Abstract: Scolothrips longicornis Priesner is one of the
important predators of tetranychid mites with a wide distribution
throughout Iran. Life table and population growth parameters of S.
longicornis feeding on two-spotted spider mite, Tetranychus
turkestani Ugarov & Nikolski were investigated under laboratory
condition (26±1ºC, 65±5% R.H. and 16L: 8D). To carry of these
experiments, S. longicornis collections reared on cowpea infested
with T. turkestani were prepared. The eggs with less than 24 hours
old were selected and reared. The emerged larvae feeding directly on
cowpea leaf discs which were infested with T. turkestani. Thirty
females of S. longicornis with 24 hours age were selected and
released on infested leaf discs. They replaced daily to a new leaf disc
and the laying eggs have counted. The experiment continued till the
last thrips had died. The result showed that the mean age mortality of
the adult female thrips were between 21-25 days which is nearly
equal life expectancy (ex) at the time of adult eclosion. Parameters
related to reproductive table including gross reproductive rate, net
reproductive rate, intrinsic rate of natural increase and finite rate of
increase were 48.91, 37.63, 0.26 and 2.3, respectively. Mean age per
female/day, mean fertile egg per female/day, gross hatch rate, mean
net age fertility, mean net age fecundity, net fertility rate and net
fecundity rate were 2.23, 1.76, 0.87, 13.87, 14.26, 69.1 and 78.5,
respectively. Sex ratio of offspring also recorded daily. The highest
sex ratio for females was 0.88 in first day of oviposition. The sex
ratio decreased gradually and reached under 0.46 after the day 26 and
the oviposition rate declined. Then it seems that maintenance of
rearing culture of predatory thrips for mass rearing later than 26 days
after egg-laying commence is not profitable.
Abstract: A perfect secret-sharing scheme is a method to distribute a secret among a set of participants in such a way that only qualified subsets of participants can recover the secret and the joint share of participants in any unqualified subset is statistically independent of the secret. The collection of all qualified subsets is called the access structure of the perfect secret-sharing scheme. In a graph-based access structure, each vertex of a graph G represents a participant and each edge of G represents a minimal qualified subset. The average information ratio of a perfect secret-sharing scheme realizing the access structure based on G is defined as AR = (Pv2V (G) H(v))/(|V (G)|H(s)), where s is the secret and v is the share of v, both are random variables from and H is the Shannon entropy. The infimum of the average information ratio of all possible perfect secret-sharing schemes realizing a given access structure is called the optimal average information ratio of that access structure. Most known results about the optimal average information ratio give upper bounds or lower bounds on it. In this present structures based on bipartite graphs and determine the exact values of the optimal average information ratio of some infinite classes of them.
Abstract: In this paper we present the first Arabic sentence
dataset for on-line handwriting recognition written on tablet pc. The
dataset is natural, simple and clear. Texts are sampled from daily
newspapers. To collect naturally written handwriting, forms are
dictated to writers. The current version of our dataset includes 154
paragraphs written by 48 writers. It contains more than 3800 words
and more than 19,400 characters. Handwritten texts are mainly
written by researchers from different research centers. In order to use
this dataset in a recognition system word extraction is needed. In this
paper a new word extraction technique based on the Arabic
handwriting cursive nature is also presented. The technique is applied
to this dataset and good results are obtained. The results can be
considered as a bench mark for future research to be compared with.
Abstract: Simulation accuracy by recent dynamic vehicle
simulation multidimensional expression significantly has progressed
and acceptable results not only for passive vehicles but also for
active vehicles normally equipped with advanced electronic
components is also provided. Recently, one of the subjects that has it
been considered, is increasing the safety car in design. Therefore,
many efforts have been done to increase vehicle stability especially
in the turn. One of the most important efforts is adjusting the camber
angle in the car suspension system. Optimum control camber angle in
addition to the vehicle stability is effective in the wheel adhesion on
road, reducing rubber abrasion and acceleration and braking. Since
the increase or decrease in the camber angle impacts on the stability
of vehicles, in this paper, a car suspension system mechanism is
introduced that could be adjust camber angle and the mechanism is
application and also inexpensive. In order to reach this purpose, in
this paper, a passive double wishbone suspension system with
variable camber angle is introduced and then variable camber
mechanism designed and analyzed for study the designed system
performance, this mechanism is modeled in Visual Nastran software
and kinematic analysis is revealed.
Abstract: The heat storage capacity of concrete in building shells is a major reason for excessively large electricity consumption induced by indoor air conditioning. In this research, the previously developed Smart Temperature Information Material (STIM) is embedded in two groups of exterior wall specimens (the control group contains reinforced concrete exterior walls and the experimental group consists of tiled exterior walls). Long term temperature measurements within the concrete are taken by the embedded STIM. Temperature differences between the control group and the experimental group in walls facing the four cardinal directions (east, west, south, and north) are evaluated. This study aims to provide a basic reference for the design of exterior walls and the selection of heat insulation materials.
Abstract: This paper presents a design of source encoding
calculator software which applies the two famous algorithms in the
field of information theory- the Shannon-Fano and the Huffman
schemes. This design helps to easily realize the algorithms without
going into a cumbersome, tedious and prone to error manual
mechanism of encoding the signals during the transmission. The
work describes the design of the software, how it works, comparison
with related works, its efficiency, its usefulness in the field of
information technology studies and the future prospects of the
software to engineers, students, technicians and alike. The designed
“Encodia" software has been developed, tested and found to meet the
intended requirements. It is expected that this application will help
students and teaching staff in their daily doing of information theory
related tasks. The process is ongoing to modify this tool so that it can
also be more intensely useful in research activities on source coding.
Abstract: A multilayer self organizing neural neural network
(MLSONN) architecture for binary object extraction, guided by a beta
activation function and characterized by backpropagation of errors
estimated from the linear indices of fuzziness of the network output
states, is discussed. Since the MLSONN architecture is designed to
operate in a single point fixed/uniform thresholding scenario, it does
not take into cognizance the heterogeneity of image information in
the extraction process. The performance of the MLSONN architecture
with representative values of the threshold parameters of the beta
activation function employed is also studied. A three layer bidirectional
self organizing neural network (BDSONN) architecture
comprising fully connected neurons, for the extraction of objects from
a noisy background and capable of incorporating the underlying image
context heterogeneity through variable and adaptive thresholding,
is proposed in this article. The input layer of the network architecture
represents the fuzzy membership information of the image scene to
be extracted. The second layer (the intermediate layer) and the final
layer (the output layer) of the network architecture deal with the self
supervised object extraction task by bi-directional propagation of the
network states. Each layer except the output layer is connected to the
next layer following a neighborhood based topology. The output layer
neurons are in turn, connected to the intermediate layer following
similar topology, thus forming a counter-propagating architecture
with the intermediate layer. The novelty of the proposed architecture
is that the assignment/updating of the inter-layer connection weights
are done using the relative fuzzy membership values at the constituent
neurons in the different network layers. Another interesting feature
of the network lies in the fact that the processing capabilities of
the intermediate and the output layer neurons are guided by a beta
activation function, which uses image context sensitive adaptive
thresholding arising out of the fuzzy cardinality estimates of the
different network neighborhood fuzzy subsets, rather than resorting to
fixed and single point thresholding. An application of the proposed
architecture for object extraction is demonstrated using a synthetic
and a real life image. The extraction efficiency of the proposed
network architecture is evaluated by a proposed system transfer index
characteristic of the network.
Abstract: The goal of steganography is to avoid drawing
suspicion to the transmission of a hidden message. If suspicion is
raised, steganography may fail. The success of steganography
depends on the secrecy of the action. If steganography is detected,
the system will fail but data security depends on the robustness of the
applied algorithm. In this paper, we propose a novel plausible
deniability scheme in steganography by using a diversionary message
and encrypt it with a DES-based algorithm. Then, we compress the
secret message and encrypt it by the receiver-s public key along with
the stego key and embed both messages in a carrier using an
embedding algorithm. It will be demonstrated how this method can
support plausible deniability and is robust against steganalysis.
Abstract: Multirate multimedia delivery applications in multihop Wireless Mesh Network (WMN) are data redundant and delay-sensitive, which brings a lot of challenges for designing efficient transmission systems. In this paper, we propose a new cross layer resource allocation scheme to minimize the receiver side distortion within the delay bound requirements, by exploring application layer Position and Value (P-V) diversity as well as the multihop Effective Capacity (EC). We specifically consider image transmission optimization here. First of all, the maximum supportable source traffic rate is identified by exploring the multihop Effective Capacity (EC) model. Furthermore, the optimal source coding rate is selected according to the P-V diversity of multirate media streaming, which significantly increases the decoded media quality. Simulation results show the proposed approach improved media quality significantly compared with traditional approaches under the same QoS requirements.
Abstract: This paper presents the modeling and simulation of a hybrid proton exchange membrane fuel cell (PEMFC) with an energy storage system for use in a stand-alone distributed generation (DG) system. The simulation model consists of fuel cell DG, lead-acid battery, maximum power point tracking and power conditioning unit which is modeled in the MATLAB/Simulink platform. Poor loadfollowing characteristics and slow response to rapid load changes are some of the weaknesses of PEMFC because of the gas processing reaction and the fuel cell dynamics. To address the load-tracking issues in PEMFC, a hybrid PEMFC and battery storage system is considered and modelled. The model utilizes PEMFC as the main energy source whereas the battery functions as energy storage to compensate for the limitations of PEMFC.Simulation results are given to show the overall system performance under light and heavyloading conditions.
Abstract: A number of previous studies were rarely considered
the effects of transient non-uniform balloon expansion on evaluation
of the properties and behaviors of stents during stent expansion, nor
did they determine parameters to maximize the performances driven
by mechanical characteristics. Therefore, in order to fully understand
the mechanical characteristics and behaviors of stent, it is necessary to
consider a realistic modeling of transient non-uniform balloon-stent
expansion. The aim of the study is to propose design parameters
capable of improving the ability of vascular stent through a
comparative study of seven commercial stents using finite element
analyses of a realistic transient non-uniform balloon-stent expansion
process. In this study, seven representative commercialized stents were
evaluated by finite element (FE) analysis in terms of the criteria based
on the itemized list of Food and Drug Administration (FDA) and
European Standards (prEN). The results indicate that using stents
composed of opened unit cells connected by bend-shaped link
structures and controlling the geometrical and morphological features
of the unit cell strut or the link structure at the distal ends of stent may
improve mechanical characteristics of stent. This study provides a
better method at the realistic transient non-uniform balloon-stent
expansion by investigating the characteristics, behaviors, and
parameters capable of improving the ability of vascular stent.
Abstract: In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get furtherdiscussions among the security of SDN virtualization.
Abstract: This paper discusses the approach of real-time
controlling of the energy management system using the data
acquisition tool of LabVIEW. The main idea of this inspiration was
to interface the Station (PC) with the system and publish the data on
internet using LabVIEW. In this venture, controlling and switching of
3 phase AC loads are effectively and efficiently done. The phases are
also sensed through devices. In case of any failure the attached
generator starts functioning automatically. The computer sends
command to the system and system respond to the request. The
modern feature is to access and control the system world-wide using
world wide web (internet). This controlling can be done at any time
from anywhere to effectively use the energy especially in developing
countries where energy management is a big problem. In this system
totally integrated devices are used to operate via remote location.
Abstract: Gas flaring is one of the most GHG emitting sources in the oil and gas industries. It is also a major way for wasting such an energy that could be better utilized and even generates revenue. Minimize flaring is an effective approach for reducing GHG emissions and also conserving energy in flaring systems. Integrating waste and flared gases into the fuel gas networks (FGN) of refineries is an efficient tool. A fuel gas network collects fuel gases from various source streams and mixes them in an optimal manner, and supplies them to different fuel sinks such as furnaces, boilers, turbines, etc. In this article we use fuel gas network model proposed by Hasan et al. as a base model and modify some of its features and add constraints on emission pollution by gas flaring to reduce GHG emissions as possible. Results for a refinery case study showed that integration of flare gas stream with waste and natural gas streams to construct an optimal FGN can significantly reduce total annualized cost and flaring emissions.
Abstract: Benchmarking cleaner production performance is an
effective way of pollution control and emission reduction in coal-fired
power industry. A benchmarking method using two-stage
super-efficiency data envelopment analysis for coal-fired power plants
is proposed – firstly, to improve the cleaner production performance of
DEA-inefficient or weakly DEA-efficient plants, then to select the
benchmark from performance-improved power plants. An empirical
study is carried out with the survey data of 24 coal-fired power plants.
The result shows that in the first stage the performance of 16 plants is
DEA-efficient and that of 8 plants is relatively inefficient. The target
values for improving DEA-inefficient plants are acquired by
projection analysis. The efficient performance of 24 power plants and
the benchmarking plant is achieved in the second stage. The two-stage
benchmarking method is practical to select the optimal benchmark in
the cleaner production of coal-fired power industry and will
continuously improve plants- cleaner production performance.
Abstract: Paced Auditory Serial Addition Test (PASAT) has
been used as a common research tool for different neurological
disorders like Multiple Sclerosis. Recently, technology let
researchers to introduce a new versions of the visual test, the paced
visual serial addition test (PVSAT). In this paper, the computerized
version of these two tests is introduced. Beside the number of true
responses are interpreted, the reaction time of subjects are calculated
by the software. We hypothesize that paying attention to the reaction
time may be valuable. For this purpose, sixty eight female normal
subjects and fifty eight male normal subjects are enrolled in the
study. We investigate the similarity between the PASAT3 and
PVSAT3 in number of true responses and the new criterion (the
average reaction time of each subject). The similarity between two
tests were rejected (p-value = 0.000) which means that these two test
differ. The effect of sex in the tests were not approved since the pvalues
of different between PASAT3 and PVSAT3 in both sex is the
same (p-value = 0.000) which means that male and female subjects
performed the tests at no different level of performance. The new
criterion shows a negative correlation with the age which offers aged
normal subjects may have the same number of true responses as the
young subjects but they have latent responses. This will give prove
for the importance of reaction time.
Abstract: In this paper, the melting of a semi-infinite body as a
result of a moving laser beam has been studied. Because the Fourier
heat transfer equation at short times and large dimensions does not
have sufficient accuracy; a non-Fourier form of heat transfer
equation has been used. Due to the fact that the beam is moving in x
direction, the temperature distribution and the melting pool shape are
not asymmetric. As a result, the problem is a transient threedimensional
problem. Therefore, thermophysical properties such as
heat conductivity coefficient, density and heat capacity are functions
of temperature and material states. The enthalpy technique, used for
the solution of phase change problems, has been used in an explicit
finite volume form for the hyperbolic heat transfer equation. This
technique has been used to calculate the transient temperature
distribution in the semi-infinite body and the growth rate of the melt
pool. In order to validate the numerical results, comparisons were
made with experimental data. Finally, the results of this paper were
compared with similar problem that has used the Fourier theory. The
comparison shows the influence of infinite speed of heat propagation
in Fourier theory on the temperature distribution and the melt pool
size.
Abstract: The myoelectric signal (MES) is one of the Biosignals
utilized in helping humans to control equipments. Recent approaches
in MES classification to control prosthetic devices employing pattern
recognition techniques revealed two problems, first, the classification
performance of the system starts degrading when the number of
motion classes to be classified increases, second, in order to solve the
first problem, additional complicated methods were utilized which
increase the computational cost of a multifunction myoelectric
control system. In an effort to solve these problems and to achieve a
feasible design for real time implementation with high overall
accuracy, this paper presents a new method for feature extraction in
MES recognition systems. The method works by extracting features
using Wavelet Packet Transform (WPT) applied on the MES from
multiple channels, and then employs Fuzzy c-means (FCM)
algorithm to generate a measure that judges on features suitability for
classification. Finally, Principle Component Analysis (PCA) is
utilized to reduce the size of the data before computing the
classification accuracy with a multilayer perceptron neural network.
The proposed system produces powerful classification results (99%
accuracy) by using only a small portion of the original feature set.
Abstract: Identifying parameters in an epidemic model is one
of the important aspect of modeling. In this paper, we suggest a
method to identify the transmission rate by using the multistage
Adomian decomposition method. As a case study, we use the data of
the reported dengue fever cases in the city of Shah Alam, Malaysia.
The result obtained fairly represents the actual situation. However, in
the SIR model, this method serves as an alternative in parameter
identification and enables us to make necessary analysis for a smaller
interval.
Abstract: The determination of sugars in foods is very
significant. Their relation in fact, can affect the chemical and
sensorial quality of the matrix (e.g., sweetness, pH, total acidity,
microbial stability, global acceptability) and can provide information
on food to optimize several selected technological processes. Three
stages of ripeness (green, yellow and red) of tomatoes (Lycopersicon
Esculentum cv. Elegance) at different harvest dates were evaluated.
Fruit from all harvests were exposed to different of ozone doses
(0.25, 0.50 and 1 mg O3/g tomatoes) and clean air for 5 day at 15
°C±2 and 90-95 % relative humidity. Then, fruits were submitted for
extraction and analysis after a day from the finish of exposure of each
stage. The concentrations of the glucose and fructose increased in the
tomatoes which were subjected to ozone treatments.