Simulation of Water Droplet on Horizontally Smooth and Rough Surfaces Using Quasi-Molecular Modelling

We developed a method based on quasi-molecular modelling to simulate the fall of water drops on horizontally smooth and rough surfaces. Each quasi-molecule was a group of particles that interacted in a fashion entirely analogous to classical Newtonian molecular interactions. When a falling water droplet was simulated at low impact velocity on both smooth and rough surfaces, the droplets moved periodically (i.e. the droplets moved up and down for a certain period, finally they stopped moving and reached a steady state), spreading and recoiling without splash or break-up. Spreading rates of falling water droplets increased rapidly as time increased until the spreading rate reached its steady state at time t ~ 0.25 s for rough surface and t ~ 0.40 s for smooth surface. The droplet height above both surfaces decreased as time increased, remained constant after the droplet diameter attained a maximum value and reached its steady state at time t ~ 0.4 s. However, rough surface had higher spreading rates of falling water droplets and lower height on the surface than smooth one.

Silver Modified TiO2/Halloysite Thin Films for Decontamination of Target Pollutants

 Sol-gel method has been used to fabricate nanocomposite films on glass substrates composed halloysite clay mineral and nanocrystalline TiO2. The methodology for the synthesis involves a simple chemistry method utilized nonionic surfactant molecule as pore directing agent along with the acetic acid-based solgel route with the absence of water molecules. The thermal treatment of composite films at 450oC ensures elimination of organic material and lead to the formation of TiO2 nanoparticles onto the surface of the halloysite nanotubes. Microscopy techniques and porosimetry methods used in order to delineate the structural characteristics of the materials. The nanocomposite films produced have no cracks and active anatase crystal phase with small crystallite size were deposited on halloysite nanotubes. The photocatalytic properties for the new materials were examined for the decomposition of the Basic Blue 41 azo dye in solution. These, nanotechnology based composite films show high efficiency for dye’s discoloration in spite of different halloysite quantities and small amount of halloysite/TiO2 catalyst immobilized onto glass substrates. Moreover, we examined the modification of the halloysite/TiO2 films with silver particles in order to improve the photocatalytic properties of the films. Indeed, the presence of silver nanoparticles enhances the discoloration rate of the Basic Blue 41 compared to the efficiencies obtained for unmodified films.

High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm

Nowadays, the rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threatens. It-s a big security and privacy issue with the large flood of information and the development of the digital format, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Nowadays protection system classified with more specific as hiding information, encryption information, and combination between hiding and encryption to increase information security, the strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this research becomes difficult. In this paper, a new system of information hiding is presented. The proposed system aim to hidden information (data file) in any execution file (EXE) and to detect the hidden file and we will see implementation of steganography system which embeds information in an execution file. (EXE) files have been investigated. The system tries to find a solution to the size of the cover file and making it undetectable by anti-virus software. The system includes two main functions; first is the hiding of the information in a Portable Executable File (EXE), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). The system has achieved the main goals, such as make the relation of the size of the cover file and the size of information independent and the result file does not make any conflict with anti-virus software.

RUPSec: An Extension on RUP for Developing Secure Systems - Requirements Discipline

The world is moving rapidly toward the deployment of information and communication systems. Nowadays, computing systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important activity in development process of computing systems, specially in developing systems such as banking, military and e-business systems. For developing every system, a process model which includes a process, methods and tools is chosen. The Rational Unified Process (RUP) is one of the most popular and complete process models which is used by developers in recent years. This process model should be extended to be used in developing secure software systems. In this paper, the Requirement Discipline of RUP is extended to improve RUP for developing secure software systems. These proposed extensions are adding and integrating a number of Activities, Roles, and Artifacts to RUP in order to capture, document and model threats and security requirements of system. These extensions introduce a group of clear and stepwise activities to developers. By following these activities, developers assure that security requirements are captured and modeled. These models are used in design, implementation and test activitie

Image Transmission in Low-Power Networks in Mobile Communications Channel

This paper studies a vital issue in wireless communications, which is the transmission of images over Wireless Personal Area Networks (WPANs) through the Bluetooth network. It presents a simple method to improve the efficiency of error control code of old Bluetooth versions over mobile WPANs through Interleaved Error Control Code (IECC) technique. The encoded packets are interleaved by simple block interleaver. Also, the paper presents a chaotic interleaving scheme as a tool against bursts of errors which depends on the chaotic Baker map. Also, the paper proposes using the chaotic interleaver instead of traditional block interleaver with Forward Error Control (FEC) scheme. A comparison study between the proposed and standard techniques for image transmission over a correlated fading channel is presented. Simulation results reveal the superiority of the proposed chaotic interleaving scheme to other schemes. Also, the superiority of FEC with proposed chaotic interleaver to the conventional interleavers with enhancing the security level with chaotic interleaving packetby- packet basis.

Intelligent Speaker Verification based Biometric System for Electronic Commerce Applications

Electronic commerce is growing rapidly with on-line sales already heading for hundreds of billion dollars per year. Due to the huge amount of money transferred everyday, an increased security level is required. In this work we present the architecture of an intelligent speaker verification system, which is able to accurately verify the registered users of an e-commerce service using only their voices as an input. According to the proposed architecture, a transaction-based e-commerce application should be complemented by a biometric server where customer-s unique set of speech models (voiceprint) is stored. The verification procedure requests from the user to pronounce a personalized sequence of digits and after capturing speech and extracting voice features at the client side are sent back to the biometric server. The biometric server uses pattern recognition to decide whether the received features match the stored voiceprint of the customer who claims to be, and accordingly grants verification. The proposed architecture can provide e-commerce applications with a higher degree of certainty regarding the identity of a customer, and prevent impostors to execute fraudulent transactions.

Study of Encapsulation of Quantum Dots in Polystyrene and Poly (E-Caprolactone)Microreactors Prepared by Microvolcanic Eruption of Freeze Dried Microspheres

Polymeric microreactors have emerged as a new generation of carriers that hold tremendous promise in the areas of cancer therapy, controlled delivery of drugs, for removal of pollutants etc. Present work reports a simple and convenient methodology for synthesis of polystyrene and poly caprolactone microreactors. An aqueous suspension of carboxylated (1μm) polystyrene latex particles was mixed with toluene solution followed by freezing with liquid nitrogen. Freezed particles were incubated at -20°C and characterized for formation of voids on the surface of polymer microspheres by Field Emission Scanning Electron Microscope. The hollow particles were then overnight incubated at 40ºC with unfunctionalized quantum dots (QDs) in 5:1 ratio. QDs Encapsulated polystyrene microcapsules were characterized by fluorescence microscopy. Likewise Poly ε-caprolactone microreactors were prepared by micro-volcanic rupture of freeze dried microspheres synthesized using emulsification of polymer with aqueous Poly vinyl alcohol and freezed with liquid nitrogen. Microreactors were examined with Field Emission Scanning Electron Microscope for size and morphology. Current study is an attempt to create hollow polymer particles which can be employed for microencapsulation of nanoparticles and drug molecules.

The Portuguese Press Portrait of “Environmental Refugees“

The migration-environment nexus has gained increased interest from the social research field over the last years. While straightly connected to human security issues, this theme has pervaded through the media to the public sphere. Therefore, it is important to observe how did the discussions over environmentally induced migrations develop from the scientific basis to the media attention, passing through some political voices, and in which ways might these messages be interpreted within the broader public discourses. To achieve this purpose, the analysis of the press entries between 2004 and 2010 in three of the main Portuguese newspapers shall be presented, specially reflecting upon the events, protagonists, topics, geographical attributions and terms/expressions used to define those who migrate due to environmental degradation or disasters.

Computational Analysis of Hemodynamic Effects on Aneurysm Coil Bundle

Recurrence of aneurysm rupture can be attributed to coil migration and compaction. In order to verify the effects of hemodynamics on coil compaction and migration, we analyze the forces and displacements on the coil bundle using a computational method. Lateral aneurysms partially filled coils are modeled, and blood flow fields and coil deformations are simulated considering fluid and solid interaction. Effects of aneurysm neck size and parent vessel geometry are also investigated. The results showed that coil deformation was larger in the aneurysms with a wider neck. Parent vessel geometry and aneurysm neck size also affected mean pressure force profiles on the coil surface. Pressure forces were higher in wide neck models with curved parent vessel geometry. Simulation results showed that coils in the wide neck aneurysm with a curved parent vessel may be displaced and compacted more easily.

Impacts of Climate Change under the Threat of Global Warming for an Agricultural Watershed of the Kangsabati River

The effects of global warming on India vary from the submergence of low-lying islands and coastal lands to the melting of glaciers in the Indian Himalayas, threatening the volumetric flow rate of many of the most important rivers of India and South Asia. In India, such effects are projected to impact millions of lives. As a result of ongoing climate change, the climate of India has become increasingly volatile over the past several decades; this trend is expected to continue. Climate change is one of the most important global environmental challenges, with implications for food production, water supply, health, energy, etc. Addressing climate change requires a good scientific understanding as well as coordinated action at national and global level. The climate change issue is part of the larger challenge of sustainable development. As a result, climate policies can be more effective when consistently embedded within broader strategies designed to make national and regional development paths more sustainable. The impact of climate variability and change, climate policy responses, and associated socio-economic development will affect the ability of countries to achieve sustainable development goals. A very well calibrated Soil and Water Assessment Tool (R2 = 0.9968, NSE = 0.91) was exercised over the Khatra sub basin of the Kangsabati River watershed in Bankura district of West Bengal, India, in order to evaluate projected parameters for agricultural activities. Evapotranspiration, Transmission Losses, Potential Evapotranspiration and Lateral Flow to reach are evaluated from the years 2041-2050 in order to generate a picture for sustainable development of the river basin and its inhabitants. India has a significant stake in scientific advancement as well as an international understanding to promote mitigation and adaptation. This requires improved scientific understanding, capacity building, networking and broad consultation processes. This paper is a commitment towards the planning, management and development of the water resources of the Kangsabati River by presenting detailed future scenarios of the Kangsabati river basin, Khatra sub basin, over the mentioned time period. India-s economy and societal infrastructures are finely tuned to the remarkable stability of the Indian monsoon, with the consequence that vulnerability to small changes in monsoon rainfall is very high. In 2002 the monsoon rains failed during July, causing profound loss of agricultural production with a drop of over 3% in India-s GDP. Neither the prolonged break in the monsoon nor the seasonal rainfall deficit was predicted. While the general features of monsoon variability and change are fairly well-documented, the causal mechanisms and the role of regional ecosystems in modulating the changes are still not clear. Current climate models are very poor at modelling the Asian monsoon: this is a challenging and critical region where the ocean, atmosphere, land surface and mountains all interact. The impact of climate change on regional ecosystems is likewise unknown. The potential for the monsoon to become more volatile has major implications for India itself and for economies worldwide. Knowledge of future variability of the monsoon system, particularly in the context of global climate change, is of great concern for regional water and food security. The major findings of this paper were that of all the chosen projected parameters, transmission losses, soil water content, potential evapotranspiration, evapotranspiration and lateral flow to reach, display an increasing trend over the time period of years 2041- 2050.

A Security Analysis for Home Gateway Architectures

Providing Services at Home has become over the last few years a very dynamic and promising technological domain. It is likely to enable wide dissemination of secure and automated living environments. We propose a methodology for identifying threats to Services at Home Delivery systems, as well as a threat analysis of a multi-provider Home Gateway architecture. This methodology is based on a dichotomous positive/preventive study of the target system: it aims at identifying both what the system must do, and what it must not do. This approach completes existing methods with a synthetic view of potential security flaws, thus enabling suitable measures to be taken into account. Security implications of the evolution of a given system become easier to deal with. A prototype is built based on the conclusions of this analysis.

A New Secure Communication Model Based on Synchronization of Coupled Multidelay Feedback Systems

Recent research result has shown that two multidelay feedback systems can synchronize each other under different schemes, i.e. lag, projective-lag, anticipating, or projectiveanticipating synchronization. There, the driving signal is significantly complex due that it is constituted by multiple nonlinear transformations of delayed state variable. In this paper, a secure communication model is proposed based on synchronization of coupled multidelay feedback systems, in which the plain signal is mixed with a complex signal at the transmitter side and it is precisely retrieved at the receiver side. The effectiveness of the proposed model is demonstrated and verified in the specific example, where the message signal is masked directly by the complex signal and security is examined under the breaking method of power spectrum analysis.

Security Weaknesses of Dynamic ID-based Remote User Authentication Protocol

Recently, with the appearance of smart cards, many user authentication protocols using smart card have been proposed to mitigate the vulnerabilities in user authentication process. In 2004, Das et al. proposed a ID-based user authentication protocol that is secure against ID-theft and replay attack using smart card. In 2009, Wang et al. showed that Das et al.-s protocol is not secure to randomly chosen password attack and impersonation attack, and proposed an improved protocol. Their protocol provided mutual authentication and efficient password management. In this paper, we analyze the security weaknesses and point out the vulnerabilities of Wang et al.-s protocol.

An Algorithm for an Optimal Staffing Problem in Open Shop Environment

The paper addresses a problem of optimal staffing in open shop environment. The problem is to determine the optimal number of operators serving a given number of machines to fulfill the number of independent operations while minimizing staff idle. Using a Gantt chart presentation of the problem it is modeled as twodimensional cutting stock problem. A mixed-integer programming model is used to get minimal job processing time (makespan) for fixed number of machines' operators. An algorithm for optimal openshop staffing is developed based on iterative solving of the formulated optimization task. The execution of the developed algorithm provides optimal number of machines' operators in the sense of minimum staff idle and optimal makespan for that number of operators. The proposed algorithm is tested numerically for a real life staffing problem. The testing results show the practical applicability for similar open shop staffing problems.

Civil Society and Democratization in Africa: The Role of the Civil Society in the 2005 Election in Ethiopia

One of the approaches to democratization is the fostering of civil society organizations. In Africa, civil society organizations did not fully play their role in the continent-s democratization process due to many factors including the repressive regulations imposed on them by governing parties. In Ethiopia, for the first time in the country-s political history, the civil society played a very active role in the 2005 multi-party election. The involvement of the civil society in this election has far-reaching consequences. One of the objectives of this paper is to assess the consequences of such involvement for both the civil society and the political society in the country. The paper also examines the peculiarities of civil society formation in Africa in general, and in Ethiopia in particular by assessing both the “traditional" and “modern" civil society organizations.

Effects of Upflow Liquid Velocity on Performance of Expanded Granular Sludge Bed (EGSB) System

The effects of upflow liquid velocity (ULV) on performance of expanded granular sludge bed (EGSB) system were investigated. The EGSB reactor, made from galvanized steel pipe 0.10 m diameter and 5 m height, had been used to treat piggery wastewater, after passing through acidification tank. It consisted of 39.3 l working volume in reaction zone and 122 l working volume in sedimentation zone, at the upper part. The reactor was seeded with anaerobically digested sludge and operated at the ULVs of 4, 8, 12 and 16 m/h, consecutively, corresponding to organic loading rates of 9.6 – 13.0 kg COD/ (m3.d). The average COD concentrations in the influent were 9,601 – 13,050 mg/l. The COD removal was not significantly different, i.e. 93.0% - 94.0%, except at ULV 12 m/h where SS in the influent was exceptionally high so that VSS washout had occurred, leading to low COD removal. The FCOD and VFA concentrations in the effluent of all experiments were not much different, indicating the same range of treatment performance. The biogas production decreased at higher ULV and ULV of 4 m/h is suggested as design criterion for EGSB system.

Parallezation Protein Sequence Similarity Algorithms using Remote Method Interface

One of the major problems in genomic field is to perform sequence comparison on DNA and protein sequences. Executing sequence comparison on the DNA and protein data is a computationally intensive task. Sequence comparison is the basic step for all algorithms in protein sequences similarity. Parallel computing is an attractive solution to provide the computational power needed to speedup the lengthy process of the sequence comparison. Our main research is to enhance the protein sequence algorithm using dynamic programming method. In our approach, we parallelize the dynamic programming algorithm using multithreaded program to perform the sequence comparison and also developed a distributed protein database among many PCs using Remote Method Interface (RMI). As a result, we showed how different sizes of protein sequences data and computation of scoring matrix of these protein sequence on different number of processors affected the processing time and speed, as oppose to sequential processing.

Expectation about Teamwork to Build a Knowledge Management System

Gurus of the Classical Management School (like Taylor, Fayol and Ford) had an opinion that work must be delegated to the individual and the individual has to be instructed, his work assessed and paid based on individual performance. The theories of the Human Relations School have changed this mentality regarding the concept of groups. They came to the conclusion that the influence of groups greatly affects the behaviour and performance of its members. Group theories today are characterized by problem-solving teams and self-managing groups authorized to make decisions and execute; professional communities also play an important role during the operation of knowledge management systems. In this theoretical research we try to find answers to a question: what kind of characteristics (professional competencies, personal features, etc.) a successful team needs to manage a change to operate a knowledge management system step by step.

Schedule Management of an Enterprise Receiving Orders Considering Dependency between Unit Tasks of a Collaborative Project

This study suggests how an order-receiving company can avoid disclosing schedule information on unit tasks to the order-placing company when carrying out a collaborative project on the value chain in an order-oriented industry. Specifically, it suggests methods for keeping schedule information confidential, and categorizes potential situations by inter-task dependency. Lastly, an approach to select the most optimal non-disclosure method is discussed. With the methods for not disclosing work-related information suggested in the study, order-receiving companies can logically deal with political issues relating to the question of whether or not to disclose information upon the execution of a collaborative project in cooperation with an order-placing firm. Moreover, order-placing companies can monitor undistorted information, while respecting the legitimate rights of an order-receiving company. Therefore, it is fair to say that the suggestions made in this study will contribute to the smooth operation of collaborative intercompany projects.

Transient Stability Assessment Using Fuzzy SVM and Modified Preventive Control

Transient Stability is an important issue in power systems planning, operation and extension. The objective of transient stability analysis problem is not satisfied with mere transient instability detection or evaluation and it is most important to complement it by defining fast and efficient control measures in order to ensure system security. This paper presents a new Fuzzy Support Vector Machines (FSVM) to investigate the stability status of power systems and a modified generation rescheduling scheme to bring back the identified unstable cases to a more economical and stable operating point. FSVM improves the traditional SVM (Support Vector Machines) by adding fuzzy membership to each training sample to indicate the degree of membership of this sample to different classes. The preventive control based on economic generator rescheduling avoids the instability of the power systems with minimum change in operating cost under disturbed conditions. Numerical results on the New England 39 bus test system show the effectiveness of the proposed method.