436 research outputs found

    Decision Analytics Using Permissioned Blockchain “Commledger”

    Get PDF
    The advent of Blockchain has introduced a paradigm shift in the area of Scientific Computing. The decision analytics embodiment in current technology fabric has introduced a need of incorporating Blockchain with industrial technology ecosystem. The utilization of Blockchain has introduced gaps in terms of standard business processes, while the data is being processed using the concept of traditional RDBMS and NoSQL data formats. The lag of permissioned and permissionless Blockchain is the problem area which is dealt with in this doctoral dissertation to provide a Proof of Permission (PoP) protocol for any organization or entity to tailor according to their environmental constraints. There has been a need of an opensource protocol that organizations can customize according to their needs, which is not bound of using only REST interactions. The research presented in this thesis provides such a solution for the industry. The provided propositions are the use of Tiered Asynchronous Locking Algorithm (TALA) to generate a key for securing an Authenticated Data Acceptance Marker (ADAM) block for a permissioned Blockchain Community Ledger (CommLedger)

    Effect of outer cylinder rotation on the radially heated Taylor-Couette flow

    Full text link
    A radially heated Taylor-Couette setup is considered where an incompressible, Boussinesq fluid is sheared in the annular region between two concentric, independently rotating cylinders maintained at different temperatures. The radius ratios chosen for the current study are 0.6 and 0.9 corresponding to wide-gap and thin-gap cases. A linear stability analysis assuming infinite axial extent over a range of Grashof numbers with Taylor number as the control parameter is performed. The fastest growing modes at the onset of instability are found to be oscillatory for the parameters considered. Depending on the ratio of angular velocities and Grashof numbers, both axisymmetric and non-axisymmetric modes are found to be the fastest growing modes. Compared to the case where the outer cylinder is held stationary, the rotation of the outer cylinder is shown to have a general stabilizing effect on the linear stability threshold, except for a few cases. Additionally, at a Grashof number of 1000, unstable modes are located even in the Rayleigh-stable regime for both wide-gap and thin-gap cases.Comment: 18 pages, 16 figure

    Test Anxiety among Outstanding and Non-outstanding Female Student at the Faculty of Educational Sciences / Al-Hussein Bin Talal University / Ma'an – Jordan

    Get PDF
    The aim of this study is to identify the level of test anxiety among students of Faculty of Educational Sciences and its relationship with some variables such as academic excellence and specialization. The study sample consisted of (90) female students from the Faculty of Educational Sciences/ Al-Hussein Bin Talal University which  has been divided into two groups: the first group:  outstanding students   (45 students ) and the second group : non-outstanding  students  (45 students ) , all are selected randomly. The results showed that:-   The level of test  anxiety of female students at the Faculty of Educational Sciences is a medium - The outstanding students have a higher level of  test   anxiety compared with   non-outstanding  students. - The students of The classroom teacher specialization suffer from test  anxiety more than students  of  kindergarten and special education specialization - The outstanding female  students in three specialization  have greater  tests anxiety than non-outstanding  students  , but all differences are insignificant at level (0.05). Keywords: outstanding  students; Academic achievement; performance; self-confidence; female; specializatio

    Informativeness of St14 VNTR Polymorphic Marker in the Carrier Detection of Hemophilia A

    Get PDF
    Hemophilia A is the most common hereditary severe disorder of blood clotting. In families affected with hemophilia, genetic analysis provides opportunities to prevent recurrence of the disease. This study establishes a diagnostic strategy for carrier-ship determination in Pakistani population using an extragenic polymorphic marker for the first time. The analysis of St14 VNTR (DXS52) was carried out by polymerase chain reaction (PCR), in order to determine its informativeness in terms of heterozygosity in Pakistani population. This may be a milestone for further analysis of other polymorphic markers for carrier detection and prenatal diagnosis of hemophilia. Seventy eight blood samples (Hemophiliac = 23, Normal = 55) from 15 families were analyzed for determining informativeness of St14 VNTR in carrier detection of hemophilia A. A total of nine alleles (2400, 2100, 1750, 1690, 1630, 1570, 1390, 1300, 1220 bp) was detected in the pool of subjects. 19 out of 40 females were found to be carriers with respect to the St14 VNTR polymorphic marker. The marker was informative in 73.33% of families. The expected heterozygosity rate of the St14 VNTR was 0.86 while the observed heterozygosity was 0.7. This shows that St14 VNTR is 70% informative in our population, allowing it to be a useful marker in carrier detection, as informativeness is the direct reflection of heterozygosity of a polymorphic marker

    Cloud Computing Security for Organizations using Live Signature – TPALM Printing Client Service

    Get PDF
    Cloud is taking over the computing environment in both public as well as private sector. This has increased the use of service-oriented architecture (SOA) for the development of services later deployed in the Cloud. This paper presents a Cloud Security algorithm using SOA 3.0 for secured transactions on the data, which usually governments of countries like USA International Traffic in Arms Regulations (ITAR) and Export Administration Regulations (EAR) requires to be utilized and distributed only within United States by security cleared personal only. In this paper, we describe a novel algorithm and corresponding cloud service as Cloud Monitoring Gateway (CMG). The current service prototype simulates the behavior of actual Cloud Security Gateway Application (CSGA) using the algorithm called as TPALM (The Privacy Authentication Latency Management). This simulation is coarse-grained, but is capable of measuring the privacy authentication on the given variables of a legit user. We also present an evaluation of this service utilization on actual data

    A Revision Of Scientific Research Ä°n Jordanian Higher Education Institutions: A Follow-Up Assessment

    Get PDF
    This study aimed at identifying the status and obstacles of scientific research in Jordanian higher education institutions as perceived by vice presidents, deans and vice deans of the scientific research departments. In addition to differences in status and obstacles, pursuant to the study variable, this is the institution type.The sample composed of (139) faculty members and all 27 vice presidents, deans and vice deans of the scientific research departments at all 27 Jordanian universities.Having reviewed all interviews and some literature, the researcher prepared a questionnaire, which was tested for validity and reliability of the questionnaire, and used five-likert scale to measure the status and the obstacles of the scientific research in higher education in Jordan. The study showed the following findings; The scientific research status mean was 2.19 and that was low result, also the themes have almost the same results where the research planning got the highest among the themes and the research support the lowest. The scientific research obstacles mean was 2.87 and that was low result, also the themes have almost the same results while doing research for academic promotion got the highest among the themes and doing research for developing human knowledge and enjoyment the lowest. In the light of these results, the study provides a number of recommendations that could reduce the obstacles for funding of scientific research in higher education

    Numerical solution of two dimensional stagnation flows of Micropolar fluids towards a shrinking sheet by using SOR Iterative Procedure

    Get PDF
    In this paper, the problem of two dimensional stagnation flows of micropolar fluids towards a shrinking sheet has been solved numerically by SOR iterative procedure. The similarity transformations have been used to reduce the highly nonlinear partial differential equations of motion to ordinary differential equations. The resulting equations are then integrated by using appropriate numerical techniques. The results have been calculated on three different grid sizes to check the accuracy of the results. The numerical results have been obtained for various values of the parametera. For, the problem relates to the stagnation flow towards a stretching sheet. For, the problem relates to the flow towards a shrinking sheet. Moreover, the results computed for micropolar case are found in good agreement with those obtained with the Newtonian results

    Extended use of SOA and Cloud Computing Security Gateway Protocol for Big Data analytic sessions

    Get PDF
    The advent of Cloud computing and Big Data has introduced a paradigm shift in the area of Information Technology. The Cloud security is lagging behind the evolution of Cloud computing; this lag requires further research. The adaptation of Cloud by the businesses results in the use of VPN and SANs. In this new paradigm the computing is conducted in the Cloud rather onsite. This needs a security protocol, since the processing of Big Data is simultaneously massive and vulnerable. The utilization of Cloud and Big Data has introduced gaps in terms of standard business processes as well as data security, while the data is being processed using the concept of MapReduce. The lag of open source security is the problem area which is dealt with in this doctoral thesis to provide a security gateway protocol for any organization or entity to tailor according to their environmental constraints. All of the major software solution providers, such as Microsoft, Oracle, SAP etc., have their own closed source security protocols available for the organizations to use. There are several versions of the open source Kerberos also available to be used in providing security for Big Data processing within Cloud using commodity hardware. Another famous open source security gateway is the Apache Knox Gateway. However it only provides a single access point for all REST interactions with Hadoop clusters. There has been a need of an open source security protocol that organizations can customize according to their needs, which is not bound of using only REST interactions. The research presented in this thesis provides such an Open source solution for the industry. The provided security gateway utilizes an extended use of SOA by adapting Achievable Service Oriented Architecture (ASOA). Since the use of Information Technology has been significantly altered after the emergence of the Cloud, there is also a need for the organization using legacy technology to transition from current business processing to processing of the Big Data within the Cloud in a secured way. This thesis builds security gateway protocol upon the SOA using ASOA as the base methodology. It also introduces a Master Observer Service (MOS), which uses Messaging Secured Service (MSS) as an added capability to strengthen the idea of secured data availability for MapReduce processing to deal with Big Data. The thesis presents an actual implementation using Business Process Engineering (BPR). The tailored implementation of the Security Gateway Protocol has been implemented in one of the fortune one hundred financial institutions using Master Observer Service. This allows the institution to process their Big Data using MapReduce in secured sessions using Cloud. L'avènement du Cloud Computing et du Big Data a introduit un changement de paradigme dans le domaine des technologies de l'information. La sécurité Cloud est à la traîne de l'évolution du Cloud Computing (CC); ce décalage nécessite de plus amples recherches. L'adaptation du Cloud par les entreprises se traduit par l'utilisation de réseaux privés virtuels (VPN) et des réseaux de stockage VPN. Dans ce nouveau paradigme du CC, des calculs sont effectués dans le Cloud plutôt que sur place. Ceci nécessite d'un protocole de sécurité, puisque le traitement de Big Data est simultanément massif et vulnérable. L'utilisation de Cloud et Big Data a introduit des lacunes en termes de processus d'affaires standard, ainsi que de la sécurité des données, tandis que les données sont traitées en utilisant le concept de MapReduce. Le décalage de la sécurité open source est la zone à problème qui est traité dans cette thèse de doctorat en proposant un protocole de sécurité de passerelle du CC pour toute organisation ou entité en fonction de leurs contraintes environnementales. Tous les principaux fournisseurs de solutions de logiciels, tels que Microsoft, Oracle, SAP, etc., ont leurs propres protocoles de sécurité, disponibles pour les organisations à utiliser sans code source. Il existe également plusieurs versions de l'open source Kerberos disponibles à être utilisées afin d’assurer la sécurité pour le traitement des Big Data. Une autre passerelle de sécurité open source est celle de l’Apache Knox. Toutefois, il ne fournit qu'un point d'accès unique pour toutes les interactions REST avec des clusters Hadoop. Il y a eu une nécessité d'un protocole de sécurité open source que les organisations peuvent personnaliser selon leurs besoins. Ce protocole n’est pas lié seulement aux interactions REST. La recherche présentée dans cette thèse propose une telle solution open source pour l'industrie. La passerelle de sécurité fournie utilise une extension de l’architecture orientée service SOA en adaptant notre modèle de cette architecture : Achievable Service Oriented Architecture (ASOA). Après l'émergence du Cloud, l'utilisation des technologies de l'information a été modifiée de façon significative, il y a aussi une nécessité des organisations utilisant des technologies légataires pour faire la transition de traitement des affaires en cours vers le traitement des Big Data dans le Cloud de manière sécurisée. Cette thèse conçoit et valide un protocole de passerelle de sécurité en utilisant ASOA. Il introduit également un service d'observation maître (Master Observer Service MOS), qui à son tour utilise le service de messagerie sécurisé (MSS) comme étant une capacité supplémentaire pour renforcer l'idée de la disponibilité de données sécurisée pour le traitement de MapReduce afin de faire face aux Big Data. La thèse présente une mise en oeuvre réelle en utilisant Business Process Engineering (BPR). La mise en oeuvre adaptée du Protocole Security Gateway a été implémentée dans plusieurs institutions financières utilisant Master Observer Service. Cela permet à l'institution de traiter leurs Big Data en utilisant MapReduce dans les sessions sécurisées en Cloud Computing
    • …
    corecore