387 research outputs found

    Polymorphism and danger susceptibility of system call DASTONs

    Get PDF
    We have proposed a metaphor “DAnger Susceptible daTa codON� (DASTON) in data subject to processing by Danger Theory (DT) based Artificial Immune System (DAIS). The DASTONs are data chunks or data point sets that actively take part to produce “danger�; here we abstract “danger� as required outcome. To have closer look to the metaphor, this paper furthers biological abstractions for DASTON. Susceptibility of DASTON is important parameter for generating dangerous outcome. In biology, susceptibility of a host to pathogenic activities (potentially dangerous activities) is related to polymorphism. Interestingly, results of experiments conducted for system call DASTONs are in close accordance to biological theory of polymorphism and susceptibility. This shows that computational data (system calls in this case) exhibit biological properties when processed with DT point of view

    A Review on Biological Inspired Computation in Cryptology

    Get PDF
    Cryptology is a field that concerned with cryptography and cryptanalysis. Cryptography, which is a key technology in providing a secure transmission of information, is a study of designing strong cryptographic algorithms, while cryptanalysis is a study of breaking the cipher. Recently biological approaches provide inspiration in solving problems from various fields. This paper reviews major works in the application of biological inspired computational (BIC) paradigm in cryptology. The paper focuses on three BIC approaches, namely, genetic algorithm (GA), artificial neural network (ANN) and artificial immune system (AIS). The findings show that the research on applications of biological approaches in cryptology is minimal as compared to other fields. To date only ANN and GA have been used in cryptanalysis and design of cryptographic primitives and protocols. Based on similarities that AIS has with ANN and GA, this paper provides insights for potential application of AIS in cryptology for further research

    Real valued negative selection for anomaly detection in wireless ad hoc networks

    Get PDF
    Wireless ad hoc network is one of the network technologies that have gained lots of attention from computer scientists for the future telecommunication applications. However it has inherits the major vulnerabilities from its ancestor (i.e., the fixed wired networks) but cannot inherit all the conventional intrusion detection capabilities due to its features and characteristics. Wireless ad hoc network has the potential to become the de facto standard for future wireless networking because of its open medium and dynamic features. Non-infrastructure network such as wireless ad hoc networks are expected to become an important part of 4G architecture in the future. In this paper, we study the use of an Artificial Immune System (AIS) as anomaly detector in a wireless ad hoc network. The main goal of our research is to build a system that can learn and detect new and unknown attacks. To achieve our goal, we studied how the real-valued negative selection algorithm can be applied in wireless ad hoc network network and finally we proposed the enhancements to real-valued negative selection algorithm for anomaly detection in wireless ad hoc network

    Effect of magnesium addition on the microstructure and properties of ductile Ni-resist alloy using in-mould magnesium treatment method

    Get PDF
    For engineering reasons, ductile Ni-resist alloys are widely used in oil and gas, automotive industries and elevated temperature purposes. Ductile Ni-resist offers an advantage because this alloy has an austenitic structure at all temperatures. However, ductile Ni-resist alloy faces economical limitation due to the high price of nickel for alloying of ductile Ni-resist. Therefore, the present study aims to explore the possibility to reduce nickel consumption by substituting nickel with manganese to generate austenitic structure of ductile Ni-resist. Austenitic structure was formed by adding a nickel with much higher manganese percentage consumption as compared to standard usage. The control of carbide formation due to increasing Mnlwt. % was conducted using inoculation method. The effect on solidification was evaluated using cooling curve thermal analysis, complemented by microscopic observation and mechanical properties. It was observed that both Mn/wt. % and inoculation affect the austenitic structure and solidification cooling curve. Solidification cooling curve was lowered with increasing Mn/wt. %.It was also observed that graphite microstructure can be modified by both Mn/wt. % and inoculation. The morphology and graphite distribution was affected by increasing Mri/wt. % and inoculation. An isolated region due to segregation known as 'Last To Freeze' was the last area to solidify. Tensile strength and elongation at room temperature dropped by 21.5% (12Mn-lONi wt %) and 20.0% respectively as compared to D2 standard alloys. Tensile strength at elevated temperature showed that this alloy can withstand up to 150 MPa, dropped by 6.15% (12Mn-lONi wt. %) compared to D2 standard alloy. Corrosion test proved that corrosion rate is comparable to unmodified ductile Ni-resist. Three dense oxide layers were formed on the alloy surface at elevated temperature. A good agreement was observed between the result of the solidification cooling curve, microstructure and mechanical properties

    Translation and validation of household food insecurity access scale (HFIAS) and factors associated with food insecurity among households with children aged five to six years old in Tumpat, Kelantan

    Get PDF
    Introduction: Food security was defined as, when all people, at all times, has physical and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preference for an active and healthy life (World Food Summit, 1996). The concept of food security encompasses of four dimensions namely access, availability, utilization and stability. Methods: The objective of first phase of this study was to translate the Food Insecurity Access Scale (HFIAS) into Malay and to determine its validity and reliability. The second phase was to determine the household food insecurity and its related factors among children aged five to six years in Tumpat, Kelantan. Phase one involved 60 mothers or female caregivers for children aged five to six years in Bachok, Kelantan. The second phase was a cross sectional study conducted at 45 TABIKA in Tumpat district. It has involved 370 mothers or female guards to children aged five to six years old. All participants were randomly selected. HFIAS has been used to measure the level of household food security (access) and the translated and validated Radimer / Cornell and Hunger scale has been used to measure the level of household food security (availability). The body mass index (BMI) was used to determine the nutritional status of children. The validity of HFIAS constructs translated into Malay has been tested using the method of exploratory analysis. The reliability of the translated questionnaire was expressed as Cronbach alpha. The factors that associated to the underlying status of food security and child malnutrition have been identified through multiple logistic regression analysis. Results: Two major components have been identified from exploratory analysis factors which are quality component and insufficiency component with good reliability index (Cronbach's α = 0.83). A total of 36 (9.7%) households were identified as households with mild food insecurity, 64 (17.3%) moderate and 47 (12.7%) severe household food insecurity. The level of education of mothers who did not receive any formal education or only primary education [Adj: 8.77 (95% CI: 1.80, 42.69; p-value = 0.007)], total monthly income per capita less than RM130 [AdjOR: 4.71 (95% CI : 2.19, 10.08; p-value <0.001)] and the absence of monetary savings [AdjOR: 3.97 (95% CI: 2.45, 6.43; p-value <0.001)] has been identified as associated factors to the household food insecurity (access) . Mothers who have no formal education or just primary education [AdjOR: 3.97 (95% CI: 1.04, 15.16; p-value = 0.043)], mothers who have secondary education [AdjOR: 4.28 (95% CI: 1.55, 11.79; p-value = 0.005)], total monthly income per capita of less than RM130 [AdjOR: 3.10 (95% CI: 1.50, 6.41; p-value 0.002)], total monthly income per capita between RM130 and RM210 [AdjOR: 1.83 (95% CI: 1.10, 3.06; p-value 0.021)] and the absence of monetary savings [AdjOR: 2.71 (95% CI: 1.74, 4.22; p-value <0.001)] has also been identified as associated factors to household food insecurity (availability) Families receiving financial assistance [AdjOR: 1.63 (95% CI: 1.05, 2.52; p-value = 0.028)], absence of land ownership [AdjOR: 1.99 (95% CI: 1.14, 3.50;p-value = 0.016)] and girls [AdjOR: 1.68 (95% CI: 1.10, 2.56; p-value 0.017)] were found to be associated with malnutrition status of children. Conclusion: The HFIAS that has been translated into Malay can be used to measure the access components of household food insecurity in local setting. Household food insecurity need to be handled by taking into account the level of maternal education and monthly income per capita that will enable families to have monetary savings in order to improve household food security that will address the problem of pre-school children's malnutrition

    Spectral properties from Matsubara Green's function approach - application to molecules

    Get PDF
    We present results for many-body perturbation theory for the one-body Green's function at finite temperatures using the Matsubara formalism. Our method relies on the accurate representation of the single-particle states in standard Gaussian basis sets, allowing to efficiently compute, among other observables, quasiparticle energies and Dyson orbitals of atoms and molecules. In particular, we challenge the second-order treatment of the Coulomb interaction by benchmarking its accuracy for a well-established test set of small molecules, which includes also systems where the usual Hartree-Fock treatment encounters difficulties. We discuss different schemes how to extract quasiparticle properties and assess their range of applicability. With an accurate solution and compact representation, our method is an ideal starting point to study electron dynamics in time-resolved experiments by the propagation of the Kadanoff-Baym equations.Comment: 12 pages, 8 figure

    Integration of Student Information Data Using XML

    Get PDF
    Schools in Malaysia have been provided with few systems to increase their capabilities to manage student data in the schools environment. With so many workloads that teachers have to face, those systems really give a relief to the teachers. This study was carried out to formulate the integration model of student information data using XML. There are three main phases involved in the study which are analysis and modeling, prototype development and testing. Upon completion, models of data integration were formulated and prototype was developed based on the model. Finally the prototypes were tested and the results are promising. There are some recommendations also for future work

    Metrology at nanoscale: thermal wave probe made it simple

    Get PDF
    A major hurdle facing nanotechnology implementation is in how samples of nano-scale dimensions can be probed. Parts of the problems include sample mounting, making contact with the sample; the possibility that the act of measuring alters the sample, repeatability and accuracy of measurement and referencing reference metrology to calibrate various tools to perform required measurements. The present attempted solution is certainly not a one-size-fits-all matter and no more than a complement to existing tools available such as SEM, TEM, AFM etc, which are no match for the simplicity of the thermal wave probe. Initially the thermal wave probe was not intended for nano-scale applications. The discovery of the converging thermal wave mechanism in thin subsurface layers opened up avenues for stand alone thin layer probing even for materials of high thermal conductivity and diffusivity like copper and silver. This came in tandem with the advent of nano-materials whereby electronic packaging materials could include thin layers with thermal diffusivity exceeding that of copper to alleviate problems associated with overheating. From the time the converging thermal wave technique was introduced in the mid eighties until very recently, it could only be performed with the availability of massive and expensive ultra-short lasers even though the thinnest material that could be measured was 30 μm. With the birth of the CTWaveProbeTM this myth should no longer exist. Within the limitations of standard samples available the CTWaveProbeTM has measured samples of thickness as low as 0.75 μm. In the near future everyone can perform nano-scale measurement like everyone now can fly

    Simulation and Analysis of Short Channel Effects on Bulk and Tri-Gate Multiple Input Floating Gate Mosfet

    Get PDF
    While the scaling limits of MOSFET have been widely researched, the scaling of Multiple Input Floating Gate (MIFG) MOSFET devices has been receiving less attention. The MIFG MOSFET has short channel effect that arises from the scaling of the device at a more significant level than the typical MOSFET because the existence of the floating gate electrode widens the distance of the input gates and the channel. This distance weakens the ability of the gate to control the channel charge effectively which leads to higher short channel effects. Tri-gate MIFG MOSFET proposed in this thesis is combination technologies of a MIFG MOSFET planar device structure and a 3-D Tri-gate transistor. The ability to circumvent short channel effect of the Tri-gate MOSFET are emphasized on the subthreshold characteristic of the device by monitoring the DIBL and subthreshold slope parameter and is compared with a bulk MIFG MOSFET structure at equal technology parameter. The device coupling capacitor and voltage bias at control gate are varied in order to analyze its influence on these effects. Two different structures, Top Tri-gate MIFG MOSFET and Side Tri-gate MIFG MOSFET were studied. This research focuses in the physical MIFG MOSFET structures and analyzes its short channel effect behavior by performing 3-D computer-based numerical simulations using Davinci simulator. There were two sets of results obtained when comparing the short channel effect of the two Tri-gate MIFG MOSFETs with bulk MIFG MOSFET. At C2/C1 ≤ 1 and at variable Vgate2, Tri-gate MIFG MOSFETs shows better results than the bulk MIFG MOSFET in subthreshold slope and DIBL effect with best in C2/C1 = 0.5 followed by C2/C1 = 1. From the electrostatic potential distribution graph of the devices, the better short channel effect suppression can be interpreted as a result of better gate controllability in the Tri-gate MIFG MOSFET than the bulk MIFG MOSFET channel. However, for C2/C1 > 1, overall Tri-gate MIFG MOSFETs shows worse short channel effects than the bulk MIFG MOSFET. The Tri-gate device structure shows the worst short channel effect behavior than the bulk device structure which contradicts with the previous results. The correlation between C2/C1≤1 and C2/C1>1 for a two-input gates in the Tri-gate MIFG MOSFET to control short channel effects is that gate 1 as the signal gate has to have a large area in order to control the channel effectively. At the same time, the voltage applied at gate 2 has to be controlled just to be sufficiently enough to turn on the transistor. The placement of the input gates as the top and side of the floating gate does give significant effect in the simulation results where the Top Tri-gate MIFG MOSFET gives better or approximately same data with the Side Tri-gate MIFG MOSFET.It can be concluded that the suppression of short channel effects of the Tri-gate MIFG MOSFET must not only consider the Tri-gate structure itself, but must also take into account the area of input gate coupling capacitance, voltage bias and placement of the input gates

    Solving time gap problems through the optimization of detecting stepping stone algorithm

    Get PDF
    This paper describes an analysis of detecting stepping stone algorithm to defeat the time gap problem. It is found that current algorithm of detecting stepping stone is not optimized. Several weaknesses are identified and suggestions are proposed to overcome this problem. The suggestions are applied in the improved algorithm. Since the detecting stepping stone is listed as one of the response technique, it is suggested that the improved algorithm should be used as a remedial to the time gap problem
    corecore