Abstract: Resistance of denial of service attacks is a key security requirement in voting protocols. Acquisti protocol plays an important role in development of internet voting protocols and claims its security without strong physical assumptions. In this study firstly Acquisti protocol is modeled in extended applied pi calculus, and then resistance of denial of service attacks is proved with ProVerif. The result is that it is not resistance of denial of service attacks because two denial of service attacks are found. Finally we give the method against the denial of service attacks.
Abstract: The paper presents an applied study of a multivariate AR(p) process fitted to daily data from U.S. commodity futures markets with the use of Bayesian statistics. In the first part a detailed description of the methods used is given. In the second part two BVAR models are chosen one with assumption of lognormal, the second with normal distribution of prices conditioned on the parameters. For a comparison two simple benchmark models are chosen that are commonly used in todays Financial Mathematics. The article compares the quality of predictions of all the models, tries to find an adequate rate of forgetting of information and questions the validity of Efficient Market Hypothesis in the semi-strong form.
Abstract: In this paper we propose a blind algorithm for peakto- average power ratio (PAPR) reduction in OFDM systems, based on selected mapping (SLM) algorithm as a distortionless method. The main drawback of the conventional SLM technique is the need for transmission of several side information bits, for each data block, which results in loss in data rate transmission. In the proposed method some special number of carriers in the OFDM frame is reserved to be rotated with one of the possible phases according to the number of phase sequence blocks in SLM algorithm. Reserving some limited number of carriers wont effect the reduction in PAPR of OFDM signal. Simulation results show using ML criteria at the receiver will lead to the same system-performance as the conventional SLM algorithm, while there is no need to send any side information to the receiver.
Abstract: Iris localization is a very important approach in
biometric identification systems. Identification process usually is
implemented in three levels: iris localization, feature extraction, and
pattern matching finally. Accuracy of iris localization as the first step
affects all other levels and this shows the importance of iris
localization in an iris based biometric system. In this paper, we
consider Daugman iris localization method as a standard method,
propose a new method in this field and then analyze and compare the
results of them on a standard set of iris images. The proposed method
is based on the detection of circular edge of iris, and improved by
fuzzy circles and surface energy difference contexts. Implementation
of this method is so easy and compared to the other methods, have a
rather high accuracy and speed. Test results show that the accuracy of
our proposed method is about Daugman method and computation
speed of it is 10 times faster.
Abstract: Autoregressive Moving average (ARMA) is a parametric based method of signal representation. It is suitable for problems in which the signal can be modeled by explicit known source functions with a few adjustable parameters. Various methods have been suggested for the coefficients determination among which are Prony, Pade, Autocorrelation, Covariance and most recently, the use of Artificial Neural Network technique. In this paper, the method of using Artificial Neural network (ANN) technique is compared with some known and widely acceptable techniques. The comparisons is entirely based on the value of the coefficients obtained. Result obtained shows that the use of ANN also gives accurate in computing the coefficients of an ARMA system.
Abstract: In this study, an experimental investigation was carried
out to fix CO2 into the electronic arc furnace (EAF) reducing slag from
stainless steelmaking process under wet grinding. The slag was ground
by the vibrating ball mill with the CO2 and pure water. The reaction
behavior was monitored with constant pressure method, and the
change of CO2 volume in the experimental system with grinding time
was measured. It was found that the CO2 absorption occurred as soon
as the grinding started. The CO2 absorption under wet grinding was
significantly larger than that under dry grinding. Generally, the
amount of CO2 absorption increased as the amount of water, the
amount of slag, the diameter of alumina ball and the initial pressure of
CO2 increased. However, the initial absorption rate was scarcely
influenced by the experimental conditions except for the initial CO2
pressure. According to this research, the CO2 reacted with the CaO
inside the slag to form CaCO3.
Abstract: In this paper, we rely on the story of the late British
weapons inspector David Kelly to illustrate how sensemaking can
inform the study of the ethics of suppression of dissent. Using
archival data, we reconstruct Dr. Kelly-s key responsibilities as a
weapons inspector and government employee. We begin by clarifying
the concept of dissent and how it is a useful organizational process.
We identify the various ways that dissent has been discussed in the
organizational literature and reconsider the process of sensemaking.
We conclude that suppression of opinions that deviate from the
majority is part of the identity maintenance of the sensemaking
process. We illustrate the prevention of dissent in organizations
consists of a set of unsatisfactory trade-offs.
Abstract: A direct downconversion receiver implemented in 0.13 μm 1P8M process is presented. The circuit is formed by a single-end LNA, an active balun for conversion into balanced mode, a quadrature double-balanced passive switch mixer and a quadrature voltage-controlled oscillator. The receiver operates in the 2.4 GHz ISM band and complies with IEEE 802.15.4 (ZigBee) specifications. The circuit exhibits a very low noise figure of only 2.27 dB and dissipates only 14.6 mW with a 1.2 V supply voltage and is hence suitable for low-power applications.
Abstract: In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS ÔèÑ T , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overlapping blocks and the two LSBs are set to zero. The object that is to be authenticated is also divided into 2×2 nonoverlapping blocks and each block-s intensity mean is computed followed by eight bit encoding. The generated watermark is then embedded into T channel randomly selected 2×2 block-s LSBs using 2D-Torus Automorphism. Selection of block size is paramount for exact localization and recovery of work. The proposed scheme is blind, efficient and secure with ability to detect and locate even minor tampering applied to the image with full recovery of original work. The quality of watermarked media is quite high both subjectively and objectively. The technique is suitable for class of images with format such as gif, tif or bitmap.
Abstract: Polyurethane foam (PUF) is formed by a chemical
reaction of polyol and isocyanate. The aim is to understand the
impact of Silicone on synthesizing polyurethane in differentiate
volume of molding. The method used was one step process, which is
simultaneously caried out a blending polyol (petroleum polyol and
soybean polyol), a TDI (2,4):MDI (4,4-) (80:20), a distilled water,
and a silicone. The properties of the material were measured via a
number of parameters, which are polymer density, compressive
strength, and cellular structures. It is found that density of
polyurethane using silicone with volume of molding either 250 ml or
500 ml is lower than without using silicone.
Abstract: The reservoir of Kowsar dam supply water for
different usages such as aquaculture farms , drinking, agricultural and
industrial usages for some provinces in south of Iran. The Kowsar
dam is located next to the city of Dehdashat in Kohgiluye and
Boyerahmad province in southern Iran. There are some towns and
villages on the Kowsar dam watersheds, which Dehdasht and Choram
are the most important and populated twons in this area, which can to
be sources of pollution for water reservoir of the Kowsar dam . This
study was done to determine of water pollution of the Kowsar dam
reservoir which is one of the most important water resources of
Kohkiloye and Boyerahmad and Bushehr provinces in south-west
Iran. In this study , water samples during 12 months were collected to
examine Biochemical Oxygen Demand (BOD) and Dissolved
Oxygen(DO) as a criterion for evaluation of water pollution of the
reservoir. In summary ,the study has shown Maximum, average and
minimum levels of BOD have observed 25.9 ,9.15 and 2.3 mg/L
respectively and statistical parameters of data such as standard
deviation , variance and skewness have calculated 7.88, 62 and 1.54
respectively. Finally the results were compared with Iranian national
standards. Among the analyzed samples, as the maximum value of
BOD (25.9 mg/L) was observed at the May 2010 , was within the
maximum admissible limits by the Iranian standards.
Abstract: An efficient and green protocol for the synthesis of α-
aminonitriles derivatives by one-pot reaction of different aldehydes
with amines and trimethylsilyl cyanides has been developed using
natural alumina, alumina sulfuric acid (ASA), nano-γ-alumina, nanoalumina
sulfuric acid (nano-ASA) under microwave irradiation and
solvent-free conditions. The advantages of methods are short reaction
times, high yields, milder conditions and easy work up. The catalysts
can be recovered for the subsequent reactions and reused without any
appreciable loss of efficiency.
Abstract: A liquid curved jet has many applications in different
industrial and engineering processes, such as the prilling process
for generating small spherical pellets (fertilizer or magnesium). The
liquids used are usually molten and contain small quantities of
polymers and therefore can be modelled as non-Newtonian liquids. In
this paper, we model the viscoelastic liquid jet by using the Oldroyd-
B model. An asymptotic analysis has been used to simplify the
governing equations. Furthermore, the trajectory and a linear temporal
stability in the presence of gravity and rotation have been determined.
Abstract: In this study, the two dimensional heat conduction
problem for the dry friction clutch disc is modeled mathematically
analysis and is solved numerically using finite element method, to
determine the temperature field when band contacts occurs between
the rubbing surfaces during the operation of an automotive clutch.
Temperature calculation have been made for contact area of different
band width and the results obtained compared with these attained
when complete contact occurs. Furthermore, the effects of slipping
time and sliding velocity function are investigated as well. Both
single and repeated engagements made at regular interval are
considered.
Abstract: Natural ventilation has played an important role for
many low energy-building designs. It has been also noticed as a
essential subject to persistently bring the fresh cool air from the
outside into a building. This study carried out the computational fluid
dynamics (CFD)-based simulations to examine the natural ventilation
development of a work area in a public building. The simulated results
can be useful to better understand the indoor microclimate and the
interaction of wind with buildings. Besides, this CFD simulation
procedure can serve as an effective analysis tool to characterize the
airing performance, and thereby optimize the building ventilation for
strengthening the architects, planners and other decision makers on
improving the natural ventilation design of public buildings.
Abstract: This hypothesis shows that the induction and the
remanent of magnetic properties govern the mechanism processes of
DNA replication and the shortening of the telomere.
The solenoid–like formation of each parental DNA strand, which
exists at the initial stage of the replication process, enables an electric
charge transformation through the strand to produce a magnetic field.
The magnetic field, in turn, induces the surrounding medium to form
a new (replicated) strand by a remanent magnetisation. Through the
remanent [residual] magnetisation process, the replicated strand
possesses a similar information pattern to that of the parental strand.
In the same process, the remanent amount of magnetisation forms the
medium in which it has less of both repetitive and pattern
magnetisation than that of the parental strand, therefore the replicated
strand shows a shortening in the length of its telomeres.
Abstract: We propose a novel prioritized limited
processor-sharing (PS) rule and a simulation algorithm for the performance evaluation of this rule. The performance measures of practical interest are evaluated using this algorithm. Suppose that there
are two classes and that an arriving (class-1 or class-2) request encounters n1 class-1 and n2 class-2 requests (including the arriving
one) in a single-server system. According to the proposed rule, class-1
requests individually and simultaneously receive m / (m * n1+ n2) of the service-facility capacity, whereas class-2 requests receive 1 / (m *n1 + n2) of it, if m * n1 + n2 ≤ C. Otherwise (m * n1 + n2 > C), the arriving request will be queued in the corresponding class waiting
room or rejected. Here, m (1) denotes the priority ratio, and C ( ∞), the service-facility capacity. In this rule, when a request arrives at [or
departs from] the system, the extension [shortening] of the remaining
sojourn time of each request receiving service can be calculated using
the number of requests of each class and the priority ratio. Employing
a simulation program to execute these events and calculations enables
us to analyze the performance of the proposed prioritized limited PS
rule, which is realistic in a time-sharing system (TSS) with a
sufficiently small time slot. Moreover, this simulation algorithm is
expanded for the evaluation of the prioritized limited PS system with
N 3 priority classes.
Abstract: The scale dependence of the strength of virtually homogeneous rock is usually considered to be insignificant but the spectrum of discontinuities plays a very important role for the strength of differently sized rock elements and also controls the rock creep strain. Large-scale load tests comprised recording of the creep strain rate that was found to be strongly retarded and negligible for stresses lower than about 1/3 of the failure load. For higher stresses creep took place according to a log time law representing secondary creep that ultimately changed to tertiary creep and failure.
Abstract: Various mechanisms providing mutual exclusion and
thread synchronization can be used to support parallel processing
within a single computer. Instead of using locks, semaphores, barriers
or other traditional approaches in this paper we focus on alternative
ways for making better use of modern multithreaded architectures
and preparing hash tables for concurrent accesses. Hash structures
will be used to demonstrate and compare two entirely different
approaches (rule based cooperation and hardware synchronization
support) to an efficient parallel implementation using traditional
locks. Comparison includes implementation details, performance
ranking and scalability issues. We aim at understanding the effects
the parallelization schemes have on the execution environment with
special focus on the memory system and memory access
characteristics.
Abstract: Psoriasis is a widespread skin disease affecting up to 2% population with plaque psoriasis accounting to about 80%. It can be identified as a red lesion and for the higher severity the lesion is usually covered with rough scale. Psoriasis Area Severity Index (PASI) scoring is the gold standard method for measuring psoriasis severity. Scaliness is one of PASI parameter that needs to be quantified in PASI scoring. Surface roughness of lesion can be used as a scaliness feature, since existing scale on lesion surface makes the lesion rougher. The dermatologist usually assesses the severity through their tactile sense, therefore direct contact between doctor and patient is required. The problem is the doctor may not assess the lesion objectively. In this paper, a digital image analysis technique is developed to objectively determine the scaliness of the psoriasis lesion and provide the PASI scaliness score. Psoriasis lesion is modelled by a rough surface. The rough surface is created by superimposing a smooth average (curve) surface with a triangular waveform. For roughness determination, a polynomial surface fitting is used to estimate average surface followed by a subtraction between rough and average surface to give elevation surface (surface deviations). Roughness index is calculated by using average roughness equation to the height map matrix. The roughness algorithm has been tested to 444 lesion models. From roughness validation result, only 6 models can not be accepted (percentage error is greater than 10%). These errors occur due the scanned image quality. Roughness algorithm is validated for roughness measurement on abrasive papers at flat surface. The Pearson-s correlation coefficient of grade value (G) of abrasive paper and Ra is -0.9488, its shows there is a strong relation between G and Ra. The algorithm needs to be improved by surface filtering, especially to overcome a problem with noisy data.