Abstract: A SCADA (Supervisory Control And Data
Acquisition) system is an industrial control and monitoring system for
national infrastructures. The SCADA systems were used in a closed
environment without considering about security functionality in the
past. As communication technology develops, they try to connect the
SCADA systems to an open network. Therefore, the security of the
SCADA systems has been an issue. The study of key management for
SCADA system also has been performed. However, existing key
management schemes for SCADA system such as SKE(Key
establishment for SCADA systems) and SKMA(Key management
scheme for SCADA systems) cannot support broadcasting
communication. To solve this problem, an Advanced Key
Management Architecture for Secure SCADA Communication has
been proposed by Choi et al.. Choi et al.-s scheme also has a problem
that it requires lots of computational cost for multicasting
communication. In this paper, we propose an enhanced scheme which
improving computational cost for multicasting communication with
considering the number of keys to be stored in a low power
communication device (RTU).
Abstract: In this paper, we use Generalized Hamiltonian systems approach to synchronize a modified sixth-order Chua's circuit, which generates hyperchaotic dynamics. Synchronization is obtained between the master and slave dynamics with the slave being given by an observer. We apply this approach to transmit private information (analog and binary), while the encoding remains potentially secure.
Abstract: Image compression plays a vital role in today-s
communication. The limitation in allocated bandwidth leads to
slower communication. To exchange the rate of transmission in the
limited bandwidth the Image data must be compressed before
transmission. Basically there are two types of compressions, 1)
LOSSY compression and 2) LOSSLESS compression. Lossy
compression though gives more compression compared to lossless
compression; the accuracy in retrievation is less in case of lossy
compression as compared to lossless compression. JPEG, JPEG2000
image compression system follows huffman coding for image
compression. JPEG 2000 coding system use wavelet transform,
which decompose the image into different levels, where the
coefficient in each sub band are uncorrelated from coefficient of
other sub bands. Embedded Zero tree wavelet (EZW) coding exploits
the multi-resolution properties of the wavelet transform to give a
computationally simple algorithm with better performance compared
to existing wavelet transforms. For further improvement of
compression applications other coding methods were recently been
suggested. An ANN base approach is one such method. Artificial
Neural Network has been applied to many problems in image
processing and has demonstrated their superiority over classical
methods when dealing with noisy or incomplete data for image
compression applications. The performance analysis of different
images is proposed with an analysis of EZW coding system with
Error Backpropagation algorithm. The implementation and analysis
shows approximately 30% more accuracy in retrieved image
compare to the existing EZW coding system.
Abstract: Face and facial expressions play essential roles in
interpersonal communication. Most of the current works on the facial
expression recognition attempt to recognize a small set of the
prototypic expressions such as happy, surprise, anger, sad, disgust
and fear. However the most of the human emotions are
communicated by changes in one or two of discrete features. In this
paper, we develop a facial expressions synthesis system, based on the
facial characteristic points (FCP's) tracking in the frontal image
sequences. Selected FCP's are automatically tracked using a crosscorrelation
based optical flow. The proposed synthesis system uses a
simple deformable facial features model with a few set of control
points that can be tracked in original facial image sequences.
Abstract: In this paper, the periodic surveillance scheme has
been proposed for any convex region using mobile wireless sensor
nodes. A sensor network typically consists of fixed number of
sensor nodes which report the measurements of sensed data such as
temperature, pressure, humidity, etc., of its immediate proximity
(the area within its sensing range). For the purpose of sensing an
area of interest, there are adequate number of fixed sensor
nodes required to cover the entire region of interest. It implies
that the number of fixed sensor nodes required to cover a given
area will depend on the sensing range of the sensor as well as
deployment strategies employed. It is assumed that the sensors to
be mobile within the region of surveillance, can be mounted on
moving bodies like robots or vehicle. Therefore, in our
scheme, the surveillance time period determines the number of
sensor nodes required to be deployed in the region of interest.
The proposed scheme comprises of three algorithms namely:
Hexagonalization, Clustering, and Scheduling, The first algorithm
partitions the coverage area into fixed sized hexagons that
approximate the sensing range (cell) of individual sensor node.
The clustering algorithm groups the cells into clusters, each of
which will be covered by a single sensor node. The later
determines a schedule for each sensor to serve its respective cluster.
Each sensor node traverses all the cells belonging to the cluster
assigned to it by oscillating between the first and the last cell for
the duration of its life time. Simulation results show that our
scheme provides full coverage within a given period of time using
few sensors with minimum movement, less power consumption,
and relatively less infrastructure cost.
Abstract: The paper examines the theories of media, dominant
effects and critical and cultural theories that are used to examine
media and society issues, and then apply the theories to explore the
current situation of news media in Arab societies. The research is
meant to explore the nature of media in the Arab world and the way
that modern technologies have changed the nature of the Arab public
sphere. It considers the role of an open press in promoting a more
democratic society, while recognizing the unique qualities of an Arab
culture.
Abstract: Providing authentication for the messages exchanged
between group members in addition to confidentiality is an important
issue in Secure Group communication. We develop a protocol for
Secure Authentic Communication where we address authentication
for the group communication scheme proposed by Blundo et al.
which only provides confidentiality. Authentication scheme used is a
multiparty authentication scheme which allows all the users in the
system to send and receive messages simultaneously. Our scheme is
secure against colluding malicious parties numbering fewer than k.
Abstract: I/O workload is a critical and important factor to
analyze I/O pattern and file system performance. However tracing I/O
operations on the fly distributed parallel file system is non-trivial due
to collection overhead and a large volume of data. In this paper, we
design and implement a parallel file system logging method for high
performance computing using shared memory-based multi-layer
scheme. It minimizes the overhead with reduced logging operation
response time and provides efficient post-processing scheme through
shared memory. Separated logging server can collect sequential logs
from multiple clients in a cluster through packet communication.
Implementation and evaluation result shows low overhead and high
scalability of this architecture for high performance parallel logging
analysis.
Abstract: Corporate identity, which has several advantages such
that the employees become integrated with their corporations,
corporation is distinguished from its competitors and it is recognized
by the masses, is the total of the distinctive corporate features that
and corporation has. That the information takes part in production as
a more important component than labor and capital has required that
the corporations are reorganized as information-based. Therefore,
information and its management have reached a basic and prevalent
position in having sustainable competitive advantage. Thanks to the
information management which regulates the information and makes
it reachable and available, information will be produced in line with a
specific purpose in the corporations and be used in all the corporate
processes. As an auxiliary power for increase in the economic
potential, efficiency and productivity of the corporation, corporate
identity consists of four components. These are corporate philosophy,
corporate design, corporate behavior and corporate communication.
In this study, the effects of the information management on corporate
identity are discussed from the point of these four elements.
Abstract: this paper presents a novel scheme which is capable of reducing the error rate and improves the transmission performance in the asynchronous cooperative MIMO systems. A case study of image transmission is applied to prove the efficient of scheme. The linear dispersion structure is employed to accommodate the cooperative wireless communication network in the dynamic topology of structure, as well as to achieve higher throughput than conventional space–time codes based on orthogonal designs. The LDPC encoder without girth-4 and the STBC encoder with guard intervals are respectively introduced. The experiment results show that the combined coder of LDPC-STBC with guard intervals can be the good error correcting coders and BER performance in the asynchronous cooperative communication. In the case study of image transmission, the results show that in the transmission process, the image quality which is obtained by applied combined scheme is much better than it which is not applied the scheme in the asynchronous cooperative MIMO systems.
Abstract: The main objective of this paper is to provide an efficient tool for delineating brain tumors in three-dimensional magnetic resonance images. To achieve this goal, we use basically a level-sets approach to delineating three-dimensional brain tumors. Then we introduce a compression plan of 3D brain structures based for the meshes simplification, adapted for time to the specific needs of the telemedicine and to the capacities restricted by network communication. We present here the main stages of our system, and preliminary results which are very encouraging for clinical practice.
Abstract: Article is devoted to the problem of Kazakhstan people national values in the conditions of the Republic of Kazakhstan independence. Formation of ethnos national values is viewed as the mandatory constituent of this process in contemporary conditions. The article shows the dynamics of forming socialspiritual basis of Kazakhstan people-s national values. It depicts peculiarities of interethnic relations in poly-ethnic and multiconfessional Kazakhstan. The study reviews in every detail various directions of the state social policy development in the sphere of national values. It is aimed to consolidation of the society to achieve the shared objective, i.e. building democratic and civilized state. The author discloses peculiarities of ethnos national values development using specific sources. It is underlined that renewal and modernization of Kazakhstan society represents new stage in the national value development, and its typical feature is integration process based on peoples- friendship, cultural principles of interethnic communication.
Abstract: Through inward perceptions, we intuitively expect
distributed software development to increase the risks associated with
achieving cost, schedule, and quality goals. To compound this
problem, agile software development (ASD) insists one of the main
ingredients of its success is cohesive communication attributed to
collocation of the development team. The following study identified
the degree of communication richness needed to achieve comparable
software quality (reduce pre-release defects) between distributed and
collocated teams. This paper explores the relevancy of
communication richness in various development phases and its
impact on quality. Through examination of a large distributed agile
development project, this investigation seeks to understand the levels
of communication required within each ASD phase to produce
comparable quality results achieved by collocated teams. Obviously,
a multitude of factors affects the outcome of software projects.
However, within distributed agile software development teams, the
mode of communication is one of the critical components required to
achieve team cohesiveness and effectiveness. As such, this study
constructs a distributed agile communication model (DAC-M) for
potential application to similar distributed agile development efforts
using the measurement of the suitable level of communication. The
results of the study show that less rich communication methods, in
the appropriate phase, might be satisfactory to achieve equivalent
quality in distributed ASD efforts.
Abstract: In this paper, a two-channel secure communication
using fractional chaotic systems is presented. Conditions for chaos
synchronization have been investigated theoretically by using Laplace
transform. To illustrate the effectiveness of the proposed scheme, a
numerical example is presented. The keys, key space, key selection
rules and sensitivity to keys are discussed in detail. Results show that
the original plaintexts have been well masked in the ciphertexts yet
recovered faithfully and efficiently by the present schemes.
Abstract: Voice over Internet Protocol (VoIP) is a form of voice
communication that uses audio data to transmit voice signals to the
end user. VoIP is one of the most important technologies in the
World of communication. Around, 20 years of research on VoIP,
some problems of VoIP are still remaining. During the past decade
and with growing of wireless technologies, we have seen that many
papers turn their concentration from Wired-LAN to Wireless-LAN.
VoIP over Wireless LAN (WLAN) faces many challenges due to the
loose nature of wireless network. Issues like providing Quality of
Service (QoS) at a good level, dedicating capacity for calls and
having secure calls is more difficult rather than wired LAN.
Therefore VoIP over WLAN (VoWLAN) remains a challenging
research topic. In this paper we consolidate and address major
VoWLAN issues. This research is helpful for those researchers wants
to do research in Voice over IP technology over WLAN network.
Abstract: Adapting various sensor devices to communicate
within sensor networks empowers us by providing range of
possibilities. The sensors in sensor networks need to know their
measurable belief of trust for efficient and safe communication. In this
paper, we suggested a trust model using fuzzy logic in sensor network.
Trust is an aggregation of consensus given a set of past interaction
among sensors. We applied our suggested model to sensor networks in
order to show how trust mechanisms are involved in communicating
algorithm to choose the proper path from source to destination.
Abstract: Regarding the multi-media property of internet and the facilities that can be provided for the users, the purpose of this paper is to investigate the users- behavioral patterns and the impact of internet on taboos of marriage. For this purpose a survey technique on the sample size amounted 403 students of governmental guidance schools of city of Mashhad in country of Iran were considered. The results showed, the process of using various internet environments depends on the degree of the users- familiarity with these sites. In order to clarify the effects of the Internet on the taboos of marriage, the non – internet parameters also considered to be controlled. The ttest held among the internet users and non-users, indicated that internet users possess lower taboos of marriage. Extraction of the effects of internet via considering the effects of non-internet parameters, indicate that addiction to the internet, creating a cordial atmosphere, emotional communication, and message attractive factors have significant effects on the family's traditional values.
Abstract: The objective of the paper was to understand the use
of an important element of design, namely color in a Semiotic
system. Semiotics is the study of signs and sign processes, it is often
divided into three branches namely (i) Semantics that deals with the
relation between signs and the things to which they refer to mean, (ii)
Syntactics which addresses the relations among signs in formal
structures and (iii) Pragmatics that relates between signs and its
effects on they have on the people who use them to create a plan for
an object or a system referred to as design. Cubism with its versatility
was the key design tool prevalent across the 20th century. In order to
analyze the user's understanding of interaction and appreciation of
color through the movement of Cubism, an exercise was undertaken
in Dept. of Design, IIT Guwahati. This included tasks to design a
composition using color and sign process to the theme 'Between the
Lines' on a given tessellation where the users relate their work to the
world they live in, which in this case was the college campus of IIT
Guwahati. The findings demonstrate impact of the key design
element color on the principles of visual perception based on image
analysis of specific compositions.
Abstract: GSM has undoubtedly become the most widespread
cellular technology and has established itself as one of the most
promising technology in wireless communication. The next
generation of mobile telephones had also become more powerful and
innovative in a way that new services related to the user-s location
will arise. Other than the 911 requirements for emergency location
initiated by the Federal Communication Commission (FCC) of the
United States, GSM positioning can be highly integrated in cellular
communication technology for commercial use. However, GSM
positioning is facing many challenges. Issues like accuracy,
availability, reliability and suitable cost render the development and
implementation of GSM positioning a challenging task. In this paper,
we investigate the optimal mobile position tracking means. We
employ an innovative scheme by integrating the Kalman filter in the
localization process especially that it has great tracking
characteristics. When tracking in two dimensions, Kalman filter is
very powerful due to its reliable performance as it supports
estimation of past, present, and future states, even when performing
in unknown environments. We show that enhanced position tracking
results is achieved when implementing the Kalman filter for GSM
tracking.
Abstract: Medical services are usually provided in hospitals; however, in developing country, some rural residences have fewer opportunities to access in healthcare services due to the limitation of transportation communication. Therefore, in Thailand, there are charitable organizations operating to provide medical treatments to these people by shifting the medical services to operation sites; this is commonly known as mobile medical service. Operation routing is important for the organization to reduce its transportation cost in order to focus more on other important activities; for instance, the development of medical apparatus. VRP is applied to solve the problem of high transportation cost of the studied organization with the searching techniques of saving algorithm to find the minimum total distance of operation route and satisfy available time constraints of voluntary medical staffs.