Abstract: In this work, axisymetric CFD simulation of fixed bed
GTL reactor has been conducted, using computational fluid dynamics
(CFD). In fixed bed CFD modeling, when N (tube-to-particle
diameter ratio) has a large value, it is common to consider the packed
bed as a porous media. Synthesis gas (a mixture of predominantly
carbon monoxide and hydrogen) was fed to the reactor. The reactor
length was 20 cm, divided to three sections. The porous zone was in
the middle section of the reactor. The model equations were solved
employing finite volume method. The effects of particle diameter,
bed voidage, fluid velocity and bed length on pressure drop have
been investigated. Simulation results showed these parameters could
have remarkable impacts on the reactor pressure drop.
Abstract: The Partitioned Global Address Space (PGAS) programming
paradigm offers ease-of-use in expressing parallelism
through a global shared address space while emphasizing performance
by providing locality awareness through the partitioning of
this address space. Therefore, the interest in PGAS programming
languages is growing and many new languages have emerged and
are becoming ubiquitously available on nearly all modern parallel
architectures. Recently, new parallel machines with multiple cores
are designed for targeting high performance applications. Most of the
efforts have gone into benchmarking but there are a few examples of
real high performance applications running on multicore machines.
In this paper, we present and evaluate a parallelization technique
for implementing a local DNA sequence alignment algorithm using
a PGAS based language, UPC (Unified Parallel C) on a chip
multithreading architecture, the UltraSPARC T1.
Abstract: This survey highlights a number of important issues
which relate to the needs to counseling for distance learners studying
at the School of Distance Education in University science Malaysia
(DEUSM) according to their gender. Data were obtained by selfreport
questionnaire that had been developed by the researchers in
counseling and educational psychology and interviews were take
place. 116 voluntary respondents complete the Questionnaire and
returned it back during new student-s registration week.64% of the
respondents were female and 52% were males that means
55%ofthem were females and 45% were males. The data was
analyzed to find out the frequencies of respondents agreements of the
items. The average of the female was 18 and the average of the male
was 19.6 by using t- test there is no significant values between the
genders. The findings show that respondents have needs for
counseling. (22) Significant needs for mails (DEUSM) the highest
was their families complain about the amount of time they spend at
work. (11) Significant needs for females the highest was they
convinced themselves that they only need 4 to 5 hours of sleep per
night.
Abstract: This paper describes an expanded system for a servo
system design by using the Loop Shaping Design Procedure (LSDP).
LSDP is one of the H∞ design procedure. By conducting Loop
Shaping with a compensator and robust stabilization to satisfy the
index function, we get the feedback controller that makes the control
system stable. In this paper, we propose an expanded system for a
servo system design and apply to the DC motor. The proposed method
performs well in the DC motor positioning control. It has no
steady-state error in the disturbance response and it has robust
stability.
Abstract: We obtain appropriate sharp estimates for rough oscillatory integrals. Our results represent significant improvements as well as natural extensions of what was known previously.
Abstract: The noticeable advance in the area of computer technology has paved the way for the invention of powerful mobile devices. However, limited storage, short battery life, and relatively low computational power define the major problems of such devices. Due to the ever increasing computational requirements, such devices may fail to process needed tasks under certain constraints. One of the proposed solutions to this drawback is the introduction of Collaborative Computing, a new concept dealing with the distribution of computational tasks amongst several handhelds. This paper introduces the basics of Collaborative Computing, and proposes a new protocol that aims at managing and optimizing computing tasks in Ad-Hoc Collaborative Computing Environments.
Abstract: Recently, Denial of Service(DoS) attacks and Distributed DoS(DDoS) attacks which are stronger form of DoS attacks from plural hosts have become security threats on the Internet. It is important to identify the attack source and to block attack traffic as one of the measures against these attacks. In general, it is difficult to identify them because information about the attack source is falsified. Therefore a method of identifying the attack source by tracing the route of the attack traffic is necessary. A traceback method which uses traffic patterns, using changes in the number of packets over time as criteria for the attack traceback has been proposed. The traceback method using the traffic patterns can trace the attack by matching the shapes of input traffic patterns and the shape of output traffic pattern observed at a network branch point such as a router. The traffic pattern is a shapes of traffic and unfalsifiable information. The proposed trace methods proposed till date cannot obtain enough tracing accuracy, because they directly use traffic patterns which are influenced by non-attack traffics. In this paper, a new traffic pattern matching method using Independent Component Analysis(ICA) is proposed.
Abstract: Active network was developed to solve the problem of
the current sharing-based network–difficulty in applying new
technology, service or standard, and duplicated operation at several
protocol layers. Active network can transport the packet loaded with
the executable codes, which enables to change the state of the network
node. However, if the network node is placed in the sharing-based
network, security and safety issues should be resolved. To satisfy this
requirement, various security aspects are required such as
authentication, authorization, confidentiality and integrity. Among
these security components, the core factor is the encryption key. As a
result, this study is designed to propose the scheme that manages the
encryption key, which is used to provide security of the
comprehensive active directory, based on the domain.
Abstract: In this paper, LDPC Codes based on defected fullerene
graphs have been generated. And it is found that the codes generated
are fast in encoding and better in terms of error performance on
AWGN Channel.
Abstract: Nowadays, efficiency, effectiveness and economy are regarded as the main objectives of managers and the secret of the continuity of an organization in competing economy. In such competing settings, it is essential that the management of an organization has not been neglected and been obliged to identify quickly the opportunities for improving the operation of organization and remove the shortcomings of their managed system in order to use the opportunities for development. Operational auditing is a useful tool for system adjustment and leading an organization toward its objectives. Operational auditing is indeed a viewpoint which identifies the causes of insufficiencies, weaknesses and deficiencies of system and plans to eliminate them. Operational auditing is useful in the effectiveness and optimization of executive managers- decisions and increasing the efficiency and economy of their performance in the future and prevents the waste and incorrect use of resources. Evidence shows that operational auditing is used at a limited level in Iran. This matter raises some questions like the following ones in the minds. Why do a limited number of corporations use operational auditing? Which factors can guarantee its full implementation? What obstacles are there in its implementation? The purpose of this article is to determine executive objectives, the operation domain of operational auditing, the components of operational auditing and the executive obstacles to operational auditing in Iran.
Abstract: This paper explores an application of an adaptive learning mechanism for robots based on the natural immune system. Most of the research carried out so far are based either on the innate or adaptive characteristics of the immune system, we present a combination of these to achieve behavior arbitration wherein a robot learns to detect vulnerable areas of a track and adapts to the required speed over such portions. The test bed comprises of two Lego robots deployed simultaneously on two predefined near concentric tracks with the outer robot capable of helping the inner one when it misaligns. The helper robot works in a damage-control mode by realigning itself to guide the other robot back onto its track. The panic-stricken robot records the conditions under which it was misaligned and learns to detect and adapt under similar conditions thereby making the overall system immune to such failures.
Abstract: Representation and description of object shapes by the
slopes of their contours or borders are proposed. The idea is to capture
the essence of the features that make it easier for a shape to be
stored, transmitted, compared and recognized. These features must
be independent of translation, rotation and scaling of the shape. A
approach is proposed to obtain high performance, efficiency and to
merge the boundaries into sequence of straight line segments with
the fewest possible segments. Evaluation on the performance of the
proposed method is based on its comparison with established method
of object shape description.
Abstract: Protection of slope and embankment from erosion has
become an important issue in Bangladesh. The constructions of
strong structures require large capital, integrated designing, high
maintenance cost. Strong structure methods have negative impact on
the environment and sometimes not function for the design period.
Plantation of vetiver system along the slopes is an alternative
solution. Vetiver not only serves the purpose of slope protection but
also adds green environment reducing pollution. Vetiver is available
in almost all the districts of Bangladesh. This paper presents the
application of vetiver system with geo-jute, for slope protection and
erosion control of embankments and slopes. In-situ shear tests have
been conducted on vetiver rooted soil system to find the shear
strength. The shear strength and effective soil cohesion of vetiver
rooted soil matrix are respectively 2.0 times and 2.1 times higher than
that of the bared soil. Similar trends have been found in direct shear
tests conducted on laboratory reconstituted samples. Field trials have
been conducted in road embankment and slope protection with
vetiver at different sites. During the time of vetiver root growth the
soil protection has been accomplished by geo-jute. As the geo-jute
degrades with time, vetiver roots grow and take over the function of
geo-jutes. Slope stability analyses showed that vegetation increase
the factor of safety significantly.
Abstract: Calcium [Ca2+] dynamics is studied as a potential form
of neuron excitability that can control many irregular processes like
metabolism, secretion etc. Ca2+ ion enters presynaptic terminal and
increases the synaptic strength and thus triggers the neurotransmitter
release. The modeling and analysis of calcium dynamics in neuron
cell becomes necessary for deeper understanding of the processes
involved. A mathematical model has been developed for cylindrical
shaped neuron cell by incorporating physiological parameters like
buffer, diffusion coefficient, and association rate. Appropriate initial
and boundary conditions have been framed. The closed form solution
has been developed in terms of modified Bessel function. A computer
program has been developed in MATLAB 7.11 for the whole
approach.
Abstract: P16/INK4A is tumor suppressor protein that plays a critical role in cell cycle regulation. Loss of P16 protein expression has been implicated in pathogenesis of many cancers, including lymphoma. Therefore, we sought to investigate if loss of P16 protein expression is associated with lymphoma and/or any specific lymphoma subtypes (Hodgkin-s lymphoma (HL) and nonHodgkin-s lymphoma (NHL)). Fifty-five lymphoma cases consisted of 30 cases of HL and 25 cases of NHL, with an age range of 3 to 78 years, were examined for loss of P16 by immunohistochemical technique using a specific antibody reacting against P16. In total, P16 loss was seen in 33% of all lymphoma cases. P16 loss was identified in 47.7% of HL cases. In contrast, only 16% of NHL showed loss of P16. Loss of P16 was seen in 67% of HL patients with 50 years of age or older, whereas P16 loss was found in only 42% of HL patients with less than 50 years of age. P16 loss in HL is somewhat higher in male (55%) than in female (30%). In subtypes of HL, P16 loss was found exclusively in all cases of lymphocyte depletion, lymphocyte predominance and unclassified cases, whereas P16 loss was seen in 39% of mixed cellularity and 29% of nodular sclerosis cases. In low grade NHL patients, P16 loss was seen in approximately one-third of cases, whereas no or very rare of P16 loss was found in intermediate and high grade cases. P16 loss did not show any correlation with age or gender of NHL patients. In conclusion, the high rate of P16 loss seen in our study suggests that loss of P16 expression plays a critical role in the pathogenesis of lymphoma, particularly with HL.
Abstract: Nodes in mobile Ad Hoc Network (MANET) do not
rely on a central infrastructure but relay packets originated by other
nodes. Mobile ad hoc networks can work properly only if the
participating nodes collaborate in routing and forwarding. For
individual nodes it might be advantageous not to collaborate, though.
In this conceptual paper we propose a new approach based on
relationship among the nodes which makes them to cooperate in an
Adhoc environment. The trust unit is used to calculate the trust
values of each node in the network. The calculated trust values are
being used by the relationship estimator to determine the relationship
status of nodes. The proposed enhanced protocol was compared with
the standard DSR protocol and the results are analyzed using the
network simulator-2.
Abstract: This paper presents a cold chain monitoring system which focuses on assessment of quality and dynamic pricing information about food in cold chain. Cold chain is composed of many actors and stages; however it can be seen as a single entity since a breakdown in temperature control at any stage can impact the final quality of the product. In a cold chain, the shelf life, quality, and safety of perishable food throughout the supply chain is greatly impacted by environmental factors especially temperature. In this paper, a prototype application is implemented to retrieve timetemperature history, the current quality and the dynamic price setting according to changing quality impacted by temperature fluctuations in real-time.
Abstract: The purpose of this study is to derive optimal shapes of
a body located in viscous flows by the finite element method using the
acoustic velocity and the four-step explicit scheme. The formulation
is based on an optimal control theory in which a performance function
of the fluid force is introduced. The performance function should be
minimized satisfying the state equation. This problem can be transformed
into the minimization problem without constraint conditions
by using the adjoint equation with adjoint variables corresponding to
the state equation. The performance function is defined by the drag
and lift forces acting on the body. The weighted gradient method
is applied as a minimization technique, the Galerkin finite element
method is used as a spatial discretization and the four-step explicit
scheme is used as a temporal discretization to solve the state equation
and the adjoint equation. As the interpolation, the orthogonal basis
bubble function for velocity and the linear function for pressure
are employed. In case that the orthogonal basis bubble function is
used, the mass matrix can be diagonalized without any artificial
centralization. The shape optimization is performed by the presented
method.
Abstract: School experiences, family bonding and self-concept
had always been a crucial factor in influencing all aspects of a
student-s development. The purpose of this study is to develop and to
validate a priori model of self-concept among students. The study
was tested empirically using Structural Equation Modeling (SEM)
and Confirmatory Factor Analysis (CFA) to validate the structural
model. To address these concerns, 1167 students were randomly
selected and utilized the Cognitive Psycho-Social University of
Malaya instrument (2009).Resulted demonstrated there is indirect
effect from family bonding to self-concept through school
experiences among secondary school students as a mediator. Besides
school experiences, there is a direct effect from family bonding to
self-concept and family bonding to school experiences among
students.
Abstract: Linear cryptanalysis methods are rarely used to improve the security of chaotic stream ciphers. In this paper, we apply linear cryptanalysis to a chaotic stream cipher which was designed by strictly using the basic design criterion of cryptosystem – confusion and diffusion. We show that this well-designed chaos-based stream cipher is still insecure against distinguishing attack. This distinguishing attack promotes the further improvement of the cipher.