Abstract: As the number of networked computers grows,
intrusion detection is an essential component in keeping networks
secure. Various approaches for intrusion detection are currently
being in use with each one has its own merits and demerits. This
paper presents our work to test and improve the performance of a
new class of decision tree c-fuzzy decision tree to detect intrusion.
The work also includes identifying best candidate feature sub set to
build the efficient c-fuzzy decision tree based Intrusion Detection
System (IDS). We investigated the usefulness of c-fuzzy decision
tree for developing IDS with a data partition based on horizontal
fragmentation. Empirical results indicate the usefulness of our
approach in developing the efficient IDS.
Abstract: Students with high level skills are in demand, especially in scare skill environments. If universities wish to be successful and competitive, its students need to be adequately equipped with the necessary tools. Work Integrated Learning (WIL) is an essential component of the education of a student. The relevance of higher education should be assessed in terms of how it meets the needs of society and the world of work in a global economy. This paper demonstrates how to use Habermas's theory of communicative action to reflect on students- perceptions on their integration in the work environment to achieve social integration and financial justification. Interpretive questionnaires are used to determine the students- view of how they are integrated into society, and contributing to the economy. This paper explores the use of Habermas-s theory of communicative action to give theoretical and methodological guidance for the practice of social findings obtained in this inquiry.
Abstract: Functional near infrared spectroscopy (fNIRS) is a
practical non-invasive optical technique to detect characteristic of
hemoglobin density dynamics response during functional activation of
the cerebral cortex. In this paper, fNIRS measurements were made in
the area of motor cortex from C4 position according to international
10-20 system. Three subjects, aged 23 - 30 years, were participated in
the experiment.
The aim of this paper was to evaluate the effects of different motor
activation tasks of the hemoglobin density dynamics of fNIRS signal.
The chaotic concept based on deterministic dynamics is an important
feature in biological signal analysis. This paper employs the chaotic
properties which is a novel method of nonlinear analysis, to analyze
and to quantify the chaotic property in the time series of the
hemoglobin dynamics of the various motor imagery tasks of fNIRS
signal. Usually, hemoglobin density in the human brain cortex is
found to change slowly in time. An inevitable noise caused by various
factors is to be included in a signal. So, principle component analysis
method (PCA) is utilized to remove high frequency component. The
phase pace is reconstructed and evaluated the Lyapunov spectrum, and
Lyapunov dimensions. From the experimental results, it can be
conclude that the signals measured by fNIRS are chaotic.
Abstract: Automatic reusability appraisal is helpful in
evaluating the quality of developed or developing reusable software
components and in identification of reusable components from
existing legacy systems; that can save cost of developing the
software from scratch. But the issue of how to identify reusable
components from existing systems has remained relatively
unexplored. In this research work, structural attributes of software
components are explored using software metrics and quality of the
software is inferred by different Neural Network based approaches,
taking the metric values as input. The calculated reusability value
enables to identify a good quality code automatically. It is found that
the reusability value determined is close to the manual analysis used
to be performed by the programmers or repository managers. So, the
developed system can be used to enhance the productivity and
quality of software development.
Abstract: In this paper sensitivity analysis is performed for
reliability evaluation of power systems. When examining the
reliability of a system, it is useful to recognize how results
change as component parameters are varied. This knowledge
helps engineers to understand the impact of poor data, and
gives insight on how reliability can be improved. For these
reasons, a sensitivity analysis can be performed. Finally, a real
network was used for testing the presented method.
Abstract: In this paper the supersonic ejectors are
experimentally and analytically studied. Ejector is a device that
uses the energy of a fluid to move another fluid. This device works
like a vacuum pump without usage of piston, rotor or any other
moving component. An ejector contains an active nozzle, a passive
nozzle, a mixing chamber and a diffuser. Since the fluid viscosity
is large, and the flow is turbulent and three dimensional in the
mixing chamber, the numerical methods consume long time and
high cost to analyze the flow in ejectors. Therefore this paper
presents a simple analytical method that is based on the precise
governing equations in fluid mechanics. According to achieved
analytical relations, a computer code has been prepared to analyze
the flow in different components of the ejector. An experiment has
been performed in supersonic regime 1.5
Abstract: Requirements management is critical to software
delivery success and project lifecycle. Requirements management
and their traceability provide assistance for many software
engineering activities like impact analysis, coverage analysis,
requirements validation and regression testing. In addition
requirements traceability is the recognized component of many
software process improvement initiatives. Requirements traceability
also helps to control and manage evolution of a software system.
This paper aims to provide an evaluation of current requirements
management and traceability tools. Management and test managers
require an appropriate tool for the software under test. We hope,
evaluation identified here will help to select the efficient and
effective tool.
Abstract: In this paper a new fast simplification method is
presented. Such method realizes Karnough map with large
number of variables. In order to accelerate the operation of the
proposed method, a new approach for fast detection of group
of ones is presented. Such approach implemented in the
frequency domain. The search operation relies on performing
cross correlation in the frequency domain rather than time one.
It is proved mathematically and practically that the number of
computation steps required for the presented method is less
than that needed by conventional cross correlation. Simulation
results using MATLAB confirm the theoretical computations.
Furthermore, a powerful solution for realization of complex
functions is given. The simplified functions are implemented
by using a new desigen for neural networks. Neural networks
are used because they are fault tolerance and as a result they
can recognize signals even with noise or distortion. This is
very useful for logic functions used in data and computer
communications. Moreover, the implemented functions are
realized with minimum amount of components. This is done
by using modular neural nets (MNNs) that divide the input
space into several homogenous regions. Such approach is
applied to implement XOR function, 16 logic functions on one
bit level, and 2-bit digital multiplier. Compared to previous
non- modular designs, a clear reduction in the order of
computations and hardware requirements is achieved.
Abstract: This work presents a new approach of securing a
wireless network. The configuration is focused on securing &
Protecting wireless network traffic for a small network such as a
home or dorm room. The security Mechanism provided both
authentication, allowing only known authorized users access to the
wireless network, and encryption, preventing anyone from reading
the wireless traffic. The mentioned solution utilizes the open source
free S/WAN software which implements the Internet Protocol
Security –IPSEC. In addition to wireless components, wireless NIC
in PC and wireless access point needs a machine running Linux to act
as security gateway. While the current configuration assumes that the
wireless PC clients are running Linux, Windows XP/VISTA/7 based
machines equipped with VPN software which will allow to interface
with this configuration.
Abstract: The genus Fumaria L. (Papaveraceae) in Iran
comprises 8 species with a vast medicinal use in Asian folk
medicine. These herbs are considered to be useful in the
treatment of gastrointestinal disease and skin disorders.
Antioxidant activities of alkaloids and phenolic extracts of
these species had been studied previously. These species are:
F. officinalis, F. parviflora, F. asepala, F. densiflora, F.
schleicheri, F. vaillantii and F. indica. More than 50
populations of Fumaria species were sampled from nature. In
this study different fatty acids are extracted. Their picks were
recorded by GC technique. This species contain some kind of
fatty acids with antioxidant effects. A part of these lipids are
phospholipids. As these are unsaturated fatty acids they may
have industrial use as natural additive to cosmetics, dermal
and oral medicines. The presences of different materials are
discussed. Our studies for antioxidant effects of these
substances are continued.
Abstract: The performance of high-resolution schemes is investigated for unsteady, inviscid and compressible multiphase flows. An Eulerian diffuse interface approach has been chosen for the simulation of multicomponent flow problems. The reduced fiveequation and seven equation models are used with HLL and HLLC approximation. The authors demonstrated the advantages and disadvantages of both seven equations and five equations models studying their performance with HLL and HLLC algorithms on simple test case. The seven equation model is based on two pressure, two velocity concept of Baer–Nunziato [10], while five equation model is based on the mixture velocity and pressure. The numerical evaluations of two variants of Riemann solvers have been conducted for the classical one-dimensional air-water shock tube and compared with analytical solution for error analysis.
Abstract: This paper focuses on a critical component of the situational awareness (SA), the neural control of depth flight of an autonomous underwater vehicle (AUV). Constant depth flight is a challenging but important task for AUVs to achieve high level of autonomy under adverse conditions. With the SA strategy, we proposed a multirate neural control of an AUV trajectory using neural network model reference controller for a nontrivial mid-small size AUV "r2D4" stochastic model. This control system has been demonstrated and evaluated by simulation of diving maneuvers using software package Simulink. From the simulation results it can be seen that the chosen AUV model is stable in the presence of high noise, and also can be concluded that the fast SA of similar AUV systems with economy in energy of batteries can be asserted during the underwater missions in search-and-rescue operations.
Abstract: The “conveyor belt" as a product represents a
complex high performance component with a wide range of different
applications. Further development of these highly complex
components demands an integration of new technologies and new
enhanced materials. In this context nanostructured fillers appear to
have a more promising effect on the performance of the conveyor
belt composite than conventional micro-scaled fillers.
Within the project “DotTrans" nanostructured fillers, for example
silicon dioxide, are used to optimize performance parameters of
conveyor belt systems. The objective of the project includes
operating parameters like energy consumption or friction
characteristics as well as adaptive parameters like cut or wear
resistance.
Abstract: It has been defined that the “network is the system".
This implies providing levels of service, reliability, predictability and
availability that are commensurate with or better than those that
individual computers provide today. To provide this requires
integrated network management for interconnected networks of
heterogeneous devices covering both the local campus. In this paper
we are addressing a framework to effectively deal with this issue. It
consists of components and interactions between them which are
required to perform the service fault management. A real-world
scenario is used to derive the requirements which have been applied
to the component identification. An analysis of existing frameworks
and approaches with respect to their applicability to the framework is
also carried out.
Abstract: Oilsands bitumen is an extremely important source of
energy for North America. However, due to the presence of large
molecules such as asphaltenes, the density and viscosity of the
bitumen recovered from these sands are much higher than those of
conventional crude oil. As a result the extracted bitumen has to be
diluted with expensive solvents, or thermochemically upgraded in
large, capital-intensive conventional upgrading facilities prior to
pipeline transport. This study demonstrates that globally abundant
natural zeolites such as clinoptilolite from Saint Clouds, New Mexico
and Ca-chabazite from Bowie, Arizona can be used as very effective
reagents for cracking and visbreaking of oilsands bitumen. Natural
zeolite cracked oilsands bitumen products are highly recoverable (up
to ~ 83%) using light hydrocarbons such as pentane, which indicates
substantial conversion of heavier fractions to lighter components.
The resultant liquid products are much less viscous, and have lighter
product distribution compared to those produced from pure thermal
treatment. These natural minerals impart similar effect on industrially
extracted Athabasca bitumen.
Abstract: One main drawback of intrusion detection system is the
inability of detecting new attacks which do not have known
signatures. In this paper we discuss an intrusion detection method
that proposes independent component analysis (ICA) based feature
selection heuristics and using rough fuzzy for clustering data. ICA is
to separate these independent components (ICs) from the monitored
variables. Rough set has to decrease the amount of data and get rid of
redundancy and Fuzzy methods allow objects to belong to several
clusters simultaneously, with different degrees of membership. Our
approach allows us to recognize not only known attacks but also to
detect activity that may be the result of a new, unknown attack. The
experimental results on Knowledge Discovery and Data Mining-
(KDDCup 1999) dataset.
Abstract: Recently in the field of bridges that are newly built or
repaired, fast construction is required more than ever. For these
reasons, precast prefabricated bridge that enables rapid construction is
actively discussed and studied today. In South Korea, it is called
modular bridge. Cross beam is an integral component of modular
bridge. It functions for load distribution, reduction of bending
moment, resistance of horizontal strength on lateral upper structure. In
this study, the structural characteristics of domestic and foreign cross
beam types were compared. Based on this, alternative cross beam
connection types suitable for modular bridge were selected. And
bulb-T girder specimens were fabricated with each type of connection.
The behavior of each specimen was analyzed under static loading, and
cross beam connection type which is expected to be best suited to
modular bridge proposed.
Abstract: Conventional WBL is effective for meaningful student, because rote student learn by repeating without thinking or trying to understand. It is impossible to have full benefit from conventional WBL. Understanding of rote student-s intention and what influences it becomes important. Poorly designed user interface will discourage rote student-s cultivation and intention to use WBL. Thus, user interface design is an important factor especially when WBL is used as comprehensive replacement of conventional teaching. This research proposes the influencing factors that can enhance student-s intention to use the system. The enhanced TAM is used for evaluating the proposed factors. The research result points out that factors influencing rote student-s intention are Perceived Usefulness of Homepage Content Structure, Perceived User Friendly Interface, Perceived Hedonic Component, and Perceived (homepage) Visual Attractiveness.
Abstract: In this paper, the problem of stability criteria of neural networks (NNs) with two-additive time-varying delay compenents is investigated. The relationship between the time-varying delay and its lower and upper bounds is taken into account when estimating the upper bound of the derivative of Lyapunov functional. As a result, some improved delay stability criteria for NNs with two-additive time-varying delay components are proposed. Finally, a numerical example is given to illustrate the effectiveness of the proposed method.
Abstract: The log periodogram regression is widely used in empirical
applications because of its simplicity, since only a least squares
regression is required to estimate the memory parameter, d, its good
asymptotic properties and its robustness to misspecification of the
short term behavior of the series. However, the asymptotic distribution
is a poor approximation of the (unknown) finite sample distribution
if the sample size is small. Here the finite sample performance of different
nonparametric residual bootstrap procedures is analyzed when
applied to construct confidence intervals. In particular, in addition to
the basic residual bootstrap, the local and block bootstrap that might
adequately replicate the structure that may arise in the errors of the
regression are considered when the series shows weak dependence in
addition to the long memory component. Bias correcting bootstrap
to adjust the bias caused by that structure is also considered. Finally,
the performance of the bootstrap in log periodogram regression based
confidence intervals is assessed in different type of models and how
its performance changes as sample size increases.