Abstract: A comparative study on the feasibility of producing instant high fibre plantain flour for diabetic fufu by blending soy residence with different plantain (Musa spp) varieties (Horn, false Horn and French), all sieved at 60 mesh, mixed in ratio of 60:40 was analyzed for their passing properties using standard analytical method. Results show that VIIIS60 had the highest peak viscosity (303.75 RVU), Trough value (182.08 RVU), final viscosity (284.50 RVU), and lowest in breakdown viscosity (79.58 RVU), set back value (88.17 RVU), peak time (4.36min), pasting temperature (81.18°C) and differed significantly (p
Abstract: In this research, a 2-D computational analysis of
steady state free convection in a rectangular enclosure filled with an
electrically conducting fluid under Effect of Magnetic Field has been
performed. The governing equations (mass, momentum, and energy)
are formulated and solved by a finite volume method (FVM)
subjected to different boundary conditions. A parametric study has
been conducted to consider the influence of Grashof number (Gr),
Prantdl number (Pr) and the orientation of magnetic field on the flow
and heat transfer characteristics. It is observed that Nusselt number
(Nu) and heat flux will increase with increasing Grashof and Prandtl
numbers and decreasing the slope of the orientation of magnetic field.
Abstract: Cardiac pulse-related artifacts in the EEG recorded
simultaneously with fMRI are complex and highly variable. Their
effective removal is an unsolved problem. Our aim is to develop an
adaptive removal algorithm based on the matching pursuit (MP)
technique and to compare it to established methods using a visual
evoked potential (VEP). We recorded the VEP inside the static
magnetic field of an MR scanner (with artifacts) as well as in an
electrically shielded room (artifact free). The MP-based artifact
removal outperformed average artifact subtraction (AAS) and
optimal basis set removal (OBS) in terms of restoring the EEG field
map topography of the VEP. Subsequently, a dipole model was fitted
to the VEP under each condition using a realistic boundary element
head model. The source location of the VEP recorded inside the MR
scanner was closest to that of the artifact free VEP after cleaning
with the MP-based algorithm as well as with AAS. While none of the
tested algorithms offered complete removal, MP showed promising
results due to its ability to adapt to variations of latency, frequency
and amplitude of individual artifact occurrences while still utilizing a
common template.
Abstract: In this paper, an ultrasonic technique is proposed to
predict oil content in a fresh palm fruit. This is accomplished by
measuring the attenuation based on ultrasonic transmission mode.
Several palm fruit samples with known oil content by Soxhlet
extraction (ISO9001:2008) were tested with our ultrasonic
measurement. Amplitude attenuation data results for all palm samples
were collected. The Feedforward Neural Networks (FNNs) are
applied to predict the oil content for the samples. The Root Mean
Square Error (RMSE) and Mean Absolute Error (MAE) of the FNN
model for predicting oil content percentage are 7.6186 and 5.2287
with the correlation coefficient (R) of 0.9193.
Abstract: Noise causes significant sensibility changes on a human. This study investigated the effect of five different noises on electroencephalogram (EEG) and subjective evaluation. Six human subjects were exposed to classic piano, ocean wave, alarm in army, ambulance, mosquito noise and EEG data were collected during the experimental session. Alpha band activity in the mosquito noise was smaller than that in the classic piano. Alpha band activity decreased 43.4 ± 8.2 % in the mosquito noise. On the other hand, Beta band activity in the mosquito noise was greater than that in the classic piano. Beta band activity increased 60.1 ± 10.7 % in the mosquito noise. The advances from this study may aid the product design process with human sensibility engineering. This result may provide useful information in designing a human-oriented product to avoid the stress.
Abstract: Security risk models have been successful in estimating the likelihood of attack for simple security threats. However, modeling complex system and their security risk is even a challenge. Many methods have been proposed to face this problem. Often difficult to manipulate, and not enough all-embracing they are not as famous as they should with administrators and deciders. We propose in this paper a new tool to model big systems on purpose. The software, takes into account attack threats and security strength.
Abstract: This paper focuses on a critical component of the situational awareness (SA), the control of autonomous vertical flight for tactical unmanned aerial vehicle (TUAV). With the SA strategy, we proposed a two stage flight control procedure using two autonomous control subsystems to address the dynamics variation and performance requirement difference in initial and final stages of flight trajectory for an unmanned helicopter model with coaxial rotor and ducted fan configuration. This control strategy for chosen model of TUAV has been verified by simulation of hovering maneuvers using software package Simulink and demonstrated good performance for fast stabilization of engines in hovering, consequently, fast SA with economy in energy can be asserted during search-and-rescue operations.
Abstract: Alcohol and water extracts of Cymbopogon citratus
was investigated for anti-bacterial properties and phytochemical
constituents. The extract was screened against four gram-negative
bacteria Escherichia coli, Klebsiella pneumoniae, Pseudomonas
aeruginosa, Proteus vulgaris) and two grampositive bacteria Bacillus
subtilis and Staphylococcus aureus at four different concentrations
(1:1, 1:5, 1:10 and 1:20) using disc diffusion method. The antibacterial
examination was by disc diffusion techniques, while the
photochemical constituents were investigated using standard
chemical methods. Results showed that the extracts inhibited the
growth of standard and local strains of the organisms used. The
treatments were significantly different (P = 0.05). The minimum
inhibitory concentration of the extracts against the tested
microorganisms ranged between 150mg/ml and 50mg/ml. The
alcohol extracts were found to be generally more effective than the
water extract. The photochemical analysis revealed the presence of
alkaloids and phenol but absence of cardiac and cyanogenic
glycosides. The presence of alkaloid and phenols were inferred as
being responsible for the anti-bacterial properties of the extracts.
Abstract: The steady mixed convection boundary layer flow from
a vertical cone in a porous medium filled with a nanofluid is
numerically investigated using different types of nanoparticles as Cu
(copper), Al2O3 (alumina) and TiO2 (titania). The boundary value
problem is solved by using the shooting technique by reducing it
into an ordinary differential equation. Results of interest for the local
Nusselt number with various values of the constant mixed convection
parameter and nanoparticle volume fraction parameter are evaluated.
It is found that dual solutions exist for a certain range of mixed
convection parameter.
Abstract: A dead leg is a typical subsea production system
component. CFD is required to model heat transfer within the dead
leg. Unfortunately its solution is time demanding and thus not
suitable for fast prediction or repeated simulations. Therefore there is
a need to create a thermal FEA model, mimicking the heat flows and
temperatures seen in CFD cool down simulations.
This paper describes the conventional way of tuning and a new
automated way using parametric model order reduction (PMOR)
together with an optimization algorithm. The tuned FE analyses
replicate the steady state CFD parameters within a maximum error in
heat flow of 6 % and 3 % using manual and PMOR method
respectively. During cool down, the relative error of the tuned FEA
models with respect to temperature is below 5% comparing to the
CFD. In addition, the PMOR method obtained the correct FEA setup
five times faster than the manually tuned FEA.
Abstract: Free Hemoglobin promotes the accumulation of
hydroxyl radicals by the heme iron, which can react with endogenous
hydrogen peroxide to produce free radicals which may cause severe
oxidative cell damage. Haptoglobin binds to Hemoglobin strongly
and Haptoglobin-Hemoglobin binding is irreversible. Peroxidase
activity of Haptoglobin(2-2)-Hemoglobin complex was assayed by
following increase of absorption of produced tetraguaiacol as the
second substrate of Haptoglobin-Hemoglobin complex at 470 nm and
42°C by UV-Vis spectrophotometer. The results have shown that
peroxidase activity of Haptoglobin(2-2)-Hemoglobin complex is
modulated via homotropic effect of hydrogen peroxide as allostric
substrate. On the other hand antioxidant property of Haptoglobin(2-
2)-Hemoglobin was increased via heterotropic effect of the two drugs
(especially ampicillin) on peroxidase activity of the complex. Both
drugs also have mild effect on quality of homotropic property of
peroxidase activity of Haptoglobin(2-2)-Hemoglobin complex.
Therefore, in vitro studies show that the two drugs may help Hp-Hb
complex to remove hydrogen peroxide from serum at pathologic
temperature ature (42 C).
Abstract: There are various overlay structures that provide
efficient and scalable solutions for point and range query in a peer-topeer
network. Overlay structure based on m-Binary Search Tree
(BST) is one such popular technique. It deals with the division of the
tree into different key intervals and then assigning the key intervals to
a BST. The popularity of the BST makes this overlay structure
vulnerable to different kinds of attacks. Here we present four such
possible attacks namely index poisoning attack, eclipse attack,
pollution attack and syn flooding attack. The functionality of BST is
affected by these attacks. We also provide different security
techniques that can be applied against these attacks.
Abstract: An approach to develop the FPGA of a flexible key
RSA encryption engine that can be used as a standard device in the
secured communication system is presented. The VHDL modeling of
this RSA encryption engine has the unique characteristics of
supporting multiple key sizes, thus can easily be fit into the systems
that require different levels of security. A simple nested loop addition
and subtraction have been used in order to implement the RSA
operation. This has made the processing time faster and used
comparatively smaller amount of space in the FPGA. The hardware
design is targeted on Altera STRATIX II device and determined that
the flexible key RSA encryption engine can be best suited in the
device named EP2S30F484C3. The RSA encryption implementation
has made use of 13,779 units of logic elements and achieved a clock
frequency of 17.77MHz. It has been verified that this RSA
encryption engine can perform 32-bit, 256-bit and 1024-bit
encryption operation in less than 41.585us, 531.515us and 790.61us
respectively.
Abstract: Intrusion Detection System is significant in network
security. It detects and identifies intrusion behavior or intrusion
attempts in a computer system by monitoring and analyzing the
network packets in real time. In the recent year, intelligent algorithms
applied in the intrusion detection system (IDS) have been an
increasing concern with the rapid growth of the network security.
IDS data deals with a huge amount of data which contains irrelevant
and redundant features causing slow training and testing process,
higher resource consumption as well as poor detection rate. Since the
amount of audit data that an IDS needs to examine is very large even
for a small network, classification by hand is impossible. Hence, the
primary objective of this review is to review the techniques prior to
classification process suit to IDS data.
Abstract: Trace element speciation of an integrated soil
amendment matrix was studied with a modified BCR sequential
extraction procedure. The analysis included pseudo-total
concentration determinations according to USEPA 3051A and
relevant physicochemical properties by standardized methods. Based
on the results, the soil amendment matrix possessed neutralization
capacity comparable to commercial fertilizers. Additionally, the
pseudo-total concentrations of all trace elements included in the
Finnish regulation for agricultural fertilizers were lower than the
respective statutory limit values. According to chemical speciation,
the lability of trace elements increased in the following order: Hg <
Cr < Co < Cu < As < Zn < Ni < Pb < Cd < V < Mo < Ba. The
validity of the BCR approach as a tool for chemical speciation was
confirmed by the additional acid digestion phase. Recovery of trace
elements during the procedure assured the validity of the approach
and indicated good quality of the analytical work.
Abstract: In order to guarantee secure communication for wireless sensor networks (WSNs), many user authentication schemes have successfully drawn researchers- attention and been studied widely. In 2012, He et al. proposed a robust biometric-based user authentication scheme for WSNs. However, this paper demonstrates that He et al.-s scheme has some drawbacks: poor reparability problem, user impersonation attack, and sensor node impersonate attack.
Abstract: A numerical analysis used to simulate the effects of wavy surfaces and thermal radiation on natural convection heat transfer boundary layer flow over an inclined wavy plate has been investigated. A simple coordinate transformation is employed to transform the complex wavy surface into a flat plate. The boundary layer equations and the boundary conditions are discretized by the finite difference scheme and solved numerically using the Gauss-Seidel algorithm with relaxation coefficient. Effects of the wavy geometry, the inclination angle of the wavy plate and the thermal radiation on the velocity profiles, temperature profiles and the local Nusselt number are presented and discussed in detail.
Abstract: The aim of this research is to propose a Measurement
Scale for Patient Satisfaction (MSPS) in the context of Tunisian
private clinics. This scale is developed using value management
methods and is validated by statistic tools with SPSS.
Abstract: The protection of parallel transmission lines has been a challenging task due to mutual coupling between the adjacent circuits of the line. This paper presents a novel scheme for detection and classification of faults on parallel transmission lines. The proposed approach uses combination of wavelet transform and neural network, to solve the problem. While wavelet transform is a powerful mathematical tool which can be employed as a fast and very effective means of analyzing power system transient signals, artificial neural network has a ability to classify non-linear relationship between measured signals by identifying different patterns of the associated signals. The proposed algorithm consists of time-frequency analysis of fault generated transients using wavelet transform, followed by pattern recognition using artificial neural network to identify the type of the fault. MATLAB/Simulink is used to generate fault signals and verify the correctness of the algorithm. The adaptive discrimination scheme is tested by simulating different types of fault and varying fault resistance, fault location and fault inception time, on a given power system model. The simulation results show that the proposed scheme for fault diagnosis is able to classify all the faults on the parallel transmission line rapidly and correctly.
Abstract: Current technological advances pale in comparison to the changes in social behaviors and 'sense of place' that is being empowered since the Internet made it on the scene. Today-s students view the Internet as both a source of entertainment and an educational tool. The development of virtual environments is a conceptual framework that needs to be addressed by educators and it is important that they become familiar with who these virtual learners are and how they are motivated to learn. Massively multiplayer online role playing games (MMORPGs), if well designed, could become the vehicle of choice to deliver learning content. We suggest that these games, in order to accomplish these goals, must begin with well-established instructional design principles that are co-aligned with established principles of video game design. And have the opportunity to provide an instructional model of significant prescriptive power. The authors believe that game designers need to take advantage of the natural motivation player-learners have for playing games by developing them in such a way so as to promote, intrinsic motivation, content learning, transfer of knowledge, and naturalization.