Abstract: This study attempts to understand the effect of different UV irradiation methods on the intercalation of LDPE/MMT nanocomposites, and its molecular behavior at certain isothermal crystallization temperature. Three different methods of UV exposure were employed using single composition of LDPE/MMT nanocomposites. All samples were annealed for 5 hours at a crystallization temperature of 100oC. The crystallization temperature was chosen to be at large supercooling temperature to ensure quick and complete crystallization. The raw material of LDPE consisted of two stable monoclinic and orthorhombic phases according to XRD results. The thermal behavior of both phases acted differently when UV exposure method was changed. The monoclinic phase was more dependent on the method used compared to the orthorhombic phase. The intercalation of clay, as well as, the non-isothermal crystallization temperature, has also shown a clear dependency on the type of UV exposure. A third phase that is thermally less stable was also observed. Its respond to UV irradiation was greater since it contains low molecular weight entities which make it more vulnerable to any UV exposure.
Abstract: Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.
Abstract: This paper considers people’s driving skills
diagnosis under real driving conditions. In that sense, this research
presents an approach that uses GPS signals which have a direct
correlation with driving maneuvers. Besides, it is presented a novel
expert-driving-criteria approximation using fuzzy logic which
seeks to analyze GPS signals in order to issue an intelligent driving
diagnosis.
Based on above, this works presents in the first section the
intelligent driving diagnosis system approach in terms of its own
characteristics properties, explaining in detail significant
considerations about how an expert-driving-criteria approximation
must be developed. In the next section, the implementation of our
developed system based on the proposed fuzzy logic approach is
explained. Here, a proposed set of rules which corresponds to a
quantitative abstraction of some traffics laws and driving secure
techniques seeking to approach an expert-driving- criteria
approximation is presented.
Experimental testing has been performed in real driving
conditions. The testing results show that the intelligent driving
diagnosis system qualifies driver’s performance quantitatively with
a high degree of reliability.
Abstract: The security of the medical images and its related data is the major research area which is to be concentrated in today’s era. Security in the medical image indicates that the physician may hide patients’ related data in the medical image and transfer it safely to a defined location using reversible watermarking. Many reversible watermarking methods had proposed over the decade. This paper enhances the security level in brain tumor images to hide the patient’s detail, which has to be conferred with other physician’s suggestions. The details or the information will be hidden in Non-ROI area of the image by using the block cipher algorithm. The block cipher uses different keys to extract the details that are difficult for the intruder to detect all the keys and to spot the details, which are the key advantage of this method. The ROI is the tumor area and Non-ROI is the area rest of ROI. The Non-ROI should not be spoiled in any cause and the details in the Non-ROI should be extracted correctly. The reversible watermarking method proposed in this paper performs well when compared to existing methods in the process of extraction of an original image and providing information security.
Abstract: Information security plays a major role in uplifting the standard of secured communications via global media. In this paper, we have suggested a technique of encryption followed by insertion before transmission. Here, we have implemented two different concepts to carry out the above-specified tasks. We have used a two-point crossover technique of the genetic algorithm to facilitate the encryption process. For each of the uniquely identified rows of pixels, different mathematical methodologies are applied for several conditions checking, in order to figure out all the parent pixels on which we perform the crossover operation. This is done by selecting two crossover points within the pixels thereby producing the newly encrypted child pixels, and hence the encrypted cover image. In the next lap, the first and second order derivative operators are evaluated to increase the security and robustness. The last lap further ensures reapplication of the crossover procedure to form the final stego-image. The complexity of this system as a whole is huge, thereby dissuading the third party interferences. Also, the embedding capacity is very high. Therefore, a larger amount of secret image information can be hidden. The imperceptible vision of the obtained stego-image clearly proves the proficiency of this approach.
Abstract: Groundwater is a vital water resource in many areas in the world, particularly in the Middle-East region where the water resources become scarce and depleting. Sustainable management and planning of the groundwater resources become essential and urgent given the impact of the global climate change. In the recent years, numerical models have been widely used to predict the flow pattern and assess the water resources security, as well as the groundwater quality affected by the contaminants transported. In this study, MODFLOW is used to study the current status of groundwater resources and the risk of water resource security in the region centred at Al-Najaf City, which is located in the mid-west of Iraq and adjacent to the Euphrates River. In this study, a conceptual model is built using the geologic and hydrogeologic collected for the region, together with the Digital Elevation Model (DEM) data obtained from the "Global Land Cover Facility" (GLCF) and "United State Geological Survey" (USGS) for the study area. The computer model is also implemented with the distributions of 69 wells in the area with the steady pro-defined hydraulic head along its boundaries. The model is then applied with the recharge rate (from precipitation) of 7.55 mm/year, given from the analysis of the field data in the study area for the period of 1980-2014. The hydraulic conductivity from the measurements at the locations of wells is interpolated for model use. The model is calibrated with the measured hydraulic heads at the locations of 50 of 69 wells in the domain and results show a good agreement. The standard-error-of-estimate (SEE), root-mean-square errors (RMSE), Normalized RMSE and correlation coefficient are 0.297 m, 2.087 m, 6.899% and 0.971 respectively. Sensitivity analysis is also carried out, and it is found that the model is sensitive to recharge, particularly when the rate is greater than (15mm/year). Hydraulic conductivity is found to be another parameter which can affect the results significantly, therefore it requires high quality field data. The results show that there is a general flow pattern from the west to east of the study area, which agrees well with the observations and the gradient of the ground surface. It is found that with the current operational pumping rates of the wells in the area, a dry area is resulted in Al-Najaf City due to the large quantity of groundwater withdrawn. The computed water balance with the current operational pumping quantity shows that the Euphrates River supplies water into the groundwater of approximately 11759 m3/day, instead of gaining water of 11178 m3/day from the groundwater if no pumping from the wells. It is expected that the results obtained from the study can provide important information for the sustainable and effective planning and management of the regional groundwater resources for Al-Najaf City.
Abstract: Access to advanced medical services has been one of the medical challenges faced by our present society especially in distant geographical locations which may be inaccessible. Then the need for telemedicine arises through which live videos of a doctor can be streamed to a patient located anywhere in the world at any time. Patients’ medical records contain very sensitive information which should not be made accessible to unauthorized people in order to protect privacy, integrity and confidentiality. This research work focuses on a more robust security measure which is biometric (fingerprint) as a form of access control to data of patients by the medical specialist/practitioner.
Abstract: The present paper discusses the prediction of gas-liquid two-phase frictional pressure drop in a 2.12 mm horizontal circular minichannel using Artificial Neural Network (ANN). The experimental results are obtained with air as gas phase and water as liquid phase. The superficial gas velocity is kept in the range of 0.0236 m/s to 0.4722 m/s while the values of 0.0944 m/s, 0.1416 m/s and 0.1889 m/s are considered for superficial liquid velocity. The experimental results are predicted using different Artificial Neural Network (ANN) models. Networks used for prediction are radial basis, generalised regression, linear layer, cascade forward back propagation, feed forward back propagation, feed forward distributed time delay, layer recurrent, and Elman back propagation. Transfer functions used for networks are Linear (PURELIN), Logistic sigmoid (LOGSIG), tangent sigmoid (TANSIG) and Gaussian RBF. Combination of networks and transfer functions give different possible neural network models. These models are compared for Mean Absolute Relative Deviation (MARD) and Mean Relative Deviation (MRD) to identify the best predictive model of ANN.
Abstract: Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.
Abstract: Environmental security clearly articulates the perfections and developments of various communities around the world irrespective of the region, culture, religion or social inclination. Although, the present state of insecurity has become serious issue devastating the peace, unity, stability and progress of man and his physical environment particularly in developing countries. Recently, measure of security and it management in Nigeria has been a bottle-neck to the effectiveness and advancement of various sectors that include; business, education, social relations, politics and above all an economy. Several measures have been considered on mitigating environment insecurity such as surveillance, demarcation, security personnel empowerment and the likes, but still the issue remains disturbing. In this paper, we present the application of new technology that contributes to the improvement of security surveillance known as “Wireless Sensor Network (WSN)”. The system is new, smart and emerging technology that provides monitoring, detection and aggregation of information using sensor nodes and wireless network. WSN detects, monitors and stores information or activities in the deployed area such as schools, environment, business centers, public squares, industries, and outskirts and transmit to end users. This will reduce the cost of security funding and eases security surveillance depending on the nature and the requirement of the deployment.
Abstract: This research aims to develop ways of lodging
business management of Bang Khonthi community in Samut
Songkram province that are appropriate with the cultural context of
the Bang Khonthi community.
Eight lodging business owners were interviewed. It was found that
lodging business that are family business must be done with passion,
correct understanding of self, culture, nature, Thai way of life,
thorough, professional development, environmentally concerned,
building partnerships with various networks both community level,
and public sector and business cohorts. Public relations should be
done through media both traditional and modern outlets, such as
websites and social networks to provide customers convenience,
security, happiness, knowledge, love and value when travel to Bang
Khonthi. This will also help them achieve sustainability in business,
in line with the 10 Home Stay Standard Thailand.
Suggestions for operators are as follows: Operators need to
improve their public relations work. They need to use technology in
public relations such as the internet. Management standards must be
improved. Souvenir and local products shops should be arranged in
the compound. Product pricing must be set accordingly. They need to
join hands to help each other. Quality of the business operation
should be raised to meet the standards. Educational measures to
reduce the impact caused by tourism on the community such as
efforts to reduce energy consumption.
Abstract: This study aims to investigate and explore the underlying causes of security concerns of customers emerged when WHSmith transformed its physical system to virtualized business model through NetSuite. NetSuite is essentially fully integrated software which helps transforming the physical system to virtualized business model. Modern organisations are moving away from traditional business models to cloud based models and consequently it is expected to have a better, secure and innovative environment for customers. The vital issue of the modern age race is the security when transforming virtualized through cloud based models and designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. The content analysis approach is being used to collect the qualitative data from 120 online bloggers including TRUSTPILOT. The results and finding provide useful new insights into the nature and form of security concerns of online users after they have used the WHSmith services offered online through their website. Findings have theoretical as well as practical implications for the successful adoption of cloud computing Business-to-Business model and similar systems.
Abstract: This study aims to investigate the impact of data leak of M&S customers on digital communities. Modern businesses are using digital communities as an important public relations tool for marketing purposes. This form of communication helps companies to build better relationship with their customers which also act as another source of information. The communication between the customers and the organizations is not regulated so users may post positive and negative comments. There are new platforms being developed on a daily basis and it is very crucial for the businesses to not only get themselves familiar with those but also know how to reach their existing and perspective consumers. The driving force of marketing and communication in modern businesses is the digital communities and these are continuously increasing and developing. This phenomenon is changing the way marketing is conducted. The current research has discussed the implications on M&S business performance since the data was exploited on digital communities; users contacted M&S and raised the security concerns. M&S closed down its website for few hours to try to resolve the issue. The next day M&S made a public apology about this incidence. This information was proliferated on various digital communities and it has impacted negatively on M&S brand name, sales and customers. The content analysis approach is being used to collect qualitative data from 100 digital bloggers including social media communities such as Facebook and Twitter. The results and finding provide useful new insights into the nature and form of security concerns of digital users. Findings have theoretical and practical implications. This research will showcase a large corporation utilizing various digital community platforms and can serve as a model for future organizations.
Abstract: In this paper proposed the effective fault detection of industrial drives by using Biorthogonal Posterior Vibration Signal-Data Probabilistic Wavelet Neural Network (BPPVS-WNN) system. This system was focused to reducing the current flow and to identify faults with lesser execution time with harmonic values obtained through fifth derivative. Initially, the construction of Biorthogonal vibration signal-data based wavelet transform in BPPVS-WNN system localizes the time and frequency domain. The Biorthogonal wavelet approximates the broken bearing using double scaling and factor, identifies the transient disturbance due to fault on induction motor through approximate coefficients and detailed coefficient. Posterior Probabilistic Neural Network detects the final level of faults using the detailed coefficient till fifth derivative and the results obtained through it at a faster rate at constant frequency signal on the industrial drive. Experiment through the Simulink tool detects the healthy and unhealthy motor on measuring parametric factors such as fault detection rate based on time, current flow rate, and execution time.
Abstract: Approximately 10,000 different types of dyes and
pigments are being used in various industrial applications yearly,
which include the textile and printing industries. However, these dyes
are difficult to degrade naturally once they enter the aquatic system.
Their high persistency in natural environment poses a potential health
hazard to all form of life. Hence, there is a need for alternative dye
removal strategy in the environment via bioremediation. In this study,
fungi laccase is investigated via commercial agar dyes plates and
submerged fermentation to explore the application of fungi laccase in
textile dye wastewater treatment. Two locally isolated basidiomycetes
were screened for laccase activity using media added with commercial
dyes such as 2, 2-azino-bis (3-ethylbenzothiazoline-6-sulfonic acid
(ABTS), guaiacol and Remazol Brillant Blue R (RBBR). Isolate TBB3
(1.70±0.06) and EL2 (1.78±0.08) gave the highest results for ABTS
plates with the appearance of greenish halo on around the isolates.
Submerged fermentation performed on Isolate TBB3 with the
productivity 3.9067 U/ml/day, whereas the laccase activity for Isolate
EL2 was much lower (0.2097 U/ml/day). As isolate TBB3 showed
higher laccase production, it was subjected to molecular
characterization by DNA isolation, PCR amplification and sequencing
of ITS region of nuclear ribosomal DNA. After being compared with
other sequences in National Center for Biotechnology Information
(NCBI database), isolate TBB3 is probably from species Trametes
hirsutei. Further research work can be performed on this isolate by
upscale the production of laccase in order to meet the demands of the
requirement for higher enzyme titer for the bioremediation of textile
dyes.
Abstract: Water suspensions of in-organic (metals and oxides)
and organic nano-objects (chitozan and collagen) were subjected to
the treatment of direct and alternative electrical fields. In addition to
quasi-periodical spatial patterning resonance-like performance of
spatial distributions of these suspensions has been found at low
frequencies of alternating electrical field. These resonances are
explained as the result of creation of equilibrium states of groups of
charged nano-objects with opposite signs of charges at the interparticle
distances where the forces of Coulomb attraction are
compensated by the repulsion forces induced by relatively negative
polarization of hydrated regions surrounding the nanoparticles with
respect to pure water. The low frequencies of these resonances are
explained by comparatively big distances between the particles and
their big masses with t\respect to masses of atoms constituting
molecules with high resonance frequencies. These new resonances
open a new approach to detailed modeling and understanding of
mechanisms of the influence of electrical fields on the functioning of
internal organs of living organisms at the level of cells and neurons.
Abstract: This work studies the effect of thickness on structural
and electrical properties of CuAlS2 thin films grown by two stage
vacuum thermal evaporation technique. CuAlS2 thin films of
thicknesses 50nm, 100nm and 200nm were deposited on suitably
cleaned corning 7059 glass substrate at room temperature (RT). In
the first stage Cu-Al precursors were grown at room temperature by
thermal evaporation and in the second stage Cu-Al precursors were
converted to CuAlS2 thin films by sulfurisation under sulfur
atmosphere at the temperature of 673K. The structural properties of
the films were examined by X-ray diffraction (XRD) technique while
electrical properties of the specimens were studied using four point
probe method. The XRD studies revealed that the films are of
crystalline in nature having tetragonal structure. The variations of the
micro-structural parameters, such as crystallite size (D), dislocation
density ( ), and micro-strain ( ), with film thickness were
investigated. The results showed that the crystallite sizes increase as
the thickness of the film increases. The dislocation density and
micro-strain decreases as the thickness increases. The resistivity ( )
of CuAlS2 film is found to decrease with increase in film thickness,
which is related to the increase of carrier concentration with film
thickness. Thus thicker films exhibit the lowest resistivity and high
carrier concentration, implying these are the most conductive films.
Low electrical resistivity and high carrier concentration are widely
used as the essential components in various optoelectronic devices
such as light-emitting diode and photovoltaic cells.
Abstract: Knowledge transfer between personnel could benefit an organization’s improved competitive advantage in the marketplace from a strategic approach to knowledge management. The lack of information sharing between personnel could create knowledge transfer gaps while restricting the decision-making processes. Knowledge transfer between personnel can potentially improve information sharing based on an implemented knowledge management strategy. An organization’s capacity to gain more knowledge is aligned with the organization’s prior or existing captured knowledge. This case study attempted to understand the overall influence of a KMS within the corporate environment and knowledge exchange between personnel. The significance of this study was to help understand how organizations can improve the Return on Investment (ROI) of a knowledge management strategy within a knowledge-centric organization. A qualitative descriptive case study was the research design selected for this study. The lack of information sharing between personnel may create knowledge transfer gaps while restricting the decision-making processes. Developing a knowledge management strategy acceptable at all levels of the organization requires cooperation in support of a common organizational goal. Working with management and executive members to develop a protocol where knowledge transfer becomes a standard practice in multiple tiers of the organization. The knowledge transfer process could be measurable when focusing on specific elements of the organizational process, including personnel transition to help reduce time required understanding the job. The organization studied in this research acknowledged the need for improved knowledge management activities within the organization to help organize, retain, and distribute information throughout the workforce. Data produced from the study indicate three main themes including information management, organizational culture, and knowledge sharing within the workforce by the participants. These themes indicate a possible connection between an organizations KMS, the organizations culture, knowledge sharing, and knowledge transfer.
Abstract: MicroRNAs are small non-coding RNA found in
many different species. They play crucial roles in cancer such as
biological processes of apoptosis and proliferation. The identification
of microRNA-target genes can be an essential first step towards to
reveal the role of microRNA in various cancer types. In this paper,
we predict miRNA-target genes for lung cancer by integrating
prediction scores from miRanda and PITA algorithms used as a
feature vector of miRNA-target interaction. Then, machine-learning
algorithms were implemented for making a final prediction. The
approach developed in this study should be of value for future studies
into understanding the role of miRNAs in molecular mechanisms
enabling lung cancer formation.
Abstract: The combination of the properties of graphene oxide
(OG) and PVDF homopolymer makes their combined composite
materials as multifunctional systems with great potential. Knowledge
of the molecular structure is essential for better use. In this work, the
degradation of PVDF polymer exposed to gamma irradiation in
oxygen atmosphere in high dose rate has been studied and compared
to degradation of PVDF/OG composites. The samples were irradiated
with a Co-60 source at constant dose rate, with doses ranging from
100 kGy to 1,000 kGy. In FTIR data shown that the formation of
oxidation products was at the both samples with formation of
carbonyl and hydroxyl groups amongst the most prevalent products
in the pure PVDF samples. In the other hand, the composites samples
exhibit less presence of degradation products with predominant
formation of carbonyl groups, these results also seen in the UV-Vis
analysis. The results show that the samples of composites may have
greater resistance to the irradiation process, since they have less
degradation products than pure PVDF samples seen by spectroscopic
techniques.