Abstract: The present study was carried out to evaluate the
effect of different levels of dietary seed and extract of Harmal
(Peganum harmala L.) on immunity of broiler chicks. A total of 350
one-day old broiler chicks (Ross 308) were randomly allocated to
five dietary treatments with four replicates pen of 14 birds each.
Dietary treatments consisted of control, 1 and 2 g/kg Harmal seed in
diet, 100 and 200 mg/L Harmal seed extract in water. Broilers
received dietary treatments from 1 to 42 d. Two birds from each pen
were randomly weighed and sacrificed at 42 d of age, the relative
weight of lymphoid organs (bursa of Fabercius and spleen) to live
weight were calculated. Antibody titers against Newcastle and
influenza viruses and sheep red blood cell were measured at 30 d of
age. Results showed that the relative weights of lymphoid organs
were not affected by dietary treatments. Furthermore, antibody titer
against Newcastle and influenza viruses as well as sheep red blood
cell antigen were significantly (P
Abstract: Chemical Reaction Optimization (CRO) is an
optimization metaheuristic inspired by the nature of chemical
reactions as a natural process of transforming the substances from
unstable to stable states. Starting with some unstable molecules with
excessive energy, a sequence of interactions takes the set to a state of
minimum energy. Researchers reported successful application of the
algorithm in solving some engineering problems, like the quadratic
assignment problem, with superior performance when compared with
other optimization algorithms. We adapted this optimization
algorithm to the Printed Circuit Board Drilling Problem (PCBDP)
towards reducing the drilling time and hence improving the PCB
manufacturing throughput. Although the PCBDP can be viewed as
instance of the popular Traveling Salesman Problem (TSP), it has
some characteristics that would require special attention to the
transactions that explore the solution landscape. Experimental test
results using the standard CROToolBox are not promising for
practically sized problems, while it could find optimal solutions for
artificial problems and small benchmarks as a proof of concept.
Abstract: Batteries of electric vehicles (BEV) are becoming
more attractive with the advancement of new battery technologies
and promotion of electric vehicles. BEV batteries are recharged on
board vehicles using either the grid (G2V for Grid to Vehicle) or
renewable energies in a stand-alone application (H2V for Home to
Vehicle). This paper deals with the modeling, sizing and control of a
photovoltaic stand-alone application that can charge the BEV at
home. The modeling approach and developed mathematical models
describing the system components are detailed. Simulation and
experimental results are presented and commented.
Abstract: To date, one of the few comprehensive indicators for
the measurement of food security is the Global Food Security Index
(GFSI). This index is a dynamic quantitative and qualitative
benchmarking model, constructed from 28 unique indicators, that
measures drivers of food security across both developing and
developed countries. Whereas the GFSI has been calculated across a
set of 109 countries, in this paper we aim to present and compare, for
the Middle East and North Africa (MENA), 1) the Food Security
Index scores achieved and 2) the data available on affordability,
availability, and quality of food. The data for this work was taken
from the latest available report published by the creators of the GFSI,
which in turn used information from national and international
statistical sources. MENA countries rank from place 17/109 (Israel,
although with resent political turmoil this is likely to have changed)
to place 91/109 (Yemen) with household expenditure spent in food
ranging from 15.5% (Israel) to 60% (Egypt). Lower spending on food
as a share of household consumption in most countries and better
food safety net programs in the MENA have contributed to a notable
increase in food affordability. The region has also, however,
experienced a decline in food availability, owing to more limited
food supplies and higher volatility of agricultural production. In
terms of food quality and safety the MENA has the top ranking
country (Israel). The most frequent challenges faced by the countries
of the MENA include public expenditure on agricultural research and
development as well as volatility of agricultural production. Food
security is a complex phenomenon that interacts with many other
indicators of a country’s wellbeing; in the MENA it is slowly but
markedly improving.
Abstract: This paper presents analysis and design of a wideband
Wilkinson power divider for wireless applications. The design is
accomplished by transforming the lengths and impedances of the
quarter wavelength sections of the conventional Wilkinson power
divider into U-shaped sections. The designed power divider is
simulated by using ADS Agilent technologies and CST microwave
studio software. It is shown that the proposed power divider has
simple topology and good performances in terms of insertion loss,
port matching and isolation at all operating frequencies (1.8 GHz,
2.45 GHz and 3.55 GHz).
Abstract: A thermosyphon system is a heat transfer loop which
operates on the basis of gravity and buoyancy forces. It guarantees a
good reliability and low maintenance cost as it does not involve any
mechanical pump. Therefore, it can be used in many industrial
applications such as refrigeration and air conditioning, electronic
cooling, nuclear reactors, geothermal heat extraction, etc. But flow
instabilities and loop configuration are the major problems in this
system. Several previous researchers studied that stabilities can be
suppressed by using nanofluids as loop fluid. In the present study a
rectangular thermosyphon loop with end heat exchangers are
considered for the study. This configuration is more appropriate for
many practical applications such as solar water heater, geothermal
heat extraction, etc. In the present work, steady-state analysis is
carried out on thermosyphon loop with parallel flow coaxial heat
exchangers at heat source and heat sink. In this loop nanofluid is
considered as the loop fluid and water is considered as the external
fluid in both hot and cold heat exchangers. For this analysis onedimensional
homogeneous model is developed. In this model,
conservation equations like conservation of mass, momentum, energy
are discretized using finite difference method. A computer code is
written in MATLAB to simulate the flow in thermosyphon loop. A
comparison in terms of heat transfer is made between water and
nanofluid as working fluids in the loop.
Abstract: A Distributed Denial of Service (DDoS) attack is a
major threat to cyber security. It originates from the network layer or
the application layer of compromised/attacker systems which are
connected to the network. The impact of this attack ranges from the
simple inconvenience to use a particular service to causing major
failures at the targeted server. When there is heavy traffic flow to a
target server, it is necessary to classify the legitimate access and
attacks. In this paper, a novel method is proposed to detect DDoS
attacks from the traces of traffic flow. An access matrix is created
from the traces. As the access matrix is multi dimensional, Principle
Component Analysis (PCA) is used to reduce the attributes used for
detection. Two classifiers Naive Bayes and K-Nearest neighborhood
are used to classify the traffic as normal or abnormal. The
performance of the classifier with PCA selected attributes and actual
attributes of access matrix is compared by the detection rate and
False Positive Rate (FPR).
Abstract: Vertical Handover(VHO) among different
communication technologies ensuring uninterruption and service
continuity is one of the most important performance parameter in
Heterogenous networks environment. In an integrated Universal
Mobile Telecommunicatin System(UMTS) and Wireless Local
Area Network(WLAN), WLAN is given an inherent priority over
UMTS because of its high data rates with low cost. Therefore
mobile users want to be associated with WLAN maximum of the
time while roaming, to enjoy best possible services with low cost.
That encourages reduction of number of VHO. In this work the
reduction of number of VHO with respect to varying number of
WLAN Access Points(APs) in an integrated UMTS and WLAN
network is investigated through simulation to provide best possible
cost effective service to the users. The simulation has been carried
out for an area (7800 × 9006)m2 where COST-231 Hata model
and 3GPP (TR 101 112 V 3.1.0) specified models are used for
WLAN and UMTS path loss models respectively. The handover
decision is triggered based on the received signal level as compared
to the fade margin. Fade margin gives a probabilistic measure of
the reliability of the communication link. A relationship between
number of WLAN APs and the number of VHO is also established
in this work.
Abstract: In this paper, the transient device performance analysis
of n-type Gate Inside JunctionLess Transistor (GI-JLT) has been
evaluated. 3-D Bohm Quantum Potential (BQP) transport device
simulation has been used to evaluate the delay and power dissipation
performance. GI-JLT has a number of desirable device parameters
such as reduced propagation delay, dynamic power dissipation,
power and delay product, intrinsic gate delay and energy delay
product as compared to Gate-all-around transistors GAA-JLT. In
addition to this, various other device performance parameters namely,
on/off current ratio, short channel effects (SCE), transconductance
Generation Factor (TGF) and unity gain cut-off frequency (fT ) and
subthreshold slope (SS) of the GI-JLT and GAA-JLT have been
analyzed and compared. GI-JLT shows better device performance
characteristics than GAA-JLT for low power and high frequency
applications, because of its larger gate electrostatic control on the
device operation.
Abstract: The transition period of Kosovo society brought
fundamental changes in all the spheres of organizing life. This was
the period when also in the cultural tradition the biggest movement
and an emerging from ‘isolation’ or from the ‘shell’ occurred.
Transformation of the traditional and embracing of the modern began
here. The same was experienced and is currently being experienced
also by Gjakova and its surrounding which is historically renowned
for its great tradition and culture.
The population of this region is actually facing a transition from
the traditional system into the modern one and quite often with huge
leaps.
These ‘movements’ or ‘evolutions’ of the society of this region,
besides the numerous positive things it ‘harvested’, also brought
things that do not at all correspond with their tradition as well as new
criminal occurrences which in the past were not present in this area.
Furthermore, some of the ‘new’ behaviors that are embraced from
other ‘cultures’ and ‘civilizations’, and which are often exceeded, are
quite perturbing. The security situation is also worrying, particularly
following the appearance of some new criminal occurrences.
Therefore, with this research paper we will strive to analyze the
new cultural “intersections” as well as the nature of the origin of
some new very worrying criminal occurrences. We will present there
also some factors inciting into these occurrences, which were
confessed by the persons involved in these criminal occurrences and
who come from this very region.
Abstract: Fugitive particulate matter (PM) is a major source of
airborne pollution in the Middle East countries. The meteorological
conditions and topography of the area makes it highly susceptible to
wind-blown particles which raise many air quality concerns. Air
quality tools such as field monitoring, emission factors and dispersion
modeling have been used in previous research studies to analyze the
release and impacts of fugitive PM in the region. However, these
tools have been originally developed based on experiments made for
European and North American regions. In this work, an experimental
campaign was conducted on April-May 2014 in a construction site in
Doha city, Qatar. The ultimate goal is to evaluate the applicability of
the existing emission factors for construction sites in dry and arid
areas like the Middle East.
Abstract: In this paper, we propose a method for three-dimensional
(3-D)-model indexing based on defining a new
descriptor, which we call new descriptor using spherical harmonics.
The purpose of the method is to minimize, the processing time on the
database of objects models and the searching time of similar objects
to request object.
Firstly we start by defining the new descriptor using a new
division of 3-D object in a sphere. Then we define a new distance
which will be used in the search for similar objects in the database.
Abstract: In this paper, a system of linear matrix equations
is considered. A new necessary and sufficient condition for the
consistency of the equations is derived by means of the generalized
singular-value decomposition, and the explicit representation of the
general solution is provided.
Abstract: In this paper cognitive radio is presented and the
spectrum overlay cognitive radio antenna system is detailed. A UWB
antenna with frequency reconfigurable characteristics is proposed.
The reconfigurability is achieved when the filter is integrated to the
feeding line of the single port overlay cognitive radio. When
activated, the filter can transform the UWB frequency response into a
reconfigurable narrowband one, which is suitable for the
communication operation of the CR system. Here single port overlay
cognitive radio antenna is designed and simulated using Ansoft High
Frequency Structure Simulator (HFSS).
Abstract: Wireless mesh networking is rapidly gaining in
popularity with a variety of users: from municipalities to enterprises,
from telecom service providers to public safety and military
organizations. This increasing popularity is based on two basic facts:
ease of deployment and increase in network capacity expressed in
bandwidth per footage; WMNs do not rely on any fixed
infrastructure. Many efforts have been used to maximizing
throughput of the network in a multi-channel multi-radio wireless
mesh network. Current approaches are purely based on either static or
dynamic channel allocation approaches. In this paper, we use a
hybrid multichannel multi radio wireless mesh networking
architecture, where static and dynamic interfaces are built in the
nodes. Dynamic Adaptive Channel Allocation protocol (DACA), it
considers optimization for both throughput and delay in the channel
allocation. The assignment of the channel has been allocated to be codependent
with the routing problem in the wireless mesh network and
that should be based on passage flow on every link. Temporal and
spatial relationship rises to re compute the channel assignment every
time when the pattern changes in mesh network, channel assignment
algorithms assign channels in network. In this paper a computing
path which captures the available path bandwidth is the proposed
information and the proficient routing protocol based on the new path
which provides both static and dynamic links. The consistency
property guarantees that each node makes an appropriate packet
forwarding decision and balancing the control usage of the network,
so that a data packet will traverse through the right path.
Abstract: Worldwide, most PILC MV underground cables in use
are approaching the end of their design life; hence, failures are likely
to increase. This paper studies the electric field and potential
distributions within the PILC insulted cable containing common
void-defect. The finite element model of the performance of the
belted PILC MV underground cable is presented. The variation of the
electric field stress within the cable using the Finite Element Method
(FEM) is concentrated. The effects of the void-defect within the
insulation are given. Outcomes will lead to deeper understanding of
the modeling of Paper Insulated Lead Covered (PILC) and electric
field response of belted PILC insulted cable containing void defect.
Abstract: Evaluating the performance of a simulator in the
CAVE has to be confirmed by encouraging people to live the
experience of virtual reality. In this paper, a detailed procedure of
recording video is presented. Limitations of the experimental device
are firstly exposed. Then, solutions for improving this idea are finally
described.
Abstract: In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.
Abstract: Given a graph G. A cycle of G is a sequence of
vertices of G such that the first and the last vertices are the same.
A hamiltonian cycle of G is a cycle containing all vertices of G.
The graph G is k-ordered (resp. k-ordered hamiltonian) if for any
sequence of k distinct vertices of G, there exists a cycle (resp.
hamiltonian cycle) in G containing these k vertices in the specified
order. Obviously, any cycle in a graph is 1-ordered, 2-ordered and 3-
ordered. Thus the study of any graph being k-ordered (resp. k-ordered
hamiltonian) always starts with k = 4. Most studies about this topic
work on graphs with no real applications. To our knowledge, the
chordal ring families were the first one utilized as the underlying
topology in interconnection networks and shown to be 4-ordered.
Furthermore, based on our computer experimental results, it was
conjectured that some of them are 4-ordered hamiltonian. In this
paper, we intend to give some possible directions in proving the
conjecture.
Abstract: This paper presents the scaling laws that provide the
criteria of geometry and dynamic similitude between the full-size
rotor-shaft system and its scale model, and can be used to predict the
torsional vibration characteristics of the full-size rotor-shaft system by
manipulating the corresponding data of its scale model. The scaling
factors, which play fundamental roles in predicting the geometry and
dynamic relationships between the full-size rotor-shaft system and its
scale model, for torsional free vibration problems between scale and
full-size rotor-shaft systems are firstly obtained from the equation of
motion of torsional free vibration. Then, the scaling factor of external
force (i.e., torque) required for the torsional forced vibration problems
is determined based on the Newton’s second law. Numerical results
show that the torsional free and forced vibration characteristics of a
full-size rotor-shaft system can be accurately predicted from those of
its scale models by using the foregoing scaling factors. For this reason,
it is believed that the presented approach will be significant for
investigating the relevant phenomenon in the scale model tests.