Student Handbook and Planner 2014-15 (original) (raw)
Related papers
This paper presents enhanced model of security of symmetric key based cryptosystem[1]. The enhancement of model by variable keys and key exchange using parameters only approach is also presented. The issue of fixing up the minimum length of key for AVK is also a big challenge in AVK model. Selection of shorter key length leads to vulnerability/compromise of system, on the other side, larger then optimum key size would involve unnecessary overheads and wastage of resources[2]. Further, ensuring high protection against malicious attack, is achieved through IDS software tools, that attempts to detect and prevent the system from malicious network users. Apart from these tools, various network security applications using pattern mining to extract the threat from cipher log. Faster and more efficient pattern matching algorithm to overcome the performance issue is demonstrated in[3], parameterized model of automatic variable key. Presented parameters only exchanged instead of key, has been analyzed using association rule discovery from hacker's perspective. This paper applies apriori method to investigate association rule among parameters used for generation of key and prediction of future key in the cryptosystem based on parameter only communication for AVK model[11]. In other words, the paper attempts to answer, How much the method is secure against association rule for future parameter prediction?
Cryptic-Mining: Association Rules Extractions Using Session Log
Security of gargantuan sized data has always posed as a challenging issue. This domain has witnessed a number of approaches being introduced to counter such issues. This paper first reviews approaches for investigation of mining algorithms in cryptography domain and sheds light on application of mining techniques and machine learning algorithms in cryptography. The paper presents key computation using parameters-only scheme for automatic variable key (AVK) based symmetric key cryptosystem. A cryptanalysis based on association rule mining for key and parameter prediction has been discussed using both analytical method and WEKA tool. The paper also presents some research questions regarding the design issues associated with the implementation of parameter based symmetric Automatic Variable Key (AVK) based cryptosystem.
Environmental Monitoring and Assessment, 2010
In this research, in order to determine mean fungus counts, indoor and outdoor air samples were taken in five elementary school buildings located in the city center of Seferihisar, Izmir (45 km from Izmir) within a 1-year period between March and April 2004, and between January and February 2005 representing similar climatic characteristics. Five samples, three from three classes where 5–8, 10–12, and 12–15 age group students attended, one from the corridors, and one from outside the buildings in all the schools, were taken for each period. Within the period of the study, in indoor and outdoor air samples, 7,122 microfungus colonies were counted. Sixty-four species were identified that belong to 17 genera as a result of the identification of isolates obtained. Skin prick tests were applied to 55 out of a total of 117 teachers by the clinicians. According to these test results, 24 teachers were sensitive to at least one agent. Results revealed that, in terms of mold counts, the difference between the schools and the difference between the times (periods) were statistically significant (p
ELEMENTARY TEACHERS’ EFFICIENCY IN COMPUTATIONAL ESTIMATION PROBLEMS
The aim of this study was to explore in-service teachers’ performance and strategies in computational estimation and possible individual difference. Additionally, the study looked for possible individual difference in terms of age and work experience, their attitude towards mathematics and their prior performance in mathematics during high school years. Eighty Greek in-service teachers participated in the study. Results showed that in-service teachers performed quite well, in most of the computational estimations and used a variety of strategies. Individual differences were captured only in terms of in-service attitude towards mathematics. Keywords: Computational estimation, in-service teachers, individual differences strategies in computational estimation.
ETP-Mine: An Efficient Method for Mining Transitional Patterns
A Transaction database contains a set of transactions along with items and their associated timestamps. Transitional patterns are the patterns which specify the dynamic behavior of frequent patterns in a transaction database. To discover transitional patterns and their significant milestones, first we have to extract all frequent patterns and their supports using any frequent pattern generation algorithm. These frequent patterns are used in the generation of transitional patterns. The existing algorithm (TP-Mine) generates frequent patterns, some of which cannot be used in generation of transitional patterns. In this paper, we propose a modification to the existing algorithm, which prunes the candidate items to be used in the generation of frequent patterns. This method drastically reduces the number of frequent patterns which are used in discovering transitional patterns. Extensive simulation test is done to evaluate the proposed method.
An optimized round robin cpu scheduling algorithm with dynamic time quantum
2015
CPU scheduling is one of the most crucial operations performed by operating system. Different algorithms are available for CPU scheduling amongst them RR (Round Robin) is considered as optimal in time shared environment. The effectiveness of Round Robin completely depends on the choice of time quantum. In this paper a new CPU scheduling algorithm has been proposed, named as DABRR (Dynamic Average Burst Round Robin). That uses dynamic time quantum instead of static time quantum used in RR. The performance of the proposed algorithm is experimentally compared with traditional RR and some existing variants of RR. The results of our approach presented in this paper demonstrate improved performance in terms of average waiting time, average turnaround time, and context switching.
Luzp4 defines a new mRNA export pathway in cancer cells
Nucleic acids research, 2015
Cancer testis antigens (CTAs) represented a poorly characterized group of proteins whose expression is normally restricted to testis but are frequently up-regulated in cancer cells. Here we show that one CTA, Luzp4, is an mRNA export adaptor. It associates with the TREX mRNA export complex subunit Uap56 and harbours a Uap56 binding motif, conserved in other mRNA export adaptors. Luzp4 binds the principal mRNA export receptor Nxf1, enhances its RNA binding activity and complements Alyref knockdown in vivo. Whilst Luzp4 is up-regulated in a range of tumours, it appears preferentially expressed in melanoma cells where it is required for growth.
Quantum factorization of 56153 with only 4 qubits
The largest number factored on a quantum device reported until now was 143. That quantum computation, which used only 4 qubits at 300K, actually also factored much larger numbers such as 3599, 11663, and 56153, without the awareness of the authors of that work. Furthermore, unlike the implementations of Shor’s algorithm performed thus far, these 4-qubit factorizations do not need to use prior knowledge of the answer. However, because they only use 4 qubits, these factorizations can also be performed trivially on classical computers. We discover a class of numbers for which the power of quantum information actually comes into play. We then demonstrate a 3-qubit factorization of 175, which would be the first quantum factorization of a triprime.