Abstract: In this article a comparison was made between Cu and
TiO2 supported catalysts on activated carbon for ozone
decomposition reaction. The activated carbon support in the case of
TiO2/AC sample was prepared by physicochemical pyrolysis and for
Cu/AC samples the supports are chemically modified carbons. The
prepared catalysts were synthesized by impregnation method. The
samples were annealed in two different regimes- in air and under
vacuum. To examine adsorption efficiency of the samples BET
method was used. All investigated catalysts supported on chemically
modified carbons have higher specific surface area compared to the
specific surface area of TiO2 supported catalysts, varying in the range
590÷620 m2/g. The method of synthesis of the precursors had
influenced catalytic activity.
Abstract: The development of the United Arab Emirates (UAE)
into a regional trade, tourism, finance and logistics hub has
transformed its real estate markets. However, speculative activity and
price volatility remain concerns. UAE residential market values
(MV) are exposed to fluctuations in capital flows and migration
which, in turn, are affected by geopolitical uncertainty, oil price
volatility and global investment market sentiment. Internally, a
complex interplay between administrative boundaries, land tenure,
building quality and evolving location characteristics fragments UAE
residential property markets. In short, the UAE Residential Valuation
System (UAE-RVS) confronts multiple challenges to collect, filter
and analyze relevant information in complex and dynamic spatial and
capital markets. A robust (RVS) can mitigate the risk of unhelpful
volatility, speculative excess or investment mistakes. The research
outlines the institutional, ontological, dynamic and epistemological
issues at play. We highlight the importance of system capabilities,
valuation standard salience and stakeholders trust.
Abstract: In this study, we have focused our attention on
combining of molecular imprinting into nanofilms and QCM
nanosensor approaches and producing QCM nanosensor for anti-
CCP, chosen as model protein, using anti-CCP imprinted nanofilms.
The nonimprinted nanosensor was also prepared to evaluate the
selectivity of the imprinted nanosensor. Anti-CCP imprinted QCM
nanosensor was tested for real time detection of anti-CCP from
aqueous solution. The kinetic and affinity studies were determined by
using anti-CCP solutions with different concentrations. The
responses related with mass shifts (%m) and frequency shifts (%f)
were used to evaluate adsorption properties. To show the selectivity
of the anti-CCP imprinted QCM nanosensor, competitive adsorption
of anti-CCP and IgM was investigated. The results indicate that anti-
CCP imprinted QCM nanosensor has higher adsorption capabilities
for anti-CCP than for IgM, due to selective cavities in the polymer
structure.
Abstract: Human motion capture has become one of the major
area of interest in the field of computer vision. Some of the major
application areas that have been rapidly evolving include the
advanced human interfaces, virtual reality and security/surveillance
systems. This study provides a brief overview of the techniques and
applications used for the markerless human motion capture, which
deals with analyzing the human motion in the form of mathematical
formulations. The major contribution of this research is that it
classifies the computer vision based techniques of human motion
capture based on the taxonomy, and then breaks its down into four
systematically different categories of tracking, initialization, pose
estimation and recognition. The detailed descriptions and the
relationships descriptions are given for the techniques of tracking and
pose estimation. The subcategories of each process are further
described. Various hypotheses have been used by the researchers in
this domain are surveyed and the evolution of these techniques have
been explained. It has been concluded in the survey that most
researchers have focused on using the mathematical body models for
the markerless motion capture.
Abstract: With increasingly more mobile health applications
appearing due to the popularity of smartphones, the possibility arises
that these data can be used to improve the medical diagnostic process,
as well as the overall quality of healthcare, while at the same time
lowering costs. However, as of yet there have been no reports of a
successful combination of patient-generated data from smartphones
with data from clinical routine. In this paper we describe how these
two types of data can be combined in a secure way without
modification to hospital information systems, and how they can
together be used in a medical expert system for automatic nutritional
classification and triage.
Abstract: A large amount of data is typically stored in relational
databases (DB). The latter can efficiently handle user queries which
intend to elicit the appropriate information from data sources.
However, direct access and use of this data requires the end users to
have an adequate technical background, while they should also cope
with the internal data structure and values presented. Consequently
the information retrieval is a quite difficult process even for IT or DB
experts, taking into account the limited contributions of relational
databases from the conceptual point of view. Ontologies enable users
to formally describe a domain of knowledge in terms of concepts and
relations among them and hence they can be used for unambiguously
specifying the information captured by the relational database.
However, accessing information residing in a database using
ontologies is feasible, provided that the users are keen on using
semantic web technologies. For enabling users form different
disciplines to retrieve the appropriate data, the design of a Graphical
User Interface is necessary. In this work, we will present an
interactive, ontology-based, semantically enable web tool that can be
used for information retrieval purposes. The tool is totally based on
the ontological representation of underlying database schema while it
provides a user friendly environment through which the users can
graphically form and execute their queries.
Abstract: Every machine plays roles of client and server
simultaneously in a peer-to-peer (P2P) network. Though a P2P
network has many advantages over traditional client-server models
regarding efficiency and fault-tolerance, it also faces additional
security threats. Users/IT administrators should be aware of risks
from malicious code propagation, downloaded content legality, and
P2P software’s vulnerabilities. Security and preventative measures
are a must to protect networks from potential sensitive information
leakage and security breaches. Bit Torrent is a popular and scalable
P2P file distribution mechanism which successfully distributes large
files quickly and efficiently without problems for origin server. Bit
Torrent achieved excellent upload utilization according to
measurement studies, but it also raised many questions as regards
utilization in settings, than those measuring, fairness, and Bit
Torrent’s mechanisms choice. This work proposed a block selection
technique using Fuzzy ACO with optimal rules selected using ACO.
Abstract: Agriculture is the backbone of economy of Pakistan
and cotton is the major agricultural export and supreme source of raw
fiber for our textile industry. To combat severe problems of insect
and weed, combination of three genes namely Cry1Ac, Cry2A and
EPSPS genes was transferred in locally cultivated cotton variety
MNH-786 with the use of Agrobacterium mediated genetic
transformation. The present study focused on the molecular screening
of transgenic cotton plants at T3 generation in order to confirm
integration and expression of all three genes (Cry1Ac, Cry2A and
EPSP synthase) into the cotton genome. Initially, glyphosate spray
assay was used for screening of transgenic cotton plants containing
EPSP synthase gene at T3 generation. Transgenic cotton plants which
were healthy and showed no damage on leaves were selected after 07
days of spray. For molecular analysis of transgenic cotton plants in
the laboratory, the genomic DNA of these transgenic cotton plants
were isolated and subjected to amplification of the three genes. Thus,
seventeen out of twenty (Cry1Ac gene), ten out of twenty (Cry2A
gene) and all twenty (EPSP synthase gene) were produced positive
amplification. On the base of PCR amplification, ten transgenic plant
samples were subjected to protein expression analysis through
ELISA. The results showed that eight out of ten plants were actively
expressing the three transgenes. Real-time PCR was also done to
quantify the mRNA expression levels of Cry1Ac and EPSP synthase
gene. Finally, eight plants were confirmed for the presence and active
expression of all three genes at T3 generation.
Abstract: It is important to take security measures to protect
your computer information, reduce identify theft, and prevent from
malicious cyber-attacks. With cyber-attacks on the continuous rise,
people need to understand and learn ways to prevent from these
attacks. Cyber-attack is an important factor to be considered if one is
to be able to protect oneself from malicious attacks. Without proper
security measures, most computer technology would hinder home
users more than such technologies would help. Knowledge of how
cyber-attacks operate and protective steps that can be taken to reduce
chances of its occurrence are key to increasing these security
measures. The purpose of this paper is to inform home users on the
importance of identifying and taking preventive steps to avoid cyberattacks.
Throughout this paper, many aspects of cyber-attacks will be
discuss: what a cyber-attack is, the affects of cyber-attack for home
users, different types of cyber-attacks, methodology to prevent such
attacks; home users can take to fortify security of their computer.
Abstract: Generally the natural environment is made up of air,
water and soil. The release of emission of industrial waste into
anyone of the components of the environment causes pollution.
Industrial pollution significantly threatens the inherent right of
people, to the enjoyment of a safe and secure environment. The aim
of this paper is to assess the effect of environmental pollution and
health risks of residents living near Ewekoro cement factory. The
research made use of IKONOS imagery for Geographical
Information System (GIS) to buffer and extract buildings that are less
than 1km to the factory, within 1km to 5km and above 5km to the
factory. Also questionnaire was used to elicit information on the
socio-economic factors, effect of environmental pollution on
residents and measures adopted to control industrial pollution on the
residents. Findings show that most buildings that fall between less
than 1km and 1km to 5km to the factory have high health risk in the
study area. The study recommended total relocation for the residents
of the study area to reduce health risk problems.
Abstract: Random epistemologies and hash tables have garnered
minimal interest from both security experts and experts in the last
several years. In fact, few information theorists would disagree with
the evaluation of expert systems. In our research, we discover how
flip-flop gates can be applied to the study of superpages. Though
such a hypothesis at first glance seems perverse, it is derived from
known results.
Abstract: The aim of this study is to evaluate the effects of the
laser and partial vibration stimulation on the mice tibia with
morphological characteristics. Twenty female C57BL/6 mice (12
weeks old) were used for the experiment. The study was carried out on
four groups of animals each consisting of five mice. Four groups of
mice were ovariectomized. Animals were scanned at 0 and 2 weeks
after ovariectomy by using micro computed tomography to estimate
morphological characteristics of tibial trabecular bone. Morphological
analysis showed that structural parameters of multi-stimuli group
appear significantly better phase in BV/TV, BS/BV, Tb.Th, Tb.N,
Tb.Sp, and Tb.pf than single stimulation groups. However, single
stimulation groups didn’t show significant effect on tibia with Sham
group. This study suggests that multi-stimuli may restrain the change
as the degenerate phase on osteoporosis in the mice tibia.
Abstract: Thin ZnO films are deposited on glass substrates via
sol–gel method and dip-coating. The films are prepared from zinc
acetate dehydrate as a starting reagent. After that the as-prepared
ZnO sol is aged for different periods (0, 1, 3, 5, 10, 15 and 30 days).
Nanocrystalline thin films are deposited from various sols. The
effect ZnO sols aging time on the structural and photocatalytic
properties of the films is studied. The films surface is studied by
Scanning Electron Microscopy. The effect of the aging time of the
starting solution is studied in the photocatalytic degradation of
Reactive Black 5 (RB5) by UV-vis spectroscopy. The experiments
are conducted upon UV-light illumination and in complete darkness.
The variation of the absorption spectra shows the degradation of RB5
dissolved in water, as a result of the reaction, occurring on the surface
of the films and promoted by UV irradiation. The initial
concentrations of dye (5, 10 and 20 ppm) and the effect of the aging
time are varied during the experiments. The results show, that the
increasing aging time of starting solution with respect to ZnO
generally promotes photocatalytic activity. The thin films obtained
from ZnO sol, which is aged 30 days have best photocatalytic
degradation of the dye (97,22%) in comparison with the freshly
prepared ones (65,92%). The samples and photocatalytic
experimental results are reproducible. Nevertheless, all films exhibit
a substantial activity in both UV light and darkness, which is
promising for the development of new ZnO photocatalysts by sol-gel
method.
Abstract: Modern low earth orbit (LEO) satellites that require multi-mission flexibility are highly likely to be repositioned between different operational orbits. While executing this process the satellite may experience high levels of vibration and environmental hazards, exposing the deployed solar panel to dangerous stress levels, fatigue and space debris, hence it is desirable to retract the solar array before satellite repositioning to avoid damage or failure.
A novel concept of deployable/retractable hybrid solar array systemcomposed of both rigid and flexible solar panels arranged within a petal formation, aimed to provide a greater power to volume ratio while dramatically reducing mass and cost is proposed.
Abstract: Speech enhancement is a long standing problem with
numerous applications like teleconferencing, VoIP, hearing aids and
speech recognition. The motivation behind this research work is to
obtain a clean speech signal of higher quality by applying the optimal
noise cancellation technique. Real-time adaptive filtering algorithms
seem to be the best candidate among all categories of the speech
enhancement methods. In this paper, we propose a speech
enhancement method based on Recursive Least Squares (RLS)
adaptive filter of speech signals. Experiments were performed on
noisy data which was prepared by adding AWGN, Babble and Pink
noise to clean speech samples at -5dB, 0dB, 5dB and 10dB SNR
levels. We then compare the noise cancellation performance of
proposed RLS algorithm with existing NLMS algorithm in terms of
Mean Squared Error (MSE), Signal to Noise ratio (SNR) and SNR
Loss. Based on the performance evaluation, the proposed RLS
algorithm was found to be a better optimal noise cancellation
technique for speech signals.
Abstract: In the present work, the alloy of Bismuth-lead is
prepared on the basis of percentage of molecular weight 9:1, 5:5 and
1:9 ratios and grown by Zone- Refining Technique under a vacuum
atmosphere. The EDAX of these samples are done and the results are
reported. Micro hardness test has been used as an alternative test for
measuring material’s tensile properties. The effect of temperature and
load on the hardness of the grown alloy has been studied. Further the
comparative studies of work hardening coefficients are reported.
Abstract: The study of organisations’ information security
cultures has attracted scholars as well as healthcare services industry
to research the topic and find appropriate tools and approaches to
develop a positive culture. The vast majority of studies in Saudi
national health services are on the use of technology to protect and
secure health services information. On the other hand, there is a lack
of research on the role and impact of an organisation’s cultural
dimensions on information security. This research investigated and
analysed the role and impact of cultural dimensions on information
security in Saudi Arabia health service. Hypotheses were tested and
two surveys were carried out in order to collect data and information
from three major hospitals in Saudi Arabia (SA). The first survey
identified the main cultural-dimension problems in SA health
services and developed an initial information security culture
framework model. The second survey evaluated and tested the
developed framework model to test its usefulness, reliability and
applicability. The model is based on human behaviour theory, where
the individual’s attitude is the key element of the individual’s
intention to behave as well as of his or her actual behaviour. The
research identified a set of cultural and sub-cultural dimensions in SA
health information security and services.
Abstract: Many issues about the relationship between auditors in
auditing practices with its stakeholders often heard. It appears in
perspectives of bringing out the variety of phenomena affecting from
the audit practice of greed and not appreciating from the
independency of the audit profession and professional code of ethics.
It becomes a logical consequence in practicing of capitalism in
accounting. The main purpose of this article would like to uncover
the existing auditing practices in Indonesia, especially in Java that
associated with a strong influence of Javanese culture with reluctant
/”shy", politely, "legowo (gratefully accepted)", "ngemong"
(friendly), "not mentholo" (lenient), "tepo seliro" (tolerance),
"ngajeni" (respectful), "acquiescent" and also reveals its relationships
with Non Javanese culture in facing the conflict of interest in
practical of auditing world. The method used by interpretive
approach that emphasizes the role of language, interpret and
understand and see social reality as something other than a label,
name or concept. Global practices in auditing of each country have
particular cultures that affect the standard set by those regulatory
standards results the adaptation of IAS. The majority of parties in
Indonesia is dominated by Javanese racial regulators, so Java culture
is embedded in every audit practices and those conditions in Java
leads auditors in having similar behaviour, sometimes interfere with
standard Java code of conduct must be executed by an auditor.
Auditors who live in Java have the characters of Javanese culture that
is hard to avoid in the audit practice. However, practically, the
auditors still are relevant in their profession.
Abstract: In medical imaging, segmentation of different areas of
human body like bones, organs, tissues, etc. is an important issue.
Image segmentation allows isolating the object of interest for further
processing that can lead for example to 3D model reconstruction of
whole organs. Difficulty of this procedure varies from trivial for
bones to quite difficult for organs like liver. The liver is being
considered as one of the most difficult human body organ to segment.
It is mainly for its complexity, shape versatility and proximity of
other organs and tissues. Due to this facts usually substantial user
effort has to be applied to obtain satisfactory results of the image
segmentation. Process of image segmentation then deteriorates from
automatic or semi-automatic to fairly manual one. In this paper,
overview of selected available software applications that can handle
semi-automatic image segmentation with further 3D volume
reconstruction of human liver is presented. The applications are being
evaluated based on the segmentation results of several consecutive
DICOM images covering the abdominal area of the human body.
Abstract: Motion Tracking and Stereo Vision are complicated,
albeit well-understood problems in computer vision. Existing
softwares that combine the two approaches to perform stereo motion
tracking typically employ complicated and computationally expensive
procedures. The purpose of this study is to create a simple and
effective solution capable of combining the two approaches. The
study aims to explore a strategy to combine the two techniques
of two-dimensional motion tracking using Kalman Filter; and depth
detection of object using Stereo Vision. In conventional approaches
objects in the scene of interest are observed using a single camera.
However for Stereo Motion Tracking; the scene of interest is
observed using video feeds from two calibrated cameras. Using two
simultaneous measurements from the two cameras a calculation for
the depth of the object from the plane containing the cameras is made.
The approach attempts to capture the entire three-dimensional spatial
information of each object at the scene and represent it through a
software estimator object. In discrete intervals, the estimator tracks
object motion in the plane parallel to plane containing cameras and
updates the perpendicular distance value of the object from the plane
containing the cameras as depth. The ability to efficiently track
the motion of objects in three-dimensional space using a simplified
approach could prove to be an indispensable tool in a variety of
surveillance scenarios. The approach may find application from high
security surveillance scenes such as premises of bank vaults, prisons
or other detention facilities; to low cost applications in supermarkets
and car parking lots.