Abstract: Relevant agricultural information disseminator
(extension agent) ratio of 1:3500 farm families which become a
menace to agricultural production capacity in developing countries
necessitate this study. Out of 4 zones in the state, 24 extension agents
in each zone, 4 extension agents using cell phones and 120 farmers
using cell phone and 120 other farmers not using cell phone were
purposively selected to give 240 farmers that participated in the
research. Data were collected using interview guide and analysized
using frequency, percentage and t-test.. Frequency of contact with
agricultural information centers revealed that cell phone user farmers
had greater means score of X 41.43 contact as against the low mean
X19.32 contact recorded by farmers receiving agricultural
information from extension agents not using cell phone and their
production was statistically significant at P < 0.05. Usage of cell
phone increase extension agent contact and increase farmers-
production capacity.
Abstract: Optimal design of structure has a main role in reduction of material usage which leads to deduction in the final cost of construction projects. Evolutionary approaches are found to be more successful techniques for solving size and shape structural optimization problem since it uses a stochastic random search instead of a gradient search. By reviewing the recent literature works the problem found was the optimization of weight. A new meta-heuristic algorithm called as Cuckoo Search (CS) Algorithm has used for the optimization of the total weight of the truss structures. This paper has used set of 10 bars and 25 bars trusses for the testing purpose. The main objective of this work is to reduce the number of iterations, weight and the total time consumption. In order to demonstrate the effectiveness of the present method, minimum weight design of truss structures is performed and the results of the CS are compared with other algorithms.
Abstract: SIP (Session Initiation Protocol), using HTML based
call control messaging which is quite simple and efficient, is being
replaced for VoIP networks recently. As for authentication and
authorization purposes there are many approaches and considerations
for securing SIP to eliminate forgery on the integrity of SIP
messages. On the other hand Elliptic Curve Cryptography has
significant advantages like smaller key sizes, faster computations on
behalf of other Public Key Cryptography (PKC) systems that obtain
data transmission more secure and efficient. In this work a new
approach is proposed for secure SIP authentication by using a public
key exchange mechanism using ECC. Total execution times and
memory requirements of proposed scheme have been improved in
comparison with non-elliptic approaches by adopting elliptic-based
key exchange mechanism.
Abstract: Despite extensive study on wireless sensor network
security, defending internal attacks and finding abnormal behaviour
of the sensor are still difficult and unsolved task. The conventional
cryptographic technique does not give the robust security or detection
process to save the network from internal attacker that cause by
abnormal behavior. The insider attacker or abnormally behaved
sensor identificationand location detection framework using false
massage detection and Time difference of Arrival (TDoA) is
presented in this paper. It has been shown that the new framework
can efficiently identify and detect the insider attacker location so that
the attacker can be reprogrammed or subside from the network to
save from internal attack.
Abstract: Ferroresonance is an electrical phenomenon in
nonlinear character, which frequently occurs in power system due to
transmission line faults and single or more-phase switching on the
lines as well as usage of the saturable transformers. In this study, the
ferroresonance phenomena are investigated under the modeling of the
West Anatolian Electric Power Network of 380 kV in Turkey. The
ferroresonance event is observed as a result of removing the loads at
the end of the lines. In this sense, two different cases are considered.
At first, the switching is applied at 2nd second and the ferroresonance
affects are observed between 2nd and 4th seconds in the voltage
variations of the phase-R. Hence the ferroresonance and nonferroresonance
parts of the overall data are compared with each
others using the Fourier transform techniques to show the
ferroresonance affects.
Abstract: The problem of frequent pattern discovery is defined
as the process of searching for patterns such as sets of features or items that appear in data frequently. Finding such frequent patterns
has become an important data mining task because it reveals associations, correlations, and many other interesting relationships
hidden in a database. Most of the proposed frequent pattern mining
algorithms have been implemented with imperative programming
languages. Such paradigm is inefficient when set of patterns is large
and the frequent pattern is long. We suggest a high-level declarative
style of programming apply to the problem of frequent pattern
discovery. We consider two languages: Haskell and Prolog. Our
intuitive idea is that the problem of finding frequent patterns should
be efficiently and concisely implemented via a declarative paradigm
since pattern matching is a fundamental feature supported by most
functional languages and Prolog. Our frequent pattern mining
implementation using the Haskell and Prolog languages confirms our
hypothesis about conciseness of the program. The comparative
performance studies on line-of-code, speed and memory usage of
declarative versus imperative programming have been reported in the
paper.
Abstract: Cu-mesoporous TiO2 is developed for removal acid
odor cooperated with ozone assistance and online- regeneration
system with/without UV irradiation (all weather) in study. The results
showed that Cu-mesoporous TiO2 present the desirable adsorption
efficiency of acid odor without UV irradiation, due to the larger
surface area, pore sizeand the additional absorption ability provided by
Cu. In the photocatalysis process, the material structure also benefits
Cu-mesoporous TiO2 to perform the more outstanding efficiency on
degrading acid odor. Cu also postponed the recombination of
electron-hole pairs excited from TiO2 to enhance photodegradation
ability. Cu-mesoporous TiO2 could gain the conspicuous increase on
photocatalysis ability from ozone assistance, but without any benefit
on adsorption. In addition, the online regeneration procedure could
process the used Cu-mesoporous TiO2 to reinstate the adsorption
ability and maintain the photodegradtion performance, depended on
scrubbing, desorping acid odor and reducing Cu to metal state.
Abstract: Encrypted messages sending frequently draws the attention
of third parties, perhaps causing attempts to break and
reveal the original messages. Steganography is introduced to hide
the existence of the communication by concealing a secret message
in an appropriate carrier like text, image, audio or video. Quantum
steganography where the sender (Alice) embeds her steganographic
information into the cover and sends it to the receiver (Bob) over a
communication channel. Alice and Bob share an algorithm and hide
quantum information in the cover. An eavesdropper (Eve) without
access to the algorithm can-t find out the existence of the quantum
message. In this paper, a text quantum steganography technique based
on the use of indefinite articles (a) or (an) in conjunction with the nonspecific
or non-particular nouns in English language and quantum
gate truth table have been proposed. The authors also introduced a
new code representation technique (SSCE - Secret Steganography
Code for Embedding) at both ends in order to achieve high level of
security. Before the embedding operation each character of the secret
message has been converted to SSCE Value and then embeds to cover
text. Finally stego text is formed and transmits to the receiver side.
At the receiver side different reverse operation has been carried out
to get back the original information.
Abstract: Cryptography provides the secure manner of
information transmission over the insecure channel. It authenticates
messages based on the key but not on the user. It requires a lengthy
key to encrypt and decrypt the sending and receiving the messages,
respectively. But these keys can be guessed or cracked. Moreover,
Maintaining and sharing lengthy, random keys in enciphering and
deciphering process is the critical problem in the cryptography
system. A new approach is described for generating a crypto key,
which is acquired from a person-s iris pattern. In the biometric field,
template created by the biometric algorithm can only be
authenticated with the same person. Among the biometric templates,
iris features can efficiently be distinguished with individuals and
produces less false positives in the larger population. This type of iris
code distribution provides merely less intra-class variability that aids
the cryptosystem to confidently decrypt messages with an exact
matching of iris pattern. In this proposed approach, the iris features
are extracted using multi resolution wavelets. It produces 135-bit iris
codes from each subject and is used for encrypting/decrypting the
messages. The autocorrelators are used to recall original messages
from the partially corrupted data produced by the decryption process.
It intends to resolve the repudiation and key management problems.
Results were analyzed in both conventional iris cryptography system
(CIC) and non-repudiation iris cryptography system (NRIC). It
shows that this new approach provides considerably high
authentication in enciphering and deciphering processes.
Abstract: The convergence of heterogeneous wireless access technologies characterizes the 4G wireless networks. In such converged systems, the seamless and efficient handoff between
different access technologies (vertical handoff) is essential and remains a challenging problem. The heterogeneous co-existence of access technologies with largely different characteristics creates a decision problem of determining the “best" available network at
“best" time to reduce the unnecessary handoffs. This paper proposes a dynamic decision model to decide the “best" network at “best"
time moment to handoffs. The proposed dynamic decision model make the right vertical handoff decisions by determining the “best"
network at “best" time among available networks based on, dynamic
factors such as “Received Signal Strength(RSS)" of network and
“velocity" of mobile station simultaneously with static factors like Usage Expense, Link capacity(offered bandwidth) and power
consumption. This model not only meets the individual user needs but also improve the whole system performance by reducing the unnecessary handoffs.
Abstract: In the modern construction practices, industrial wastes
or by-products are largely used as raw materials in cement and
concrete. These impart many benefits to the environment and bringabout
an economic impact because the cost of waste disposal is
constantly increasing due to strict environmental regulations. It was
reported in literature that the leakage of oil onto concrete element in
older cement grinding unit resulted in concrete with greater resistance
to freezing and thawing. This effect was thought to be similar to
adding an air-entraining chemical admixture to concrete. This paper
presents an investigation on the load deflection behaviour and crack
patterns of reinforced concrete (RC) beams subjected to four point
loading. Ten 120x260x1900 mm beams were cast with 100%
ordinary Portland cement (OPC) concrete, 20% fly ash (FA) and 20%
rice husk ash (RHA) blended cement concrete. 0.15% dosage of
admixtures (used engine oil, new engine oil, and superplasticizer)
was used throughout the experiment. Results show that OPC and
OPC/RHA RC beams containing used engine oil and superplasticizer
exhibit higher capacity, 18-26% than their corresponding control
mix.
Abstract: Today, advantage of biotechnology especially in environmental issues compared to other technologies is irrefragable. Kimia Gharb Gostar Industries Company, as a largest producer of citric acid in Middle East, applies biotechnology for this goal. Citrogypsum is a by–product of citric acid production and it considered as a valid residuum of this company. At this paper summary of acid citric production and condition of Citrogypsum production in company were introduced in addition to defmition of Citrogypsum production and its applications in world. According to these information and evaluation of present conditions about Iran needing to Citrogypsum, the best priority was introduced and emphasized on strategy selection and proper programming for self-sufficiency. The Delphi technique was used to elicit expert opinions about criteria for evaluating the usages. The criteria identified by the experts were profitability, capacity of production, the degree of investment, marketable, production ease and time production. The Analytical Hierarchy Process (ARP) and Expert Choice software were used to compare the alternatives on the criteria derived from the Delphi process.
Abstract: The present work was conducted for the synthesis of
nano size zerovalent iron (nZVI) and hexavalent chromium (Cr(VI))
removal as a highly toxic pollutant by using this nanoparticles. Batch
experiments were performed to investigate the effects of Cr(VI),
nZVI concentration, pH of solution and contact time variation on
the removal efficiency of Cr(VI). nZVI was synthesized by
reduction of ferric chloride using sodium borohydrid. SEM and
XRD examinations applied for determination of particle size and
characterization of produced nanoparticles. The results showed that
the removal efficiency decreased with Cr(VI) concentration and pH
of solution and increased with adsorbent dosage and contact time.
The Langmuir and Freundlich isotherm models were used for the
adsorption equilibrium data and the Langmuir isotherm model was
well fitted. Nanoparticle ZVI presented an outstanding ability to
remove Cr(VI) due to high surface area, low particle size and high
inherent activity.
Abstract: An Ad hoc wireless network comprises of mobile
terminals linked and communicating with each other sans the aid of
traditional infrastructure. Optimized Link State Protocol (OLSR) is a
proactive routing protocol, in which routes are discovered/updated
continuously so that they are available when needed. Hello messages
generated by a node seeks information about its neighbor and if the
latter fails to respond to a specified number of hello messages
regulated by neighborhood hold time, the node is forced to assume
that the neighbor is not in range. This paper proposes to evaluate
OLSR routing protocol in a random mobility network having various
neighborhood hold time intervals. The throughput and delivery ratio
are also evaluated to learn about its efficiency for multimedia loads.
Abstract: Quasigroups are algebraic structures closely related to
Latin squares which have many different applications. The
construction of block cipher is based on quasigroup string
transformation. This article describes a block cipher based
Quasigroup of order 256, suitable for fast software encryption of
messages written down in universal ASCII code. The novelty of this
cipher lies on the fact that every time the cipher is invoked a new set
of two randomly generated quasigroups are used which in turn is
used to create a pair of quasigroup of dual operations. The
cryptographic strength of the block cipher is examined by calculation
of the xor-distribution tables. In this approach some algebraic
operations allows quasigroups of huge order to be used without any
requisite to be stored.
Abstract: This work deals with aspects of support vector machine learning for large-scale data mining tasks. Based on a decomposition algorithm for support vector machine training that can be run in serial as well as shared memory parallel mode we introduce a transformation of the training data that allows for the usage of an expensive generalized kernel without additional costs. We present experiments for the Gaussian kernel, but usage of other kernel functions is possible, too. In order to further speed up the decomposition algorithm we analyze the critical problem of working set selection for large training data sets. In addition, we analyze the influence of the working set sizes onto the scalability of the parallel decomposition scheme. Our tests and conclusions led to several modifications of the algorithm and the improvement of overall support vector machine learning performance. Our method allows for using extensive parameter search methods to optimize classification accuracy.
Abstract: Number Link is a Japanese logic puzzle where pairs of same numbers are connected using lines. Number Link can be regarded as a dynamic multiple travelers, multiple entries and exits maze, where the walls and passages are dynamically changing as the travelers move. In this paper, we apply the Tremaux’s algorithm to solve Number Link puzzles of size 8x8, 10x10 and 15x20. The algorithm works well and produces a solution for puzzles of size 8x8 and 10x10. However, solving a puzzle of size 15x20 requires high computer processing power and is time consuming.
Abstract: A new method, based on the normal shrink and
modified version of Katssagelous and Lay, is proposed for multiscale
blind image restoration. The method deals with the noise and blur in
the images. It is shown that the normal shrink gives the highest S/N
(signal to noise ratio) for image denoising process. The multiscale
blind image restoration is divided in two sections. The first part of
this paper proposes normal shrink for image denoising and the
second part of paper proposes modified version of katssagelous and
Lay for blur estimation and the combination of both methods to reach
a multiscale blind image restoration.
Abstract: B2E portals represent a new class of web-based
information technologies which many organisations are introducing
in recent years to stay in touch with their distributed workforces and
enable them to perform value added activities for organisations.
However, actual usage of these emerging systems (measured using
suitable instruments) has not been reported in the contemporary
scholarly literature. We argue that many of the instruments to
measure usage of various types of IT-enabled information systems
are not directly applicable for B2E portals because they were
developed for the context of traditional mainframe and PC-based
information systems. It is therefore important to develop a new
instrument for web-based portal technologies aimed at employees. In
this article, we report on the development and initial qualitative
evaluation of an instrument that seeks to operationaise a set of
independent factors affecting the usage of portals by employees. The
proposed instrument is useful to IT/e-commerce researchers and
practitioners alike as it enhances their confidence in predicting
employee usage of portals in organisations.
Abstract: Toxic and bloom-forming cyanobacterium Microcystis
aeruginosa was exposed to antialgal allelochemical gramine (0, 0.5, 1,
2, 4, 8 mg·L-1), The effects of gramine on photosynthetic pigments
(lipid soluble: chlorophyll a and β-carotene; water soluble:
phycocyanin, allophycocyanin, phycoerythrin, and total phycobilins)
and absorption spectra were studied in order to identify the most
sensitive pigment probe implicating the crucial suppression site on
photosynthetic apparatus. The results obtained indicated that all
pigment parameters were decreased with gramine concentration
increasing and exposure time extending. The above serious bleaching
of pigments was also reflected on the scanning results of absorption
spectra. Phycoerytherin exhibited the highest sensitivity to gramine
added, following by the largest relative decrease. It was concluded that
gramine seriously influenced algal photosynthetic activity by
destroying photosynthetic pigments and phycoerythrin most sensitive
to gramine might be contributed to its placing the outside of
phycobilins.