Abstract: In this paper we analyze the application of a formal proof system to the discrete logarithm problem used in publickey cryptography. That means, we explore a computer verification of the ElGamal encryption scheme with the formal proof system Isabelle/HOL. More precisely, the functional correctness of this algorithm is formally verified with computer support. Besides, we present a formalization of the DSA signature scheme in the Isabelle/HOL system. We show that this scheme is correct what is a necessary condition for the usefulness of any cryptographic signature scheme.
Abstract: Text Mining is around applying knowledge discovery techniques to unstructured text is termed knowledge discovery in text (KDT), or Text data mining or Text Mining. In Neural Network that address classification problems, training set, testing set, learning rate are considered as key tasks. That is collection of input/output patterns that are used to train the network and used to assess the network performance, set the rate of adjustments. This paper describes a proposed back propagation neural net classifier that performs cross validation for original Neural Network. In order to reduce the optimization of classification accuracy, training time. The feasibility the benefits of the proposed approach are demonstrated by means of five data sets like contact-lenses, cpu, weather symbolic, Weather, labor-nega-data. It is shown that , compared to exiting neural network, the training time is reduced by more than 10 times faster when the dataset is larger than CPU or the network has many hidden units while accuracy ('percent correct') was the same for all datasets but contact-lences, which is the only one with missing attributes. For contact-lences the accuracy with Proposed Neural Network was in average around 0.3 % less than with the original Neural Network. This algorithm is independent of specify data sets so that many ideas and solutions can be transferred to other classifier paradigms.
Abstract: Assessment of IEP (Individual Education Plan) is an
important stage in the area of special education. This paper deals
with this problem by introducing computer software which process
the data gathered from application of IEP. The software is intended
to be used by special education institution in Turkey and allows
assessment of school and family trainings. The software has a user
friendly interface and its design includes graphical developer tools.
Abstract: Knowledge of factors, which influence stress and its
distribution, is of key importance to the successful production of
durable restorations. One of this is the marginal geometry. The
objective of this study was to evaluate, by finite element analysis
(FEA), the influence of different marginal designs on the stress
distribution in teeth prepared for cast metal crowns. Five margin
designs were taken into consideration: shoulderless, chamfer,
shoulder, sloped shoulder and shoulder with bevel. For each kind of
preparation three dimensional finite element analyses were initiated.
Maximal equivalent stresses were calculated and stress patterns were
represented in order to compare the marginal designs. Within the
limitation of this study, the shoulder and beveled shoulder margin
preparations of the teeth are preferred for cast metal crowns from
biomechanical point of view.
Abstract: Support Vector Machine (SVM) is a statistical
learning tool developed to a more complex concept of
structural risk minimization (SRM). In this paper, SVM is
applied to signal detection in communication systems in the
presence of channel noise in various environments in the form
of Rayleigh fading, additive white Gaussian background noise
(AWGN), and interference noise generalized as additive color
Gaussian noise (ACGN). The structure and performance of
SVM in terms of the bit error rate (BER) metric is derived and
simulated for these advanced stochastic noise models and the
computational complexity of the implementation, in terms of
average computational time per bit, is also presented. The
performance of SVM is then compared to conventional binary
signaling optimal model-based detector driven by binary
phase shift keying (BPSK) modulation. We show that the
SVM performance is superior to that of conventional matched
filter-, innovation filter-, and Wiener filter-driven detectors,
even in the presence of random Doppler carrier deviation,
especially for low SNR (signal-to-noise ratio) ranges. For
large SNR, the performance of the SVM was similar to that of
the classical detectors. However, the convergence between
SVM and maximum likelihood detection occurred at a higher
SNR as the noise environment became more hostile.
Abstract: The article presents findings from the study and
analysis of the results of an experimental programme focused on the
production of concrete and fibre reinforced concrete in which natural
aggregate has been substituted with brick or concrete recyclate. The
research results are analyzed to monitor the effect of mechanicalphysical
characteristics on the durability properties of tested
cementitious composites. The key parts of the fibre reinforced
concrete mix are the basic components: aggregates – recyclate,
cement, fly ash, water and fibres. Their specific ratios and the
properties of individual components principally affect the resulting
behaviour of fresh fibre reinforced concrete and the characteristics of
the final product. The article builds on the sources dealing with the
use of recycled aggregates from construction and demolition waste in
the production of fibre reinforced concrete. The implemented
procedure of testing the composite contributes to the building
sustainability in environmental engineering.
Abstract: Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.
Abstract: This study examines appearances of brand placement
as an alternative communication strategy in television series by
focusing on Yalan Dünya which is one of the most popular television
series in Turkey. Consequently, this study has a descriptive research
design and quantitative content analysis method is used in order to
analyze frequency and time data of brand placement appearances in
first 3 seasons of Yalan Dünya with 16 episodes.
Analysis of brand placement practices in Yalan Dünya is dealt in
three categories: episode-based analysis, season-based analysis and
comparative analysis. At the end, brand placement practices in Yalan
Dünya are evaluated in terms of type, form, duration and legal
arrangements.
As a result of this study, it is seen that brand placement plays a
determinant role in Yalan Dünya content. Also, current legal
arrangements make brand placement closer to other traditional
communication strategies instead of differing brand placement from
them distinctly.
Abstract: Homogeneous Charge Compression (HCCI) Ignition technology has been around for a long time, but has recently received renewed attention and enthusiasm. This paper deals with experimental investigations of HCCI engine using hydrous methanol as a primary fuel and Dimethyl Ether (DME) as an ignition improver. A regular diesel engine has been modified to work as HCCI engine for this investigation. The hydrous methanol is inducted and DME is injected into a single cylinder engine. Hence, hydrous methanol is used with 15% water content in HCCI engine and its performance and emission behavior is documented. The auto-ignition of Methanol is enabled by DME. The quantity of DME varies with respect to the load. In this study, the experiments are conducted independently and the effect of the hydrous methanol on the engine operating limit, heat release rate and exhaust emissions at different load conditions are investigated. The investigation also proves that the Hydrous Methanol with DME operation reduces the oxides of Nitrogen and smoke to an extreme low level which is not possible by the direct injection CI engine. Therefore, it is beneficial to use hydrous methanol-DME HCCI mode while using hydrous methanol in internal Combustion Engines.
Abstract: The purpose of this study was to investigate the effect
of combining Real Experimentation (RE) With Virtual
Experimentation (VE) on students- conceptual understanding of
photo electric effect. To achieve this, a pre–post comparison study
design was used that involved 46 undergraduate students. Two
groups were set up for this study. Participants in the control group
used RE to learn photo electric effect, whereas, participants in the
experimental group used RE in the first part of the curriculum and
VE in another part. Achievement test was given to the groups
before and after the application as pre-test and post test. The
independent samples t- test, one way Anova and Tukey HSD test
were used for testing the data obtained from the study.
According to the results of analyzes, the experimental group
was found more successful than the control group.
Abstract: At present, increased concerns about global
environmental problems have magnified the importance of
sustainability management. To move towards sustainability,
companies need to look at everything from a holistic perspective in
order to understand the interconnections between economic growth
and environmental and social sustainability. This paper aims to gain
an understanding of key determinants that drive sustainability
management and barriers that hinder its development. It employs
semi-structured interviews with key informants, site observation and
documentation. The informants are production, marketing and
environmental managers of the leading wine producer, which aims to
become an Asia-s leader in wine & wine based products. It is found
that corporate image and top management leadership are the primary
factors influencing the adoption of sustainability management. Lack
of environmental knowledge and inefficient communication are
identified as barriers.
Abstract: Unlike Christianity and Buddhism, Islam, being one
of the three universal world religions, actively penetrates into
people-s everyday life. The main reason for this is that in Islam the
religion and ideology, philosophy, religious organizations and state
bodies are closely interrelated. In order to analyze the state of being
of interrelations of religion and civil society in Kazakhstan, it is
necessary to study Islam and its relations with spiritual culture of the
society. According to the Constitution of the Republic of Kazakhstan
the religion is separated from the state, i.e. each performs its own
function without interfering into each other-s affairs. The right of the
citizens of our republic to freedom of thinking and faith is based on
the Constitution of the RK, Civil Code, Law “On freedom of faith
and religious unions in the Republic of Kazakhstan".
Legislatively secured separation of the mosque and church from
the state does not mean that religion has no influence on the latter.
The state, consisting of citizens with their own beliefs, including
religious ones, cannot be isolated from the influence of religion.
Nowadays it is commonly accepted that it is not possible to
understand and forecast key social processes without taking into
account the religious factor.
Abstract: This paper presents a boarding on biometric
authentication through the Keystrokes Dynamics that it intends to
identify a person from its habitual rhythm to type in conventional
keyboard. Seven done experiments: verifying amount of prototypes,
threshold, features and the variation of the choice of the times of the
features vector. The results show that the use of the Keystroke
Dynamics is simple and efficient for personal authentication, getting
optimum resulted using 90% of the features with 4.44% FRR and 0%
FAR.
Abstract: Water is the key of national development. Wherever a spring has been dried out or a river has changed its course, the area-s people have migrated and have been scattered and the area-s civilization has lost its brilliance. Today, air pollution, global warming and ozone layer damage are as the problems of countries, but certainly in the next decade the shortage and pollution of waters will be important issues of the world. The polluted waters are more dangerous in when they are used in agriculture. Because they infect plants and these plants are used in human and livestock consumption in food chain. With the increasing population growth and after that, the increase need to facilities and raw materials, human beings has started to do haste actions and wanted or unwanted destroyed his life basin. They try to overuse and capture his environment extremely, instead of having futurism approach in sustainable use of nature. This process includes Zayanderood recession, and caused its pollution after the transition from industrial and urban areas. Zayandehrood River in Isfahan is a vital artery of a living ecosystem. Now is the location of disposal waste water of many cities, villages and existing industries. The central area of the province is an important industrial place, and its environmental situation has reached a critical stage. Not only a large number of pollution-generating industries are active in the city limits, but outside of the city and adjacent districts Zayandehrood River, heavy industries like steel, Mobarakeh Steel and other tens great units pollute wild life. This article tries to study contaminant sources of Zayanderood and their severity, and determine and discuss the share of each of these resources by major industrial centers located in areas. At the end, we represent suitable strategy.
Abstract: Semantic Web Technologies enable machines to
interpret data published in a machine-interpretable form on the web.
At the present time, only human beings are able to understand the
product information published online. The emerging semantic Web
technologies have the potential to deeply influence the further
development of the Internet Economy. In this paper we propose a
scenario based research approach to predict the effects of these new
technologies on electronic markets and business models of traders
and intermediaries and customers. Over 300 million searches are
conducted everyday on the Internet by people trying to find what
they need. A majority of these searches are in the domain of
consumer ecommerce, where a web user is looking for something to
buy. This represents a huge cost in terms of people hours and an
enormous drain of resources. Agent enabled semantic search will
have a dramatic impact on the precision of these searches. It will
reduce and possibly eliminate information asymmetry where a better
informed buyer gets the best value. By impacting this key
determinant of market prices semantic web will foster the evolution
of different business and economic models. We submit that there is a
need for developing these futuristic models based on our current
understanding of e-commerce models and nascent semantic web
technologies. We believe these business models will encourage
mainstream web developers and businesses to join the “semantic web
revolution."
Abstract: Socioeconomic stability and development of a
country, can be describe by housing affordability. It is aimed to
ensure the housing provided as one of the key factors that is
affordable by every income earner group whether low-income,
middle income and high income group. This research carried out is to
find out affordability of home ownership level for first medium cost
landed-house by the middle-income group in Selangor, Malaysia. It is
also hope that it could be seen as able to contribute to the knowledge
and understanding on housing affordability level for the middleincome
group and variables that influenced the medium income
group-s ability to own first medium-cost houses.
Abstract: When architecting an application, key nonfunctional requirements such as performance, scalability, availability and security, which influence the architecture of the system, are some times not adequately addressed. Performance of the application may not be looked at until there is a concern. There are several problems with this reactive approach. If the system does not meet its performance objectives, the application is unlikely to be accepted by the stakeholders. This paper suggests an approach for performance modeling for web based J2EE and .Net applications to address performance issues early in the development life cycle. It also includes a Performance Modeling Case Study, with Proof-of-Concept (PoC) and implementation details for .NET and J2EE platforms.
Abstract: Guaranteeing the availability of the required parts at
the scheduled time represents a key logistical challenge. This is
especially important when several parts are required together. This
article describes a tool that supports the positioning in the area of
conflict between low stock costs and a high service level for a
consumer.
Abstract: Cryptographic algorithms play a crucial role in the
information society by providing protection from unauthorized
access to sensitive data. It is clear that information technology will
become increasingly pervasive, Hence we can expect the emergence
of ubiquitous or pervasive computing, ambient intelligence. These
new environments and applications will present new security
challenges, and there is no doubt that cryptographic algorithms and
protocols will form a part of the solution. The efficiency of a public
key cryptosystem is mainly measured in computational overheads,
key size and bandwidth. In particular the RSA algorithm is used in
many applications for providing the security. Although the security
of RSA is beyond doubt, the evolution in computing power has
caused a growth in the necessary key length. The fact that most chips
on smart cards can-t process key extending 1024 bit shows that there
is need for alternative. NTRU is such an alternative and it is a
collection of mathematical algorithm based on manipulating lists of
very small integers and polynomials. This allows NTRU to high
speeds with the use of minimal computing power. NTRU (Nth degree
Truncated Polynomial Ring Unit) is the first secure public key
cryptosystem not based on factorization or discrete logarithm
problem. This means that given sufficient computational resources
and time, an adversary, should not be able to break the key. The
multi-party communication and requirement of optimal resource
utilization necessitated the need for the present day demand of
applications that need security enforcement technique .and can be
enhanced with high-end computing. This has promoted us to develop
high-performance NTRU schemes using approaches such as the use
of high-end computing hardware. Peer-to-peer (P2P) or enterprise
grids are proven as one of the approaches for developing high-end
computing systems. By utilizing them one can improve the
performance of NTRU through parallel execution. In this paper we
propose and develop an application for NTRU using enterprise grid
middleware called Alchemi. An analysis and comparison of its
performance for various text files is presented.
Abstract: This paper evaluate the multilevel modulation for
different techniques such as amplitude shift keying (M-ASK), MASK,
differential phase shift keying (M-ASK-Bipolar), Quaternary
Amplitude Shift Keying (QASK) and Quaternary Polarization-ASK
(QPol-ASK) at a total bit rate of 107 Gbps. The aim is to find a costeffective
very high speed transport solution. Numerical investigation
was performed using Monte Carlo simulations. The obtained results
indicate that some modulation formats can be operated at 100Gbps
in optical communication systems with low implementation effort
and high spectral efficiency.