Abstract: We developed a method based on quasi-molecular
modelling to simulate the fall of water drops on horizontally smooth
and rough surfaces. Each quasi-molecule was a group of particles
that interacted in a fashion entirely analogous to classical Newtonian
molecular interactions. When a falling water droplet was simulated at
low impact velocity on both smooth and rough surfaces, the droplets
moved periodically (i.e. the droplets moved up and down for a
certain period, finally they stopped moving and reached a steady
state), spreading and recoiling without splash or break-up. Spreading
rates of falling water droplets increased rapidly as time increased
until the spreading rate reached its steady state at time t ~ 0.25 s for
rough surface and t ~ 0.40 s for smooth surface. The droplet height
above both surfaces decreased as time increased, remained constant
after the droplet diameter attained a maximum value and reached its
steady state at time t ~ 0.4 s. However, rough surface had higher
spreading rates of falling water droplets and lower height on the
surface than smooth one.
Abstract: Sol-gel method has been used to fabricate
nanocomposite films on glass substrates composed halloysite clay
mineral and nanocrystalline TiO2. The methodology for the synthesis
involves a simple chemistry method utilized nonionic surfactant
molecule as pore directing agent along with the acetic acid-based solgel
route with the absence of water molecules. The thermal treatment
of composite films at 450oC ensures elimination of organic material
and lead to the formation of TiO2 nanoparticles onto the surface of
the halloysite nanotubes. Microscopy techniques and porosimetry
methods used in order to delineate the structural characteristics of the
materials. The nanocomposite films produced have no cracks and
active anatase crystal phase with small crystallite size were deposited
on halloysite nanotubes. The photocatalytic properties for the new
materials were examined for the decomposition of the Basic Blue 41
azo dye in solution. These, nanotechnology based composite films
show high efficiency for dye’s discoloration in spite of different
halloysite quantities and small amount of halloysite/TiO2 catalyst
immobilized onto glass substrates. Moreover, we examined the
modification of the halloysite/TiO2 films with silver particles in order
to improve the photocatalytic properties of the films. Indeed, the
presence of silver nanoparticles enhances the discoloration rate of the
Basic Blue 41 compared to the efficiencies obtained for unmodified
films.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: The world is moving rapidly toward the deployment
of information and communication systems. Nowadays, computing
systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important activity in
development process of computing systems, specially in developing
systems such as banking, military and e-business systems. For
developing every system, a process model which includes a process,
methods and tools is chosen. The Rational Unified Process (RUP) is
one of the most popular and complete process models which is used
by developers in recent years. This process model should be extended to be used in developing secure software systems. In this
paper, the Requirement Discipline of RUP is extended to improve RUP for developing secure software systems. These proposed extensions are adding and integrating a number of Activities, Roles,
and Artifacts to RUP in order to capture, document and model threats
and security requirements of system. These extensions introduce a
group of clear and stepwise activities to developers. By following these activities, developers assure that security requirements are
captured and modeled. These models are used in design, implementation and test activitie
Abstract: This paper studies a vital issue in wireless
communications, which is the transmission of images over Wireless
Personal Area Networks (WPANs) through the Bluetooth network. It
presents a simple method to improve the efficiency of error control
code of old Bluetooth versions over mobile WPANs through
Interleaved Error Control Code (IECC) technique. The encoded
packets are interleaved by simple block interleaver. Also, the paper
presents a chaotic interleaving scheme as a tool against bursts of
errors which depends on the chaotic Baker map. Also, the paper
proposes using the chaotic interleaver instead of traditional block
interleaver with Forward Error Control (FEC) scheme. A comparison
study between the proposed and standard techniques for image
transmission over a correlated fading channel is presented.
Simulation results reveal the superiority of the proposed chaotic
interleaving scheme to other schemes. Also, the superiority of FEC
with proposed chaotic interleaver to the conventional interleavers
with enhancing the security level with chaotic interleaving packetby-
packet basis.
Abstract: Electronic commerce is growing rapidly with on-line
sales already heading for hundreds of billion dollars per year. Due to
the huge amount of money transferred everyday, an increased
security level is required. In this work we present the architecture of
an intelligent speaker verification system, which is able to accurately
verify the registered users of an e-commerce service using only their
voices as an input. According to the proposed architecture, a
transaction-based e-commerce application should be complemented
by a biometric server where customer-s unique set of speech models
(voiceprint) is stored. The verification procedure requests from the
user to pronounce a personalized sequence of digits and after
capturing speech and extracting voice features at the client side are
sent back to the biometric server. The biometric server uses pattern
recognition to decide whether the received features match the stored
voiceprint of the customer who claims to be, and accordingly grants
verification. The proposed architecture can provide e-commerce
applications with a higher degree of certainty regarding the identity
of a customer, and prevent impostors to execute fraudulent
transactions.
Abstract: Polymeric microreactors have emerged as a new
generation of carriers that hold tremendous promise in the areas of
cancer therapy, controlled delivery of drugs, for removal of
pollutants etc. Present work reports a simple and convenient
methodology for synthesis of polystyrene and poly caprolactone
microreactors. An aqueous suspension of carboxylated (1μm)
polystyrene latex particles was mixed with toluene solution followed
by freezing with liquid nitrogen. Freezed particles were incubated at
-20°C and characterized for formation of voids on the surface of
polymer microspheres by Field Emission Scanning Electron
Microscope. The hollow particles were then overnight incubated at
40ºC with unfunctionalized quantum dots (QDs) in 5:1 ratio. QDs
Encapsulated polystyrene microcapsules were characterized by
fluorescence microscopy.
Likewise Poly ε-caprolactone microreactors were prepared by
micro-volcanic rupture of freeze dried microspheres synthesized
using emulsification of polymer with aqueous Poly vinyl alcohol and
freezed with liquid nitrogen. Microreactors were examined with Field
Emission Scanning Electron Microscope for size and morphology.
Current study is an attempt to create hollow polymer particles which
can be employed for microencapsulation of nanoparticles and drug
molecules.
Abstract: The migration-environment nexus has gained increased interest from the social research field over the last years. While straightly connected to human security issues, this theme has pervaded through the media to the public sphere. Therefore, it is important to observe how did the discussions over environmentally induced migrations develop from the scientific basis to the media attention, passing through some political voices, and in which ways might these messages be interpreted within the broader public discourses. To achieve this purpose, the analysis of the press entries between 2004 and 2010 in three of the main Portuguese newspapers shall be presented, specially reflecting upon the events, protagonists, topics, geographical attributions and terms/expressions used to define those who migrate due to environmental degradation or disasters.
Abstract: Recurrence of aneurysm rupture can be attributed to
coil migration and compaction. In order to verify the effects of
hemodynamics on coil compaction and migration, we analyze the
forces and displacements on the coil bundle using a computational
method. Lateral aneurysms partially filled coils are modeled, and
blood flow fields and coil deformations are simulated considering
fluid and solid interaction. Effects of aneurysm neck size and parent
vessel geometry are also investigated. The results showed that coil
deformation was larger in the aneurysms with a wider neck. Parent
vessel geometry and aneurysm neck size also affected mean pressure
force profiles on the coil surface. Pressure forces were higher in wide
neck models with curved parent vessel geometry. Simulation results
showed that coils in the wide neck aneurysm with a curved parent
vessel may be displaced and compacted more easily.
Abstract: The effects of global warming on India vary from the
submergence of low-lying islands and coastal lands to the melting of
glaciers in the Indian Himalayas, threatening the volumetric flow rate
of many of the most important rivers of India and South Asia. In
India, such effects are projected to impact millions of lives. As a
result of ongoing climate change, the climate of India has become
increasingly volatile over the past several decades; this trend is
expected to continue.
Climate change is one of the most important global environmental
challenges, with implications for food production, water supply,
health, energy, etc. Addressing climate change requires a good
scientific understanding as well as coordinated action at national and
global level. The climate change issue is part of the larger challenge
of sustainable development. As a result, climate policies can be more
effective when consistently embedded within broader strategies
designed to make national and regional development paths more
sustainable. The impact of climate variability and change, climate
policy responses, and associated socio-economic development will
affect the ability of countries to achieve sustainable development
goals.
A very well calibrated Soil and Water Assessment Tool (R2 =
0.9968, NSE = 0.91) was exercised over the Khatra sub basin of the
Kangsabati River watershed in Bankura district of West Bengal,
India, in order to evaluate projected parameters for agricultural
activities. Evapotranspiration, Transmission Losses, Potential
Evapotranspiration and Lateral Flow to reach are evaluated from the
years 2041-2050 in order to generate a picture for sustainable
development of the river basin and its inhabitants.
India has a significant stake in scientific advancement as well as
an international understanding to promote mitigation and adaptation.
This requires improved scientific understanding, capacity building,
networking and broad consultation processes. This paper is a
commitment towards the planning, management and development of
the water resources of the Kangsabati River by presenting detailed
future scenarios of the Kangsabati river basin, Khatra sub basin, over
the mentioned time period.
India-s economy and societal infrastructures are finely tuned to the
remarkable stability of the Indian monsoon, with the consequence
that vulnerability to small changes in monsoon rainfall is very high.
In 2002 the monsoon rains failed during July, causing profound loss
of agricultural production with a drop of over 3% in India-s GDP.
Neither the prolonged break in the monsoon nor the seasonal rainfall
deficit was predicted. While the general features of monsoon
variability and change are fairly well-documented, the causal
mechanisms and the role of regional ecosystems in modulating the
changes are still not clear. Current climate models are very poor at
modelling the Asian monsoon: this is a challenging and critical
region where the ocean, atmosphere, land surface and mountains all
interact. The impact of climate change on regional ecosystems is
likewise unknown. The potential for the monsoon to become more
volatile has major implications for India itself and for economies
worldwide. Knowledge of future variability of the monsoon system,
particularly in the context of global climate change, is of great
concern for regional water and food security.
The major findings of this paper were that of all the chosen
projected parameters, transmission losses, soil water content,
potential evapotranspiration, evapotranspiration and lateral flow to
reach, display an increasing trend over the time period of years 2041-
2050.
Abstract: Providing Services at Home has become over the last
few years a very dynamic and promising technological domain. It is
likely to enable wide dissemination of secure and automated living
environments. We propose a methodology for identifying threats to
Services at Home Delivery systems, as well as a threat analysis
of a multi-provider Home Gateway architecture. This methodology
is based on a dichotomous positive/preventive study of the target
system: it aims at identifying both what the system must do, and
what it must not do. This approach completes existing methods with
a synthetic view of potential security flaws, thus enabling suitable
measures to be taken into account. Security implications of the
evolution of a given system become easier to deal with. A prototype
is built based on the conclusions of this analysis.
Abstract: Recent research result has shown that two multidelay
feedback systems can synchronize each other under different
schemes, i.e. lag, projective-lag, anticipating, or projectiveanticipating
synchronization. There, the driving signal is significantly
complex due that it is constituted by multiple nonlinear transformations
of delayed state variable. In this paper, a secure communication
model is proposed based on synchronization of coupled multidelay
feedback systems, in which the plain signal is mixed with a complex
signal at the transmitter side and it is precisely retrieved at the receiver
side. The effectiveness of the proposed model is demonstrated and
verified in the specific example, where the message signal is masked
directly by the complex signal and security is examined under the
breaking method of power spectrum analysis.
Abstract: Recently, with the appearance of smart cards, many
user authentication protocols using smart card have been proposed to
mitigate the vulnerabilities in user authentication process. In 2004,
Das et al. proposed a ID-based user authentication protocol that is
secure against ID-theft and replay attack using smart card. In 2009,
Wang et al. showed that Das et al.-s protocol is not secure to randomly
chosen password attack and impersonation attack, and proposed an
improved protocol. Their protocol provided mutual authentication and
efficient password management. In this paper, we analyze the security
weaknesses and point out the vulnerabilities of Wang et al.-s protocol.
Abstract: The paper addresses a problem of optimal staffing in
open shop environment. The problem is to determine the optimal
number of operators serving a given number of machines to fulfill the
number of independent operations while minimizing staff idle. Using
a Gantt chart presentation of the problem it is modeled as twodimensional
cutting stock problem. A mixed-integer programming
model is used to get minimal job processing time (makespan) for
fixed number of machines' operators. An algorithm for optimal openshop
staffing is developed based on iterative solving of the
formulated optimization task. The execution of the developed
algorithm provides optimal number of machines' operators in the
sense of minimum staff idle and optimal makespan for that number of
operators. The proposed algorithm is tested numerically for a real life
staffing problem. The testing results show the practical applicability
for similar open shop staffing problems.
Abstract: One of the approaches to democratization is the fostering of civil society organizations. In Africa, civil society organizations did not fully play their role in the continent-s democratization process due to many factors including the repressive regulations imposed on them by governing parties. In Ethiopia, for the first time in the country-s political history, the civil society played a very active role in the 2005 multi-party election. The involvement of the civil society in this election has far-reaching consequences. One of the objectives of this paper is to assess the consequences of such involvement for both the civil society and the political society in the country. The paper also examines the peculiarities of civil society formation in Africa in general, and in Ethiopia in particular by assessing both the “traditional" and “modern" civil society organizations.
Abstract: The effects of upflow liquid velocity (ULV) on
performance of expanded granular sludge bed (EGSB) system were
investigated. The EGSB reactor, made from galvanized steel pipe
0.10 m diameter and 5 m height, had been used to treat piggery
wastewater, after passing through acidification tank. It consisted of
39.3 l working volume in reaction zone and 122 l working volume in
sedimentation zone, at the upper part. The reactor was seeded with
anaerobically digested sludge and operated at the ULVs of 4, 8, 12
and 16 m/h, consecutively, corresponding to organic loading rates of
9.6 – 13.0 kg COD/ (m3.d). The average COD concentrations in the
influent were 9,601 – 13,050 mg/l. The COD removal was not
significantly different, i.e. 93.0% - 94.0%, except at ULV 12 m/h where
SS in the influent was exceptionally high so that VSS washout had
occurred, leading to low COD removal. The FCOD and VFA
concentrations in the effluent of all experiments were not much
different, indicating the same range of treatment performance. The
biogas production decreased at higher ULV and ULV of 4 m/h is
suggested as design criterion for EGSB system.
Abstract: One of the major problems in genomic field is to perform sequence comparison on DNA and protein sequences. Executing sequence comparison on the DNA and protein data is a computationally intensive task. Sequence comparison is the basic step for all algorithms in protein sequences similarity. Parallel computing is an attractive solution to provide the computational power needed to speedup the lengthy process of the sequence comparison. Our main research is to enhance the protein sequence algorithm using dynamic programming method. In our approach, we parallelize the dynamic programming algorithm using multithreaded program to perform the sequence comparison and also developed a distributed protein database among many PCs using Remote Method Interface (RMI). As a result, we showed how different sizes of protein sequences data and computation of scoring matrix of these protein sequence on different number of processors affected the processing time and speed, as oppose to sequential processing.
Abstract: Gurus of the Classical Management School (like
Taylor, Fayol and Ford) had an opinion that work must be delegated
to the individual and the individual has to be instructed, his work
assessed and paid based on individual performance. The theories of
the Human Relations School have changed this mentality regarding
the concept of groups. They came to the conclusion that the influence
of groups greatly affects the behaviour and performance of its
members.
Group theories today are characterized by problem-solving teams
and self-managing groups authorized to make decisions and execute;
professional communities also play an important role during the
operation of knowledge management systems.
In this theoretical research we try to find answers to a question:
what kind of characteristics (professional competencies, personal
features, etc.) a successful team needs to manage a change to operate
a knowledge management system step by step.
Abstract: This study suggests how an order-receiving company
can avoid disclosing schedule information on unit tasks to the
order-placing company when carrying out a collaborative project on
the value chain in an order-oriented industry. Specifically, it suggests
methods for keeping schedule information confidential, and
categorizes potential situations by inter-task dependency. Lastly, an
approach to select the most optimal non-disclosure method is
discussed. With the methods for not disclosing work-related
information suggested in the study, order-receiving companies can
logically deal with political issues relating to the question of whether
or not to disclose information upon the execution of a collaborative
project in cooperation with an order-placing firm. Moreover,
order-placing companies can monitor undistorted information, while
respecting the legitimate rights of an order-receiving company.
Therefore, it is fair to say that the suggestions made in this study will
contribute to the smooth operation of collaborative intercompany
projects.
Abstract: Transient Stability is an important issue in power systems planning, operation and extension. The objective of transient stability analysis problem is not satisfied with mere transient instability detection or evaluation and it is most important to complement it by defining fast and efficient control measures in order to ensure system security. This paper presents a new Fuzzy Support Vector Machines (FSVM) to investigate the stability status of power systems and a modified generation rescheduling scheme to bring back the identified unstable cases to a more economical and stable operating point. FSVM improves the traditional SVM (Support Vector Machines) by adding fuzzy membership to each training sample to indicate the degree of membership of this sample to different classes. The preventive control based on economic generator rescheduling avoids the instability of the power systems with minimum change in operating cost under disturbed conditions. Numerical results on the New England 39 bus test system show the effectiveness of the proposed method.