Abstract: Novel Coconut oil nanofluids of various concentrations have been prepared through ultrasonically assisted sol-gel method. The structural and morphological properties of the copper oxide nanoparticle have been analyzed with respectively and it revealed the monoclinic end-centered structure of crystallite and shuttle like flake morphology of agglomerates. Ultrasonic studies have been made for the nanofluids at different temperatures. The molecular interactions responsible for the changes in acoustical parameter with respect to concentration and temperature are discussed.
Abstract: This paper is concerned with studying the forgetting factor of the recursive least square (RLS). A new dynamic forgetting factor (DFF) for RLS algorithm is presented. The proposed DFF-RLS is compared to other methods. Better performance at convergence and tracking of noisy chirp sinusoid is achieved. The control of the forgetting factor at DFF-RLS is based on the gradient of inverse correlation matrix. Compared with the gradient of mean square error algorithm, the proposed approach provides faster tracking and smaller mean square error. In low signal-to-noise ratios, the performance of the proposed method is superior to other approaches.
Abstract: Voltage collapse is instability of heavily loaded electric
power systems that cause to declining voltages and blackout. Power
systems are predicated to become more heavily loaded in the future
decade as the demand for electric power rises while economic and
environmental concerns limit the construction of new transmission
and generation capacity. Heavily loaded power systems are closer to
their stability limits and voltage collapse blackouts will occur if
suitable monitoring and control measures are not taken. To control
transmission lines, it can be used from FACTS devices.
In this paper Harmony search algorithm (HSA) and Genetic
Algorithm (GA) have applied to determine optimal location of
FACTS devices in a power system to improve power system stability.
Three types of FACTS devices (TCPAT, UPFS, and SVC) have been
introduced. Bus under voltage has been solved by controlling reactive
power of shunt compensator. Also a combined series-shunt
compensators has been also used to control transmission power flow
and bus voltage simultaneously.
Different scenarios have been considered. First TCPAT, UPFS, and
SVC are placed solely in transmission lines and indices have been
calculated. Then two types of above controller try to improve
parameters randomly. The last scenario tries to make better voltage
stability index and losses by implementation of three types controller
simultaneously. These scenarios are executed on typical 34-bus test
system and yields efficiency in improvement of voltage profile and
reduction of power losses; it also may permit an increase in power
transfer capacity, maximum loading, and voltage stability margin.
Abstract: In this paper, a semi-fragile watermarking scheme is proposed for color image authentication. In this particular scheme, the color image is first transformed from RGB to YST color space, suitable for watermarking the color media. Each channel is divided into 4×4 non-overlapping blocks and its each 2×2 sub-block is selected. The embedding space is created by setting the two LSBs of selected sub-block to zero, which will hold the authentication and recovery information. For verification of work authentication and parity bits denoted by 'a' & 'p' are computed for each 2×2 subblock. For recovery, intensity mean of each 2×2 sub-block is computed and encoded upto six to eight bits depending upon the channel selection. The size of sub-block is important for correct localization and fast computation. For watermark distribution 2DTorus Automorphism is implemented using a private key to have a secure mapping of blocks. The perceptibility of watermarked image is quite reasonable both subjectively and objectively. Our scheme is oblivious, correctly localizes the tampering and able to recovery the original work with probability of near one.
Abstract: Sweet potato products are necessary for the provision
of essential nutrients in every household, regardless of their poverty
status. Their consumption appears to be highly influenced by socioeconomic
factors, such as malnutrition, food insecurity and
unemployment. Therefore, market availability is crucial for these
cultivars to resolve some of the socio-economic factors. The aim of
the study was to investigate market availability of sweet potato
cultivars in the North West Province. In this study, both qualitative
and quantitative research methodologies were used. Qualitative
methodology was used to explain the quantitative outcomes of the
variables. On the other hand, quantitative results were used to test the
hypothesis. The study used SPSS software to analyse the data. Crosstabulation
and Chi-square statistics were used to obtain the
descriptive and inferential analyses, respectively. The study found
that the Blesbok cultivar is dominating the markets of the North West
Province, with the Monate cultivar dominating in the Bojanala
Platinum (75%) and Dr Ruth Segomotsi Mompati (25%) districts. It
is also found that a unit increase in the supply of sweet potato
cultivars in both local and district municipal markets is accompanied
by a reduced demand of 28% and 33% at district and local markets,
respectively. All these results were found to be significant at p
Abstract: this scientific article considers the peculiarities of
ecology of culture and ecological outlook from cultural and
anthropological aspect of Turkic languages speaking peoples in the
Central Asia. The ecology of culture of Turkic languages speaking
peoples in the Central Asia, formed under the influence of climatic,
geographical, economic, religious, ethno cultural and political factors
and defining the originality of traditions which have laid down in its
basis and functioned, as its components, causes an interest and
urgency simultaneously, representing the sample of life of the Person
in the World by which it is necessary to be guided today.
Abstract: The pollution of sediments sampled from the North
Port by polycyclic aromatic hydrocarbons (PAHs) was investigated.
Concentrations of PAHs estimated in the port sediments ranged from
199 to 2851.2 μg/kg dw. The highest concentration was found which
is closed to the Berth line, this locations affected by intensive
shipping activities and Land based runoff and they were dominated
by the high molecular weight PAHs (4–6- rings). Source
identification showed that PAHs originated mostly from the
pyrogenic source either from the combustion of fossil fuels, grass,
wood and coal (majority of the samples). Ecological Risk Assessment
on the port sediments presented that slightly adverse ecological
effects to biological community are expected to occur at the vicinity
of the stations 1 and 4. Thus PAHs are not considered as pollutants of
concern in the North Port.
Abstract: This paper introduces a new approach for the performance
analysis of adaptive filter with error saturation nonlinearity in
the presence of impulsive noise. The performance analysis of adaptive
filters includes both transient analysis which shows that how fast
a filter learns and the steady-state analysis gives how well a filter
learns. The recursive expressions for mean-square deviation(MSD)
and excess mean-square error(EMSE) are derived based on weighted
energy conservation arguments which provide the transient behavior
of the adaptive algorithm. The steady-state analysis for co-related
input regressor data is analyzed, so this approach leads to a new
performance results without restricting the input regression data to
be white.
Abstract: Infrastructure investments are important in developing
countries, it will not only help to foster the economic growth of a
nation, but it will also act as a platform in which new forms of
partnership and collaboration can be developed mainly in East Asian
countries. Since the last two decades, many infrastructure projects
had been completed through build-operate-transfer (BOT) type of
procurement. The developments of BOT have attracted participation
of local and foreign private sector investor to secure funding and to
deliver projects on time, within the budget and to the required
specifications. Private sectors are preferred by the government in
East Asia to participate in BOT projects due to lack of public
funding. The finding has resulted that the private sector or promoter
of the BOT projects is exposed to multiple risks which have been
discussed in this paper. Effective risk management methods and
good managerial skills are required in ensuring the success of the
project. The review indicated that mitigation measures should be
employed by the promoter throughout the concession period and
support from the host government is also required in ensuring the
success of the BOT project.
Abstract: Protein and Esterase electrophoresis were used to
genetically identify two Saudi tick species. Engorged females of the
camel tick Hyalomma dromedarii (Koch) (Acari: Ixodidae) and the
cattle tick Boophilus annulatus (Say) (Acari: Ixodidae) ticks
collected from infested camels and cattle in the animals resting
house at Hail region in KSA were used. The results showed that
there are a variation in both of protein and esterase activity levels and
a high polymorphism within and between the genera and species of
Hyalomma and Boophilus . In conclusion, the protein and esterase
electrophoretic analysis used in the present study could successfully
distinguish among tick species, commonly found in Saudi Arabia.
Abstract: One of the most ancient humankind concerns is knowledge formalization i.e. what a concept is. Concept Analysis, a branch of analytical philosophy, relies on the purpose of decompose the elements, relations and meanings of a concept. This paper aims at presenting a method to make a concept analysis obtaining a knowledge representation suitable to be processed by a computer system using either object-oriented or ontology technologies. Security notion is, usually, known as a set of different concepts related to “some kind of protection". Our method concludes that a more general framework for the concept, despite it is dynamic, is possible and any particular definition (instantiation) depends on the elements used by its construction instead of the concept itself.
Abstract: One of the processes of slope that occurs every year in Iran and some parts of world and cause a lot of criminal and financial harms is called landslide. They are plenty of method to stability landslide in soil and rock slides. The use of the best method with the least cost and in the shortest time is important for researchers. In this research, determining the best method of stability is investigated by using of Decision Support systems. DSS is made for this purpose and was used (for Hasan Salaran area in Kurdistan). Field study data from topography, slope, geology, geometry of landslide and the related features was used. The related data entered decision making managements programs (DSS) (ALES).Analysis of mass stability indicated the instability potential at present. Research results show that surface and sub surface drainage the best method of stabilizing. Analysis of stability shows that acceptable increase in security coefficient is a consequence of drainage.
Abstract: This study reveals that anti-immigrant policies in
Europe result from a process of securitization, and that, within this
process, radical right parties have been formulating discourses and
approaches through a construction process by using some common
security themes. These security themes can be classified as national
security, economic security, cultural security and internal security.
The frequency with which radical right parties use these themes may
vary according to the specific historical, social and cultural
characteristics of a particular country.
Abstract: This paper presents a simplified version of Data Envelopment Analysis (DEA) - a conventional approach to evaluating the performance and ranking of competitive objects characterized by two groups of factors acting in opposite directions: inputs and outputs. DEA with a Perfect Object (DEA PO) augments the group of actual objects with a virtual Perfect Object - the one having greatest outputs and smallest inputs. It allows for obtaining an explicit analytical solution and making a step to an absolute efficiency. This paper develops this approach further and introduces a DEA model with Partially Perfect Objects. DEA PPO consecutively eliminates the smallest relative inputs or greatest relative outputs, and applies DEA PO to the reduced collections of indicators. The partial efficiency scores are combined to get the weighted efficiency score. The computational scheme remains simple, like that of DEA PO, but the advantage of the DEA PPO is taking into account all of the inputs and outputs for each actual object. Firm evaluation is considered as an example.
Abstract: This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit 'one' and the un-pointed letters with extension to hold 'zero'. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu.
Abstract: The objective of this paper is to estimate realistic
principal extrusion process parameters by means of artificial neural
network. Conventionally, finite element analysis is used to derive
process parameters. However, the finite element analysis of the
extrusion model does not consider the manufacturing process
constraints in its modeling. Therefore, the process parameters
obtained through such an analysis remains highly theoretical.
Alternatively, process development in industrial extrusion is to a
great extent based on trial and error and often involves full-size
experiments, which are both expensive and time-consuming. The
artificial neural network-based estimation of the extrusion process
parameters prior to plant execution helps to make the actual extrusion
operation more efficient because more realistic parameters may be
obtained. And so, it bridges the gap between simulation and real
manufacturing execution system. In this work, a suitable neural
network is designed which is trained using an appropriate learning
algorithm. The network so trained is used to predict the
manufacturing process parameters.
Abstract: Electrospinning is a broadly used technology to obtain
polymeric nanofibers ranging from several micrometers down to
several hundred nanometers for a wide range of applications. It offers
unique capabilities to produce nanofibers with controllable porous
structure. With smaller pores and higher surface area than regular
fibers, electrospun fibers have been successfully applied in various
fields, such as, nanocatalysis, tissue engineering scaffolds, protective
clothing, filtration, biomedical, pharmaceutical, optical electronics,
healthcare, biotechnology, defense and security, and environmental
engineering. In this study, polyurethane nanofibers were obtained
under different electrospinning parameters. Fiber morphology and
diameter distribution were investigated in order to understand them
as a function of process parameters.
Abstract: This paper introduces a temporal epistemic logic
CBCTL that updates agent-s belief states through communications
in them, based on computational tree logic (CTL). In practical
environments, communication channels between agents may not be
secure, and in bad cases agents might suffer blackouts. In this study,
we provide inform* protocol based on ACL of FIPA, and declare the
presence of secure channels between two agents, dependent on time.
Thus, the belief state of each agent is updated along with the progress
of time. We show a prover, that is a reasoning system for a given
formula in a given a situation of an agent ; if it is directly provable
or if it could be validated through the chains of communications, the
system returns the proof.
Abstract: MinC plays an important role in bacterial cell division
system by inhibiting FtsZ assembly. However, the molecular
mechanism of the action is poorly understood. E. coli MinC Nterminus
domain was purified and crystallized using 1.4 M sodium
citrate pH 6.5 as a precipitant. X-ray diffraction data was collected
and processed to 2.3 Å from a native crystal. The crystal belonged to
space group P212121, with the unit cell parameters a = 52.7, b = 54.0,
c = 64.7 Å. Assuming the presence of two molecules in the
asymmetric unit, the Matthews coefficient value is 1.94 Å3 Da-1,
which corresponds to a solvent content of 36.5%. The overall
structure of MinCN is observed as a dimer form through anti-parallel
ß-strand interaction.
Abstract: Phishing scheme is a new emerged security issue of
E-Commerce Crime in globalization. In this paper, the legal scaffold
of Malaysia, United States and United Kingdom are analyzed and
followed by discussion on critical issues that rose due to phishing
activities. The result revealed that inadequacy of current legal
framework is the main challenge to govern this epidemic. However,
lack of awareness among consumers, crisis on merchant-s
responsibility and lack of intrusion reports and incentive arrangement
contributes to phishing proliferating. Prevention is always better than
curb. By the end of this paper, some best practices for consumers and
corporations are suggested.