Abstract: In this paper, we explore a new scheme for filtering spoofed packets (DDOS attack) which is a combination of path fingerprint and client puzzle concepts. In this each IP packet has a unique fingerprint is embedded that represents, the route a packet has traversed. The server maintains a mapping table which contains the client IP address and its corresponding fingerprint. In ingress router, client puzzle is placed. For each request, the puzzle issuer provides a puzzle which the source has to solve. Our design has the following advantages over prior approaches, 1) Reduce the network traffic, as we place a client puzzle at the ingress router. 2) Mapping table at the server is lightweight and moderate.
Abstract: Recently T. C. Au-Yeung, C.Au, and P. C. W. Fung [2] have given the solution of the KdV equation [1] to the boundary condition , where b is a constant. We have further extended the method of [2] to find the solution of the KdV equation with asymptotic degeneracy. Via simulations we find both bright and dark Solitons (i.e. Solitons with opposite phases).
Abstract: The objective is to split a simply connected polygon
into a set of convex quadrilaterals without inserting new
boundary nodes. The presented approach consists in repeatedly
removing quadrilaterals from the polygon. Theoretical results
pertaining to quadrangulation of simply connected polygons are
derived from the usual 2-ear theorem. It produces a quadrangulation
technique with O(n) number of quadrilaterals. The
theoretical methodology is supplemented by practical results
and CAD surface segmentation.
Abstract: Empirical force fields and density functional theory
(DFT) was used to study the binding energies and structures of
methylamine on the surface of activated carbons (ACs). This is a first
step in studying the adsorption of alkyl amines on the surface of
functionalized ACs. The force fields used were Dreiding (DFF),
Universal (UFF) and Compass (CFF) models. The generalized
gradient approximation with Perdew Wang 91 (PW91) functional
was used for DFT calculations. In addition to obtaining the aminecarboxylic
acid adsorption energies, the results were used to establish
reliability of the empirical models for these systems. CFF predicted a
binding energy of -9.227 (kcal/mol) which agreed with PW91 at -
13.17 (kcal/mol), compared to DFF 0 (kcal/mol) and UFF -0.72
(kcal/mol). However, the CFF binding energies for the amine to ester
and ketone disagreed with PW91 results. The structures obtained
from all models agreed with PW91 results.
Abstract: XML files contain data which is in well formatted manner. By studying the format or semantics of the grammar it will be helpful for fast retrieval of the data. There are many algorithms which describes about searching the data from XML files. There are no. of approaches which uses data structure or are related to the contents of the document. In these cases user must know about the structure of the document and information retrieval techniques using NLPs is related to content of the document. Hence the result may be irrelevant or not so successful and may take more time to search.. This paper presents fast XML retrieval techniques by using new indexing technique and the concept of RXML. When indexing an XML document, the system takes into account both the document content and the document structure and assigns the value to each tag from file. To query the system, a user is not constrained about fixed format of query.
Abstract: The present work deals with the calculation of
transport properties of Hg0.8Cd0.2Te (MCT) semiconductor in
degenerate case. Due to their energy-band structure, this material
becomes degenerate at moderate doping densities, which are around
1015 cm-3, so that the usual Maxwell-Boltzmann approximation is
inaccurate in the determination of transport parameters. This problem
is faced by using Fermi-Dirac (F-D) statistics, and the non-parabolic
behavior of the bands may be approximated by the Kane model. The
Monte Carlo (MC) simulation is used here to determinate transport
parameters: drift velocity, mean energy and drift mobility versus
electric field and the doped densities. The obtained results are in
good agreement with those extracted from literature.
Abstract: The security of computer networks plays a strategic
role in modern computer systems. Intrusion Detection Systems (IDS)
act as the 'second line of defense' placed inside a protected
network, looking for known or potential threats in network traffic
and/or audit data recorded by hosts. We developed an Intrusion
Detection System using LAMSTAR neural network to learn patterns
of normal and intrusive activities, to classify observed system
activities and compared the performance of LAMSTAR IDS with
other classification techniques using 5 classes of KDDCup99 data.
LAMSAR IDS gives better performance at the cost of high
Computational complexity, Training time and Testing time, when
compared to other classification techniques (Binary Tree classifier,
RBF classifier, Gaussian Mixture classifier). we further reduced the
Computational Complexity of LAMSTAR IDS by reducing the
dimension of the data using principal component analysis which in
turn reduces the training and testing time with almost the same
performance.
Abstract: The theoretical investigation is carried out to describe
the effect of increase of pressure waves amplitude in clean and bubbly liquid. The goal of the work is to capture the regime of multiple magnification of acoustic and shock waves in the liquid,
which enables to get appropriate conditions to enlarge collapses of
micro-bubbles. The influence of boundary conditions and frequency
of the governing acoustic field is studied for the case of the
cylindrical acoustic resonator. It has been observed the formation of
standing waves with large amplitude at resonant frequencies. The
interaction of the compression wave with gas and vapor bubbles is
investigated for the convergent channel. It is shown theoretically that
the chemical reactions, which occur inside gas bubbles, provide additional impulse to the wave, that affect strongly on the collapses
of the vapor bubbles
Abstract: This paper in essence presents comparative
experimental data on the mechanical performance of steel and
synthetic fibre-reinforced concrete under compression, tensile split
and flexure. URW1050 steel fibre and HPP45 synthetic fibre, both
with the same concrete design mix, have been used to make cube
specimens for a compression test, cylinders for a tensile split test and
beam specimens for a flexural test. The experimental data
demonstrated steel fibre reinforced concrete to be stronger in flexure
at early stages, whilst both fibre reinforced concrete types displayed
comparatively the same performance in compression, tensile splitting
and 28-day flexural strength. In terms of post-crack controlHPP45
was preferable.
Abstract: As many scientific applications require large data processing, the importance of parallel I/O has been increasingly recognized. Collective I/O is one of the considerable features of parallel I/O and enables application programmers to easily handle their large data volume. In this paper we measured and analyzed the performance of original collective I/O and the subgroup method, the way of using collective I/O of MPI effectively. From the experimental results, we found that the subgroup method showed good performance with small data size.
Abstract: Information and communication technology (ICT) is
essential to the operation of business, and create many employment
opportunities. High volumes of students graduate in ICT however
students struggle to find job placement. A discrepancy exists between
graduate skills and industry skill requirements. To address the need
for ICT skills required, universities must create programs to meet the
demands of a changing ICT industry. This requires a partnership
between industry, universities and other stakeholders. This situation
may be viewed as a critical systems thinking problem situation as
there are various role players each with their own needs and
requirements. Jackson states a typical critical systems methods has a
pluralistic nature. This paper explores the applicability and suitability
of Maslow and Dooyeweerd to guide understanding and make
recommendations for change in ICT WIL, to foster an all-inclusive
understanding of the situation by stakeholders. The above methods
provide tools for understanding softer issues beyond the skills
required. The study findings suggest that besides skills requirements,
a deeper understanding and empowering students from being a
student to a professional need to be understood and addressed.
Abstract: The recognition of handwritten numeral is an
important area of research for its applications in post office, banks
and other organizations. This paper presents automatic recognition of
handwritten Kannada numerals based on structural features. Five
different types of features, namely, profile based 10-segment string,
water reservoir; vertical and horizontal strokes, end points and
average boundary length from the minimal bounding box are used in
the recognition of numeral. The effect of each feature and their
combination in the numeral classification is analyzed using nearest
neighbor classifiers. It is common to combine multiple categories of
features into a single feature vector for the classification. Instead,
separate classifiers can be used to classify based on each visual
feature individually and the final classification can be obtained based
on the combination of separate base classification results. One
popular approach is to combine the classifier results into a feature
vector and leaving the decision to next level classifier. This method
is extended to extract a better information, possibility distribution,
from the base classifiers in resolving the conflicts among the
classification results. Here, we use fuzzy k Nearest Neighbor (fuzzy
k-NN) as base classifier for individual feature sets, the results of
which together forms the feature vector for the final k Nearest
Neighbor (k-NN) classifier. Testing is done, using different features,
individually and in combination, on a database containing 1600
samples of different numerals and the results are compared with the
results of different existing methods.
Abstract: The deterministic quantum transfer-matrix (QTM)
technique and its mathematical background are presented. This
important tool in computational physics can be applied to a class of
the real physical low-dimensional magnetic systems described by the
Heisenberg hamiltonian which includes the macroscopic molecularbased
spin chains, small size magnetic clusters embedded in some
supramolecules and other interesting compounds. Using QTM, the
spin degrees of freedom are accurately taken into account, yielding
the thermodynamical functions at finite temperatures.
In order to test the application for the susceptibility calculations to
run in the parallel environment, the speed-up and efficiency of
parallelization are analyzed on our platform SGI Origin 3800 with
p = 128 processor units. Using Message Parallel Interface (MPI)
system libraries we find the efficiency of the code of 94% for
p = 128 that makes our application highly scalable.
Abstract: A numerical method for solving the time-independent Schrödinger equation of a particle moving freely in a three-dimensional
axisymmetric region is developed. The boundary of the region
is defined by an arbitrary analytic function. The method uses a
coordinate transformation and an expansion in eigenfunctions. The
effectiveness is checked and confirmed by applying the method to a
particular example, which is a prolate spheroid.
Abstract: VRML( The virtual reality modeling language) is a standard language used to build up 3D virtualized models. The quick development of internet technology and computer manipulation has promoted the commercialization of reality virtualization. VRML, thereof, is expected to be the most effective framework of building up virtual reality. This article has studied plans to build virtualized scenes based on the technology of virtual reality and Java programe, and introduced how to execute real-time data transactions of VRML file and Java programe by applying Script Node, in doing so we have the VRML interactivity being strengthened.
Abstract: This paper presents a recognition system for isolated
words like robot commands. It’s carried out by Time Delay Neural
Networks; TDNN. To teleoperate a robot for specific tasks as turn,
close, etc… In industrial environment and taking into account the
noise coming from the machine. The choice of TDNN is based on its
generalization in terms of accuracy, in more it acts as a filter that
allows the passage of certain desirable frequency characteristics of
speech; the goal is to determine the parameters of this filter for
making an adaptable system to the variability of speech signal and to
noise especially, for this the back propagation technique was used in
learning phase. The approach was applied on commands pronounced
in two languages separately: The French and Arabic. The results for
two test bases of 300 spoken words for each one are 87%, 97.6% in
neutral environment and 77.67%, 92.67% when the white Gaussian
noisy was added with a SNR of 35 dB.
Abstract: This article concerns with the accessibility of Business
process modelling tools (BPMo tools) and business process
modelling languages (BPMo languages). Therefore the reader will be
introduced to business process management and the authors'
motivation behind this inquiry. Afterwards, the paper will reflect
problems when applying inaccessible BPMo tools. To illustrate these
problems the authors distinguish between two different categories of
issues and provide practical examples. Finally the article will present
three approaches to improve the accessibility of BPMo tools and
BPMo languages.
Abstract: Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia signals but very few works have discussed on the issues responsible for secure data communication and its robustness improvement. The current paper has critically analyzed few such factors namely properties of spreading codes, proper signal decomposition suitable for data embedding, security provided by the key, successive bit cancellation method applied at decoder which have greater impact on the detection reliability, secure communication of significant signal under camouflage of insignificant signals etc. Based on the analysis, robust SS watermarking scheme for secure data communication is proposed in wavelet domain and improvement in secure communication and robustness performance is reported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data.
Abstract: In this study, the use of silicon NAM (Non-Audible
Murmur) microphone in automatic speech recognition is presented.
NAM microphones are special acoustic sensors, which are attached
behind the talker-s ear and can capture not only normal (audible)
speech, but also very quietly uttered speech (non-audible murmur).
As a result, NAM microphones can be applied in automatic speech
recognition systems when privacy is desired in human-machine communication.
Moreover, NAM microphones show robustness against
noise and they might be used in special systems (speech recognition,
speech conversion etc.) for sound-impaired people. Using a small
amount of training data and adaptation approaches, 93.9% word
accuracy was achieved for a 20k Japanese vocabulary dictation
task. Non-audible murmur recognition in noisy environments is also
investigated. In this study, further analysis of the NAM speech has
been made using distance measures between hidden Markov model
(HMM) pairs. It has been shown the reduced spectral space of NAM
speech using a metric distance, however the location of the different
phonemes of NAM are similar to the location of the phonemes
of normal speech, and the NAM sounds are well discriminated.
Promising results in using nonlinear features are also introduced,
especially under noisy conditions.
Abstract: Climate change is a phenomenon has been based on
the available evidence from a very long time ago and now its
existence is very probable. The speed and nature of climate
parameters changes at the middle of twentieth century has been
different and its quickness more than the before and its trend changed
to some extent comparing to the past. Climate change issue now
regarded as not only one of the most common scientific topic but also
a social political one, is not a new issue. Climate change is a
complicated atmospheric oceanic phenomenon on a global scale and
long-term. Precipitation pattern change, fast decrease of snowcovered
resources and its rapid melting, increased evaporation, the
occurrence of destroying floods, water shortage crisis, severe
reduction at the rate of harvesting agricultural products and, so on are
all the significant of climate change. To cope with this phenomenon,
its consequences and events in which public instruction is the most
important but it may be climate that no significant cant and effective
action has been done so far. The present article is included a part of
one surrey about climate change in Fars. The study area having
annually mean temperature 14 and precipitation 320 mm .23 stations
inside the basin with a common 37 year statistical period have been
applied to the meteorology data (1974-2010). Man-kendal and
change factor methods are two statistical methods, applying them, the
trend of changes and the annual mean average temperature and the
annual minimum mean temperature were studied by using them.
Based on time series for each parameter, the annual mean average
temperature and the mean of annual maximum temperature have a
rising trend so that this trend is clearer to the mean of annual
maximum temperature.