Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.
Abstract: In order to implement flexibility as well as survivable
capacities over passive optical network (PON), a new automatic
random fault-recovery mechanism with array-waveguide-grating
based (AWG-based) optical switch (OSW) is presented. Firstly,
wavelength-division-multiplexing and optical code-division
multiple-access (WDM/OCDMA) scheme are configured to meet the
various geographical locations requirement between optical network
unit (ONU) and optical line terminal (OLT). The AWG-base optical
switch is designed and viewed as central star-mesh topology to
prohibit/decrease the duplicated redundant elements such as fiber and
transceiver as well. Hence, by simple monitoring and routing switch
algorithm, random fault-recovery capacity is achieved over
bi-directional (up/downstream) WDM/OCDMA scheme. When error
of distribution fiber (DF) takes place or bit-error-rate (BER) is higher
than 10-9 requirement, the primary/slave AWG-based OSW are
adjusted and controlled dynamically to restore the affected ONU
groups via the other working DFs immediately.
Abstract: In this paper, linear multistep technique using power
series as the basis function is used to develop the block methods
which are suitable for generating direct solution of the special second
order ordinary differential equations of the form y′′ = f(x,y), a < = x < = b with associated initial or boundary conditions. The continuaous hybrid formulations enable us to differentiate and evaluate at some
grids and off – grid points to obtain two different three discrete
schemes, each of order (4,4,4)T, which were used in block form for
parallel or sequential solutions of the problems. The computational
burden and computer time wastage involved in the usual reduction of
second order problem into system of first order equations are avoided
by this approach. Furthermore, a stability analysis and efficiency of
the block method are tested on linear and non-linear ordinary
differential equations whose solutions are oscillatory or nearly
periodic in nature, and the results obtained compared favourably with
the exact solution.
Abstract: An effort estimation model is needed for softwareintensive
projects that consist of hardware, embedded software or
some combination of the two, as well as high level software
solutions. This paper first focuses on functional decomposition
techniques to measure functional complexity of a computer system
and investigates its impact on system development effort. Later, it
examines effects of technical difficulty and design team capability
factors in order to construct the best effort estimation model. With
using traditional regression analysis technique, the study develops a
system development effort estimation model which takes functional
complexity, technical difficulty and design team capability factors as
input parameters. Finally, the assumptions of the model are tested.
Abstract: In this paper, the Lennard -Jones potential is applied
to molecules of liquid argon as well as its vapor and platinum as solid
surface in order to perform a non-equilibrium molecular dynamics
simulation to study the microscopic aspects of liquid-vapor-solid
interactions. The channel is periodic in x and y directions and along z
direction it is bounded by atomic walls. It was found that density of
the liquids near the solid walls fluctuated greatly and that the
structure was more like a solid than a liquid. This indicates that the
interactions of solid and liquid molecules are very strong. The
resultant surface tension, liquid density and vapor density are found
to be well predicted when compared with the experimental data for
argon. Liquid and vapor densities were found to depend on the cutoff
radius which induces the use of P3M (particle-particle particle-mesh)
method which was implemented for evaluation of force and surface
tension.
Abstract: This paper presents a novel approach to finding a
priori interesting regions in mammograms. In order to delineate those
regions of interest (ROI-s) in mammograms, which appear to be
prominent, a topographic representation called the iso-level contour
map consisting of iso-level contours at multiple intensity levels and
region segmentation based-thresholding have been proposed. The
simulation results indicate that the computed boundary gives the
detection rate of 99.5% accuracy.
Abstract: A common way to elude the signature-based Network Intrusion Detection System is based upon changing a recognizable attack to an unrecognizable one via the IDS. For example, in order to evade sign accommodation with intrusion detection system markers, a hacker spilt the payload packet into many small pieces or hides them within messages. In this paper we try to model the main fragmentation attack and create a new module in the intrusion detection architecture system which recognizes the main fragmentation attacks through verification of integrity checking of TCP packet in order to prevent elusion of the system and also to announce the necessary alert to the system administrator.
Abstract: This paper addresses one of the most important issues
have been considered in hybrid MTS/MTO production environments. To cope with the problem, a mathematical programming model is
applied from a tactical point of view. The model is converted to a fuzzy goal programming model, because a degree of uncertainty is involved in hybrid MTS/MTO context. Finally, application of the
proposed model in an industrial center is reported and the results prove the validity of the model.
Abstract: A parallel computational fluid dynamics code has been
developed for the study of aerodynamic heating problem in hypersonic
flows. The code employs the 3D Navier-Stokes equations as the basic
governing equations to simulate the laminar hypersonic flow. The cell
centered finite volume method based on structured grid is applied for
spatial discretization. The AUSMPW+ scheme is used for the inviscid
fluxes, and the MUSCL approach is used for higher order spatial
accuracy. The implicit LU-SGS scheme is applied for time integration
to accelerate the convergence of computations in steady flows. A
parallel programming method based on MPI is employed to shorten
the computing time. The validity of the code is demonstrated by
comparing the numerical calculation result with the experimental data
of a hypersonic flow field around a blunt body.
Abstract: Let p be a prime number, Fpbe a finite field and let Qpdenote the set of quadratic residues in Fp. In the first section we givesome notations and preliminaries from elliptic curves. In the secondsection, we consider some properties of rational points on ellipticcurves Ep,b: y2= x3+ b2 over Fp, where b ∈ F*p. Recall that theorder of Ep,bover Fpis p + 1 if p ≡ 5(mod 6). We generalize thisresult to any field Fnp for an integer n≥ 2. Further we obtain someresults concerning the sum Σ[x]Ep,b(Fp) and Σ[y]Ep,b(Fp), thesum of x- and y- coordinates of all points (x, y) on Ep,b, and alsothe the sum Σ(x,0)Ep,b(Fp), the sum of points (x, 0) on Ep,b.
Abstract: In order to reduce cost, increase quality, and for
timely supplying production systems has considerably taken the
advantages of supply chain management and these advantages are
also competitive. Selection of appropriate supplier has an important
role in improvement and efficiency of systems.
The models of supplier selection which have already been used by
researchers have considered selection one or more suppliers from
potential suppliers but in this paper selecting one supplier as partner
from one supplier that have minimum one period supplying to buyer
is considered.
This paper presents a conceptual model for partner selection and
application of Degree of Adoptive (DOA) model for final selection.
The attributes weight in this model is prepared through AHP
model. After making the descriptive model, determining the
attributes and measuring the parameters of the adaptive is examined
in an auto industry of Iran(Zagross Khodro co.) and results are
presented.
Abstract: Dense slurry flow through centrifugal pump casing
has been modeled using the Eulerian-Eulerian approach with
Eulerian multiphase model in FLUENT 6.1®. First order upwinding
is considered for the discretization of momentum, k and ε terms.
SIMPLE algorithm has been applied for dealing with pressurevelocity
coupling. A mixture property based k-ε turbulence model
has been used for modeling turbulence. Results are validated first
against mesh independence and experiments for a particular set of
operational and geometric conditions. Parametric analysis is then
performed to determine the effect on important physical quantities
viz. solid velocities, solid concentration and solid stresses near the
wall with various operational geometric conditions of the pump.
Abstract: Understanding proteins functions is a major goal in
the post-genomic era. Proteins usually work in context of other
proteins and rarely function alone. Therefore, it is highly relevant to
study the interaction partners of a protein in order to understand its
function. Machine learning techniques have been widely applied to
predict protein-protein interactions. Kernel functions play an
important role for a successful machine learning technique. Choosing
the appropriate kernel function can lead to a better accuracy in a
binary classifier such as the support vector machines. In this paper,
we describe a Bayesian kernel for the support vector machine to
predict protein-protein interactions. The use of Bayesian kernel can
improve the classifier performance by incorporating the probability
characteristic of the available experimental protein-protein
interactions data that were compiled from different sources. In
addition, the probabilistic output from the Bayesian kernel can assist
biologists to conduct more research on the highly predicted
interactions. The results show that the accuracy of the classifier has
been improved using the Bayesian kernel compared to the standard
SVM kernels. These results imply that protein-protein interaction can
be predicted using Bayesian kernel with better accuracy compared to
the standard SVM kernels.
Abstract: A new approach for timestamp ordering problem in
serializable schedules is presented. Since the number of users using
databases is increasing rapidly, the accuracy and needing high
throughput are main topics in database area. Strict 2PL does not
allow all possible serializable schedules and so does not result high
throughput. The main advantages of the approach are the ability to
enforce the execution of transaction to be recoverable and the high
achievable performance of concurrent execution in central databases.
Comparing to Strict 2PL, the general structure of the algorithm is
simple, free deadlock, and allows executing all possible serializable
schedules which results high throughput. Various examples which
include different orders of database operations are discussed.
Abstract: In this paper, a method for deriving a group priority vector in the Fuzzy Analytic Network Process (FANP) is proposed. By introducing importance weights of multiple decision makers (DMs) based on their experiences, the Fuzzy Preferences Programming Method (FPP) is extended to a fuzzy group prioritization problem in the FANP. Additionally, fuzzy pair-wise comparison judgments are presented rather than exact numerical assessments in order to model the uncertainty and imprecision in the DMs- judgments and then transform the fuzzy group prioritization problem into a fuzzy non-linear programming optimization problem which maximize the group satisfaction. Unlike the known fuzzy prioritization techniques, the new method proposed in this paper can easily derive crisp weights from incomplete and inconsistency fuzzy set of comparison judgments and does not require additional aggregation producers. Detailed numerical examples are used to illustrate the implement of our approach and compare with the latest fuzzy prioritization method.
Abstract: This paper describes various stages of design and prototyping of a modular robot for use in various industrial applications. The major goal of current research has been to design and make different robotic joints at low cost capable of being assembled together in any given order for achieving various robot configurations. Five different types of joins were designed and manufactured where extensive research has been carried out on the design of each joint in order to achieve optimal strength, size, modularity, and price. This paper presents various stages of research and development undertaken to engineer these joints that include material selection, manufacturing, and strength analysis. The outcome of this research addresses the birth of a new generation of modular industrial robots with a wider range of applications and greater efficiency.
Abstract: In this paper, the finite-time stabilization of a class of multi-state time delay of fractional-order system is proposed. First, we define finite-time stability with the fractional-order system. Second, by using Generalized Gronwall's approach and the methods of the inequality, we get some conditions of finite-time stability for the fractional system with multi-state delay. Finally, a numerical example is given to illustrate the result.
Abstract: Today, numerical simulation is a powerful tool to
solve various hydraulic engineering problems. The aim of this
research is numerical solutions of shallow water equations using
finite volume method for Simulations of dam break over wet and dry
bed. In order to solve Riemann problem, Roe-s approximate solver is
used. To evaluate numerical model, simulation was done in 1D and
2D states. In 1D state, two dam break test over dry bed (with and
without friction) were studied. The results showed that Structural
failure around the dam and damage to the downstream constructions
in bed without friction is more than friction bed. In 2D state, two
tests for wet and dry beds were done. Generally in wet bed case,
waves are propagated to canal sides but in dry bed it is not
significant. Therefore, damage to the storage facilities and
agricultural lands in wet bed case is more than in dry bed.
Abstract: As current business environment is demanding a
constant adaptation of companies, the planning and strategic
management should be an ongoing and natural process in all kind of
organizations. The use of management and monitoring strategic
performance tools such as the Balanced Scorecard (BSC) have been
popular; even to Small and Medium-sized Enterprises. This paper
aims to investigate whether the BSC is being used in monitoring the
performance of small businesses, particularly in small fuel retailers
companies, which are competing in co-branding; and if not, it aims to
identify its strategic orientation in order to recommend a possible
strategy map for those managers that are willing to adopt this model
as an alternative to traditional ones for organizational performance
evaluation, which often focus only on evaluation of the
organizational financial performance.
Abstract: In this paper we propose a method for vision systems
to consistently represent functional dependencies between different
visual routines along with relational short- and long-term knowledge
about the world. Here the visual routines are bound to visual properties
of objects stored in the memory of the system. Furthermore,
the functional dependencies between the visual routines are seen
as a graph also belonging to the object-s structure. This graph is
parsed in the course of acquiring a visual property of an object to
automatically resolve the dependencies of the bound visual routines.
Using this representation, the system is able to dynamically rearrange
the processing order while keeping its functionality. Additionally, the
system is able to estimate the overall computational costs of a certain
action. We will also show that the system can efficiently use that
structure to incorporate already acquired knowledge and thus reduce
the computational demand.