Global

Cryptography is the exchange of information among the users without leakage of information to others. Many public key cryptography are available which are based on number theory but it has the drawback of requirement of large computational power, complexity and time consumption during generation of key [1]. To overcome these drawbacks, we analyzed neural network is the best way to generate secret key. In this paper we proposed a very new approach in the field of cryptography. We are using two artificial neural networks in the field of cryptography. First One is ANN based n-state sequential machine and Other One is chaotic neural network. For simulation MATLAB software is used. This paper also includes an experimental results and complete demonstration that ANN based n-state sequential machine and chaotic neural network is successfully perform the cryptography.
Every year a large scale of students in Bangladesh enrol in different Universities in order to pursue higher studies. With the aim to build up a prosperous career these students begin their academic phase at the University with great expectation and enthusiasm. However among all these enthusiastic and hopeful bright students many seem to become successful in their academic career and found to pursue the higher education beyond the undergraduate level. The main purpose of this research is to develop a dynamic academic success prediction model for universities, institutes and colleges. In this work, we first apply chi square test to separate factors such as gender, financial condition and dropping year to classify the successful from unsuccessful students. The main purpose of applying it is feature selection to data. Degree of freedom is used to P-value (Probability value) for best predicators of dependent variable. Then we have classify the data using the latest data mining technique Support Vector Machines(SVM).SVM helped the data set to be properly design and manipulated. After being processed data, we used the MATH LAB for depiction of resultant data into figure. After being separation of factors we have had examined by using data mining techniques Classification and Regression Tree (CART) and Bayes theorem using knowledge base. Proposition logic is used for designing knowledge base. Bayes theorem will perform the prediction by collecting the information from knowledge Base. Here we have considered most important factors to classify the successful students over unsuccessful students are gender, financial condition and dropping year. We also consider the sociodemographic variables such as age, gender, ethnicity, education, work status, and disability and study environment that may inflounce persistence or academic success of students at university level. We have collected real data from Chittagong University Bangladesh from numerous students. Finally, by mining the
The purpose of the paper is to illustrate the process of implementing Six Sigma in a cable manufacturing organization of Bangladesh. Major fundamental streams have been introduced to outline the concept of Six Sigma for Bangladeshi industries, and the related methodologies for the research and finally the sigma level of the organization is determined. Practicing Six Sigma could enable the company to eliminate a wide range of long standing process variation problem. This research had been undertaken to highlight the importance of a structured process and the importance data collection. Originally, it could be drawn attention to the managers on how Six Sigma can be used to enhance existing improvement efforts. Finally the specific practical example shows how the approach can be used to tackle long standing, and often hidden quality issues.
The consuming development of a company and various forms of crises are usually explained by economic causes or by failure of management individuals. To overcome the resulting crises there are some methods and financial injections recommended, which cannot definitively solve the problem. The main change of the development is seen as a preventive orientation of a company with respect to ethical postulates, providing of education in terms of ethics in accordance to appropriate egislation and a good example of public personalities and cultures. It is an innovation, which requires new attitudes, adaptation of content (Philosophy), new strategic targets of management suitable for time-evolving needs of the company. First of all, there is an importance of harmonizing the management theory with the dynamic technical development. There is a need to develop a positive and creative innovation to overcome the consuming management, which affects the thinking of people who use it in business and public organizations. The consuming management is, however, comfortable for many people, because it allows a work routine without increasing labour efforts. The management should not focus only on still dominant development of quantitative values without a proportional development of quality content. This allows the controlled subjects to manifest their behaviour as completely closed systems, when in fact there are only relatively closed systems that cannot exist without their surroundings.
Access control refers to securing access to the resources and allowing access up to some defined level. This paper presents various approaches implementing access control in an open domain and carries an analysis of decentralized and diverse access control (DDAC) architecture. The DDAC architecture eliminates the role of centralized authority for managing and issuing users’ credentials. It allows the users to keep the right of disclosure of their attributes under the sole control of them and also ensures that the users are not able to modify the confidential credentials which have been registered and verified by various trusted attribute providers. This paper explains the metrics for carrying the analysis and then presents a theoretical and experimental analysis of the DDAC architecture.
A position paper toward an important and urgent discussion on how best uses the potential of Artificial Intelligence in the context of Computer World surveillance. AI is often cited in papers on Computer World surveillance. But what is meant is using pre-existing AI techniques in Computer World surveillance. AI techniques are established around applications. Computer World surveillance has never been an area of deliberation in AI. In this paper we argue that Computer World surveillance calls for new and specific AI techniques developed with that kind of application in mind. In practice, this paper is based on a broad overview of different slants, which have the budding to be game changers in Computer World surveillance. This paper focuses on web solicitation security and supporters the use of Knowledge Based Systems, probabilistic reasoning and Bayesian apprising to control the probability of false positives and false denials.
We study the following problem: A data distributor has given sensitive data to a set of supposedly trusted agents (third parties). Some of the data are leaked and bring into being in an unconstitutional place (e.g., on the web or somebody’s laptop). The distributor must evaluate the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means. We propose data distribution strategies (across the agents) that improve the likelihood of identifying leakages. These methods do not rely on alterations of the released data (e.g., watermarks). In some cases, we can also inject “realistic but replica” data records to further improve our chances of detecting leakage and identifying the guilty party. In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties. For example, a hospital may give patient records to Researchers who will devise new treatments. Similarly, a company may have partnerships with other companies that require sharing customer data. Another enterprise may outsource its data processing, so data must be given to various other companies. There always remains a risk of data getting leaked from the agent. Perturbation is a very valuable technique where the data are modified and made “less sensitive” before being handed to agents. For example, one can add random noise to certain attributes, or one can replace exact values by ranges. But this technique requires modification of data. Leakage detection is handled by watermarking, e.g., a unique code is implanted in each distributed copy. If that copy is later discovered in the hands of an unconstitutional party, the leaker can be identified. But again it requires code modification. Watermarks can sometimes be destroyed if the data recipient is malicious.
One of the critical challenges facing the Nigerian polity today is the need to adequately feed her citizenry. Within the indigenous economies of pre-colonial ethnic groupings, most dwellers produced enough food to cater for the society and exchange. The colonial economy disarticulated the food production equilibrium to the extent that in recent times, rapid urbanization and environmental degradation occasion by the exploratory activities of multinational corporated have impacted negatively on food production activities hence the call for a state of emergency in this sector.
Exhaust gas recirculation (EGR) is a designed widely used system to reduce the exhaust emissions, particularly nitrogen oxides (NOx). At high temperatures, the nitrogen and oxygen in the engine combustion chamber can chemically combine to form NOx, which, when combined with hydrocarbons and the presence of sunlight, produce an ugly haze known commonly as smog. The EGR system recirculates a fraction of exhaust gases into the intake manifold where it mixes with the fresh incoming charge. By diluting the air- fuel charge, peak combustion temperatures and pressures are reduced resulting in a reduction of NOx concentration. In this paper, an experimental study was conducted to observe the effect of different quantities of EGR on emission and performance of four- stroke single cylinder hydrogen fueled spark- ignition engine with different excess- air ratio. Experiments were carried out for mass flow measuring of EGR with simplifying adjustment (manual designed EGR system) on the engine. Measurement results with higher EGR rates indicate a drastically reduction of NOx, especially with richer mixtures (about 60% NOx reduction). It was also observed an increase in specific fuel consumption of about 8%, a reduction in an indicated mean effective pressure (about 15%) and a reduction in an engine cylinder maximum pressure of about 19%.
The current study examines the factors affecting customer satisfaction for the continuation in dealing with electronic (ebanking) services. For this purpose, a model has been designed for the study, which included a number of variables which were identified based on an investigation and examination of the environment of commercial banks in Jordan. The study’s constructs were divided into five dimensions including E- banking service quality, personal factors, perceived usefulness, customer satisfaction, and continuity to deal with E banking services. Five hypotheses wereeveloped based on the dimensions of the study as well as the relevant literature. In addition, the sixth hypothesis was added to measure the correlation between different constructs of the study’s model. In order to collect the data required for examining the hypotheses and reaching conclusions, a questionnaire, consisting of (16) questions covering the dimensions and the hypotheses of the study, was designed. The design and development of this questionnaire was based on an initial pretested survey distributed to a sample consisting of 40 customers of Jordanian banks. The initial survey was also pretested and evaluated by a panel of experts in marketing, banking and IT specialists in order to assess the items within each construct. The questionnaire was then distributed to customers of commercial banks in Amman. Data collection resulted in 441 usableurveys for subsequent analysis. Overall, the findings provided support for the model of the study. All the hypotheses regarding the impact of the factors included in the study on customer satisfaction and continuity in dealing with E- banking services were supported. Moreover, the results of the study indicated that there is a significant relationship between all constructs of the study’s model. These results indicated that the factors relating to E-banking service quality, personal factors and perceived usefulness have an influence on consumer s