Abstract: Field experiments were conducted at Annamalai University Experimental Farm, Department of Agronomy; to device suitable weed control measures for direct seeded puddled rice and to study the effect of the weed control measures on the soil microbial population. The treatments comprised of incorporation of pressmud @ 6.25 t ha-1 and application of herbicide butachlor @1.5 kg a. i. ha- 1 with and without safener 4 days after sowing (DAS), 8 DAS alone and also in conjunction with hand weeding at 30 DAS. Hand weeding twice and a weedy check were also maintained. At maximum tillering stage, the population of bacteria was significantly reduced by butachlor application. The injury to microbes caused by herbicide disappeared with the advancement of crop's age and at flowering stage of crop, there was no significant difference among the treatments. The fungal and actinomycetes population remained unaltered by weed control treatments at both the stages of observation.
Abstract: The birdhouses and dovecotes, which are the indicator
of naturalness and human-animal relationship, are one of the
traditional cultural values of Turkey. With their structures compatible
with nature and respectful to humans the bird houses and dovecotes,
which have an important position in local urbanization models as a
representative of the civil architecture with their unique form and
function are important subjects that should be evaluated in a wide
frame comprising from architecture to urbanism, from ecologic
agriculture to globalization. The traditional bird houses and
dovecotes are disregarded due to the insensitivity affecting the city
life and the change in the public sense of art. In this study, the
characteristic properties of traditional dovecotes and birdhouses,
started in 13th century and ended in 19th century in Anatolia, are
tried to be defined for the sustainability of the tradition and for giving
a new direction to the designers.
Abstract: In this paper, an Arabic letter recognition system based on Artificial Neural Networks (ANNs) and statistical analysis for feature extraction is presented. The ANN is trained using the Least Mean Squares (LMS) algorithm. In the proposed system, each typed Arabic letter is represented by a matrix of binary numbers that are used as input to a simple feature extraction system whose output, in addition to the input matrix, are fed to an ANN. Simulation results are provided and show that the proposed system always produces a lower Mean Squared Error (MSE) and higher success rates than the current ANN solutions.
Abstract: carrot is one of the important root vegetable crops,
and it is highly nutritious as it contains appreciable amount of
vitamins, minerals and β-carotene. The major objective of current
research was to evaluate the chemical composition of carrot variety
'Nante' hybrids in general and to select the best samples for fresh-cut
salad production. The research was accomplished on fresh in Latvia
cultivated carrots harvested in Zemgale region in the first part of
October, 2011 and immediately used for experiments. Late-bearing
variety 'Nante' hybrid carrots were used for analysis:
'Nante/Berlikum', 'Nante/Maestro', 'Nante/Forto', 'Nante/Bolero'
and 'Nante/Champion'. The quality parameters as moisture, soluble
solid, firmness, b-carotene, carotenoid, color, polyphenols, total
phenolic compounds and total antioxidant capacity were analyzed
using standard methods. For fresh-cut salad production as more
applicable could be recommended hybrids 'Nante/Forto' and
'Nante/Berlikum' - mainly because it-s higher nutritive value, as
higher total phenolic compounds, polyphenols and pronounced
antioxidant capacity.
Abstract: Frequently a group of people jointly decide and authorize
a specific person as a representative in some business/poitical
occasions, e.g., the board of a company authorizes the chief executive
officer to close a multi-billion acquisition deal. In this paper, an
integrated proxy multi-signature scheme that allows anonymously
vetoable delegation is proposed. This protocol integrates mechanisms
of private veto, distributed proxy key generation, secure transmission
of proxy key, and existentially unforgeable proxy multi-signature
scheme. First, a provably secure Guillou-Quisquater proxy signature
scheme is presented, then the “zero-sharing" protocol is extended
over a composite modulus multiplicative group, and finally the above
two are combined to realize the GQ proxy multi-signature with
anonymously vetoable delegation. As a proxy signature scheme, this
protocol protects both the original signers and the proxy signer.
The modular design allows simplified implementation with less
communication overheads and better computation performance than
a general secure multi-party protocol.
Abstract: This paper describes the application of a model
predictive controller to the problem of batch reactor temperature
control. Although a great deal of work has been done to improve
reactor throughput using batch sequence control, the control of the
actual reactor temperature remains a difficult problem for many
operators of these processes. Temperature control is important as
many chemical reactions are sensitive to temperature for formation of
desired products. This controller consist of two part (1) a nonlinear
control method GLC (Global Linearizing Control) to create a linear
model of system and (2) a Model predictive controller used to obtain
optimal input control sequence. The temperature of reactor is tuned
to track a predetermined temperature trajectory that applied to the
batch reactor. To do so two input signals, electrical powers and the
flow of coolant in the coil are used. Simulation results show that the
proposed controller has a remarkable performance for tracking
reference trajectory while at the same time it is robust against noise
imposed to system output.
Abstract: Polynomial maps offer analytical properties used to obtain better performances in the scope of chaos synchronization under noisy channels. This paper presents a new method to simplify equations of the Exact Polynomial Kalman Filter (ExPKF) given in [1]. This faster algorithm is compared to other estimators showing that performances of all considered observers vanish rapidly with the channel noise making application of chaos synchronization intractable. Simulation of ExPKF shows that saturation drawn on the emitter to keep it stable impacts badly performances for low channel noise. Then we propose a particle filter that outperforms all other Kalman structured observers in the case of noisy channels.
Abstract: In the globalized e-learning environment, students coming from different cultures and countries have different characteristics and require different support designed for their approaches to study and learning styles. This paper explores the ways in which cultural background influences students- approaches to study and learning styles. Participants in the study consisted of 131 eastern students and 54 western students from an Australian university. The students were tested using the Study Process Questionnaire (SPQ) for assessing their approaches to study and the Index of Learning Styles Questionnaire (ILS) for assessing their learning styles. The results of the study led to a set of principles being proposed to guide personalization of e-learning system design on the basis of cultural differences.
Abstract: The paper attempts to contribute to the largely
neglected social and anthropological discussion of technology development on the one hand, and to redirecting the emphasis in
anthropology from primitive and exotic societies to problems of high
relevance in contemporary era and how technology is used in
everyday life. It draws upon multidimensional models of intelligence
and ideal type formation. It is argued that the predominance of
computational and cognitive cosmovisions have led to technology alienation. Injection of communicative competence in artificially
intelligent systems and identity technologies in the coming
information society are analyzed
Abstract: The present work is a numerical simulation of
nanofluids flow in a double pipe heat exchanger provided with
porous baffles. The hot nanofluid flows in the inner cylinder, whereas
the cold nanofluid circulates in the annular gap. The Darcy-
Brinkman-Forchheimer model is adopted to describe the flow in the
porous regions, and the governing equations with the appropriate
boundary conditions are solved by the finite volume method. The
results reveal that the addition of metallic nanoparticles enhances the
rate of heat transfer in comparison to conventional fluids but this
augmentation is accompanied by an increase in pressure drop. The
highest heat exchanger performances are obtained when
nanoparticles are added only to the cold fluid.
Abstract: Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). However, the scheme is vulnerable to privileged insider attack at their proposed registration phase and to forgery attack at their proposed authentication phase. In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual authentication between the user and the remote server. Therefore, this paper points out that the Jia et al. scheme is vulnerable to the above three attacks.
Abstract: In the present work, the performance of the particle
swarm optimization and the genetic algorithm compared as a typical
geometry design problem. The design maximizes the heat transfer
rate from a given fin volume. The analysis presumes that a linear
temperature distribution along the fin. The fin profile generated using
the B-spline curves and controlled by the change of control point
coordinates. An inverse method applied to find the appropriate fin
geometry yield the linear temperature distribution along the fin
corresponds to optimum design. The numbers of the populations, the
count of iterations and time to convergence measure efficiency.
Results show that the particle swarm optimization is most efficient
for geometry optimization.
Abstract: Buildings are one of the valuable assets to provide
people with shelters for work, leisure and rest. After years of
attacks by weather, buildings will deteriorate which need proper
maintenance in order to fulfill the requirements and satisfaction of
the users. Poorly managed buildings not just give a negative image
to the city itself, but also pose potential risk hazards to the health
and safety of the general public. As a result, the management of
maintenance projects has played an important role in cities like
Hong Kong where the problem of urban decay has drawn much
attention. However, most research has focused on managing new
construction, and little research effort has been put on maintenance
projects. Given the short duration and more diversified nature of
work, repair and maintenance works are found to be more difficult
to monitor and regulate when compared with new works. Project
participants may face with problems in running maintenance
projects which should be investigated so that proper strategies can
be established. This paper aims to provide a thorough analysis on
the problems of running maintenance projects. A review of
literature on the characteristics of building maintenance projects
was firstly conducted, which forms a solid basis for the empirical
study. Results on the problems and difficulties of running
maintenance projects from the viewpoints of industry practitioners
will also be delivered with a view to formulating effective
strategies for managing maintenance projects successfully.
Abstract: The gas safety management system using an
intelligent gas meter we proposed is to monitor flow and
pressure of gas, earthquake, temperature, smoke and leak of
methane. Then our system takes safety measures to protect a
serious risk by the result of an event, to communicate with a
wall-pad including a gateway by zigbee network in buildings
and to report the event to user by the safety management
program in a server. Also, the inner cutoff valve of an
intelligent gas meter is operated if any event occurred or
abnormal at each sensor.
Abstract: Whilst there is growing evidence that activity across
the lifespan is beneficial for improved health, there are also many
changes involved with the aging process and subsequently the
potential for reduced indices of health. The nexus between all forms
of health, physical activity and aging is complex and has raised much
interest in recent times due to the realization that a multifaceted
approached is necessary in order to counteract a growing obesity
epidemic. By investigating age based trends within a population
adherring to competitive sport at older ages, further insight might be
gleaned to assist in understanding one of many factors influencing
this relationship. This study evaluated those sport psychological
constructs of health, physical fitness, mental health states, and social
dimension factors in sport that were associated with factors to
participate in sport and physical activity based on responses from the
2009 World Masters Games in Sydney. The sample consisted of
7846 athletes who competed at the games and who completed a 56
item sports participation survey using a 7-point Likert response (1 -
not important to 7 - very important). Questions focuses on factors
thought to promote participation, such as weight control, living
longer, improving mental health (self-esteem, mood states),
improving physical health and factors related to the athlete-s
competitive perspective. The most significant factors related to
participation with this cohort of masters athletes were the socializing
environment of sport, getting physically fit and improving
competitive personal best performances. Strategies to increase
participation in masters sport should focus on these factors as other
factors such as weight loss, improving mental health and living
longer were not identified as important determinates of sports
participation at the World Masters level.
Abstract: Most of the drugs used for pharmaceutical purposes
are poorly water-soluble drugs. About 40% of all newly discovered
drugs are lipophilic and the numbers of lipophilic drugs seem to
increase more and more. Drug delivery systems such as
nanoparticles, micelles or liposomes are applied to improve their
solubility and thus their bioavailability. Besides various techniques of
solubilization, oil-in-water emulsions are often used to incorporate
lipophilic drugs into the oil phase. To stabilize emulsions surface
active substances (surfactants) are generally used. An alternative
method to avoid the application of surfactants was of great interest.
One possibility is to develop O/W-emulsion without any addition of
surface active agents or the so called “surfactant-free emulsion or
SFE”. The aim of this study was to develop and characterize SFE as a
drug carrier by varying the production conditions. Lidocaine base
was used as a model drug. The injection method was developed.
Effects of ultrasound as well as of temperature on the properties of
the emulsion were studied. Particle sizes and release were
determined. The long-term stability up to 30 days was performed.
The results showed that the surfactant-free O/W emulsions with
pharmaceutical oil as drug carrier can be produced.
Abstract: EPC Class-1 Generation-2 UHF tags, one of Radio
frequency identification or RFID tag types, is expected that most
companies are planning to use it in the supply chain in the short term
and in consumer packaging in the long term due to its inexpensive
cost. Because of the very cost, however, its resources are extremely
scarce and it is hard to have any valuable security algorithms in it. It
causes security vulnerabilities, in particular cloning the tags for
counterfeits. In this paper, we propose a product authentication
solution for anti-counterfeiting at application level in the supply chain
and mobile RFID environment. It aims to become aware of
distribution of spurious products with fake RFID tags and to provide a
product authentication service to general consumers with mobile
RFID devices like mobile phone or PDA which has a mobile RFID
reader. We will discuss anti-counterfeiting mechanisms which are
required to our proposed solution and address requirements that the
mechanisms should have.
Abstract: Contractor selection in Saudi Arabia is very important due to the large construction boom and the contractor role to get over construction risks. The need for investigating contractor selection is due to the following reasons; large number of defaulted or failed projects (18%), large number of disputes attributed to contractor during the project execution stage (almost twofold), the extension of the General Agreement on Tariffs and Trade (GATT) into construction industry, and finally the few number of researches. The selection strategy is not perfect and considered as the reason behind irresponsible contractors. As a response, this research was conducted to review the contractor selection strategies as an integral part of a long advanced research to develop a good selection model. Many techniques can be used to form a selection strategy; multi criteria for optimizing decision, prequalification to discover contractor-s responsibility, bidding process for competition, third party guarantee to enhance the selection, and fuzzy techniques for ambiguities and incomplete information.
Abstract: Compression algorithms reduce the redundancy in
data representation to decrease the storage required for that data.
Lossless compression researchers have developed highly
sophisticated approaches, such as Huffman encoding, arithmetic
encoding, the Lempel-Ziv (LZ) family, Dynamic Markov
Compression (DMC), Prediction by Partial Matching (PPM), and
Burrows-Wheeler Transform (BWT) based algorithms.
Decompression is also required to retrieve the original data by
lossless means. A compression scheme for text files coupled with
the principle of dynamic decompression, which decompresses only
the section of the compressed text file required by the user instead of
decompressing the entire text file. Dynamic decompressed files offer
better disk space utilization due to higher compression ratios
compared to most of the currently available text file formats.
Abstract: This article presents a computationally tractable probabilistic model for the relation between the complex wavelet coefficients of two images of the same scene. The two images are acquisitioned at distinct moments of times, or from distinct viewpoints, or by distinct sensors. By means of the introduced probabilistic model, we argue that the similarity between the two images is controlled not by the values of the wavelet coefficients, which can be altered by many factors, but by the nature of the wavelet coefficients, that we model with the help of hidden state variables. We integrate this probabilistic framework in the construction of a new image registration algorithm. This algorithm has sub-pixel accuracy and is robust to noise and to other variations like local illumination changes. We present the performance of our algorithm on various image types.