Abstract: CuO thin films were deposited by spray ultrasonic
pyrolysis with different precursor solution. Two staring solution slats
were used namely: copper acetate and copper chloride. The influence
of these solutions on CuO thin films proprieties of is instigated. The
X rays diffraction (XDR) analysis indicated that the films deposed
with copper acetate are amorphous however the films elaborated with
copper chloride have monoclinic structure. UV- Visible transmission
spectra showed a strong absorbance of the deposited CuO thin films
in the visible region. Electrical characterization has shown that CuO
thin films prepared with copper acetate have a higher electrical
conductivity.
Abstract: Here, we have shown the reaction of [Cr(ArN(CH2)3NAr)2Cl2] (1) where (Ar = 2,6-Pri
2C6H3) and in presence of NaCp (2) (Cp= C5H5 = cyclopentadien), with a center
coordination η5 interaction between Cp as co-ligand and chromium
metal center, for optimization we used density functional theory
(DFT), under methods, explicitly including electrons correlations, for
the final calculations as MB3LYP (Becke) (Lee–Yang–Parr) level of
theory we used to obtain more exact results. This complex was
calculated as electronic energy for molecular system, because the
calculation accounting all electrons correlations interactions. The
optimised of [Cr(ArN(CH2)3NAr)2(η5-Cp)] (Ar = 2,6-Pri2C6H3 and Cp = C5H5) was found to be thermally stable. By using Dewar-Chatt-Duncanson model, as a basis of the molecular orbital (MO) analysis
and showed the highest occupied molecular orbital (HOMO) and
lowest occupied molecular orbital LUMO.
Abstract: The aim of the study is to compare behavioral and
EEG reactions in Turkic-speaking inhabitants of Siberia (Tuvinians
and Yakuts) and Russians during the recognition of syntax errors in
native and foreign languages. Sixty-three healthy aboriginals of the
Tyva Republic, 29 inhabitants of the Sakha (Yakutia) Republic, and
55 Russians from Novosibirsk participated in the study. EEG were
recorded during execution of error-recognition task in Russian and
English language (in all participants) and in native languages
(Tuvinian or Yakut Turkic-speaking inhabitants). Reaction time (RT)
and quality of task execution were chosen as behavioral measures.
Amplitude and cortical distribution of P300 and P600 peaks of ERP
were used as a measure of speech-related brain activity. In Tuvinians,
there were no differences in the P300 and P600 amplitudes as well as
in cortical topology for Russian and Tuvinian languages, but there
was a difference for English. In Yakuts, the P300 and P600
amplitudes and topology of ERP for Russian language were the same
as Russians had for native language. In Yakuts, brain reactions during
Yakut and English language comprehension had no difference, while
the Russian language comprehension was differed from both Yakut
and English. We found out that the Tuvinians recognized both Russian and
Tuvinian as native languages, and English as a foreign language. The
Yakuts recognized both English and Yakut as foreign languages, but
Russian as a native language. According to the inquirer, both
Tuvinians and Yakuts use the national language as a spoken
language, whereas they do not use it for writing. It can well be a
reason that Yakuts perceive the Yakut writing language as a foreign
language while writing Russian as their native.
Abstract: Software testing has become a mandatory process in
assuring the software product quality. Hence, test management is
needed in order to manage the test activities conducted in the
software test life cycle. This paper discusses on the challenges faced
in the software test life cycle, and how the test processes and test
activities, mainly on test cases creation, test execution, and test
reporting is being managed and automated using several test
automation tools, i.e. Jira, Robot Framework, and Jenkins.
Abstract: The energy need is growing rapidly due to the
population growth and the large new usage of power. Several works
put considerable efforts to make the electricity grid more intelligent
to reduce essentially energy consumption and provide efficiency and
reliability of power systems. The Smart Grid is a complex
architecture that covers critical devices and systems vulnerable to
significant attacks. Hence, security is a crucial factor for the success
and the wide deployment of Smart Grids. In this paper, we present
security issues of the Smart Grid architecture and we highlight open
issues that will make the Smart Grid security a challenging research
area in the future.
Abstract: Household waste form a larger proportion of waste
generated across the state, accumulation of organic waste is an
apparent problem and the existing dump sites could be overstress.
Niger state has abundant arable land and water resources thus should
be one of the highest producers of agricultural crops in the country.
However, the major challenge to agricultural sector today is loss of
soil nutrient coupled with high cost of fertilizer. These have
continued to increase the use of fertilizer and decomposed solid waste
for enhance agricultural yield, which have varying effects on the soil
as well a threat to human livelihood. Consequently, vegetable yield
samples from poultry droppings, decomposed household waste
manure, NPK treatments and control from each replication were
subjected to proximate analysis to determine the nutritional and antinutritional
component as well as heavy metal concentration. Data
collected was analyzed using SPSS software and Randomized
complete Block Design means were compared. The result shows that
the treatments do not devoid the concentrations of any nutritional
components while the anti-nutritional analysis proved that NPK had
higher oxalate content than control and organic treats. The
concentration of lead and cadmium are within safe permissible level
while the mercury level exceeded the FAO/WHO maximum
permissible limit for the entire treatments depicts the need for urgent
intervention to minimize mercury levels in soil and manure in order
to mitigate its toxic effect. Thus, eco-agriculture should be widely
accepted and promoted by the stakeholders for soil amendment,
higher yield, strategies for sustainable environmental protection, food
security, poverty eradication, attainment of sustainable development
and healthy livelihood.
Abstract: In this paper, we present an optimization technique or
a learning algorithm using the hybrid architecture by combining the
most popular sequence recognition models such as Recurrent Neural
Networks (RNNs) and Hidden Markov models (HMMs). In order to
improve the sequence/pattern recognition/classification performance
by applying a hybrid/neural symbolic approach, a gradient descent
learning algorithm is developed using the Real Time Recurrent
Learning of Recurrent Neural Network for processing the knowledge
represented in trained Hidden Markov Models. The developed hybrid
algorithm is implemented on automata theory as a sample test beds
and the performance of the designed algorithm is demonstrated and
evaluated on learning the deterministic finite state automata.
Abstract: In recent years, the power system has been changed
and a flexible power pricing system such as demand response has been
sought in Japan. The demand response system works simply in the
household sector and the owner as the decision-maker, can benefit
from power saving. On the other hand, the execution of demand
response in the office building is more complex than in the household
because various people such as owners, building administrators and
occupants are involved in the decision-making process. While the
owners benefit from demand saving, the occupants are exposed to
restricted benefits of a demand-saved environment. One of the reasons
is that building systems are usually under centralized management and
each occupant cannot choose freely whether to participate in demand
response or not. In addition, it is unclear whether incentives give
occupants the motivation to participate. However, the recent
development of IT and building systems enables the personalized
control of the office environment where each occupant can control the
lighting level or temperature individually. Therefore, it can be possible
to have a system which each occupant can make a decision of whether
or not to participate in demand response in the office building. This study investigates personal responses to demand response
requests, under the condition where each occupant can adjust their
brightness individually in their workspace. Once workers participate
in the demand response, their desk-lights are automatically turned off.
The participation rates in the demand response events are compared
among four groups, which are divided by different motivation, the
presence, or absence of incentives and the method of participation. The
result shows that there are significant differences of participation rates
in demand response event between four groups. The method of
participation has a large effect on the participation rate. The “Opt-out”
groups where the occupants are automatically enrolled in a demand
response event if they do not express non-participation have the
highest participation rate in the four groups. Incentives also have an
effect on the participation rate. This study also reports on the impact of low illumination office
environment on the occupants, such as stress or fatigue. The
electrocardiogram and the questionnaire are used to investigate the
autonomic nervous activity and subjective fatigue symptoms of the
occupants. There is no big difference between dim workspace during
demand response event and bright workspace in autonomic nervous
activity and fatigue.
Abstract: With the increasing population and intensive land use,
huge traffic demand is generating worldwide both in developing and
developed countries. As a developing country, Bangladesh is also
facing the same problem in recent years by producing huge numbers
of daily trips. As a matter of fact, extensive traffic demand is
increasing day by day. Also, transport system in Dhaka is
heterogeneous, reflecting the heterogeneity in the socio-economic
and land use patterns. Trips produced here are for different purposes
such as work, business, educational etc. Due to the significant
concentration of educational institutions a large share of the trips are
generated by educational purpose. And one of the major percentages
of educational trips is produced by university going students and
most of them are travelled by car, bus, train, taxi, rickshaw etc. The
aim of the study was to find out the university students’ perception on
public transit ridership. A survey was conducted among 330 students
from eight different universities. It was found out that 26% of the
trips produced by university going students are travelled by public
bus service and only 5% are by train. Percentage of car share is 16%
and 12% of the trips are travelled by private taxi. It has been
observed from the study, students those who prefer bus instead of
other options, 42 percent of their family resides outside Dhaka. And
those who prefer walking, of them, over 40 percent students’ family
reside outside of Dhaka and of them over 85 percent students have a
tendency to live in a mess. On the contrary, students travelling by car
represents, most of their family reside in Dhaka. The study also
revealed that the most important reason that restricts students not to
use public transit is poor service. Negative attitudes such as
discomfort, uneasiness in using public transit also reduces the usage
of public transit. The poor waiting area is another major cause of not
using public transit. Insufficient security also plays a significant role
in not using public transit. On the contrary, the fare is not a problem
for students those who use public transit as a mode of transportation.
Students also think stations are not far away from their home or
institution and they do not need to wait long for the buses or trains. It
was also found accessibility to public transit is moderate.
Abstract: Growing human population has placed increased
demands on water supplies and spurred a heightened interest in
desalination infrastructure. Key elements of the economics of
desalination projects are thermal and electrical inputs. With growing
concerns over use of fossil fuels to (indirectly) supply these inputs,
coupling of desalination with nuclear power production represents a
significant opportunity. Individually, nuclear and desalination
technologies have a long history and are relatively mature. For
desalination, Reverse Osmosis (RO) has the lowest energy inputs.
However, the economically driven output quality of the water
produced using RO, which uses only electrical inputs, is lower than the
output water quality from thermal desalination plants. Therefore,
modern desalination projects consider that RO should be coupled with
thermal desalination technologies (MSF, MED, or MED-TVC) with
attendant steam inputs to permit blending to produce various qualities
of water. A large nuclear facility is well positioned to dispatch large
quantities of both electrical and thermal power. This paper considers
the supply of thermal energy to a large desalination facility to examine
heat balance impact on the nuclear steam cycle. The APR1400 nuclear
plant is selected as prototypical from both a capacity and turbine cycle
heat balance perspective to examine steam supply and the impact on
electrical output. Extraction points and quantities of steam are
considered parametrically along with various types of thermal
desalination technologies to form the basis for further evaluations of
economically optimal approaches to the interface of nuclear power
production with desalination projects. In our study, the
thermodynamic evaluation will be executed by DE-TOP, an IAEA
sponsored program. DE-TOP has capabilities to analyze power
generation systems coupled to desalination plants through various
steam extraction positions, taking into consideration the isolation loop
between the nuclear and the thermal desalination facilities (i.e., for
radiological isolation).
Abstract: The high-molecular water-soluble preparations from
several species of two genera (Symphytum and Anchusa) of
Boraginaceae family Symphytum asperum, S. caucasicum, S.officinale
and Anchusa italica were isolated. According to IR, 13C and 1H
NMR, APT, 1D NOE, 2D heteronuclear 1H/13C HSQC and 2D
DOSY experiments, the main chemical constituent of these
preparations was found to be caffeic acid-derived polyether, namely
poly[3-(3,4-dihydroxyphenyl)glyceric acid] (PDPGA) or poly[oxy-1-
carboxy-2-(3,4-dihydroxyphenyl)ethylene]. Most carboxylic groups
of this caffeic acid-derived polymer of A. italica are methylated.
Abstract: Cloud Computing refers to applications delivered as
services over the internet, and the datacenters that provide those
services with hardware and systems software. These were earlier
referred to as Software as a Service (SaaS). Scheduling is justified by
job components (called tasks), lack of information. In fact, in a large
fraction of jobs from machine learning, bio-computing, and image
processing domains, it is possible to estimate the maximum time
required for a task in the job. This study focuses on Trust based
scheduling to improve cloud security by modifying Heterogeneous
Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT
(Trust Reputation HEFT) which is then compared to Dynamic Load
Scheduling.
Abstract: The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
systems.
Abstract: In the present study we have investigated axial
buckling characteristics of nanocomposite beams reinforced by
single-walled carbon nanotubes (SWCNTs). Various types of beam
theories including Euler-Bernoulli beam theory, Timoshenko beam
theory and Reddy beam theory were used to analyze the buckling
behavior of carbon nanotube-reinforced composite beams.
Generalized differential quadrature (GDQ) method was utilized to
discretize the governing differential equations along with four
commonly used boundary conditions. The material properties of the
nanocomposite beams were obtained using molecular dynamic (MD)
simulation corresponding to both short-(10,10) SWCNT and long-
(10,10) SWCNT composites which were embedded by amorphous
polyethylene matrix. Then the results obtained directly from MD
simulations were matched with those calculated by the mixture rule
to extract appropriate values of carbon nanotube efficiency
parameters accounting for the scale-dependent material properties.
The selected numerical results were presented to indicate the
influences of nanotube volume fractions and end supports on the
critical axial buckling loads of nanocomposite beams relevant to
long- and short-nanotube composites.
Abstract: In this paper, we describe the use of formal methods
to model malware behaviour. The modelling of harmful behaviour
rests upon syntactic structures that represent malicious procedures
inside malware. The malicious activities are modelled by a formal
grammar, where API calls’ components are the terminals and the set
of API calls used in combination to achieve a goal are designated
non-terminals. The combination of different non-terminals in various
ways and tiers make up the attack vectors that are used by harmful
software. Based on these syntactic structures a parser can be
generated which takes execution traces as input for pattern
recognition.
Abstract: Lots of motors have been being used in industry.
Therefore many researchers have studied about the failure diagnosis of
motors. In this paper, the effect of measuring environment for
diagnosis of gear fault connected to a motor shaft is studied. The fault
diagnosis is executed through the comparison of normal gear and
abnormal gear. The measured FFT data are compared with the normal
data and analyzed for q-axis current, noise and vibration. For bad and
good environment, the diagnosis results are compared. From these, it
is shown that the bad measuring environment may not be able to detect
exactly the motor gear fault. Therefore it is emphasized that the
measuring environment should be carefully prepared.
Abstract: The McEliece cryptosystem is an asymmetric type of
cryptography based on error correction code. The classical McEliece
used irreducible binary Goppa code which considered unbreakable
until now especially with parameter [1024, 524, and 101], but it is
suffering from large public key matrix which leads to be difficult to
be used practically. In this work Irreducible and Separable Goppa
codes have been introduced. The Irreducible and Separable Goppa
codes used are with flexible parameters and dynamic error vectors. A
Comparison between Separable and Irreducible Goppa code in
McEliece Cryptosystem has been done. For encryption stage, to get
better result for comparison, two types of testing have been chosen;
in the first one the random message is constant while the parameters
of Goppa code have been changed. But for the second test, the
parameters of Goppa code are constant (m=8 and t=10) while the
random message have been changed. The results show that the time
needed to calculate parity check matrix in separable are higher than
the one for irreducible McEliece cryptosystem, which is considered
expected results due to calculate extra parity check matrix in
decryption process for g2(z) in separable type, and the time needed to
execute error locator in decryption stage in separable type is better
than the time needed to calculate it in irreducible type. The proposed
implementation has been done by Visual studio C#.
Abstract: This paper reports on the response of a fiber-optic
sensing probe to small concentrations of hydrogen peroxide (H2O2)
vapor at room temperature. H2O2 has extensive applications in industrial and medical
environments. Conversely, H2O2 can be a health hazard by itself. For
example, H2O2 induces cellular damage in human cells and its
presence can be used to diagnose illnesses such as asthma and human
breast cancer. Hence, development of reliable H2O2 sensor is of vital
importance to detect and measure this species. Ferric ferrocyanide, referred to as Prussian Blue (PB), was
deposited on the tip of a multimode optical fiber through the single
source precursor technique and served as an indicator of H2O2 in a
spectroscopic manner. Sensing tests were performed in H2O2-H2O
vapor mixtures with different concentrations of H2O2. The results of sensing tests show the sensor is able to detect H2O2
concentrations in the range of 50.6 ppm to 229.5 ppm. Furthermore,
the sensor response to H2O2 concentrations is linear in a log-log scale
with the adjacent R-square of 0.93. This sensing behavior allows us
to detect and quantify the concentration of H2O2 in the vapor phase.
Abstract: The Gezi Park protests of 2013 have significantly changed the Turkish agenda and its effects have been felt historically. The protests, which rapidly spread throughout the country, were triggered by the proposal to recreate the Ottoman Army Barracks to function as a shopping mall on Gezi Park located in Istanbul’s Taksim neighbourhood despite the oppositions of several NGOs and when trees were cut in the park for this purpose. Once the news that the construction vehicles entered the park on May 27 spread on social media, activists moved into the park to stop the demolition, against whom the police used disproportioned force. With this police intervention and the then prime-minister Tayyip Erdoğan's insistent statements about the construction plans, the protests turned into anti- government demonstrations, which then spread to the rest of the country, mainly in big cities like Ankara and Izmir. According to the Ministry of Internal Affairs’ June 23rd reports, 2.5 million people joined the demonstrations in 79 provinces, that is all of them, except for the provinces of Bayburt and Bingöl, while even more people shared their opinions via social networks. As a result of these events, 8 civilians and 2 security personnel lost their lives, namely police chief Mustafa Sarı, police officer Ahmet Küçükdağ, citizens Mehmet Ayvalıtaş, Abdullah Cömert, Ethem Sarısülük, Ali İsmail Korkmaz, Ahmet Atakan, Berkin Elvan, Burak Can Karamanoğlu, Mehmet İstif, and Elif Çermik, and 8163 more were injured. Besides being a turning point in Turkish history, the Gezi Park protests also had broad repercussions in both in Turkish and in global media, which focused on Turkey throughout the events. Our study conducts content analysis of three Turkish reporting newspapers with varying ideological standpoints, Hürriyet, Cumhuriyet ve Yeni Şafak, in order to reveal their basic approach to news casting in context of the Gezi Park protests. Headlines, news segments, and news content relating to the Gezi protests were treated and analysed for this purpose. The aim of this study is to understand the social effects of the Gezi Park protests through media samples with varying political attitudes towards news casting.
Abstract: A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure. Routing is an important issue which impacts network performance. As MANETs lack central administration and prior organization, their security concerns are different from those of conventional networks. Wireless links make MANETs susceptible to attacks. This study proposes a new trust mechanism to mitigate wormhole attack in MANETs. Different optimization techniques find available optimal path from source to destination. This study extends trust and reputation to an improved link quality and channel utilization based Adhoc Ondemand Multipath Distance Vector (AOMDV). Differential Evolution (DE) is used for optimization.