Abstract: We propose an enhanced key management scheme
based on Key Infection, which is lightweight scheme for tiny sensors.
The basic scheme, Key Infection, is perfectly secure against node
capture and eavesdropping if initial communications after node
deployment is secure. If, however, an attacker can eavesdrop on
the initial communications, they can take the session key. We use
common neighbors for each node to generate the session key. Each
node has own secret key and shares it with its neighbor nodes. Then
each node can establish the session key using common neighbors-
secret keys and a random number. Our scheme needs only a few
communications even if it uses neighbor nodes- information. Without
losing the lightness of basic scheme, it improves the resistance against
eavesdropping on the initial communications more than 30%.
Abstract: Evaluation of educational portals is an important
subject area that needs more attention from researchers. A university
that has an educational portal which is difficult to use and interact by
teachers or students or management staff can reduce the position and
reputation of the university. Therefore, it is important to have the
ability to make an evaluation of the quality of e-services the
university provide to improve them over time.
The present study evaluates the usability of the Information
Technology Faculty portal at University of Benghazi. Two evaluation
methods were used: a questionnaire-based method and an online
automated tool-based method. The first method was used to measure
the portal's external attributes of usability (Information, Content and
Organization of the portal, Navigation, Links and Accessibility,
Aesthetic and Visual Appeal, Performance and Effectiveness and
educational purpose) from users' perspectives, while the second
method was used to measure the portal's internal attributes of
usability (number and size of HTML files, number and size of images,
load time, HTML check errors, browsers compatibility problems,
number of bad and broken links), which cannot be perceived by the
users. The study showed that some of the usability aspects have been
found at the acceptable level of performance and quality, and some
others have been found otherwise. In general, it was concluded that
the usability of IT faculty educational portal generally acceptable.
Recommendations and suggestions to improve the weakness and
quality of the portal usability are presented in this study.
Abstract: Solid waste can be considered as an urban burden or
as a valuable resource depending on how it is managed. To meet the
rising demand for energy and to address environmental concerns, a
conversion from conventional energy systems to renewable resources
is essential. For the sustainability of human civilization, an
environmentally sound and techno-economically feasible waste
treatment method is very important to treat recyclable waste. Several
technologies are available for realizing the potential of solid waste as
an energy source, ranging from very simple systems for disposing of
dry waste to more complex technologies capable of dealing with
large amounts of industrial waste. There are three main pathways for
conversion of waste material to energy: thermo chemical,
biochemical and physicochemical. This paper investigates the thermo
chemical conversion of solid waste for energy recovery. The
processes, advantages and dis-advantages of various thermo chemical
conversion processes are discussed and compared. Special attention
is given to Gasification process as it provides better solutions
regarding public acceptance, feedstock flexibility, near-zero
emissions, efficiency and security. Finally this paper presents
comparative statements of thermo chemical processes and introduces
an integrated waste management system.
Abstract: A personal estimate of a health risk may not
correspond to a scientific assessment of the health risk. Hence, there
is a need to investigate perceived health risks in the public. In this
study, a young, educated and healthy group of people from a tertiary
institute were questioned about their health concerns. Ethics
clearance was obtained and data was collected by means of a
questionnaire. 362 students participated in the study. Tobacco use,
heavy alcohol drinking, illicit drugs, unsafe sex and potential
carcinogens were perceived to be the five greatest threats to health in
this cohort. On the other hand natural health products,
unemployment, unmet contraceptive needs, family violence and
homelessness were felt to be the least perceived health risks.
Nutrition-related health risks as well as health risks due to physical
inactivity and obesity were not perceived as major health threats.
Such a study of health perceptions may guide health promotion
campaigns.
Abstract: CloudSim is a useful tool to simulate the cloud
environment. It shows the service availability, the power consumption,
and the network traffic of services on the cloud environment.
Moreover, it supports to calculate a network communication delay
through a network topology data easily. CloudSim allows inputting a
file of topology data, but it does not provide any generating process.
Thus, it needs the file of topology data generated from some other
tools. The BRITE is typical network topology generator. Also, it
supports various type of topology generating algorithms. If CloudSim
can include the BRITE, network simulation for clouds is easier than
existing version. This paper shows the potential of connection between
BRITE and CloudSim. Also, it proposes the direction to link between
them.
Abstract: To support mobility in ATM networks, a number of
technical challenges need to be resolved. The impact of handoff
schemes in terms of service disruption, handoff latency, cost
implications and excess resources required during handoffs needs to
be addressed. In this paper, a one phase handoff and route
optimization solution using reserved PVCs between adjacent ATM
switches to reroute connections during inter-switch handoff is
studied. In the second phase, a distributed optimization process is
initiated to optimally reroute handoff connections. The main
objective is to find the optimal operating point at which to perform
optimization subject to cost constraint with the purpose of reducing
blocking probability of inter-switch handoff calls for delay tolerant
traffic. We examine the relation between the required bandwidth
resources and optimization rate. Also we calculate and study the
handoff blocking probability due to lack of bandwidth for resources
reserved to facilitate the rapid rerouting.
Abstract: Efforts to secure supervisory control and data acquisition
(SCADA) systems must be supported under the guidance of
sound security policies and mechanisms to enforce them. Critical
elements of the policy must be systematically translated into a format
that can be used by policy enforcement components. Ideally, the
goal is to ensure that the enforced policy is a close reflection of
the specified policy. However, security controls commonly used to
enforce policies in the IT environment were not designed to satisfy
the specific needs of the SCADA environment. This paper presents
a language, based on the well-known XACML framework, for the
expression of authorization policies for SCADA systems.
Abstract: The drug discovery process starts with protein
identification because proteins are responsible for many functions
required for maintenance of life. Protein identification further needs
determination of protein function. Proposed method develops a
classifier for human protein function prediction. The model uses
decision tree for classification process. The protein function is
predicted on the basis of matched sequence derived features per each
protein function. The research work includes the development of a
tool which determines sequence derived features by analyzing
different parameters. The other sequence derived features are
determined using various web based tools.
Abstract: Despite the internet, which is one of the mass media
that has become quite common in recent years, the relationship of
Advertisement with Television and Cinema, which have always
drawn attention of researchers as basic media and where visual use is
in the foreground, have also become the subject of various studies.
Based on the assumption that the known fundamental effects of
advertisements on consumers are closely related to the creative
process of advertisements as well as the nature and characteristics of
the medium where they are used, these basic mass media (Television
and Cinema) and the consumer motivations of the advertisements
they broadcast have become a focus of study.
Given that the viewers of the mass media in question have shifted
from a passive position to a more active one especially in recent years
and approach contents of advertisements, as they do all contents, in a
more critical and “pitiless" manner, it is possible to say that
individuals make more use of advertisements than in the past and
combine their individual goals with the goals of the advertisements.
This study, which aims at finding out what the goals of these new
individual advertisement use are, how they are shaped by the distinct
characteristics of Television and Cinema, where visuality takes
precedence as basic mass media, and what kind of places they occupy
in the minds of consumers, has determined consumers- motivations
as: “Entertainment", “Escapism", “Play", “Monitoring/Discovery",
“Opposite Sex" and “Aspirations and Role Models".
This study intends to reveal the differences or similarities among
the needs and hence the gratifications of viewers who consume
advertisements on Television or at the Cinema, which are two basic
media where visuality is prioritized.
Abstract: At very high speeds, bubbles form in the underwater vehicles because of sharp trailing edges or of places where the local pressure is lower than the vapor pressure. These bubbles are called cavities and the size of the cavities grows as the velocity increases. A properly designed cavitator can induce the formation of a single big cavity all over the vehicle. Such a vehicle travelling in the vaporous cavity is called a supercavitating vehicle and the present research work mainly focuses on the dynamic modeling of such vehicles. Cavitation of the fins is also accounted and the effect of the same on trajectory is well explained. The entire dynamics has been developed using the state space approach and emphasis is given on the effect of size and angle of attack of the cavitator. Control law has been established for the motion of the vehicle using Non-linear Dynamic Inverse (NDI) with cavitator as the control surface.
Abstract: The 20th century has brought much development to the practice of Architecture worldwide, and technology has bridged inhabitation limits in many regions of the world with high levels of comfort and conveniences, most times at high costs to the environment. Throughout the globe, the tropical countries are being urbanized at an unprecedented rate and housing has become a major issue worldwide, in light of increased demand and lack of appropriate infra-structure and planning. Buildings and urban spaces designed in tropical cities have mainly adopted external concepts that in most cases do not fit the needs of the inhabitants living in such harsh climatic environment, and when they do, do so at high financial, environmental and cultural costs. Traditional architectural practices can provide valuable understanding on how self-reliance and autonomy of construction can be reinforced in rural-urban tropical environments. From traditional housing knowledge, it is possible to derive lessons for the development of new construction materials that are affordable, environmentally friendly, culturally acceptable and accesible to all.Specifically to the urban context, such solutions are of outmost importance, given the needs to a more democratic society, where access to housing is considered high in the agenda for development. Traditional or rural constructions are also ongoing through extensive changes eventhough they have mostly adopted climate-responsive building practices relying on local resources (with minimum embodied energy) and energy (for comfort and quality of life). It is important to note that many of these buildings can actually be called zero-energy, and hold potential answers to enable transition from high energy, high cost, low comfort urban habitations to zero/low energy habitations with high quality urban livelihood. Increasing access to modern urban lifestyels have also an effect on the aspirations from people in terms of performance, comfort and convenience in terms of their housing and the way it is produced and used. These aspirations are resulting in transitions from localresource dependent habitations- to non-local resource based highenergy urban style habitations. And such transitions are resulting in the habitations becoming increasingly unsuited to the local climatic conditions with increasing discomfort, ill-health, and increased CO2 emissions and local environmental disruption. This research studies one specific transition group in the context of 'water communities' in tropical-equatorial regions: Ribeirinhos housing typology (Amazonas, Brazil). The paper presents the results of a qualitative sustainability assessment of the housing typologies under transition, found at the Ribeirinhos communities.
Abstract: Molar excess Volumes, VE ijk and speeds of sound , uijk of 2-pyrrolidinone (i) + benzene or toluene (j) + ethanol (k) ternary mixture have been measured as a function of composition at 308.15 K. The observed speeds of sound data have been utilized to determine excess isentropic compressiblities, ( E S κ )ijk of ternary (i + j + k) mixtures. Molar excess volumes, VE ijk and excess isentropic compressibilities, ( E S κ )ijk data have fitted to the Redlich-Kister equation to calculate ternary adjustable parameters and standard deviations. The Moelywn-Huggins concept (Huggins in Polymer 12: 389-399, 1971) of connectivity between the surfaces of the constituents of binary mixtures has been extended to ternary mixtures (using the concept of a connectivity parameter of third degree of molecules, 3ξ , which inturn depends on its topology) to obtain an expression that describes well the measured VE ijk and ( E S κ )ijk data.
Abstract: MultiProtocol Label Switching (MPLS) is an
emerging technology that aims to address many of the existing issues
associated with packet forwarding in today-s Internetworking
environment. It provides a method of forwarding packets at a high
rate of speed by combining the speed and performance of Layer 2
with the scalability and IP intelligence of Layer 3. In a traditional IP
(Internet Protocol) routing network, a router analyzes the destination
IP address contained in the packet header. The router independently
determines the next hop for the packet using the destination IP
address and the interior gateway protocol. This process is repeated at
each hop to deliver the packet to its final destination. In contrast, in
the MPLS forwarding paradigm routers on the edge of the network
(label edge routers) attach labels to packets based on the forwarding
Equivalence class (FEC). Packets are then forwarded through the
MPLS domain, based on their associated FECs , through swapping
the labels by routers in the core of the network called label switch
routers. The act of simply swapping the label instead of referencing
the IP header of the packet in the routing table at each hop provides
a more efficient manner of forwarding packets, which in turn allows
the opportunity for traffic to be forwarded at tremendous speeds and
to have granular control over the path taken by a packet. This paper
deals with the process of MPLS forwarding mechanism,
implementation of MPLS datapath , and test results showing the
performance comparison of MPLS and IP routing. The discussion
will focus primarily on MPLS IP packet networks – by far the
most common application of MPLS today.
Abstract: Hydroxymethylfurfural (HMF) is formed by thermally
treating products rich in carbohydrates. HMF and other furan
derivatives are toxic.
The aim of the research was to establish the content of HMF in
gingerbread biscuits with honey and sugar syrup additives by using
three leavening agents— ammonium carbonate (NH4HCO3 and
(NH4)2CO3), baking powder, and baking soda (NaHCO3).
The content of HMF is significantly affected by the leavening
agent used. The content of HMF with honey where ammonium
carbonate was used as additive range from 5.7 to 27.3mg 100g-1, but
when sugar syrup is used the content varies from 2.3 to 7.4mg 100g-1.
When baking powder and baking soda are used as leavening agents,
the content of HMF exceeds 4mg 100g-1 in the event honey had been
added and the baking time had been longer (10 minutes at 180°C or
9 minutes at 200°C).
Abstract: We here propose improved version of elastic graph matching (EGM) as a face detector, called the multi-scale EGM (MS-EGM). In this improvement, Gabor wavelet-based pyramid reduces computational complexity for the feature representation often used in the conventional EGM, but preserving a critical amount of information about an image. The MS-EGM gives us higher detection performance than Viola-Jones object detection algorithm of the AdaBoost Haar-like feature cascade. We also show rapid detection speeds of the MS-EGM, comparable to the Viola-Jones method. We find fruitful benefits in the MS-EGM, in terms of topological feature representation for a face.
Abstract: The characterization of κ-carrageenan could provide a
better understanding of its functions in biological, medical and
industrial applications. Chemical and physical analyses of
carrageenan from seaweeds, Euchema cottonii L., were done to offer
information on its properties and the effects of Co-60 γ-irradiation on
its thermochemical characteristics. The structural and morphological
characteristics of κ-carrageenan were determined using scanning
electron microscopy (SEM) while the composition, molecular weight
and thermal properties were determined using attenuated total
reflectance Fourier transform infrared spectroscopy (ATR-FTIR), gel
permeation chromatography (GPC), thermal gravimetric analysis
(TGA) and differential scanning calorimetry (DSC). Further chemical
analysis was done using hydrogen-1 nuclear magnetic resonance (1H
NMR) and functional characteristics in terms of biocompatibility
were evaluated using cytotoxicity test.
Abstract: As the Computed Tomography(CT) requires normally
hundreds of projections to reconstruct the image, patients are exposed
to more X-ray energy, which may cause side effects such as cancer.
Even when the variability of the particles in the object is very less,
Computed Tomography requires many projections for good quality
reconstruction. In this paper, less variability of the particles in an
object has been exploited to obtain good quality reconstruction.
Though the reconstructed image and the original image have same
projections, in general, they need not be the same. In addition
to projections, if a priori information about the image is known,
it is possible to obtain good quality reconstructed image. In this
paper, it has been shown by experimental results why conventional
algorithms fail to reconstruct from a few projections, and an efficient
polynomial time algorithm has been given to reconstruct a bi-level
image from its projections along row and column, and a known sub
image of unknown image with smoothness constraints by reducing the
reconstruction problem to integral max flow problem. This paper also
discusses the necessary and sufficient conditions for uniqueness and
extension of 2D-bi-level image reconstruction to 3D-bi-level image
reconstruction.
Abstract: A new SUZ-4 zeolite membrane with
tetraethlyammonium hydroxide as the template was fabricated on
mullite tube via hydrothermal sol-gel synthesis in a rotating
autoclave reactor. The suitable synthesis condition was SiO2:Al2O3
ratio of 21.2 for 4 days at 155 °C crystallization under autogenous
pressure. The obtained SUZ-4 possessed a high BET surface area of
396.4 m2/g, total pore volume at 2.611 cm3/g, and narrow pore size
distribution with 97 nm mean diameter and 760 nm long of needle
crystal shape. The SUZ-4 layer obtained from seeding crystallization
was thicker than that of without seeds or in situ crystallization.
Abstract: Modeling product configurations needs large amounts of knowledge about technical and marketing restrictions on the product. Previous attempts to automate product configurations concentrate on representations and management of the knowledge for specific domains in fixed and isolated computing environments. Since the knowledge about product configurations is subject to continuous change and hard to express, these attempts often failed to efficiently manage and exchange the knowledge in collaborative product development. In this paper, XML Topic Map (XTM) is introduced to represent and exchange the knowledge about product configurations in collaborative product development. A product configuration model based on XTM along with its merger and inference facilities enables configuration engineers in collaborative product development to manage and exchange their knowledge efficiently. A prototype implementation is also presented to demonstrate the proposed model can be applied to engineering information systems to exchange the product configuration knowledge.
Abstract: A great deal of research works in the field information
systems security has been based on a positivist paradigm. Applying
the reductionism concept of the positivist paradigm for information
security means missing the bigger picture and thus, the lack of holism
which could be one of the reasons why security is still overlooked,
comes as an afterthought or perceived from a purely technical
dimension. We need to reshape our thinking and attitudes towards
security especially in a complex and dynamic environment such as e-
Business to develop a holistic understanding of e-Business security in
relation to its context as well as considering all the stakeholders in
the problem area. In this paper we argue the suitability and need for
more inductive interpretive approach and qualitative research method
to investigate e-Business security. Our discussion is based on a
holistic framework of enquiry, nature of the research problem, the
underling theoretical lens and the complexity of e-Business
environment. At the end we present a research strategy for
developing a holistic framework for understanding of e-Business
security problems in the context of developing countries based on an
interdisciplinary inquiry which considers their needs and
requirements.