Abstract: New software protection product called “Obfuscation
Studio" is presented in the paper. Several obfuscating modules that
are already implemented are described. Some theoretical data is
presented, that shows the potency and effectiveness of described
obfuscation methods. “Obfuscation Studio" is being implemented for
protecting programs written for .NET platform, but the described
methods can also be interesting for other applications.
Abstract: The nanotechnology based on epitaxial systems
includes single or arranged misfit dislocations. In general, whatever
is the type of dislocation or the geometry of the array formed by the
dislocations; it is important for experimental studies to know exactly
the stress distribution for which there is no analytical expression [1,
2]. This work, using a numerical analysis, deals with relaxation of
epitaxial layers having at their interface a periodic network of edge
misfit dislocations. The stress distribution is estimated by using
isotropic elasticity. The results show that the thickness of the two
sheets is a crucial parameter in the stress distributions and then in the
profile of the two sheets.
A comparative study between the case of single dislocation and
the case of parallel network shows that the layers relaxed better when
the interface is covered by a parallel arrangement of misfit.
Consequently, a single dislocation at the interface produces an
important stress field which can be reduced by inserting a parallel
network of dislocations with suitable periodicity.
Abstract: IPsec protocol[1] is a set of security extensions
developed by the IETF and it provides privacy and authentication
services at the IP layer by using modern cryptography. In this paper,
we describe both of H/W and S/W architectures of our router system,
SRS-10. The system is designed to support high performance routing
and IPsec VPN. Especially, we used Cavium-s CN2560 processor to
implement IPsec processing in inline-mode.
Abstract: Due to its special data structure and manipulative principle, Object-Oriented Database (OODB) has a particular security protection and authorization methods. This paper first introduces the features of security mechanism about OODB, and then talked about authorization checking process of OODB. Implicit authorization mechanism is based on the subject hierarchies, object hierarchies and access hierarchies of the security authorization modes, and simplifies the authorization mode. In addition, to combine with other authorization mechanisms, implicit authorization can make protection on the authorization of OODB expediently and effectively.
Abstract: Aim. We have introduced the notion of order to multinormed spaces and countable union spaces and their duals. The topology of bounded convergence is assigned to the dual spaces. The aim of this paper is to develop the theory of ordered topological linear
spaces La,b, L(w, z), the dual spaces of ordered multinormed spaces
La,b, ordered countable union spaces L(w, z), with the topology of bounded convergence assigned to the dual spaces. We apply Laplace transformation to the ordered linear space of Laplace transformable
generalized functions. We ultimately aim at finding solutions to nonhomogeneous
nth order linear differential equations with constant
coefficients in terms of generalized functions and comparing different
solutions evolved out of different initial conditions.
Method. The above aim is achieved by
• Defining the spaces La,b, L(w, z).
• Assigning an order relation on these spaces by identifying a
positive cone on them and studying the properties of the cone.
• Defining an order relation on the dual spaces La,b, L(w, z) of La,b, L(w, z) and assigning a topology to these dual spaces which makes the order dual and the topological dual the same. • Defining the adjoint of a continuous map on these spaces
and studying its behaviour when the topology of bounded
convergence is assigned to the dual spaces.
• Applying the two-sided Laplace Transformation on the ordered
linear space of generalized functions W and studying some
properties of the transformation which are used in solving
differential equations.
Result. The above techniques are applied to solve non-homogeneous
n-th order linear differential equations with constant coefficients in
terms of generalized functions and to compare different solutions of the differential equation.
Abstract: Research in e-Business has been growing
tremendously covering all related aspects such as adoption issues, e-
Business models, strategies, etc. This research aims to explore the
potential of adopting e-Business for a micro size business operating
from home called home-based businesses (HBBs). In Malaysia, the
HBB industry started many years ago and were mostly monopolized
by women or housewives managed as a part-time job to support their
family economy. Today, things have changed. The availability of the
Internet technology and the emergence of e-Business concept
promote the evolution of HBBs, which have been adopted as another
alternative as a professional career for women without neglecting
their family needs especially the children. Although this study is
confined to a limited sample size and within geographical biasness,
the findings show that it concurs with previous large scale studies. In
this study, both qualitative and quantitative methods were used and
data were gathered using triangulation methods via interview, direct
observation, document analysis and survey questionnaires. This paper
discusses the literature review, research methods and findings
pertaining to e-Business adoption factors that influence the HBBs in
Malaysia.
Abstract: This paper proposes a feed-forward control in
resonant dc link inverter. The feed-forward control configuration is
based on synchronous sigma-delta modulation. The simulation
results showing the proposed technique can reject non-ideal dc bus
improving the total harmonic distortion.
Abstract: In this paper we introduce a new unit test technique
called déjà-vu object. Déjà-vu objects replace real objects used by
classes under test, allowing the execution of isolated unit tests. A
déjà-vu object is able to observe and record the behaviour of a real
object during real sessions, and to replace it during unit tests,
returning previously recorded results. Consequently déjà-vu object
technique can be useful when a bottom-up development and testing
strategy is adopted. In this case déjà-vu objects can increase test
portability and test source code readability. At the same time they
can reduce the time spent by programmers to develop test code and
the risk of incompatibility during the switching between déjà-vu and
production code.
Abstract: Liveable city is referred to as the quality of life in an
area that contributes towards a safe, healthy and enjoyable place. This
paper discusses the role of the streets- activities in making Kuala
Lumpur a liveable city and the happiness level of the residents
towards the city-s street activities. The study was conducted using the
residents of Kuala Lumpur. A mixed method technique is used with
the quantitative data as a main data and supported by the qualitative
data. Data were collected using questionnaires, observation and also
an interview session with a sample of residents of Kuala Lumpur.
The sampling technique is based on multistage cluster data sampling.
The findings revealed that, there is still no significant relationship
between the length of stay of the resident in Kuala Lumpur with the
happiness level towards the street activities that occurred in the city.
Abstract: The electric power industry is currently undergoing an unprecedented reform. One of the most exciting and potentially profitable recent developments is increasing usage of artificial intelligence techniques. The intention of this paper is to give an overview of using neural network (NN) techniques in power systems. According to the growth rate of NNs application in some power system subjects, this paper introduce a brief overview in fault diagnosis, security assessment, load forecasting, economic dispatch and harmonic analyzing. Advantages and disadvantages of using NNs in above mentioned subjects and the main challenges in these fields have been explained, too.
Abstract: The purpose of this paper is to present a Dynamic
Time Warping technique which reduces significantly the data
processing time and memory size of multi-dimensional time series
sampled by the biometric smart pen device BiSP. The acquisition
device is a novel ballpoint pen equipped with a diversity of sensors
for monitoring the kinematics and dynamics of handwriting
movement. The DTW algorithm has been applied for time series
analysis of five different sensor channels providing pressure,
acceleration and tilt data of the pen generated during handwriting on
a paper pad. But the standard DTW has processing time and memory
space problems which limit its practical use for online handwriting
recognition. To face with this problem the DTW has been applied to
the sum of the five sensor signals after an adequate down-sampling
of the data. Preliminary results have shown that processing time and
memory size could significantly be reduced without deterioration of
performance in single character and word recognition. Further
excellent accuracy in recognition was achieved which is mainly due
to the reduced dynamic time warping RDTW technique and a novel
pen device BiSP.
Abstract: Nowadays due to globalization of economy and
competition environment, innovation and technology plays key role
at creation of wealth and economic growth of countries. In fact
prompt growth of practical and technologic knowledge may results in
social benefits for countries when changes into effective innovation.
Considering the importance of innovation for the development of
countries, this study addresses the radical technological innovation
introduced by nanopapers at different stages of producing paper
including stock preparation, using authorized additives, fillers and
pigments, using retention, calender, stages of producing conductive
paper, porous nanopaper and Layer by layer self-assembly. Research
results show that in coming years the jungle related products will lose
considerable portion of their market share, unless embracing radical
innovation. Although incremental innovations can make this industry
still competitive in mid-term, but to have economic growth and
competitive advantage in long term, radical innovations are
necessary. Radical innovations can lead to new products and
materials which their applications in packaging industry can produce
value added. However application of nanotechnology in this industry
can be costly, it can be done in cooperation with other industries to
make the maximum use of nanotechnology possible. Therefore this
technology can be used in all the production process resulting in the
mass production of simple and flexible papers with low cost and
special properties such as facility at shape, form, easy transportation,
light weight, recovery and recycle marketing abilities, and sealing.
Improving the resistance of the packaging materials without reducing
the performance of packaging materials enhances the quality and the
value added of packaging. Improving the cellulose at nano scale can
have considerable electron optical and magnetic effects leading to
improvement in packaging and value added. Comparing to the
specifications of thermoplastic products and ordinary papers,
nanopapers show much better performance in terms of effective
mechanical indexes such as the modulus of elasticity, tensile strength,
and strain-stress. In densities lower than 640 kgm -3, due to the
network structure of nanofibers and the balanced and randomized
distribution of NFC in flat space, these specifications will even
improve more. For nanopapers, strains are 1,4Gpa, 84Mpa and 17%,
13,3 Gpa, 214Mpa and 10% respectively. In layer by layer self
assembly method (LbL) the tensile strength of nanopaper with Tio3
particles and Sio2 and halloysite clay nanotube are 30,4 ±7.6Nm/g
and 13,6 ±0.8Nm/g and 14±0.3,3Nm/g respectively that fall within
acceptable range of similar samples with virgin fiber. The usage of
improved brightness and porosity index in nanopapers can create
more competitive advantages at packaging industry.
Abstract: Overhead conveyor systems are in use in many installations around the world, meeting the widest range of applications possible. Overhead conveyor systems are particularly preferred in automotive industry but also at post offices. Overhead conveyor systems must always be integrated with a logistical process by finding the best way for a cheaper material flow in order to guarantee precise and fast workflows. With their help, any transport can take place without wasting ground and space, without excessive company capacity, lost or damaged products, erroneous delivery, endless travels and without wasting time. Ultra-light overhead conveyor systems are rope-based conveying systems with individually driven vehicles. The vehicles can move automatically on the rope and this can be realized by energy and signals. Crossings are realized by switches. Ultra-light overhead conveyor systems provide optimal material flow, which produces profit and saves time. This article introduces two new ultra-light overhead conveyor designs in logistics and explains their components. According to the explanation of the components, scenarios are created by means of their technical characteristics. The scenarios are visualized with the help of CAD software. After that, assumptions are made for application area. According to these assumptions scenarios are visualized. These scenarios help logistics companies achieve lower development costs as well as quicker market maturity.
Abstract: Nowadays viruses use polymorphic techniques to mutate their code on each replication, thus evading detection by antiviruses. However detection by emulation can defeat simple polymorphism: thus metamorphic techniques are used which thoroughly change the viral code, even after decryption. We briefly detail this evolution of virus protection techniques against detection and then study the METAPHOR virus, today's most advanced metamorphic virus.
Abstract: This paper presents the results of thermo-mechanical
characterization of Glass/Epoxy composite specimens using Infrared
Thermography technique. The specimens used for the study were
fabricated in-house with three different lay-up sequences and tested
on a servo hydraulic machine under uni-axial loading. Infrared
Camera was used for on-line monitoring surface temperature changes
of composite specimens during tensile deformation.
Experimental results showed that thermomechanical
characteristics of each type of specimens were distinct. Temperature
was found to be decreasing linearly with increasing tensile stress in
the elastic region due to thermo-elastic effect. Yield point could be
observed by monitoring the change in temperature profile during
tensile testing and this value could be correlated with the results
obtained from stress-strain response. The extent of prior plastic
deformation in the post-yield region influenced the slopes of
temperature response during tensile loading. Partial unloading and
reloading of specimens post-yield results in change in slope in elastic
and plastic regions of composite specimens.
Abstract: Many companies have excel, it is economy and well perform to use in material requirement planning (MRP) on excel. For several products, it, however, is complex problem to link the relationship between the tables of products because the relationship depends on bill of material (BOM). This paper presents algorithm to create MRP on excel, and links relationship between tables. The study reveals MRP that is created by the algorithm which is easier and faster than MRP that created by human. By this technique, MRP on excel might be good ways to improve a productivity of companies.
Abstract: E-services have significantly changed the way of
doing business in recent years. We can, however, observe poor use of
these services. There is a large gap between supply and actual eservices
usage. This is why we started a project to provide an
environment that will encourage the use of e-services. We believe
that only providing e-service does not automatically mean consumers
would use them. This paper shows the origins of our project and its
current position. We discuss the decision of using semantic web
technologies and their potential to improve e-services usage. We also
present current knowledge base and its real-world classification. In the paper, we discuss further work to be done in the project. Current
state of the project is promising.
Abstract: Personnel protection devices are cardinal in safety hazard applications. They are widely used in home, office and in industry environments to reduce the risk of lethal shock to human being and equipment safety. This paper briefly reviews various personnel protection devices also describes the basic working principle of conventional ground fault circuit interrupter (GFCI) or ground fault isolator (GFI), its disadvantages and ways to overcome the disadvantages with solid-state relay (SSR) based GFI with ultrafast response up on fault implemented in printed circuit board. This solid state GFI comprises discrete MOSFET based alternating current (AC) switches, linear optical amplifier, photovoltaic isolator and sense resistor. In conventional GFI, current transformer is employed as a sensing element to detect the difference in current flow between live and neutral conductor. If there is no fault in equipment powered through GFI, due to insulation failure of internal wires and windings of motors, both live and neutral currents will be equal in magnitude and opposite in phase.
Abstract: In this paper, we propose a new robust and secure
system that is based on the combination between two different
transforms Discrete wavelet Transform (DWT) and Contourlet
Transform (CT). The combined transforms will compensate the
drawback of using each transform separately. The proposed
algorithm has been designed, implemented and tested successfully.
The experimental results showed that selecting the best sub-band for
embedding from both transforms will improve the imperceptibility
and robustness of the new combined algorithm. The evaluated
imperceptibility of the combined DWT-CT algorithm which gave a
PSNR value 88.11 and the combination DWT-CT algorithm
improves robustness since it produced better robust against Gaussian
noise attack. In addition to that, the implemented system shored a
successful extraction method to extract watermark efficiently.
Abstract: Having done in this study, air-conditioning
automation for patisserie shopwindow was designed. In the cooling
sector it is quite important to cooling up the air temperature in the
shopwindow within short time interval. Otherwise the patisseries
inside of the shopwindow will be spoilt in a few days. Additionally
the humidity is other important parameter for the patisseries kept in
shopwindow. It must be raised up to desired level in a quite short
time. Traditional patisserie shopwindows only allow controlling
temperature manually. There is no humidity control and humidity is
supplied by fans that are directed to the water at the bottom of the
shopwindows. In this study, humidity and temperature sensors
(SHT11), PIC, AC motor controller, DC motor controller, ultrasonic
nebulizer and other electronic circuit members were used to simulate
air conditioning automation for patisserie shopwindow in proteus
software package. The simulation results showed that temperature
and humidity values are adjusted in desired time duration by openloop
control technique. Outer and inner temperature and humidity
values were used for control mechanism.