Rc Research Papers - Academia.edu (original) (raw)

Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic... more

Most of the information is in the form of electronic data. A lot of electronic data exchanged takes place through computer applications. Therefore information exchange through these applications needs to be secure. Different cryptographic algorithms are usually used to address these security concerns. However, along with security there are other factors that need to be considered for practical implementation of different cryptographic algorithms like implementation cost and performance. This paper provides comparative analysis of time taken for encryption by seven symmetric key cryptographic algorithms (AES, DES, Triple DES, RC2, Skipjack, Blowfish and RC4) with variation of parameters like different data types, data density, data size and key sizes.

In this era of information technology and e-commerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used.... more

In this era of information technology and e-commerce security is the key aspect while transmitting confidential information over insecure network like internet. In order to protect the information, various security mechanisms are used. Cryptography is a technique of protecting secure information from unwanted individuals by converting it into unintelligible form. It is an emerging technology in the area of network security. In this paper critical analysis of some of the symmetric key block cipher algorithms DES, 3DES, AES, IDEA, Blowfish and RC2 is presented.

The main problem encountered in steel reinforced concrete structures is the corrosion of the steel bars which eventually results in the failure and disintegration of the structure. Fiber-reinforced polymer (FRP) rebar has been considered... more

The main problem encountered in steel reinforced concrete structures is the corrosion of the steel bars which eventually results in the failure and disintegration of the structure. Fiber-reinforced polymer (FRP) rebar has been considered as an alternative for this since corrosion is a material problem. The purpose of this research was to investigate flexural behaviour of GFRP and steel reinforced beams. The beam sections used in this research is of size 150 x 200 mm and of 1600 mm length. Flexural strength was determined and crack pattern studies were carried out.

In the present paper, a review evaluation study for the empirical period-height formulae recommended in some current Codes for the fundamental period of multi-storey RC frame buildings has been carried out. Comparison of the results... more

In the present paper, a review evaluation study for the empirical period-height formulae recommended in some current Codes for the fundamental period of multi-storey RC frame buildings has been carried out. Comparison of the results obtained using codes’ period-height formulae, with the results obtained from finite element analysis (eigenvalue analysis), shows that the codes’ formulae, in most cases, underestimate the fundamental period with a large deviation from finite element results. This large deviation is a result of considering only the effect of one parameter (frame height) and neglecting of remaining major parameters in the codes formulae.
A parametric study has been performed using finite element analysis to study the effect of the major parameters influencing in the fundamental period. The parameters considered in this study are the frame total height, frame total width, number of bays of the frame and the frame total mass. New simple formulae are recommended for
the calculation of the fundamental period of vibration of RC multi-storey frame buildings. In these formulae most of the factors influencing in the fundamental period of vibration are considered. The comparison of the recommended equation results with the finite element results shows good agreements.

In this paper, we propose a new hash function based on RC4 and we call it RC4-Hash. This proposed hash function produces variable length hash output from 16 bytes to 64 bytes. Our RC4-Hash has several advantages over many popularly known... more

In this paper, we propose a new hash function based on RC4 and we call it RC4-Hash. This proposed hash function produces variable length hash output from 16 bytes to 64 bytes. Our RC4-Hash has several advantages over many popularly known hash functions. Its efficiency is comparable with widely used known hash function (e.g., SHA-1). Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1 and on RIPEMD, there is a serious need to consider other hash function design strategies. We present a concrete hash function design with completely new internal structure. The security analysis of RC4-Hash can be made in the view of the security analysis of RC4 (which is well studied) as well as the attacks on different hash functions. Our hash function is very simple and rules out all possible generic attacks. To the best of our knowledge, the design criteria of our hash function is different from all previously known hash functions. We believe our hash function to be secure and will appreciate security analysis and any other comments.

Cloud Computing is current buzzword in the market Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. Security in Cloud computing is an important and... more

Cloud Computing is current buzzword in the market Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. Cloud service provider and the cloud service consumer should make sure that the cloud is safe enough from all the external threats so that the customer does not face any problem such as loss of data or data theft. There is also a possibility where a malicious user can penetrate the cloud by impersonating a legitimate user, thus infecting the entire cloud and affects many customers who are sharing the infected cloud. In this we will discuss how to provide security for the data from the unauthorized users and provide integrity to the users.

The purpose of the experimental work presented in this study is to study the effect of concrete compressive strength and steel reinforcement ratio on capacity and deflection of reinforced concrete two-way slabs. Three steel reinforcement... more

The purpose of the experimental work presented in this study is to study the effect of concrete compressive strength and steel reinforcement ratio on capacity and deflection of reinforced concrete two-way slabs. Three steel reinforcement ratios are considered which are minimum, maximum and average of them in addition to two concrete compressive strength values of 20 and 30 MPa. The results from experimental work show that increasing the reinforcing steel ratio leads to increase the ultimate capacity of the slab in addition to decrease the maximum deflection. For slabs with = 20 MPa, increasing the reinforcing steel ratio from the minimum to the maximum, i.e. 600 %, leads to increase ultimate capacity by about 156 % and decrease maximum deflection by about 52 %. Wheras, For slabs with = 30 MPa, increasing the reinforcing steel ratio from the minimum to the maximum, i.e. 900 %, leads to increase ultimate capacity by about 155 % and decrease maximum central deflection by about 27 %. In addition, matmatical expresions for load-deflection relationships are presented in the current study.

We examined whether practice activities adopted by professional youth soccer coaches are modulated through the implementation of and engagement with cocreative evidence-based programs. Across two experiments, we used systematic... more

We examined whether practice activities adopted by professional youth soccer coaches are modulated through the implementation of and engagement with cocreative evidence-based programs. Across two experiments, we used systematic observation to identify the practice activities of seven coaches across 134 sessions. In Experiment A, drill-based and games-based activities were recorded and quantified. To encourage behaviour change across the study, the systematic observation data were compared with skill acquisition literature to provide coaches with quantitative feedback and recommendations during workshops. Postworkshop systematic observation data indicated that practice activities used by coaches changed in accordance with the evidenced-based information (increase in games-based activities) delivered within the workshop. Interview data indicated that coaches typically stated that the workshop was a key reason for behaviour change. In a follow-up Experiment B, feedback and recommendati...

Resumo A pesca é vista como uma atividade exclusivamente masculina, porém muitas mulheres, geralmente suas esposas, participam da coleta e das demais etapas do beneficiamento do pescado, mas não são reconhecidas como pescadoras... more

Resumo A pesca é vista como uma atividade exclusivamente masculina, porém muitas mulheres, geralmente suas esposas, participam da coleta e das demais etapas do beneficiamento do pescado, mas não são reconhecidas como pescadoras artesanais, ficando de fora da regulação da profissão. Desse modo, o objetivo desse artigo é apresentar alguns aspectos de um estudo sobre pescadoras artesanais do município de Magé (RJ), que enfrentam dificuldades relacionadas às suas existências e ao reconhecimento de suas identidades de si, para si e para os “outros”. Foi realizado um trabalho de campo mais íntimo, aos moldes da antropologia e da etnogeografia, para que fosse possível alcançar a “região interior” do grupo estudado. Das entrevistadas, 63% vivem somente de pesca, 16% complementam a renda familiar com atividades paralelas e 37% não possuem a profissão regulamentada. Apesar das pescadoras reconhecerem-se a si mesmas como pescadoras artesanais, sua identidade não é respeitada pelas instituições...

This experimental work aims at presenting load-deflection expressions for the concrete beams that reinforced with three different reinforcement ratios of ACI 318-14, which are minimum, maximum and the average of them. Three groups of... more

This experimental work aims at presenting load-deflection expressions for the concrete beams that reinforced with three different reinforcement ratios of ACI 318-14, which are minimum, maximum and the average of them. Three groups of beams were cast, each group contained three beam specimens. Three types of loading are used, 1-concentrated force, 2-concentrated forces and partial uniformly distributed load. It is also seen that, when reinforcing ratio increases from minimum to maximum, in case of 1-concentrated force, ultimate capacity increases by about 280% and deflection decreases by about 33%, respectively. Whereas, in case of 2-concentrated forces, ultimate capacity increases by about 258% and deflection decreases by about 50%, respectively. Finally, in case of uniformly distributed load, ultimate capacity increases by about 289% and deflection decreases by about 28%, respectively.

The purpose of the experimental work presented in this study is to study the effect of concrete compressive strength and steel reinforcement ratio on capacity and deflection of reinforced concrete two-way slabs. Three steel reinforcement... more

The purpose of the experimental work presented in this study is to study the effect of concrete compressive strength and steel reinforcement ratio on capacity and deflection of reinforced concrete two-way slabs. Three steel reinforcement ratios are considered which are minimum, maximum and average of them in addition to two concrete compressive strength values of 20 and 30 MPa. The results from experimental work show that increasing the reinforcing steel ratio leads to increase the ultimate capacity of the slab in addition to decrease the maximum deflection. For slabs with = 20 MPa, increasing the reinforcing steel ratio from the minimum to the maximum, i.e. 600 %, leads to increase ultimate capacity by about 156 % and decrease maximum deflection by about 52 %. Wheras, For slabs with = 30 MPa, increasing the reinforcing steel ratio from the minimum to the maximum, i.e. 900 %, leads to increase ultimate capacity by about 155 % and decrease maximum central deflection by about 27 %. In addition, matmatical expresions for load-deflection relationships are presented in the current study.

Treating people living with severe health conditions has, and always will be, a fundamental part of the National Health Service. Given the complex nature of conditions such as Huntington’s Disease and Cancer, research exploring the impact... more

Treating people living with severe health conditions has, and always will be, a fundamental part of the National Health Service. Given the complex nature of conditions such as Huntington’s Disease and Cancer, research exploring the impact severe health conditions can have on those affected is of paramount importance. Chapter one is a systematic review utilising a meta-ethnographic approach to explore qualitative research portraying people’s experiences of genetic testing for Huntington’s Disease (HD). Electronic databases cataloguing relevant research were searched which, combined with manual searches, resulted in eleven studies suitable for inclusion. Three meta-themes were identified, highlighting the complex and individual nature of undergoing genetic testing, together with the potential emotional and behavioural consequences. The implications of such findings, together with clinical recommendations are considered. There is a dearth of research exploring what it is like to live w...

BackgroundMost evidence for associations between childhood adversity and adult mental illness is retrospective.AimsTo evaluate prospective evidence of associations between poor parent–child relationships and common psychiatric disorders... more

BackgroundMost evidence for associations between childhood adversity and adult mental illness is retrospective.AimsTo evaluate prospective evidence of associations between poor parent–child relationships and common psychiatric disorders in later life.MethodSystematic review of studies published between 1970 and 2008 including: (a) more than 100 participants; (b) measures of relationships in the home during childhood; (c) at least 10 years between assessment of exposures; and (d) measures of anxiety, depression, suicide, suicidal ideation or post-traumatic stress disorder (PTSD). Analysis was by narrative synthesis.ResultsTwenty-three papers were identified reporting data from 16 cohorts. Abusive relationships predicted depression, anxiety and PTSD. Maternal emotional unavailability in early life predicted suicide attempts in adolescence. Results of studies investigating less severe relationship problems were suggestive but not conclusive of causal association, due partly to methodol...

The pedunculopontine tegmental nucleus (PPTg) has been proposed as a target for deep brain stimulation (DBS) in parkinsonian patients, particularly for symptoms such as gait and postural difficulties refractory to dopaminergic treatments.... more

The pedunculopontine tegmental nucleus (PPTg) has been proposed as a target for deep brain stimulation (DBS) in parkinsonian patients, particularly for symptoms such as gait and postural difficulties refractory to dopaminergic treatments. Several patients have had electrodes implanted aimed at the PPTg, but outcomes have been disappointing, with little evidence that gait and posture are improved. The PPTg is a heterogeneous structure. Consequently, exact target sites in PPTg, possible DBS mechanisms, and potential benefits still need systematic investigation in good animal models. We have investigated the role of PPTg in gait, developed a refined model of parkinsonism including partial loss of the PPTg with bilateral destruction of nigrostriatal dopamine neurons that mimics human pathophysiology, and investigated the effect of DBS at different PPTg locations on gait and posture using a wireless device that lets rats move freely while receiving stimulation. Neither partial nor comple...

Individual differences in emotional processing are likely to contribute to vulnerability and resilience to emotional disorders such as depression and anxiety. Genetic variation is known to contribute to these differences but they remain... more

Individual differences in emotional processing are likely to contribute to vulnerability and resilience to emotional disorders such as depression and anxiety. Genetic variation is known to contribute to these differences but they remain incompletely understood. The serotonin transporter (5-HTTLPR) and α2B-adrenergic autoreceptor (ADRA2B) insertion/deletion polymorphisms impact on two separate but interacting monaminergic signalling mechanisms that have been implicated in both emotional processing and emotional disorders. Recent studies suggest that the 5-HTTLPR s allele is associated with a negative attentional bias and an increased risk of emotional disorders. However, such complex behavioural traits are likely to exhibit polygenicity, including epistasis. This study examined the contribution of the 5-HTTLPR and ADRA2B insertion/deletion polymorphisms to attentional biases for aversive information in 94 healthy male volunteers and found evidence of a significant epistatic effect (p...

Cloud Computing is current buzzword in the market Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. Security in Cloud computing is an important and... more

Cloud Computing is current buzzword in the market Confidentiality, Integrity, Availability, Authenticity, and Privacy are essential concerns for both Cloud providers and consumers as well. Security in Cloud computing is an important and critical aspect, and has numerous issues and problem related to it. Cloud service provider and the cloud service consumer should make sure that the cloud is safe enough from all the external threats so that the customer does not face any problem such as loss of data or data theft. There is also a possibility where a malicious user can penetrate the cloud by impersonating a legitimate user, thus infecting the entire cloud and affects many customers who are sharing the infected cloud. In this we will discuss how to provide security for the data from the unauthorized users and provide integrity to the users.

In this research we have proposed a new self-developed symmetric algorithm called FJ RC-4, which is derived from RC4. Our studies shown that KSA is the vulnerable stage of RC4, whereas a new self-developed symmetric algorithm, FJ-RC4, is... more

In this research we have proposed a new self-developed symmetric algorithm called FJ RC-4, which is derived from RC4. Our studies shown that KSA is the vulnerable stage of RC4, whereas a new self-developed symmetric algorithm, FJ-RC4, is an attempt to increase the security of RC4 by introducing the new algorithm for the KSA stage. We have investigated and compared the robustness of the RC4 and FJ-RC4 and shown that FJ-RC4 is stronger than RC4 against the attacks. In addition, it takes more time to find key in FJ-RC4 and requires more resources. Thus, it would lead us to a more secure algorithm in addition to the fact that FJ-RC4 keeps RC4 simplicity in the core algorithm, PRGA. In addition this idea can be more efficient if KSA and PRGA stages are conducted concurrently.

Embryonic cortical neural stem cells apparently have a transient existence, as they do not persist in the adult cortex. We sought to determine the fate of embryonic cortical stem cells by following Emx1IREScre; LacZ/EGFP double-transgenic... more

Embryonic cortical neural stem cells apparently have a transient existence, as they do not persist in the adult cortex. We sought to determine the fate of embryonic cortical stem cells by following Emx1IREScre; LacZ/EGFP double-transgenic murine cells from midgestation into adulthood. Lineage tracing in combination with direct cell labeling and time-lapse video microscopy demonstrated that Emx1-lineage embryonic cortical stem cells migrate ventrally into the striatal germinal zone (GZ) perinatally and intermingle with striatal stem cells. Upon integration into the striatal GZ, cortical stem cells down-regulate Emx1 and up-regulate Dlx2, which is a homeobox gene characteristic of the developing striatum and striatal neural stem cells. This demonstrates the existence of a novel dorsal-to-ventral migration of neural stem cells in the perinatal forebrain.

Earlier studies have suggested a link between asthma and severe headache, and also between migraine and wheezing illness. Recent analysis have also shown an increase of asthma among cases with a prior history of migraine but without a... more

Earlier studies have suggested a link between asthma and severe headache, and also between migraine and wheezing illness. Recent analysis have also shown an increase of asthma among cases with a prior history of migraine but without a history of hay fever, allergic rhinitis or eczema. To examine whether there is an association between migraine and asthma in the United Kingdom. Matched case-control study using the General Practice Research Database (GPRD). Practices in the United Kingdom providing data on 5,110,619 patients to the GPRD. The subjects were the patients with one or more diagnoses of migraine plus treatment for migraine. Each case was matched by general practice, sex, and age, with one control who had never been given a diagnosis of migraine. Case and control groups were compared for prevalence of asthma, chronic obstructive pulmonary disease, respiratory symptoms treated with inhalers or hay fever. Investigations were carried out to determine whether the association bet...

A reduction in population sodium (as salt) consumption is a global health priority, as well as one of the most cost-effective strategies to reduce the burden of cardiovascular disease. High potassium intake is also recommended to reduce... more

A reduction in population sodium (as salt) consumption is a global health priority, as well as one of the most cost-effective strategies to reduce the burden of cardiovascular disease. High potassium intake is also recommended to reduce cardiovascular disease. To establish effective policies for setting targets and monitoring effectiveness within each country, the current level of consumption should be known. Greece lacks data on actual sodium and potassium intake. The aim of the present study was therefore to assess dietary salt (using sodium as biomarker) and potassium intakes in a sample of healthy adults in northern Greece, and to determine whether adherence to a Mediterranean diet is related to different sodium intakes or sodium-to-potassium ratio. A cross-sectional survey was carried out in the Thessaloniki greater metropolitan area (northern Greece) (n = 252, aged 18-75 years, 45.2% males). Participants' dietary sodium and potassium intakes were determined by 24-hour urin...

RC4 is the most widely used stream cipher algorithm. It is used to protect valuable electronic information. How- ever, RC4 encryption algorithm su�ers from a secret key generation as a seed problems. This paper proposes an intelligent... more

RC4 is the most widely used stream cipher algorithm. It is used to protect valuable electronic information. How- ever, RC4 encryption algorithm su�ers from a secret key generation as a seed problems. This paper proposes an intelligent dynamic secret key generation as a seed by em- ploying an Evolutionary Algorithm (EA). The proposed RC4-EA method tends to enhance the RC4 encryption algorithm with a high degree of a seed key randomness. The main advantage of the proposed RC4-EA method is that the generation of this secret key is done dynamically and randomly; this adds more strength of the RC4 en- cryption algorithm against breaking this cryptosystems. Several experiments on the proposed RC4-EA method are conducted. Where, the results of the experiments show the improvement of the encryption time and the through- put of the proposed encryption RC4-EA method. Also, the proposed validated RC4-EA encryption method is ap- plied for data ciphering in Content Management System (CMS).

Social relationships and networking are key components of human life. Online social networking sites (OSNs) offers a new, easy and inexpensive way to maintain already existing relationships and present oneself to others by offer people... more

Social relationships and networking are key components of human life. Online social networking sites (OSNs) offers a new, easy and inexpensive way to maintain already existing relationships and present oneself to others by offer people new and varied ways to communicate via the internet. The increasing number of actions in online services gives a rise to privacy concerns and risks. There are some serious privacy problems that need to be resolved in existing OSN. There has to be methods to protect user-provided data. A fully flexible privacy and security management should exist to protect private data against attackers and unauthorized users. In this work a Protected Online Social Network (POSN) developed as web 2.0 technology, privacy and security management techniques used to protect user data. The system protects user private data with three cryptographic mechanisms, RC4 and AES cipher for data encryption and public key RSA cryptographic for key encryption. The work shows how POSN...

Understanding barriers to early diagnosis of symptomatic breast cancer among Black African, Black Caribbean and White British women in the UK. In-depth qualitative interviews using grounded theory methods to identify themes. Findings... more

Understanding barriers to early diagnosis of symptomatic breast cancer among Black African, Black Caribbean and White British women in the UK. In-depth qualitative interviews using grounded theory methods to identify themes. Findings validated through focus groups. 94 women aged 33-91 years; 20 Black African, 20 Black Caribbean and 20 White British women diagnosed with symptomatic breast cancer were interviewed. Fourteen Black African and 20 Black Caribbean women with (n=19) and without (n=15) breast cancer participated in six focus groups. Eight cancer centres/hospital trusts in London (n=5), Somerset (n=1), West Midlands (n=1) and Greater Manchester (n=1) during 2012-2013. There are important differences and similarities in barriers to early diagnosis of breast cancer between Black African, Black Caribbean and White British women in the UK. Differences were influenced by country of birth, time spent in UK and age. First generation Black African women experienced most barriers and ...

The ability to disguise and deceive action outcomes was examined by manipulating sports garments. In Experiment 1, those with higher and lower skill levels in anticipation predicted the throw direction of an opponent who wore a garment... more

The ability to disguise and deceive action outcomes was examined by manipulating sports garments. In Experiment 1, those with higher and lower skill levels in anticipation predicted the throw direction of an opponent who wore a garment designed to disguise kinetic-chain information. Higher skill anticipators were more adversely affected by the disguise garment than the lower skill anticipators, demonstrating that disguise removed the anticipation advantage. In Experiment 2, using the same occlusion methodology, the effect of deception was examined using 2 garments designed to create visual illusions of motion across the proximal-to-distal sequence of the thrower's action and compared with a white-garment control. Performances for the deceptive garments were reduced relative to the control garment at the earliest occlusion points for the rightmost targets, but this effect was reversed for the leftmost targets at the earliest occlusion point, suggesting that the visual illusion ga...

In motor development literature fundamental movement skills are divided into three constructs: locomotive, object control and stability skills. Most fundamental movement skills research has focused on children's competency in... more

In motor development literature fundamental movement skills are divided into three constructs: locomotive, object control and stability skills. Most fundamental movement skills research has focused on children's competency in locomotor and object control skills. The first aim of this study was to validate a test battery to assess the construct of stability skills, in children aged 6 to 10 (M age = 8.2, SD = 1.2). Secondly we assessed how the stability skills construct fitted into a model of fundamental movement skill. The Delphi method was used to select the stability skill battery. Confirmatory factor analysis (CFA) was used to assess if the skills loaded onto the same construct and a new model of FMS was developed using structural equation modelling. Three postural control tasks were selected (the log roll, rock and back support) because they had good face and content validity. These skills also demonstrated good predictive validity with gymnasts scoring significantly better t...