Improvements in Navy Data Networks and Tactical Communication Systems

This paper considers the benefits gained by using an efficient quality of service management such as DiffServ technique to improve the performance of military communications. Low delay and no blockage must be achieved especially for real time tactical data. All traffic flows generated by different applications do not need same bandwidth, same latency, same error ratio and this scalable technique of packet management based on priority levels is analysed. End to end architectures supporting various traffic flows and including lowbandwidth and high-delay HF or SHF military links as well as unprotected Internet sub domains are studied. A tuning of Diffserv parameters is proposed in accordance with different loads of various traffic and different operational situations.

Extraction and Analysis of Hypericum perforatum L. from Turkey

Hypericum perforatum L. is a member of the Hypericaceae (Guttiferae) family and commonly known as St. John’s wort. There is a growing interest in this medicinal plant because of the constituents of this genus. A number of species have been shown to possess various biological activities such as antiviral, wound healing, analgesic, hepatoprotective, antimicrobial and antioxidant activities and also have therapeutic effects on burns, bruises, swelling, anxiety and mild to moderate depression. In this study, the aerial parts of Hypericum perforatum L. are extracted and the main and effective constituents are determined. The analysis of the extracts was performed by GC-MS and LC-MS. As a next step, it is aimed to investigate the usage of the main constituents of the medicinal plant.

A Study on the Introduction of Wastewater Reuse Facility in Military Barracks by Cost-Benefit Analysis

The international society focuses on the environment protection and natural energy sources control for the global cooperation against weather change and sustainable growth. The study presents the overview of the water shortage status and the necessity of wastewater reuse facility in military facilities and for the possibility of the introduction, compares the economics by means of cost-benefit analysis. The military features such as the number of users of military barracks and the water use were surveyed by the design principles by facility types, the application method of wastewater reuse facility was selected, the feed water, its application and the volume of reuse volume were defined and the expectation was estimated, confirming the possibility of introducing a wastewater reuse possibility by means of cost-benefit analysis.

Public Participation in Sustainable Urban Planning

Urban planning, in particular on protected landscape areas, demands an increasing role of public participation within the frame of the efficiency of sustainable planning process. The development of urban planning actions in Protected Landscape areas, as Sintra-Cascais Natural Park, should perform a methodological process that is structured over distinct sequential stages, providing the development of a continuous, interactive, integrated and participative planning. From the start of Malveira da Serra and Janes Plan process, several public participation actions were promoted, in order to involve the local agents, stakeholders and the population in the decision of specific local key issues and define the appropriate priorities within the goals and strategies previously settled. As a result, public participation encouraged an innovative process that guarantees the efficiency of sustainable urban planning and promotes a sustainable new way of living in community.

The Influence of Biofuels on the Permeability of Sand-Bentonite Liners

Liners are made to protect the groundwater table from the infiltration of leachate which normally carries different kinds of toxic materials from landfills. Although these liners are engineered to last for long period of time; unfortunately these liners fail; therefore, toxic materials pass to groundwater. This paper focuses on the changes of the hydraulic conductivity of a sand-bentonite liner due to the infiltration of biofuel and ethanol fuel. Series of laboratory tests were conducted in 20-cm-high PVC columns. Several compositions of sand-bentonite liners were tested: 95% sand: 5% bentonite; 90% sand: 10% bentonite; and 100% sand (passed mesh #40). The columns were subjected to extreme pressures of 40 kPa, and 100 kPa to evaluate the transport of alternative fuels (biofuel and ethanol fuel). For comparative studies, similar tests were carried out using water. Results showed that hydraulic conductivity increased due to the infiltration of alternative fuels through the liners. Accordingly, the increase in the hydraulic conductivity showed significant dependency on the type of liner mixture and the characteristics of the liquid. The hydraulic conductivity of a liner (subjected to biofuel infiltration) consisting of 5% bentonite: 95% sand under pressure of 40 kPa and 100 kPa had increased by one fold. In addition, the hydraulic conductivity of a liner consisting of 10% bentonite: 90% sand under pressure of 40 kPa and 100 kPa and infiltrated by biofuel had increased by three folds. On the other hand, the results obtained by water infiltration under 40 kPa showed lower hydraulic conductivities of 1.50×10-5 and 1.37×10-9 cm/s for 5% bentonite: 95% sand, and 10% bentonite: 90% sand, respectively. Similarly, under 100 kPa, the hydraulic conductivities were 2.30×10-5 and 1.90×10-9 cm/s for 5% bentonite: 95% sand, and 10% bentonite: 90% sand, respectively.

Implementation of Geo-knowledge Based Geographic Information System for Estimating Earthquake Hazard Potential at a Metropolitan Area, Gwangju, in Korea

In this study, an inland metropolitan area, Gwangju, in Korea was selected to assess the amplification potential of earthquake motion and provide the information for regional seismic countermeasure. A geographic information system-based expert system was implemented for reliably predicting the spatial geotechnical layers in the entire region of interesting by building a geo-knowledge database. Particularly, the database consists of the existing boring data gathered from the prior geotechnical projects and the surface geo-knowledge data acquired from the site visit. For practical application of the geo-knowledge database to estimate the earthquake hazard potential related to site amplification effects at the study area, seismic zoning maps on geotechnical parameters, such as the bedrock depth and the site period, were created within GIS framework. In addition, seismic zonation of site classification was also performed to determine the site amplification coefficients for seismic design at any site in the study area. KeywordsEarthquake hazard, geo-knowledge, geographic information system, seismic zonation, site period.

Integration of Seismic and Seismological Data Interpretation for Subsurface Structure Identification

The structural interpretation of a part of eastern Potwar (Missa Keswal) has been carried out with available seismological, seismic and well data. Seismological data contains both the source parameters and fault plane solution (FPS) parameters and seismic data contains ten seismic lines that were re-interpreted by using well data. Structural interpretation depicts two broad types of fault sets namely, thrust and back thrust faults. These faults together give rise to pop up structures in the study area and also responsible for many structural traps and seismicity. Seismic interpretation includes time and depth contour maps of Chorgali Formation while seismological interpretation includes focal mechanism solution (FMS), depth, frequency, magnitude bar graphs and renewal of Seismotectonic map. The Focal Mechanism Solutions (FMS) that surrounds the study area are correlated with the different geological and structural maps of the area for the determination of the nature of subsurface faults. Results of structural interpretation from both seismic and seismological data show good correlation. It is hoped that the present work will help in better understanding of the variations in the subsurface structure and can be a useful tool for earthquake prediction, planning of oil field and reservoir monitoring.

Secure Data Aggregation Using Clusters in Sensor Networks

Wireless sensor network can be applied to both abominable and military environments. A primary goal in the design of wireless sensor networks is lifetime maximization, constrained by the energy capacity of batteries. One well-known method to reduce energy consumption in such networks is data aggregation. Providing efcient data aggregation while preserving data privacy is a challenging problem in wireless sensor networks research. In this paper, we present privacy-preserving data aggregation scheme for additive aggregation functions. The Cluster-based Private Data Aggregation (CPDA)leverages clustering protocol and algebraic properties of polynomials. It has the advantage of incurring less communication overhead. The goal of our work is to bridge the gap between collaborative data collection by wireless sensor networks and data privacy. We present simulation results of our schemes and compare their performance to a typical data aggregation scheme TAG, where no data privacy protection is provided. Results show the efficacy and efficiency of our schemes.

Unequal Error Protection for Region of Interest with Embedded Zerotree Wavelet

This paper describes a new method of unequal error protection (UEP) for region of interest (ROI) with embedded zerotree wavelet algorithm (EZW). ROI technique is important in applications with different parts of importance. In ROI coding, a chosen ROI is encoded with higher quality than the background (BG). Unequal error protection of image is provided by different coding techniques. In our proposed method, image is divided into two parts (ROI, BG) that consist of more important bytes (MIB) and less important bytes (LIB). The experimental results verify effectiveness of the design. The results of our method demonstrate the comparison of the unequal error protection (UEP) of image transmission with defined ROI and the equal error protection (EEP) over multiple noisy channels.

A Socio-Ecological Study of Sacred Groves and Memorial Parks: Cases from USA and India

The concept of sacred and nature have long been interlinked. Various cultural aspects such as religion, faith, traditions bring people closer to nature and the natural environment. Memorial Parks and Sacred Groves are examples of two such cultural landscapes that exist today. The project mainly deals with the significance of such sites to the environment and the deep rooted significance it has to the people. These parks and groves play an important role in biodiversity conservation and environmental protection. There are many differences between the establishment of memorial parks and sacred groves, but the underlying significance is the same. Sentiments, emotions play an important role in landscape planning and management. Hence the people and communities living at these sites need to be involved in any planning activity or decisions. The conservation of the environment should appeal to the sentiments of the people; the need to be 'with nature' should be used in the setting up of memorial forests and in the preservation of sacred groves.

Electrical Characteristics of SCR - based ESD Device for I/O and Power Rail Clamp in 0.35um Process

This paper presents a SCR-based ESD protection devices for I/O clamp and power rail clamp, respectably. These devices have a low trigger voltage and high holding voltage characteristics than conventional SCR device. These devices are fabricated by using 0.35um BCD (Bipolar-CMOS-DMOS) processes. These devices were validated using a TLP system. From the experimental results, the device for I/O ESD clamp has a trigger voltage of 5.8V. Also, the device for power rail ESD clamp has a holding voltage of 7.7V.

A New Method Presentation for Fault Location in Power Transformers

Power transformers are among the most important and expensive equipments in the electric power systems. Consequently the transformer protection is an essential part of the system protection. This paper presents a new method for locating transformer winding faults such as turn-to-turn, turn-to-core, turn-totransformer body, turn-to-earth, and high voltage winding to low voltage winding. In this study the current and voltage signals of input and output terminals of the transformer are measured, which the Fourier transform of measured signals and harmonic analysis determine the fault's location.

Study on the Atomic-Oxygen-Protection Film Preparation of Organic Silicon and Its Properties

Materials used on exterior spacecraft surfaces are subjected to many environmental threats which can cause degradation, atomic oxygen is one of the most threats. We prepared organic silicon atomic-oxygen-protection film using method of polymerization. This paper presented the effects on the film structure and its durability of the preparation processing, and analyzed the polymerization theory, the film structure and composition of the film. At last, we tested the film in our ground based atomic oxygen simulator, and indicated that the film worked well.

Visual Object Tracking in 3D with Color Based Particle Filter

This paper addresses the problem of determining the current 3D location of a moving object and robustly tracking it from a sequence of camera images. The approach presented here uses a particle filter and does not perform any explicit triangulation. Only the color of the object to be tracked is required, but not any precisemotion model. The observation model we have developed avoids the color filtering of the entire image. That and the Monte Carlotechniques inside the particle filter provide real time performance.Experiments with two real cameras are presented and lessons learned are commented. The approach scales easily to more than two cameras and new sensor cues.

Wavelet based ANN Approach for Transformer Protection

This paper presents the development of a wavelet based algorithm, for distinguishing between magnetizing inrush currents and power system fault currents, which is quite adequate, reliable, fast and computationally efficient tool. The proposed technique consists of a preprocessing unit based on discrete wavelet transform (DWT) in combination with an artificial neural network (ANN) for detecting and classifying fault currents. The DWT acts as an extractor of distinctive features in the input signals at the relay location. This information is then fed into an ANN for classifying fault and magnetizing inrush conditions. A 220/55/55 V, 50Hz laboratory transformer connected to a 380 V power system were simulated using ATP-EMTP. The DWT was implemented by using Matlab and Coiflet mother wavelet was used to analyze primary currents and generate training data. The simulated results presented clearly show that the proposed technique can accurately discriminate between magnetizing inrush and fault currents in transformer protection.

A New Approach of Wireless Network Traffic on VPN

This work presents a new approach of securing a wireless network. The configuration is focused on securing & Protecting wireless network traffic for a small network such as a home or dorm room. The security Mechanism provided both authentication, allowing only known authorized users access to the wireless network, and encryption, preventing anyone from reading the wireless traffic. The mentioned solution utilizes the open source free S/WAN software which implements the Internet Protocol Security –IPSEC. In addition to wireless components, wireless NIC in PC and wireless access point needs a machine running Linux to act as security gateway. While the current configuration assumes that the wireless PC clients are running Linux, Windows XP/VISTA/7 based machines equipped with VPN software which will allow to interface with this configuration.

Security, Securitization and Human Capital: The New Wave of Canadian Immigration Laws

This paper analyzes the linkage between migration, economic globalization and terrorism concerns. On a broad level, I analyze Canadian economic and political considerations, searching for causal relationships between political and economic actors on the one hand, and Canadian immigration law on the other. Specifically, the paper argues that there are contradictory impulses affecting state sovereignty. These impulses are are currently being played out in the field of Canadian immigration law through several proposed changes to Canada-s Immigration and Refugee Protection Act (IRPA). These changes reflect an ideological conception of sovereignty that is intrinsically connected with decision-making capacity centered on an individual. This conception of sovereign decision-making views Parliamentary debate and bureaucratic inefficiencies as both equally responsible for delaying essential decisions relating to the protection of state sovereignty, economic benefits and immigration control This paper discusses these concepts in relation to Canadian immigration policy under Canadian governments over the past twenty five years.

Information Security Risk in Financial Institutions

The history of technology and banking is examined as it relates to risk and technological determinism. It is proposed that the services that banks offer are determined by technology and that banks must adopt new technologies to be competitive. The adoption of technologies paradoxically forces the adoption of other new technologies to protect the bank from the increased risk of technology. This cycle will lead to bank examiners and regulators to focus on human behavior, not on the ever changing technology.

Moving towards Positive Security Model for Web Application Firewall

The proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch. Web Application Firewall (WAF) is an intermediate tool between web server and users that provides comprehensive protection for web application. WAF is a negative security model where the detection and prevention mechanisms are based on predefined or user-defined attack signatures and patterns. However, WAF alone is not adequate to offer best defensive system against web vulnerabilities that are increasing in number and complexity daily. This paper presents a methodology to automatically design a positive security based model which identifies and allows only legitimate web queries. The paper shows a true positive rate of more than 90% can be achieved.

Some Biochemical Changes Followed Experimental Gastric Ulceration

Gastric ulceration is a discontinuity in gastric mucosa, usually occurs due to imbalance between the gastric mucosal protective factors, that is called gastric mucosal barrier, and the aggressive factors, to which the mucosa is exposed. This study was carried out on sixty male Sprague-Dowely rats (12- 16 weeks old) allocated into two groups. The first control group and the second Gastric lesion group which induced by oral administration of a single daily dose of aspirin at a dose of 300 mg/kg body weight for 7 consecutive-days (6% aspirin solution will be prepared and each rat will be given 5 ml of that solution/kg body weight). Blood is collected 1, 2 and 3 weeks after induction of gastric ulceration. Significant increase in serum copper, nitric oxide, and prostaglandin E2 all over the period of experiment. Significant decrease in erythrocyte superoxide dismutase (t-SOD) activities, serum (calcium, phosphorus, glucose and insulin) levels. Non-significant changes in serum sodium and potassium levels are obtained.