Advanced Materials Research
Vol. 414
Vol. 414
Advanced Materials Research
Vol. 413
Vol. 413
Advanced Materials Research
Vol. 412
Vol. 412
Advanced Materials Research
Vol. 411
Vol. 411
Advanced Materials Research
Vol. 410
Vol. 410
Advanced Materials Research
Vol. 409
Vol. 409
Advanced Materials Research
Vols. 403-408
Vols. 403-408
Advanced Materials Research
Vol. 402
Vol. 402
Advanced Materials Research
Vols. 399-401
Vols. 399-401
Advanced Materials Research
Vols. 396-398
Vols. 396-398
Advanced Materials Research
Vols. 393-395
Vols. 393-395
Advanced Materials Research
Vols. 391-392
Vols. 391-392
Advanced Materials Research
Vols. 383-390
Vols. 383-390
Advanced Materials Research Vols. 403-408
Paper Title Page
Abstract: Botnets are growing in size, number and impact. It continues to be one of the top three web threats that mankind has ever known. The botnets are the souped-up cyber engines driving nearly all criminal commerce on the Internet and are seen as relaying millions of pieces of junk e-mail, or spam. Thus, the need of the hour is the early detection and identification of the heart of network packet flooding or the C&C centre. Most of the botmasters perform DDos attacks on a target server by spoofing the source IP address. The existing botnet detection techniques rely on machine learning algorithms and do not expound the IP spoofing issue. These approaches are also found to be unsuccessful in the meticulous identification of the botmasters. Here we propose an architecture that depend on the PSO-based IP tracebacking. Our architecture also introduces the IP spoofing detector unit so as to ensure that the Traceback moves in the right direction. The approach also detects the zombies and utilizes the PSO optimization technique that aid in the identification of the C&C node. The experimental results show that our approach is successful in prompt detection of the bots.
4469
Abstract: Determination of potential Geographical Indication (GI) is a necessity for timely protection of intellectual property of geographical characteristics. The process of determination and its subsequent filling for registration of GI remains manual in most of the developing and least developed nations. The manual process hinders the faster protection mechanism of GIS in a way that encourages bio-piracy. The problem can be solved successfully if the process of determination is fully automated and subsequent filling process is semi-automated (as the nature of information at this stage is mostly semi-structured and unstructured). The process of automation of determining potential GIs require a GIS based decision support system backed up by a distributed database of potential GIs. This paper explores a DSS methodology in the form of an efficient architecture which could be used for potential geographical indication (GI) determination in India. GI is a name or sign used on certain products that have a specific geographical origin and possess qualities, reputation or characteristics that is essentially attributable to that place of origin. More than 5000 cases/items are considered having potential for acquiring geographical indications, other than 223 already registered ones. The paper evolves round a DSS mechanism implemented through a Geographical Information System. The geographical region under consideration is India. However, with the change of database and rule base of DSS, the system can be employed for any country/region. The system design would get its virtual run through a web portal where the end user/consumer/applicant may get to fill the requisite details as demanded in GI application form. The system will accordingly classify it into one of the 34 classes as prescribed in GI Act, 1999 [1]. The norms for checking the potential are based on the provisions of being a GI such as GI must satisfy the condition of newness as claimed by the association or authority of manufactures/growers of the product having strong geographical flavour of the place where it has been originated/manufactured. Prior registration of GI puts to an end to uniqueness. The sign/word indicating GI must not work against public morality of the Nation. The criteria are checked for declaring a potential GI in GIS. The GIS also generates the skeleton application to be submitted after due manual scrutiny/modification/ editing/addition. The web portal provides a number of services for GI and a user can check potential of getting a GI before entering into time, money and effort consuming process of GI application. The database for such purpose is updated periodically from the application database of GI from IPAB or GI application database of IP India, Chennai. The other database for potential GI is maintained indigenously by GIS web portal. The legal validity of GI will be checked by an expert system that works in conjunction with the knowledge base obtained from the registered database as well as periodical updating of application data base. An architectural diagram represents the total methodology of the project. A test case dry run for a potential GI has been worked out in this paper to show the viability of the methodology for a potential GI candidate, namely “Komal Chaul”. The designed DSS methodology will provide a cost effective way for GI registration through GIS web portal.
4476
Abstract: In performance evaluation of mobility management protocols for Wireless Mobile Networks (WMN) estimating cell change rate of mobile users is very important. Based on the rate of cell change (also called handoff rate) other parameters such as location update cost, handoff latency etc. may be calculated. Moreover, any new mobility management protocol must be examined either mathematically or through simulation before its use in real network. Since the cell change rate is dependent on movement pattern of users; that is why modeling of user movement in order to evaluate the performance of protocols and architectures for WMN plays a vital role. The aim of this paper is to discuss Fluid Flow and Random Walk mobility and different method to estimate cell changing rate using these two models. Our intention is to support researchers with options to choose a suitable model when their protocol or architecture needs to be studied under various mobility patterns.
4486
Abstract: Security testing involves two approaches; the question of who should do it has two answers. Standard testing organizations using a traditional approach can perform functional security testing. For example, ensuring that access control mechanisms work as advertised is a classic functional testing exercise. Systematic security testing approaches should be seamlessly incorporated into software engineering curricula and software development process. Traditional software engineering textbooks failed to provide adequate methods and techniques for students and software engineers to bring security engineering approaches to software development process generating secure software as well as correct software. This paper argues that a security testing phase should be added to software development process with systematic approach to generating and conducting destructive security test sets following a complete coverage principle. Software engineers must have formal training on writing secure code. The security testing tasks include penetrating and destructive tests that are different from functional testing tasks currently covered in software engineering textbooks Moreover, component-based development and formal methods could be useful to produce secure code, as well as automatic security checking tools. Some experience of applying security testing principles in our software engineering method teaching is reported.
4495
Abstract: Singular point detection is the most important step in Automatic Fingerprint Identification System (AFIS) and is used in fingerprint alignment, fingerprint matching, and particularly in classification. The computation of orientation field of a fingerprint can be verified by computing orientation field reliability. The most unreliable portion in orientation field can be the possible location of singular points. In this paper we have proposed a novel algorithm for detecting singular points using reliability of the fingerprint orientation field. Experimental results show that the proposed algorithm accurately detects singular points (core and delta) with the detection rate of 92.6 %.
4499
Abstract: Software testing plays an important role during the software developing period. Any saving on software test will significantly reduce the total cost of software. The key point of this paper is to build a software testing process with the cost control management and to make tradeoffs between the software quality and the software cost. Typical software testing model are analysed and compared. A Quality controlled 3-D testing model is introduced. The model combined with software test process, software quality cost and the testing type. The computational formula is defined to calculate software quality cost. A software quality balance law is introduced to balance control and failure cost. By adjusting software testing method and strategy, organization can reach the objective of the best balance between software quality and the software cost. The result shows an optimistic point that will prove the accurate of the model and the law introduced.
4507
Abstract: This paper describes the prediction of the power output from the Self-Powered-Neutron-Detector (SPND) in the liquid zone control compartment (LZC) of nuclear reactors, which are important in online global power measurement in a large Pressurized Heavy Water Reactor (PHWR). Noisy measured data from the SPNDs have been smoothened out with the help of an ARMA filter and then the smoothed data is used as the input for the neural networks for training purpose. These typical intelligent predictors have been studied with its variation considering different dynamic neural network structures with integer and fractional order noise considerations in the measured sensor data. The paper reports the best found network structure for the prediction of measured set of noisy SPND data.
4512
Abstract: Geothermal reservoirs and groundwater resources in layered porous media in large sedimentary basins have enormous exploitation potential because of their extensive distribution, great quantity, and feasible temperatures and drilling depths. The discharge of geothermal wastewater (i.e. tail-water) on the surface is a serious environmental issue because of its high salinity content, so the Bureau of Geology Exploration and Mineral Resources Exploitation in Shandong Province, China called for the study of the disposal technique of the geothermal tail-water. The disposal test process is as follows: take the waste of geothermal water to make physics-chemistry preparative disposal; filtration with manganese-sand set and/or double-medium equipment; filtration with ion exchange resins; nanofiltration membrane separation; and reverse osmosis separation. After separation, the cheap, clean water can be used as a material for chemical plants. However, in the case of deeply embedded geothermal groundwater resources, connate water(buried water), or bad recharge conditions, must be dried up for a long time exploitation, causing ground depression. Therefore, it is concluded that systems utilizing reinjection, i.e. closed-circuit cycle mode injection, in sandstone reservoirs are ideal for the realization of sustainable exploitation of the geothermal groundwater resources with favorable environmental conditions on the surface.
4522
Abstract: Shandong is a big agricultural province. Embarking from the reality of the development of agricultural economy in Shandong Province, according to the principles of quantity economy, this paper establishes the mathematical model to the major economic target of the Shandong agriculture investment and the yield, carries on the regression analysis, researches the numerical relationship, and puts forward the related proposals.
4528
Abstract: The weight of knowledge assets in company’s value was high in knowledge economy. The substantive knowledge assets came from intellectual capital in companies, and how to measure organization’s intellectual capital had been an important study in management field all over the world. In the base of network structure of organization’s intellectual capital, the Analytic Network Process can bring us not only the quantity of a companies’ intellectual capital or the rate of the intellectual capital in several companies, but also the sort order in the determinants of intellectual capital in companies.
4533