proposed
a novel theoretical model for gathering and processing data from
Web 2.0, which would reflect semantic content of web pages in
better way. This article deals with the analysis part of the model and
its usage for content analysis of blogs. The introductory part of the
article describes methodology for the gathering and processing data
from blogs. The next part of the article is focused on the evaluation
and content analysis of blogs, which write about specific trend.
Abstract: In this paper, we apply the FM methodology to the
cross-section of Romanian-listed common stocks and investigate the
explanatory power of market beta on the cross-section of commons
stock returns from Bucharest Stock Exchange. Various assumptions
are empirically tested, such us linearity, market efficiency, the “no
systematic effect of non-beta risk" hypothesis or the positive
expected risk-return trade-off hypothesis. We find that the Romanian
stock market shows the same properties as the other emerging
markets in terms of efficiency and significance of the linear riskreturn
models. Our analysis included weekly returns from January
2002 until May 2010 and the portfolio formation, estimation and
testing was performed in a rolling manner using 51 observations (one
year) for each stage of the analysis.
Abstract: We propose a multi-agent based utilitarian approach
to model and understand information flows in social networks that
lead to Pareto optimal informational exchanges. We model the
individual expected utility function of the agents to reflect the net
value of information received. We show how this model, adapted
from a theorem by Karl Borch dealing with an actuarial Risk
Exchange concept in the Insurance industry, can be used for social
network analysis. We develop a utilitarian framework that allows us
to interpret Pareto optimal exchanges of value as potential
information flows, while achieving a maximization of a sum of
expected utilities of information of the group of agents. We examine
some interesting conditions on the utility function under which the
flows are optimal. We illustrate the promise of this new approach to
attach economic value to information in networks with a synthetic
example.