Abstract: Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.
Abstract: Abrasive waterjet cutting (AWJ) is a highly efficient
method for cutting almost any type of material. When holes shall be
cut the waterjet first needs to pierce the material.This paper presents a
vast experimental analysis of piercing parameters effect on piercing
time. Results from experimentation on feed rates, work piece
thicknesses, abrasive flow rates, standoff distances and water
pressure are also presented as well as studies on three methods for
dynamic piercing. It is shown that a large amount of time and
resources can be saved by choosing the piercing parameters in a
correct way. The large number of experiments puts demands on the
experimental setup. An automated experimental setup including
piercing detection is presented to enable large series of experiments
to be carried out efficiently.
Abstract: This study suggests a model of a new set of evaluation criteria that will be used to measure the efficiency of real-world E-commerce websites. Evaluation criteria include design, usability and performance for websites, the Data Envelopment Analysis (DEA) technique has been used to measure the websites efficiency. An efficient Web site is defined as a site that generates the most outputs, using the smallest amount of inputs. Inputs refer to measurements representing the amount of effort required to build, maintain and perform the site. Output is amount of traffic the site generates. These outputs are measured as the average number of daily hits and the average number of daily unique visitors.
Abstract: This paper describes a novel monitoring scheme to
minimize total active power in digital circuits depend on the demand
frequency, by adjusting automatically both supply voltage and
threshold voltages based on circuit operating conditions such as
temperature, process variations, and desirable frequency. The delay
monitoring results, will be control and apply so as to be maintained at
the minimum value at which the chip is able to operate for a given
clock frequency. Design details of power monitor are examined using
simulation framework in 32nm BTPM model CMOS process.
Experimental results show the overhead of proposed circuit in terms
of its power consumption is about 40 μW for 32nm technology;
moreover the results show that our proposed circuit design is not far
sensitive to the temperature variations and also process variations.
Besides, uses the simple blocks which offer good sensitivity, high
speed, the continuously feedback loop. This design provides up to
40% reduction in power consumption in active mode.
Abstract: This paper is concerned with the study of mineralogy
and engineering characteristics of soil materials derived from the
eastern part of Nile Delta. The clay minerals of the studied soil by
using X- ray diffraction are mainly illite (average 72.6 %) and
kaolinite (average 2.6 %), expandable portion in illite-smectite mixed
layer (average 7 %). Smectite is more abundant in fluviatile clays,
whereas kaolinite is more abundant in lagoonal clays. On the other
hand, illite and illite-smectite are more abundant in marine clays. The
geotechnical results show that the soil under study consists mainly of
about 0.3 % gravel, 5 % sand, 51.5 % silt and 42.2 % clay in average.
The average shrinkage limit attains 11 % whereas the average value
of the plasticity index is 23.4 %. The free swelling ranges from 40 %
to 75 % and has a value of 55 % giving an indication about the
inadequacy of such soil under foundations.
From a construction point of view, the soil under investigation
poses many problems even under light foundations due to the
swelling and shrinkage. Such swelling and shrinkage is due to the
high content of soil materials in the expandable clay minerals of illite
and smectite. Based on the results of the present and earlier studies,
trial application of soil stabilisation is recommended.
Abstract: In this paper a systematic method via H∞ control
design is proposed to select a sensor set that satisfies a number
of input criteria for a MAGLEV suspension system. The proposed
method recovers a number of optimised controllers for each possible
sensor set that satisfies the performance and constraint criteria using
evolutionary algorithms.
Abstract: This paper shows that the economy of any country
can be presented as three different shells such as: economic shell of a
big, a medium and a small business. The new concepts were
introduced such as: volume of an economic shell, coefficient of
shell-s expansion (compression) etc. These shells can expansion or
compress under action by internal or external powers and when shell
expansions - it means the rising of a business activity and
compression shows us that economy goes on recession. This process
of an expansion or a compression can develop in the various ways
like linear, logarithm or any other mathematical laws.
Abstract: In this paper we will develop further the sequential
life test approach presented in a previous article by [1] using an
underlying two parameter Weibull sampling distribution. The
minimum life will be considered equal to zero. We will again provide
rules for making one of the three possible decisions as each
observation becomes available; that is: accept the null hypothesis H0;
reject the null hypothesis H0; or obtain additional information by
making another observation. The product being analyzed is a new
type of a low alloy-high strength steel product. To estimate the shape
and the scale parameters of the underlying Weibull model we will use
a maximum likelihood approach for censored failure data. A new
example will further develop the proposed sequential life testing
approach.
Abstract: Most of the concurrent transactional protocols consider
serializability as a correctness criterion of the transactions execution.
Usually, the proof of the serializability relies on mathematical proofs
for a fixed finite number of transactions. In this paper, we introduce
a protocol to deal with an infinite number of transactions which are
iterated infinitely often. We specify serializability of the transactions
and the protocol using a specification language based on temporal
logics. It is worthwhile using temporal logics such as LTL (Lineartime
Temporal Logic) to specify transactions, to gain full automatic
verification by using model checkers.
Abstract: ZnS nanoparticles of different size have been
synthesized using a colloidal particles method. Zns nanoparticles
prepared with capping agent (mercaptoethanol) then were
characterized using X-ray diffraction (XRD) and UV-Vis
spectroscopy. The particle size of the nanoparticles calculated from
the XRD patterns has been found in the range 1.85-2.44nm.
Absorption spectra have been obtained using UV-Vis
spectrophotometer to find the optical band gap and the obtained
values have been founded to being range 3.83-4.59eV. It was also
found that energy band gap increase with the increase in molar
capping agent solution.
Abstract: This paper present a new method for design of power
system stabilizer (PSS) based on sliding mode control (SMC)
technique. The control objective is to enhance stability and improve
the dynamic response of the multi-machine power system. In order to
test effectiveness of the proposed scheme, simulation will be carried
out to analyze the small signal stability characteristics of the system
about the steady state operating condition following the change in
reference mechanical torque and also parameters uncertainties. For
comparison, simulation of a conventional control PSS (lead-lag
compensation type) will be carried out. The main approach is
focusing on the control performance which later proven to have the
degree of shorter reaching time and lower spike.
Abstract: The requirements analysis, modeling, and simulation have consistently been one of the main challenges during the development of complex systems. The scenarios and the state machines are two successful models to describe the behavior of an interactive system. The scenarios represent examples of system execution in the form of sequences of messages exchanged between objects and are a partial view of the system. In contrast, state machines can represent the overall system behavior. The automation of processing scenarios in the state machines provide some answers to various problems such as system behavior validation and scenarios consistency checking. In this paper, we propose a method for translating scenarios in state machines represented by Discreet EVent Specification and procedure to detect implied scenarios. Each induced DEVS model represents the behavior of an object of the system. The global system behavior is described by coupling the atomic DEVS models and validated through simulation. We improve the validation process with integrating formal methods to eliminate logical inconsistencies in the global model. For that end, we use the Z notation.
Abstract: The tree structured approach of non-uniform filterbank
(NUFB) is normally used in perfect reconstruction (PR). The PR is
not always feasible due to certain limitations, i.e, constraints in
selecting design parameters, design complexity and some times
output is severely affected by aliasing error if necessary and
sufficient conditions of PR is not satisfied perfectly. Therefore, there
has been generalized interest of researchers to go for near perfect
reconstruction (NPR). In this proposed work, an optimized tree
structure technique is used for the design of NPR non-uniform
filterbank. Window functions of Blackman family are used to design
the prototype FIR filter. A single variable linear optimization is used
to minimize the amplitude distortion. The main feature of the
proposed design is its simplicity with linear phase property.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: This paper presents an application of power line
carrier (PLC) for electrical power telemetering. This system has a
special capability of transmitting the measured values to a centralized
computer via power lines. The PLC modem as a passive high-pass
filter is designed for transmitting and receiving information. Its
function is to send the information carrier together with transmitted
data by superimposing it on the 50 Hz power frequency signal. A
microcontroller is employed to function as the main processing of the
modem. It is programmed for PLC control and interfacing with other
devices. Each power meter, connected via a PLC modem, is assigned
with a unique identification number (address) for distinguishing each
device from one another.
Abstract: This paper proposes a novel architecture for At-
Home medical care which enables senior citizens, patients
with chronic ailments and patients requiring post- operative
care to be remotely monitored in the comfort of their homes.
This architecture is implemented using sensors and wireless
networking for transmitting patient data to the hospitals,
health- care centers for monitoring by medical professionals.
Patients are equipped with sensors to measure their
physiological parameters, like blood pressure, pulse rate etc.
and a Wearable Data Acquisition Unit is used to transmit the
patient sensor data. Medical professionals can be alerted to
any abnormal variations in these values for diagnosis and
suitable treatment. Security threats and challenges inherent to
wireless communication and sensor network have been
discussed and a security mechanism to ensure data
confidentiality and source authentication has been proposed.
Symmetric key algorithm AES has been used for encrypting
the data and a patent-free, two-pass block cipher mode CCFB
has been used for implementing semantic security.
Abstract: This research is intended to develop a raw material allocation model in timber processing industry in Perum Perhutani Unit I, Central Java, Indonesia. The model can be used to determine the quantity of allocation of timber between chain in the supply chain to select supplier considering factors that are log price and the distance. In determining the quantity of allocation of timber between chains in the supply chain, the model considers the optimal inventory in each chain. Whilst the optimal inventory is determined based on demand forecast, the capacity and safety stock. Problem solving allocation is conducted by developing linear programming model that aims to minimize the total cost of the purchase, transportation cost and storage costs at each chain. The results of numerical examples show that the proposed model can generate savings of the purchase cost of 20.84% and select suppliers with mileage closer.
Abstract: In contrast to existing of calculation of temperature field of a profile part a blade with convective cooling which are not taking into account multi connective in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM AND FDM) numerical methods from the point of view of a realization on the PC. The theoretical substantiation of these methods is proved by the appropriate theorems.
Abstract: Reinforced concrete stair slabs with mid landings i.e.
Dog-legged shaped are conventionally designed as per specifications
of standard codes of practices which guide about the effective span
according to the varying support conditions. Presently, the behavior
of such slabs has been investigated using Finite Element method. A
single flight stair slab with landings on both sides and supported at
ends on wall, and a multi flight stair slab with landings and six
different support arrangements have been analyzed. The results
obtained for stresses, strains and deflections are used to describe the
behavior of such stair slabs, including locations of critical moments
and deflections. Values of critical moments obtained by F.E. analysis
have also have been compared with that obtained from conventional
analysis. Analytical results show that the moments are also critical
near the kinks i.e. junction of mid-landing and inclined waist slab.
This change in the behavior of dog-legged stair slab may be due to
continuity of the material in transverse direction in two landings
adjoining the waist slab, hence additional stiffness achieved. This
change in the behavior is generally not taken care of in conventional
method of design.
Abstract: Face Recognition is a field of multidimensional
applications. A lot of work has been done, extensively on the most of
details related to face recognition. This idea of face recognition using
PCA is one of them. In this paper the PCA features for Feature
extraction are used and matching is done for the face under
consideration with the test image using Eigen face coefficients. The
crux of the work lies in optimizing Euclidean distance and paving the
way to test the same algorithm using Matlab which is an efficient tool
having powerful user interface along with simplicity in representing
complex images.