Abstract: Elliptic curve-based certificateless signature is slowly
gaining attention due to its ability to retain the efficiency of
identity-based signature to eliminate the need of certificate
management while it does not suffer from inherent private
key escrow problem. Generally, cryptosystem based on elliptic
curve offers equivalent security strength at smaller key sizes
compared to conventional cryptosystem such as RSA which
results in faster computations and efficient use of computing
power, bandwidth, and storage. This paper proposes to implement
certificateless signature based on bilinear pairing to
structure the framework of IKE authentication. In this paper,
we perform a comparative analysis of certificateless signature
scheme with a well-known RSA scheme and also present the
experimental results in the context of signing and verification
execution times. By generalizing our observations, we discuss the
different trade-offs involved in implementing IKE authentication
by using certificateless signature.
Abstract: In the current study we present a system that is
capable to deliver proxy based differentiated service. It will help the
carrier service node to sell a prepaid service to clients and limit the
use to a particular mobile device or devices for a certain time. The
system includes software and hardware architecture for a mobile
device with moderate computational power, and a secure protocol for
communication between it and its carrier service node. On the
carrier service node a proxy runs on a centralized server to be
capable of implementing cryptographic algorithms, while the mobile
device contains a simple embedded processor capable of executing
simple algorithms. One prerequisite is needed for the system to run
efficiently that is a presence of Global Trusted Verification Authority
(GTVA) which is equivalent to certifying authority in IP networks.
This system appears to be of great interest for many commercial
transactions, business to business electronic and mobile commerce,
and military applications.
Abstract: The paper shows the necessity to increase the security
level for paper management in the cadastral field by using specific
graphical watermarks. Using the graphical watermarking will
increase the security in the cadastral content management;
furthermore any altered document will be validated afterwards of its
originality by checking the graphic watermark. If, by any reasons the
document is changed for counterfeiting, it is invalidated and found
that is an illegal copy due to the graphic check of the watermarking,
check made at pixel level
Abstract: Identity verification of authentic persons by their multiview faces is a real valued problem in machine vision. Multiview faces are having difficulties due to non-linear representation in the feature space. This paper illustrates the usability of the generalization of LDA in the form of canonical covariate for face recognition to multiview faces. In the proposed work, the Gabor filter bank is used to extract facial features that characterized by spatial frequency, spatial locality and orientation. Gabor face representation captures substantial amount of variations of the face instances that often occurs due to illumination, pose and facial expression changes. Convolution of Gabor filter bank to face images of rotated profile views produce Gabor faces with high dimensional features vectors. Canonical covariate is then used to Gabor faces to reduce the high dimensional feature spaces into low dimensional subspaces. Finally, support vector machines are trained with canonical sub-spaces that contain reduced set of features and perform recognition task. The proposed system is evaluated with UMIST face database. The experiment results demonstrate the efficiency and robustness of the proposed system with high recognition rates.
Abstract: This article provides some insight into the
implementation of the national ID programme in the United Arab
Emirates (UAE). The fundamental aim is to contribute to the
existing body of knowledge in the field, as it sheds light on some of
the lessons learned from the programme that is believed to widening
the knowledge horizons of those involved in such initiatives.
Abstract: The stone is a constituent part of the geological
structure of the Territory, introducing himself as a subject that has always interconnected human and environment in the development of a discourse of meanings and symbols that reflect elements realized in
different cultures and experiences.
This action meant that the first settlements and their areas of influence gained importance in the field of humanization and spatial
organization of the territory, not only for the appropriation that its
inhabitants did, but mainly because the community regardless of their
economic or social condition, used it as living space and cultural integration.
These factors become decisive in the characterization of the
landscape area in the northwest of Portugal, because the stone is a
material that appears not only in the natural landscape, but is also a strong element in humanized landscape, becoming this relation the
main characterization of the study area.
Abstract: There has been a growing emphasis in
communication management from simple coordination of
promotional tools to a complex strategic process. This study will
examine the current marketing communications and engagement
strategies used in addressing the key stakeholders. In the case of
fertilizer industry in Malaysia, there has been little empirical
research on stakeholder communication when major challenges
facing the modern corporation is the need to communicate its
identity, its values and products in order to distinguish itself from
competitors. The study will employ both quantitative and qualitative
methods and the use of Structural Equation Modeling (SEM) to
establish a causal relationship amongst the key factors of stakeholder
communication strategies and increment in consumers-
choice/acceptance and impact on financial performance. One of the
major contributions is a conceptual framework for communication
strategies and engagement in increasing consumers- acceptance level
and the firm-s financial performance.
Abstract: This paper invites to dialogue and reflections on
innovation and entrepreneurship by presenting concepts of innovation
leading to the introduction of a complex theoretical framework;
Cooperative Innovation (CO-IN). CO-IN is a didactic model
enhancing and scaffolding processes of cooperation creating
innovation drawing on a Scandinavian tradition.
CO-IN is based on a cross-sectorial and multidisciplinary
approach. We introduce the concept of complementarity to help
capture the validity of diversity and we suggest the concept of “the
space in between" to understand the creation of identity as a
collective mind. We see dialogue and the use of multi modal
techniques as essential tools for conceptualizations giving possibility
for clarification of the complexity and diversity leading to decision
making based on knowledge as commons.
We introduce the didactic design and present our empirical
findings from an innovation workshop in Argentina. In a final
paragraph we reflect on the design as a support of the development of
common ground, collective mind and collective action and the
creation of knowledge as commons to facilitate innovation and
entrepreneurship.
Abstract: The article examines the methods of protection of
citizens' personal data on the Internet using biometric identity
authentication technology. It`s celebrated their potential danger due
to the threat of loss of base biometric templates. To eliminate the
threat of compromised biometric templates is proposed to use neural
networks large and extra-large sizes, which will on the one hand
securely (Highly reliable) to authenticate a person by his biometrics,
and on the other hand make biometrics a person is not available for
observation and understanding. This article also describes in detail
the transformation of personal biometric data access code. It`s formed
the requirements for biometrics converter code for his work with the
images of "Insider," "Stranger", all the "Strangers". It`s analyzed the
effect of the dimension of neural networks on the quality of
converters mystery of biometrics in access code.
Abstract: Let T,U and V be rings with identity and M be a unitary (T,U)-bimodule, N be a unitary (U, V )- bimodule, D be a unitary (T, V )-bimodule . We characterize homomorphisms and isomorphisms of the generalized matrix ring Γ = T M D 0 U N 0 0 V .
Abstract: The purposes of researches - to estimate implicit ethnic attitudes by direct and indirect methods, to determine the accordance of two types measuring, to investigate influence of task type used in an experiment, on the results of measuring, as well as to determine a presence or communication between recent episodic events and chronologic correlations of ethnic attitudes. Method of the implicit measuring - an evaluative priming (EPT) carried out with the use of different SOA intervals, explicit methods of research are G.Soldatova-s types of ethnic identity, G.Soldatova-s index of tolerance, E.Bogardus scale of social distance. During five stages of researches received results open some aspects of implicit measuring, its correlation with the results of self-reports on different SOA intervals, connection of implicit measuring with emotional valence of episodic events of participants and other indexes, presenting a contribution to the decision of implicit measuring application problem for study of different social constructs
Abstract: In recent years linguistic research has turned
increasing attention to covert/overt strategies to modulate authorial
stance and positioning in scientific texts, and to the recipients'
response. This study discussed some theoretical implications of the
use of rhetoric in scientific communication and analysed qualitative
data from the authoritative The Cognitive Neurosciences III (2004)
volume. Its genre-identity, status and readability were considered, in
the social interactive context of contemporary disciplinary discourses
– in their polyphony of traditional and new, emerging genres.
Evidence was given of the ways its famous authors negotiate and
shape knowledge and research results – explicitly appraising team
work and promoting faith in the fast-paced progress of Cognitive
Neuroscience, also through experiential metaphors – by presenting a
set of examples, ordered according to their dominant rhetorical
quality.
Abstract: The contribution deals with analysis of identity style
at adolescents (N=463) at the age from 16 to 19 (the average age is
17,7 years). We used the Identity Style Inventory by Berzonsky,
distinguishing three basic, measured identity styles: informational,
normative, diffuse-avoidant identity style and also commitment. The
informational identity style influencing on personal adaptability,
coping strategies, quality of life and the normative identity style, it
means the style in which an individual takes on models of authorities
at self-defining were found to have the highest representation in the
studied group of adolescents by higher scores at girls in comparison
with boys. The normative identity style positively correlates with the
informational identity style. The diffuse-avoidant identity style was
found to be positively associated with maladaptive decisional
strategies, neuroticism and depressive reactions. There is the style,
in which the individual shifts aside defining his personality. In our
research sample the lowest score represents it and negatively
correlates with commitment, it means with coping strategies, thrust in
oneself and the surrounding world. The age of adolescents did not
significantly differentiate representation of identity style. We were
finding the model, in which informational and normative identity
style had positive relationship and the informational and diffuseavoidant
style had negative relationship, which were determinated
with commitment. In the same time the commitment is influenced
with other outside factors.
Abstract: The present study aims to explore the role of parents'
ethnic socialization practices contributes to the ethnic identity
development, self-esteem and psychological adjustment of multi
ethnic children in Sabah, Malaysia. A total of 342 multi ethnic
children (age range = 10 years old to 14 years old; mean age = 12.65
years, SD = 0.88) and their parents participated in the present study.
The modified version of Multi group Ethnic Identity Measure
(MEIM), The Familial Ethnic Socialization Measure (FESM). The
Rosenberg Self-Esteem Scale (RSE) and Behavioral and Emotional
Rating Scale Edition 2 (BERS-2) were used in this study. The results
showed that: i) parents' ethnic socialization practice was a strong
predictor of ethnic identity development of multi ethnic children; ii)
parents' ethnic socialization practice also was a significant predictor
of self-esteem of multi ethnic children; iii) parents' ethnic
socialization practice was not a significant predictor of psychological
adjustment of multi ethnic children. The results of this study showed
the implications parents' ethnic socialization practices and ethnic
identity development in successful multi ethnic families.
Abstract: Luxury is an identity, a philosophy and a culture
which requires understanding before the adoption of e-business
practices because of its intricacies and output are essentially different
from other types of goods. Factors such as culture, personal
characteristics, website quality, and vendor characteristics influence
the online purchasing behavior of consumers thus making it a
complex area of study. This paper explores the scope of e-retail for
luxury consumption in the U.A.E. by identifying what motivates and
de-motivates online purchase behavior of U.A.E. consumers and
necessary hypotheses have been drawn to reflect behavior between
online luxury preference consumers and non-online luxury preference
consumers.
Abstract: This paper presents a novel iris recognition system
using 1D log polar Gabor wavelet and Euler numbers. 1D log polar
Gabor wavelet is used to extract the textural features, and Euler
numbers are used to extract topological features of the iris. The
proposed decision strategy uses these features to authenticate an
individual-s identity while maintaining a low false rejection rate. The
algorithm was tested on CASIA iris image database and found to
perform better than existing approaches with an overall accuracy of
99.93%.
Abstract: This work represents the first review paper to explore the relationship between perfectionistic personality and borderline personality organization. The developmental origins, identity diffusion, interpersonal difficulties, and defense mechanisms that are common to both borderline personality and the interpersonal components of perfectionism are explored, and existing research on perfectionism and borderline personality is reviewed. The importance of the link between perfectionism and borderline features is discussed in terms of its contribution to the conceptual understanding of personality pathology as well as to applied clinical practices.
Abstract: Let G be an arbitrary group with identity e and let
R be a G-graded ring. In this paper we define graded semiprime submodules of a graded R-moduleM and we give a number of results
concerning such submodules. Also, we extend some results of graded semiprime submoduls to graded weakly semiprime submodules.
Abstract: The purpose of this research was to design costume by the inspiration from the configurations, colors and decorations of Thai Royal Barges. The researcher investigated the bibliographies and the important of the Thai Royal Water-Course Procession, configurations and decoration techniques of four Royal Barges history. Furthermore, the researcher combined the contemporary architecture which became part of the four costumes with four patterns in this research. The four costumes designed by applied the physical configuration of the Royal Barge with the fold techniques which create the geometry pattern that are part of the Royal Barge-s decoration and contemporary architecture. Therefore, the researcher united each identity color of the barges with each costume composed with the original patterns by adjusted new layout and resized. Lastly, the new attractive patterns appeared. Nevertheless, the beauty of Thai traditional still remain by using Thai painting figure with black and white color which are the prevalent colors for the contemporary architectures.
Abstract: The main purpose of this research was to study how to communicate the identity of the Bangpoo, Samu tPrakan province for ecotourism. The qualitative data was collected through studying related materials, exploring the area, in-depth interviews with three groups of people: three directly responsible officers who were key informants of the district, twenty foreign tourists and five Thai tourist guides. A content analysis was used to analyze the qualitative data. The two main findings of the study were as follows:
The identity of Bangpoo, Samut Prakan province. This establishment was near the Mouth of the Gulf of Thailand for normal people and tourists, consisting of rest accommodations. There are restaurants where food and drinks are served, rich mangrove forests, Banpoo seaside resort and mangrove trees. Bangpoo seaside resort is characterized by muddy beacheswhere the greatest number of seagulls can be seen from March to May each year.
The communication of the identity of Bangpoo, Samut Prakan province which the researcher could find and design to present in English materials can be summed up in 3 items: 1) The history of Bangpoo, Samut Prakan province 2) The Learning center of Ecotourism: Seagulls and Mangrove forest 3) How to keep Banpoo, Samut Prakran province for ecotourism.