Abstract: Many methods exist for either measuring or estimating
evaporation from free water surfaces. Evaporation pans provide one
of the simplest, inexpensive, and most widely used methods of
estimating evaporative losses. In this study, the rate of evaporation
starting from a water surface was calculated by modeling with
application to dams in wet, arid and semi arid areas in Algeria.
We calculate the evaporation rate from the pan using the energy
budget equation, which offers the advantage of an ease of use, but
our results do not agree completely with the measurements taken by
the National Agency of areas carried out using dams located in areas
of different climates. For that, we develop a mathematical model to
simulate evaporation. This simulation uses an energy budget on the
level of a vat of measurement and a Computational Fluid Dynamics
(Fluent). Our calculation of evaporation rate is compared then by the
two methods and with the measures of areas in situ.
Abstract: The problem of frequent pattern discovery is defined
as the process of searching for patterns such as sets of features or items that appear in data frequently. Finding such frequent patterns
has become an important data mining task because it reveals associations, correlations, and many other interesting relationships
hidden in a database. Most of the proposed frequent pattern mining
algorithms have been implemented with imperative programming
languages. Such paradigm is inefficient when set of patterns is large
and the frequent pattern is long. We suggest a high-level declarative
style of programming apply to the problem of frequent pattern
discovery. We consider two languages: Haskell and Prolog. Our
intuitive idea is that the problem of finding frequent patterns should
be efficiently and concisely implemented via a declarative paradigm
since pattern matching is a fundamental feature supported by most
functional languages and Prolog. Our frequent pattern mining
implementation using the Haskell and Prolog languages confirms our
hypothesis about conciseness of the program. The comparative
performance studies on line-of-code, speed and memory usage of
declarative versus imperative programming have been reported in the
paper.
Abstract: Nowadays, computer worms, viruses and Trojan horse
become popular, and they are collectively called malware. Those
malware just spoiled computers by deleting or rewriting important
files a decade ago. However, recent malware seems to be born to earn
money. Some of malware work for collecting personal information so
that malicious people can find secret information such as password for
online banking, evidence for a scandal or contact address which relates
with the target. Moreover, relation between money and malware
becomes more complex. Many kinds of malware bear bots to get
springboards. Meanwhile, for ordinary internet users,
countermeasures against malware come up against a blank wall.
Pattern matching becomes too much waste of computer resources,
since matching tools have to deal with a lot of patterns derived from
subspecies. Virus making tools can automatically bear subspecies of
malware. Moreover, metamorphic and polymorphic malware are no
longer special. Recently there appears malware checking sites that
check contents in place of users' PC. However, there appears a new
type of malicious sites that avoids check by malware checking sites. In
this paper, existing protocols and methods related with the web are
reconsidered in terms of protection from current attacks, and new
protocol and method are indicated for the purpose of security of the
web.
Abstract: The feasibility of applying a simple and cost effective sliding friction testing apparatus to study the friction behaviour of a clutch facing material, effected by the variation of temperature and contact pressure, was investigated. It was found that the method used in this work was able to give a convenient and cost effective measurement of friction coefficients and their transitions of a clutch facing material. The obtained results will be useful for the development process of new facing materials.
Abstract: The cable tower of Liede Bridge is a double-column curved-lever arched-beam portal framed structure. Being novel and unique in structure, its cable tower differs in complexity from traditional ones. This paper analyzes the ultimate load capacity of cable tower by adopting the finite element calculations and model tests which indicate that constitutive relations applied here give a better simulation of actual failure process of prestressed reinforced concrete. In vertical load, horizontal load and overloading tests, the stepped loading of the tower model is of linear relationship, and the test data has good repeatability. All suggests that the cable tower has good bearing capacity, rational design and high emergency capacity.
Abstract: In this paper is reported an analysis about the outdoor air pollution of the urban centre of the city of Messina. The variations of the most critical pollutants concentrations (PM10, O3, CO, C6H6) and their trends respect of climatic parameters and vehicular traffic have been studied. Linear regressions have been effectuated for representing the relations among the pollutants; the differences between pollutants concentrations on weekend/weekday were also analyzed. In order to evaluate air pollution and its effects on human health, a method for calculating a pollution index was implemented and applied in the urban centre of the city. This index is based on the weighted mean of the most detrimental air pollutants concentrations respect of their limit values for protection of human health. The analyzed data of the polluting substances were collected by the Assessorship of the Environment of the Regional Province of Messina in the year 2004. A statistical analysis of the air quality index trends is also reported.
Abstract: Generator of hypotheses is a new method for data mining. It makes possible to classify the source data automatically and produces a particular enumeration of patterns. Pattern is an expression (in a certain language) describing facts in a subset of facts. The goal is to describe the source data via patterns and/or IF...THEN rules. Used evaluation criteria are deterministic (not probabilistic). The search results are trees - form that is easy to comprehend and interpret. Generator of hypotheses uses very effective algorithm based on the theory of monotone systems (MS) named MONSA (MONotone System Algorithm).
Abstract: Cu-mesoporous TiO2 is developed for removal acid
odor cooperated with ozone assistance and online- regeneration
system with/without UV irradiation (all weather) in study. The results
showed that Cu-mesoporous TiO2 present the desirable adsorption
efficiency of acid odor without UV irradiation, due to the larger
surface area, pore sizeand the additional absorption ability provided by
Cu. In the photocatalysis process, the material structure also benefits
Cu-mesoporous TiO2 to perform the more outstanding efficiency on
degrading acid odor. Cu also postponed the recombination of
electron-hole pairs excited from TiO2 to enhance photodegradation
ability. Cu-mesoporous TiO2 could gain the conspicuous increase on
photocatalysis ability from ozone assistance, but without any benefit
on adsorption. In addition, the online regeneration procedure could
process the used Cu-mesoporous TiO2 to reinstate the adsorption
ability and maintain the photodegradtion performance, depended on
scrubbing, desorping acid odor and reducing Cu to metal state.
Abstract: The mathematical framework for studying of a fuzzy approximate reasoning is presented in this paper. Two important defuzzification methods (Area defuzzification and Height defuzzification) besides the center of gravity method which is the best well known defuzzification method are described. The continuity of the defuzzification methods and its application to a fuzzy feedback control are discussed.
Abstract: Hydrogen is considered to be the most promising
candidate as a future energy carrier. One of the most used
technologies for the electrolytic hydrogen production is alkaline
water electrolysis. However, due to the high energy requirements, the
cost of hydrogen produced in such a way is high. In continuous
search to improve this process using advanced electrocatalytic
materials for the hydrogen evolution reaction (HER), Ni type Raney
and macro-porous Ni-Co electrodes were prepared on AISI 304
stainless steel substrates by electrodeposition. The developed
electrodes were characterized by SEM and confocal laser scanning
microscopy. HER on these electrodes was evaluated in 30 wt.% KOH
solution by means of hydrogen discharge curves and galvanostatic
tests. Results show that the developed electrodes present a most
efficient behaviour for HER when comparing with the smooth Ni
cathode. It has been reported a reduction in the energy consumption
of the electrolysis cell of about 25% by using the developed coatings
as cathodes.
Abstract: In this paper we describe the design and implementation of a parallel algorithm for data assimilation with ensemble Kalman filter (EnKF) for oil reservoir history matching problem. The use of large number of observations from time-lapse seismic leads to a large turnaround time for the analysis step, in addition to the time consuming simulations of the realizations. For efficient parallelization it is important to consider parallel computation at the analysis step. Our experiments show that parallelization of the analysis step in addition to the forecast step has good scalability, exploiting the same set of resources with some additional efforts.
Abstract: Shear walls are used in most of the tall buildings for
carrying the lateral load. When openings for doors or windows are
necessary to be existed in the shear walls, a special type of the shear
walls is used called "coupled shear walls" which in some cases is
stiffened by specific beams and so, called "stiffened coupled shear
walls".
In this paper, a mathematical method for geometrically nonlinear
analysis of the stiffened coupled shear walls has been presented.
Then, a suitable formulation for determining the critical load of the
stiffened coupled shear walls under gravity force has been proposed.
The governing differential equations for equilibrium and deformation
of the stiffened coupled shear walls have been obtained by setting up
the equilibrium equations and the moment-curvature relationships for
each wall. Because of the complexity of the differential equation, the
energy method has been adopted for approximate solution of the
equations.
Abstract: Encrypted messages sending frequently draws the attention
of third parties, perhaps causing attempts to break and
reveal the original messages. Steganography is introduced to hide
the existence of the communication by concealing a secret message
in an appropriate carrier like text, image, audio or video. Quantum
steganography where the sender (Alice) embeds her steganographic
information into the cover and sends it to the receiver (Bob) over a
communication channel. Alice and Bob share an algorithm and hide
quantum information in the cover. An eavesdropper (Eve) without
access to the algorithm can-t find out the existence of the quantum
message. In this paper, a text quantum steganography technique based
on the use of indefinite articles (a) or (an) in conjunction with the nonspecific
or non-particular nouns in English language and quantum
gate truth table have been proposed. The authors also introduced a
new code representation technique (SSCE - Secret Steganography
Code for Embedding) at both ends in order to achieve high level of
security. Before the embedding operation each character of the secret
message has been converted to SSCE Value and then embeds to cover
text. Finally stego text is formed and transmits to the receiver side.
At the receiver side different reverse operation has been carried out
to get back the original information.
Abstract: The stilling basins are commonly used to dissipate the
energy and protect the downstream floor from erosion. The aim of
the present experimental work is to improve the roughened stilling
basin using T-shape roughness instead of the regular cubic one and
design this new shape. As a result of the present work the best
intensity and the best roughness length are identified. Also, it is
found that the T-shape roughness save materials and reduce the jump
length compared to the cubic one. Sensitivity analysis was performed
and it was noticed that the change in the length of jump is more
sensitive to the change in roughness length than the change in
intensity.
Abstract: Medical image modalities such as computed
tomography (CT), magnetic resonance imaging (MRI), ultrasound
(US), X-ray are adapted to diagnose disease. These modalities
provide flexible means of reviewing anatomical cross-sections and
physiological state in different parts of the human body. The raw
medical images have a huge file size and need large storage
requirements. So it should be such a way to reduce the size of those
image files to be valid for telemedicine applications. Thus the image
compression is a key factor to reduce the bit rate for transmission or
storage while maintaining an acceptable reproduction quality, but it is
natural to rise the question of how much an image can be compressed
and still preserve sufficient information for a given clinical
application. Many techniques for achieving data compression have
been introduced. In this study, three different MRI modalities which
are Brain, Spine and Knee have been compressed and reconstructed
using wavelet transform. Subjective and objective evaluation has
been done to investigate the clinical information quality of the
compressed images. For the objective evaluation, the results show
that the PSNR which indicates the quality of the reconstructed image
is ranging from (21.95 dB to 30.80 dB, 27.25 dB to 35.75 dB, and
26.93 dB to 34.93 dB) for Brain, Spine, and Knee respectively. For
the subjective evaluation test, the results show that the compression
ratio of 40:1 was acceptable for brain image, whereas for spine and
knee images 50:1 was acceptable.
Abstract: Cryptography provides the secure manner of
information transmission over the insecure channel. It authenticates
messages based on the key but not on the user. It requires a lengthy
key to encrypt and decrypt the sending and receiving the messages,
respectively. But these keys can be guessed or cracked. Moreover,
Maintaining and sharing lengthy, random keys in enciphering and
deciphering process is the critical problem in the cryptography
system. A new approach is described for generating a crypto key,
which is acquired from a person-s iris pattern. In the biometric field,
template created by the biometric algorithm can only be
authenticated with the same person. Among the biometric templates,
iris features can efficiently be distinguished with individuals and
produces less false positives in the larger population. This type of iris
code distribution provides merely less intra-class variability that aids
the cryptosystem to confidently decrypt messages with an exact
matching of iris pattern. In this proposed approach, the iris features
are extracted using multi resolution wavelets. It produces 135-bit iris
codes from each subject and is used for encrypting/decrypting the
messages. The autocorrelators are used to recall original messages
from the partially corrupted data produced by the decryption process.
It intends to resolve the repudiation and key management problems.
Results were analyzed in both conventional iris cryptography system
(CIC) and non-repudiation iris cryptography system (NRIC). It
shows that this new approach provides considerably high
authentication in enciphering and deciphering processes.
Abstract: Rainfall data at fine resolution and knowledge of its
characteristics plays a major role in the efficient design and operation
of agricultural, telecommunication, runoff and erosion control as well
as water quality control systems. The paper is aimed to study the
statistical distribution of hourly rainfall depth for 12 representative
stations spread across Peninsular Malaysia. Hourly rainfall data of 10
to 22 years period were collected and its statistical characteristics
were estimated. Three probability distributions namely, Generalized
Pareto, Exponential and Gamma distributions were proposed to
model the hourly rainfall depth, and three goodness-of-fit tests,
namely, Kolmogorov-Sminov, Anderson-Darling and Chi-Squared
tests were used to evaluate their fitness. Result indicates that the east
cost of the Peninsular receives higher depth of rainfall as compared
to west coast. However, the rainfall frequency is found to be
irregular. Also result from the goodness-of-fit tests show that all the
three models fit the rainfall data at 1% level of significance.
However, Generalized Pareto fits better than Exponential and
Gamma distributions and is therefore recommended as the best fit.
Abstract: Based on 276 responses from academic staff in an
evaluation of an online learning environment (OLE), this paper
identifies those elements of the OLE that were most used and valued
by staff, those elements of the OLE that staff most wanted to see
improved, and those factors that most contributed to staff perceptions
that the use of the OLE enhanced their teaching. The most used and
valued elements were core functions, including accessing unit
information, accessing lecture/tutorial/lab notes, and reading online
discussions. The elements identified as most needing attention related
to online assessment: submitting assignments, managing assessment
items, and receiving feedback on assignments. Staff felt that using the
OLE enhanced their teaching when they were satisfied that their
students were able to access and use their learning materials, and
when they were satisfied with the professional development they
received and were confident with their ability to teach with the OLE.
Abstract: wind catchers have been served as a cooling system, used to provide acceptable ventilation by means of renewable energy of wind. In the present study, the city of Yazd in arid climate is selected as case study. From the architecture point of view, learning about wind catchers in this study is done by means of field surveys. Research method for selection of the case is based on random form, and analytical method. Wind catcher typology and knowledge of relationship governing the wind catcher's architecture were those measures that are taken for the first time. 53 wind catchers were analyzed. The typology of the wind-catchers is done by the physical analyzing, patterns and common concepts as incorporated in them. How the architecture of wind catcher can influence their operations by analyzing thermal behavior are the archetypes of selected wind catchers. Calculating fluids dynamics science, fluent software and numerical analysis are used in this study as the most accurate analytical approach. The results obtained from these analyses show the formal specifications of wind catchers with optimum operation in Yazd. The knowledge obtained from the optimum model could be used for design and construction of wind catchers with more improved operation
Abstract: Sediment and mangrove root samples from Iko River
Estuary, Nigeria were analyzed for microbial and polycyclic
aromatic hydrocarbon (PAH) content. The total heterotrophic
bacterial (THB) count ranged from 1.1x107 to 5.1 x107 cfu/g, total
fungal (TF) count ranged from 1.0x106 to 2.7x106 cfu/g, total
coliform (TC) count ranged from 2.0x104 to 8.0x104cfu/g while
hydrocarbon utilizing bacterial (HUB) count ranged from 1.0x 105 to
5.0 x 105cfu/g. There was a range of positive correlation (r = 0.72 to
0.93) between THB count and total HUB count, respectively. The
organisms were Staphylococcus aureus, Bacillus cereus,
Flavobacterium breve, Pseudomonas aeruginosa, Erwinia
amylovora, Escherichia coli, Enterobacter sp, Desulfovibrio sp,
Acinetobacter iwoffii, Chromobacterium violaceum, Micrococcus
sedentarius, Corynebacterium sp, and Pseudomonas putrefaciens.
The PAH were Naphthalene, 2-Methylnaphthalene, Acenapthylene,
Acenaphthene, Fluorene, Phenanthene, Anthracene, Fluoranthene,
Pyrene, Benzo(a)anthracene, Chrysene, Benzo(b)fluoranthene,
Benzo(k)fluoranthene, Benzo(a)pyrene, Dibenzo(a,h)anthracene,
Benzo(g,h,l)perylene ,Indeno(1,2,3-d)pyrene with individual PAH
concentrations that ranged from 0.20mg/kg to 1.02mg/kg, 0.20mg/kg
to 1.07mg/kg and 0.2mg/kg to 4.43mg/kg in the benthic sediment,
epipellic sediment and mangrove roots, respectively. Total PAH
ranged from 6.30 to 9.93mg/kg, 6.30 to 9.13mg/kg and 9.66 to
16.68mg/kg in the benthic sediment, epipellic sediment and
mangrove roots, respectively. The high concentrations in the
mangrove roots are indicative of bioaccumulation of the pollutant in
the plant tissue. The microorganisms are of ecological significance
and the detectable quantities of polycyclic aromatic hydrocarbon
could be partitioned and accumulated in tissues of infaunal and
epifaunal organisms in the study area.