Abstract: Day by day technology increases and problems
associated with this technology also increase. Several researches
were carried out to investigate the deployment of such material safely
in geotechnical engineering in particular and civil engineering in
general. However, different types of waste material have such as
cement duct, fly ash and slag been proven to be suitable in several
applications. In this research cement dust mixed with different
percentages of sand will be used in some civil engineering
application as will be explained later in this paper throughout filed
and laboratory test. The used mixer (waste material with sand) prove
high performance, durability to environmental condition, low cost
and high benefits. At higher cement dust ratio, small cement ratio is
valuable for compressive strength and permeability. Also at small
cement dust ratio higher cement ratio is valuable for compressive
strength.
Abstract: In a very simple form a Mobile Agent is an independent piece of code that has mobility and autonomy behavior. One of the main advantages of using Mobile Agent in a network is - it reduces network traffic load. In an, ad hoc network Mobile Agent can be used to protect the network by using agent based IDS or IPS. Besides, to deploy dynamic software in the network or to retrieve information from network nodes Mobile Agent can be useful. But in an ad hoc network the Mobile Agent itself needs some security. Security services should be guaranteed both for Mobile Agent and for Agent Server. In this paper to protect the Mobile Agent and Agent Server in an ad hoc network we have proposed a solution which is based on Threshold Cryptography, a new vibe in the cryptographic world where trust is distributed among multiple nodes in the network.
Abstract: Least Significant Bit (LSB) technique is the earliest
developed technique in watermarking and it is also the most simple,
direct and common technique. It essentially involves embedding the
watermark by replacing the least significant bit of the image data with
a bit of the watermark data. The disadvantage of LSB is that it is not
robust against attacks. In this study intermediate significant bit (ISB)
has been used in order to improve the robustness of the watermarking
system. The aim of this model is to replace the watermarked image
pixels by new pixels that can protect the watermark data against
attacks and at the same time keeping the new pixels very close to the
original pixels in order to protect the quality of watermarked image.
The technique is based on testing the value of the watermark pixel
according to the range of each bit-plane.
Abstract: The Kowsar dam supply water for different usages
such as drinking, industrial, agricultural and aquaculture farms
usages and located next to the city of Dehdashat in Kohgiluye and
Boyerahmad province in southern Iran. There are some towns and
villages on the Kowsar dam watersheds, which Dehdasht and
Choram are the most important and populated cities in this area. The
study was undertaken to assess the status of water quality in the
urban areas of the Kowsar dam. A total of 28 water samples were
collected from 6 stations on surface water and 1 station from
groundwater on the watershed of the Kowsar dam. All the samples
were analyzed for Cd concentration using standard procedures. The
results were compared with other national and international
standards. Among the analyzed samples, as the maximum value of
cadmium (1.131 μg/L) was observed on the station 2 at the winter
2009, all the samples analyzed were within the maximum admissible
limits by the United States Environmental Protection Agency, EU,
WHO, New Zealand , Australian, Iranian, and the Indian standards.
In general results of the present study have shown that Cd mean
values of stations No. 4, 1 and 2 with 0.5135, 0.0.4733 and 0.4573
μg/L respectively are higher than the other stations . Although Cd
level of all samples and stations have had normal values but this is
an indication of pollution potential and hazards because of human
activity and waste water of towns in the areas, which can effect on
human health implications in future. This research, therefore,
recommends the government and other responsible authorities to take
suitable improving measures in the Kowsar dam watershed-s.
Abstract: The main mission of Ezilla is to provide a friendly
interface to access the virtual machine and quickly deploy the high
performance computing environment. Ezilla has been developed by
Pervasive Computing Team at National Center for High-performance
Computing (NCHC). Ezilla integrates the Cloud middleware,
virtualization technology, and Web-based Operating System (WebOS)
to form a virtual computer in distributed computing environment. In
order to upgrade the dataset and speedup, we proposed the sensor
observation system to deal with a huge amount of data in the
Cassandra database. The sensor observation system is based on the
Ezilla to store sensor raw data into distributed database. We adopt the
Ezilla Cloud service to create virtual machines and login into virtual
machine to deploy the sensor observation system. Integrating the
sensor observation system with Ezilla is to quickly deploy experiment
environment and access a huge amount of data with distributed
database that support the replication mechanism to protect the data
security.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: Rockfall is a kind of irregular geological disaster. Its
destruction time, space and movements are highly random. The impact
force is determined by the way and velocity rocks move. The
movement velocity of a rockfall depends on slope gradient of its
moving paths, height, slope surface roughness and rock shapes. For
effectively mitigate and prevent disasters brought by rockfalls, it is
required to precisely calculate the moving paths of a rockfall so as to
provide the best protective design. This paper applies Colorado
Rockfall Simulation Program (CRSP) as our study tool to discuss the
impact of slope shape and surface roughness on the moving paths of a
single rockfall. The analytical results showed that the slope, m=1:1,
acted as the threshold for rockfall bounce height on a monoclinal slight
slope. When JRC ´╝£ 1.2, movement velocity reduced and bounce
height increased as JCR increased. If slope fixed and JRC increased,
the bounce height of rocks increased gradually with reducing
movement velocity. Therefore, the analysis on the moving paths of
rockfalls with CRSP could simulate bouncing of falling rocks. By
analyzing moving paths, velocity, and bounce height of falling rocks,
we could effectively locate impact points of falling rocks on a slope.
Such analysis can be served as a reference for future disaster
prevention and control.
Abstract: This paper proposes a technique to protect against
email bombing. The technique employs a statistical approach, Naïve
Bayes (NB), and Neural Networks to show that it is possible to
differentiate between good and bad traffic to protect against email
bombing attacks. Neural networks and Naïve Bayes can be trained
by utilizing many email messages that include both input and output
data for legitimate and non-legitimate emails. The input to the model
includes the contents of the body of the messages, the subject, and
the headers. This information will be used to determine if the email
is normal or an attack email. Preliminary tests suggest that Naïve
Bayes can be trained to produce an accurate response to confirm
which email represents an attack.
Abstract: This paper constructs a four factors theoretical model of Chinese small and medium enterprises based on the “cartoon characters- reputation - enterprise marketing and management capabilities – protection of the cartoon image - institutional environment" by literature research, case studies and investigation. The empirical study show that the greatest impact on current merchandising rights income is the institutional environment friendliness, followed by marketing and management capabilities, input of character image protection and Cartoon characters- reputation through the real-time grey relational analysis, and the greatest impact on post-merchandising rights profit is Cartoon characters reputation, followed by the institutional environment friendliness, then marketing and management ability and input of character image protection through the time-delay grey relational analysis.
Abstract: The Kowsar dam supply water for different usages
such as drinking, industrial, agricultural and aquaculture farms
usages and located next to the city of Dehdashat in Kohgiluye and
Boyerahmad province in southern Iran. There are some towns and
villages on the Kowsar dam watersheds, which Dehdasht and Choram
are the most important and populated cities in this area. The study
was undertaken to assess the status of water quality in the urban areas
of the Kowsar dam. A total of 28 water samples were collected from
6 stations on surface water and 1 station from groundwater on the
watershed of the Kowsar dam. All the samples were analyzed for Ni
concentration using standard procedures. The results were compared
with other national and international standards. Among the analyzed
samples, as the maximum value of Nickel (0.01 mg/L) was observed
on the station 2 at the autumn 2010, all the samples analyzed were
within the maximum admissible limits by the United States
Environmental Protection Agency, EU, WHO and the Iranian. In
general results of the present study have shown that a Ni mean value
of station No. 2 with 0.006 mg/L is higher than the other stations. Ni
level of all samples and stations have had normal values and this is an
indication of pollution potential and hazards because of human
activity and waste water of towns in the areas, which can effect on
human health implications in future. This research, therefore,
recommends the government and other responsible authorities to take
suitable improving measures in the Kowsar dam watersheds.
Abstract: Bicycle usage for exercise, recreation, and commuting
to work in Australia shows that pedal cycling is the fourth most
popular activity with 10.6% increase in participants between 2001
and 2007. As with other means of transport, accident and injury
becomes common although mandatory bicycle helmet wearing has
been introduced. The research aims to develop a face surrogate made
of sandwich of rigid foam and rubber sheets to represent human
facial bone under blunt impact. The facial surrogate will serve as an
important test device for further development of facial-impact
protection for cyclist. A test procedure was developed to simulate the
energy of impact and record data to evaluate the effect of impact on
facial bones. Drop tests were performed to establish a suitable
combination of materials. It was found that the sandwich structure of
rigid extruded-polystyrene foam (density of 40 kg/m3 with a pattern
of 6-mm-holes), Neoprene rubber sponge, and Abrasaflex rubber
backing, had impact characteristics comparable to that of human
facial bone. In particular, the foam thickness of 30 mm and 25 mm
was found suitable to represent human zygoma (cheekbone) and
maxilla (upper-jaw bone), respectively.
Abstract: Medical images require special safety and confidentiality because critical judgment is done on the information provided by medical images. Transmission of medical image via internet or mobile phones demands strong security and copyright protection in telemedicine applications. Here, highly secured and robust watermarking technique is proposed for transmission of image data via internet and mobile phones. The Region of Interest (ROI) and Non Region of Interest (RONI) of medical image are separated. Only RONI is used for watermark embedding. This technique results in exact recovery of watermark with standard medical database images of size 512x512, giving 'correlation factor' equals to 1. The correlation factor for different attacks like noise addition, filtering, rotation and compression ranges from 0.90 to 0.95. The PSNR with weighting factor 0.02 is up to 48.53 dBs. The presented scheme is non blind and embeds hospital logo of 64x64 size.
Abstract: Nanotechnology is the science of creating, using and
manipulating objects which have at least one dimension in range of
0.1 to 100 nanometers. In other words, nanotechnology is
reconstructing a substance using its individual atoms and arranging
them in a way that is desirable for our purpose.
The main reason that nanotechnology has been attracting
attentions is the unique properties that objects show when they are
formed at nano-scale. These differing characteristics that nano-scale
materials show compared to their nature-existing form is both useful
in creating high quality products and dangerous when being in
contact with body or spread in environment.
In order to control and lower the risk of such nano-scale particles,
the main following three topics should be considered:
1) First of all, these materials would cause long term diseases that
may show their effects on body years after being penetrated in human
organs and since this science has become recently developed in
industrial scale not enough information is available about their
hazards on body.
2) The second is that these particles can easily spread out in
environment and remain in air, soil or water for very long time,
besides their high ability to penetrate body skin and causing new
kinds of diseases.
3) The third one is that to protect body and environment against
the danger of these particles, the protective barriers must be finer than
these small objects and such defenses are hard to accomplish.
This paper will review, discuss and assess the risks that human and
environment face as this new science develops at a high rate.
Abstract: A CFD study on heat flux reduction in hypersonic flow with opposing jet has been conducted. Flowfield parameters, reattachment point position, surface pressure distributions and heat flux distributions are obtained and validated with experiments. The physical mechanism of heat reduction has been analyzed. When the opposing jet blows, the freestream is blocked off, flows to the edges and not interacts with the surface to form aerodynamic heating. At the same time, the jet flows back to form cool recirculation region, which reduces the difference in temperature between the surface and the nearby gas, and then reduces the heat flux. As the pressure ratio increases, the interface between jet and freestream is gradually pushed away from the surface. Larger the total pressure ratio is, lower the heat flux is. To study the effect of the intensity of opposing jet more reasonably, a new parameter RPA has been introduced by combining the flux and the total pressure ratio. The study shows that the same shock wave position and total heat load can be obtained with the same RPA with different fluxes and the total pressures, which means the new parameter could stand for the intensity of opposing jet and could be used to analyze the influence of opposing jet on flow field and aerodynamic heating.
Abstract: Cyber attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber attacks and their more complicated methods have created a new concept: active cyber defense (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defense. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defense, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.
Abstract: Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.
Abstract: As the disfunctions of the information society and
social development progress, intrusion problems such as malicious
replies, spam mail, private information leakage, phishing, and
pharming, and side effects such as the spread of unwholesome
information and privacy invasion are becoming serious social
problems. Illegal access to information is also becoming a problem as
the exchange and sharing of information increases on the basis of the
extension of the communication network. On the other hand, as the
communication network has been constructed as an international,
global system, the legal response against invasion and cyber-attack
from abroad is facing its limit. In addition, in an environment where
the important infrastructures are managed and controlled on the basis
of the information communication network, such problems pose a
threat to national security. Countermeasures to such threats are
developed and implemented on a yearly basis to protect the major
infrastructures of information communication. As a part of such
measures, we have developed a methodology for assessing the
information protection level which can be used to establish the
quantitative object setting method required for the improvement of the
information protection level.
Abstract: Environmental considerations have become an integral part of developmental thinking and decision making in many countries. It is growing rapidly in importance as a discipline of its own. Preventive approaches have been used at the evolutional process of environmental management as a broad and dynamic system for dealing with pollution and environmental degradation. In this regard, Environmental Assessment as an activity for identification and prediction of project’s impacts carried out in the world and its legal significance dates back to late 1960. In Iran, according to the Article 2 of Environmental Protection Act, Environmental Impact Assessment (EIA) should be prepared for seven categories of project. This article has been actively implementing by Department of Environment at 1997. World Bank in 1989 attempted to introducing application of Environmental Assessment for making decision about projects which are required financial assistance in developing countries. So, preparing EIA for obtaining World Bank loan was obligated. Alborz Project is one of the World Bank Projects in Iran which is environmentally significant. Seven out of ten W.B safeguard policies were considered at this project. In this paper, Alborz project, objectives, safeguard policies and role of environmental management will be elaborated
Abstract: Atmospheric plasma is emerging as a promising
technology for many industrial sectors, because of its ecological and
economic advantages respect to the traditional production processes.
For textile industry, atmospheric plasma is becoming a valid
alternative to the conventional wet processes, but the plasma
machines realized so far do not allow the treatment of fibrous
mechanically weak material.
Novel atmospheric plasma machine for industrial applications,
developed by VenetoNanotech SCpA in collaboration with Italian
producer of corona equipment ME.RO SpA is presented. The main
feature of this pre-industrial scale machine is the possibility of the inline
plasma treatment of delicate fibrous substrates such as fibre
sleeves, for example wool tops, cotton fibres, polymeric tows,
mineral fibers and so on, avoiding burnings and disruption of the
faint materials.
Abstract: The aim of this work was to study the in vitro effects
of δ-lactam 1 and its 4-chlorophenyl derivative 2, on the proliferative
responses of human lymphocytes and Th1 and Th2 cytokine
secretion. The possible protective role of vitamin E on intracellular
stress oxidative induced by these compounds was also investigated.
Peripheral blood lymphocytes were isolated using differential
centrifugation on a density gradient of Histopaque. They were
cultured with mitogen concanavalin A, vitamin E (10 μM) and with
different concentrations of the compounds 1 and 2 (0.1 to 10 μM).
Proliferation (MTT assay), IL-2, INFγ and IL-4 (Elisa kits),
intracellular superoxide anion were determined. 1 and 2 were
immunostimulant and increased cytokine secretion with a shift away
from Th1 response to Th2. These properties were however
accompanied by an increase in intracellular oxidative stress. The
presence of vitamin E exhibited protective effects by reducing δ-
lactam-induced superoxide anion generation in lymphocytes.