Abstract: Users of computer systems may often require the
private transfer of messages/communications between parties across
a network. Information warfare and the protection and dominance of
information in the military context is a prime example of an
application area in which the confidentiality of data needs to be
maintained. The safe transportation of critical data is therefore often
a vital requirement for many private communications. However,
unwanted interception/sniffing of communications is also a
possibility. An elementary stealthy transfer scheme is therefore
proposed by the authors. This scheme makes use of encoding,
splitting of a message and the use of a hashing algorithm to verify the
correctness of the reconstructed message. For this proof-of-concept
purpose, the authors have experimented with the random sending of
encoded parts of a message and the construction thereof to
demonstrate how data can stealthily be transferred across a network
so as to prevent the obvious retrieval of data.
Abstract: It is necessary to incorporate technological advances
achieved in the field of engineering into dentistry in order to enhance
the process of diagnosis, treatment planning and enable the doctors to
render better treatment to their patients. To achieve this ultimate goal
long distance collaborations are often necessary. This paper discusses
the various collaborative tools and their applications to solve a few
burning problems confronted by the dentists. Customization is often
the solution to most of the problems. But rapid designing,
development and cost effective manufacturing is a difficult task to
achieve. This problem can be solved using the technique of digital
manufacturing. Cases from 6 major branches of dentistry have been
discussed and possible solutions with the help of state of art
technology using rapid digital manufacturing have been proposed in
the present paper. The paper also entails the usage of existing tools in
collaborative and digital manufacturing area.
Abstract: The deterministic quantum transfer-matrix (QTM)
technique and its mathematical background are presented. This
important tool in computational physics can be applied to a class of
the real physical low-dimensional magnetic systems described by the
Heisenberg hamiltonian which includes the macroscopic molecularbased
spin chains, small size magnetic clusters embedded in some
supramolecules and other interesting compounds. Using QTM, the
spin degrees of freedom are accurately taken into account, yielding
the thermodynamical functions at finite temperatures.
In order to test the application for the susceptibility calculations to
run in the parallel environment, the speed-up and efficiency of
parallelization are analyzed on our platform SGI Origin 3800 with
p = 128 processor units. Using Message Parallel Interface (MPI)
system libraries we find the efficiency of the code of 94% for
p = 128 that makes our application highly scalable.
Abstract: This paper presents a recognition system for isolated
words like robot commands. It’s carried out by Time Delay Neural
Networks; TDNN. To teleoperate a robot for specific tasks as turn,
close, etc… In industrial environment and taking into account the
noise coming from the machine. The choice of TDNN is based on its
generalization in terms of accuracy, in more it acts as a filter that
allows the passage of certain desirable frequency characteristics of
speech; the goal is to determine the parameters of this filter for
making an adaptable system to the variability of speech signal and to
noise especially, for this the back propagation technique was used in
learning phase. The approach was applied on commands pronounced
in two languages separately: The French and Arabic. The results for
two test bases of 300 spoken words for each one are 87%, 97.6% in
neutral environment and 77.67%, 92.67% when the white Gaussian
noisy was added with a SNR of 35 dB.
Abstract: Mature landfill leachates contain some macromolecular organic substances that are resistant to biological degradation. Recently, Fenton-s oxidation has been investigated for chemical treatment or pre-treatment of mature landfill leachates. The aim of this study was to reduce the recalcitrant organic load still remaining after the complete treatment of a mature landfill leachate by Fenton-s oxidation post-treatment. The effect of various parameters such as H2O2 to Fe2+ molar ratio, dosage of Fe2+ reagent, initial pH, reaction time and initial chemical oxygen demand (COD) strength, that have an important role on the oxidation, was analysed. A molar ratio H2O2/Fe2+ = 3, a Fe2+ dosage of 4 mmol·L-1, pH 3, and a reaction time of 40 min were found to achieve better oxidation performances. At these favorable conditions, COD removal efficiency was 60.9% and 31.1% for initial COD of 93 and 743 mg·L-1 respectively (diluted and non diluted leachate). Fenton-s oxidation also presented good results for color removal. In spite of being extremely difficult to treat this leachate, the above results seem rather encouraging on the application of Fenton-s oxidation.
Abstract: This research analyzes factors affecting the success of
Litecoin Value within Thailand and develops a guideline for selfreliance
for effective business implementation. Samples in this study
included 119 people through surveys. The results revealed four main
factors affecting the success as follows: 1) Future Career training
should be pursued in applied Litecoin development. 2) Didn't grasp
the concept of a digital currency or see the benefit of a digital
currency. 3) There is a great need to educate the next generation of
learners on the benefits of Litecoin within the community. 4) A great
majority didn't know what Litecoin was.
The guideline for self-reliance planning consisted of 4 aspects: 1)
Development planning: by arranging meet up groups to conduct
further education on Litecoin and share solutions on adoption into
every day usage. Local communities need to develop awareness of
the usefulness of Litecoin and share the value of Litecoin among
friends and family. 2) Computer Science and Business Management
staff should develop skills to expand on the benefits of Litecoin
within their departments. 3) Further research should be pursued on
how Litecoin Value can improve business and tourism within
Thailand. 4) Local communities should focus on developing Litecoin
awareness by encouraging street vendors to accept Litecoin as
another form of payment for services rendered.
Abstract: Information of nodes’ locations is an important
criterion for lots of applications in Wireless Sensor Networks. In the
hop-based range-free localization methods, anchors transmit the
localization messages counting a hop count value to the whole
network. Each node receives this message and calculates its own
distance with anchor in hops and then approximates its own position.
However the estimative distances can provoke large error, and affect
the localization precision. To solve the problem, this paper proposes
an algorithm, which makes the unknown nodes fix the nearest anchor
as a reference and select two other anchors which are the most
accurate to achieve the estimated location. Compared to the DV-Hop
algorithm, experiment results illustrate that proposed algorithm has
less average localization error and is more effective.
Abstract: A study was conducted to formally characterize
notebook computer performance under various environmental and
usage conditions. Software was developed to collect data from the
operating system of the computer. An experiment was conducted to
evaluate the performance parameters- variations, trends, and
correlations, as well as the extreme value they can attain in various
usage and environmental conditions. An automated software script
was written to simulate user activity. The variability of each
performance parameter was addressed by establishing the empirical
relationship between performance parameters. These equations were
presented as baseline estimates for performance parameters, which
can be used to detect system deviations from normal operation and
for prognostic assessment. The effect of environmental factors,
including different power sources, ambient temperatures, humidity,
and usage, on performance parameters of notebooks was studied.
Abstract: The Learning Management Systems present learning
environment which offers a collection of e-learning tools in a
package that allows a common interface and information sharing
among the tools. South East European University initial experience
in LMS was with the usage of the commercial LMS-ANGEL. After a
three year experience on ANGEL usage because of expenses that
were very high it was decided to develop our own software. As part
of the research project team for the in-house design and development
of the new LMS, we primarily had to select the features that would
cover our needs and also comply with the actual trends in the area of
software development, and then design and develop the system. In
this paper we present the process of LMS in-house development for
South East European University, its architecture, conception and
strengths with a special accent on the process of migration and
integration with other enterprise applications.
Abstract: In this paper, we provide complete end-to-end delay analyses including the relay nodes for instant messages. Message Session Relay Protocol (MSRP) is used to provide congestion control for large messages in the Instant Messaging (IM) service. Large messages are broken into several chunks. These chunks may traverse through a maximum number of two relay nodes before reaching destination according to the IETF specification of the MSRP relay extensions. We discuss the current solutions of sending large instant messages and introduce a proposal to reduce message flows in the IM service. We consider virtual traffic parameter i.e., the relay nodes are stateless non-blocking for scalability purpose. This type of relay node is also assumed to have input rate at constant bit rate. We provide a new scheduling policy that schedules chunks according to their previous node?s delivery time stamp tags. Validation and analysis is shown for such scheduling policy. The performance analysis with the model introduced in this paper is simple and straight forward, which lead to reduced message flows in the IM service.
Abstract: Malaysia is aggressive in promoting the usage of ICT
to its mass population through the support by the government
policies and programs targeting the general population. However,
with the uneven distribution of the basic telecommunication
infrastructure between the urban and rural area, cost for being
“interconnected" that is considered high among the poorer rural
population and the lack of local contents that suit the rural population
needs or lifestyles, it is still a challenge for Malaysia to achieve its
Vision 2020 Agenda moving the nation towards an information
society by the year 2020. Among the existing programs that have
been carried out by the government to encourage the usage of ICT by
the rural population is “Kedaikom", a community telecenter with the
general aim is to engage the community to get exposed and to use the
ICT, encouraging the diffusion of the ICT technology to the rural
population. The research investigated by using a questionnaire
survey of how Kedaikom, as a community telecenter could play a
role in encouraging the rural or underserved community to use the
ICT. The result from the survey has proven that the community
telecenter could bridge the digital divide between the underserved
rural population and the well-accessed urban population in Malaysia.
More of the rural population, especially from the younger generation
and those with higher educational background are using the
community telecenter to be connected to the ICT.
Abstract: Methane is the second most important greenhouse gas
(GHG) after carbon dioxide. Amount of methane emission from
energy sector is increasing day by day with various activities. In
present work, various sources of methane emission from upstream,
middle stream and downstream of oil & gas sectors are identified and
categorised as per IPCC-2006 guidelines. Data were collected from
various oil & gas sector like (i) exploration & production of oil & gas
(ii) supply through pipelines (iii) refinery throughput & production
(iv) storage & transportation (v) usage. Methane emission factors for
various categories were determined applying Tier-II and Tier-I
approach using the collected data. Total methane emission from
Indian Oil & Gas sectors was thus estimated for the year 1990 to
2007.
Abstract: Meshless Finite Element Methods, namely element-free Galerkin and point-interpolation method were implemented and tested concerning their applicability to typical engineering problems like electrical fields and structural mechanics. A class-structure was developed which allows a consistent implementation of these methods together with classical FEM in a common framework. Strengths and weaknesses of the methods under investigation are discussed. As a result of this work joint usage of meshless methods together with classical Finite Elements are recommended.
Abstract: The essential oil of M. × piperita L. was formulated
into a topical gel. The prepared gel was characterized for its pH,
viscosity, spreadiblity, consistency and extrudiblity, while its stability
was evaluated under different temperature conditions. The prepared
M. × piperita oil gel was clear and transparent. The pH value of
developed gel was 6.6, while its viscosity was 1200 cP. Spreadability
and consistency of the M. × piperita oil gel was 10.7 g.cm/sec and 7
mm, respectively. The prepared gel showed good extrudiblity. During
the stability studies, no significant change in pH and viscosity as a
function of time for gel was observed, indicating stability of prepared
formulation. The gel developed in this study is expected to forward
the usage of M. × piperita essential towards commercial application.
Abstract: The reservoir of Kowsar dam supply water for
different usages such as aquaculture farms , drinking, agricultural and
industrial usages for some provinces in south of Iran. The Kowsar
dam is located next to the city of Dehdashat in Kohgiluye and
Boyerahmad province in southern Iran. There are some towns and
villages on the Kowsar dam watersheds, which Dehdasht and Choram
are the most important and populated twons in this area, which can to
be sources of pollution for water reservoir of the Kowsar dam . This
study was done to determine of water pollution of the Kowsar dam
reservoir which is one of the most important water resources of
Kohkiloye and Boyerahmad and Bushehr provinces in south-west
Iran. In this study , water samples during 12 months were collected to
examine Biochemical Oxygen Demand (BOD) and Dissolved
Oxygen(DO) as a criterion for evaluation of water pollution of the
reservoir. In summary ,the study has shown Maximum, average and
minimum levels of BOD have observed 25.9 ,9.15 and 2.3 mg/L
respectively and statistical parameters of data such as standard
deviation , variance and skewness have calculated 7.88, 62 and 1.54
respectively. Finally the results were compared with Iranian national
standards. Among the analyzed samples, as the maximum value of
BOD (25.9 mg/L) was observed at the May 2010 , was within the
maximum admissible limits by the Iranian standards.
Abstract: Hierarchical Mobile IPv6 (HMIPv6) was designed to
support IP micro-mobility management in the Next Generation
Networks (NGN) framework. The main design behind this protocol is
the usage of Mobility Anchor Point (MAP) located at any level router
of network to support hierarchical mobility management. However,
the distance MAP selection in HMIPv6 causes MAP overloaded and
increase frequent binding update as the network grows. Therefore, to
address the issue in designing MAP selection scheme, we propose a
dynamic load control mechanism integrates with a speed detection
mechanism (DMS-DLC). From the experimental results we obtain
that the proposed scheme gives better distribution in MAP load and
increase handover speed.
Abstract: In this study, the sorption of Malachite green (MG) on Hydrilla verticillata biomass, a submerged aquatic plant, was investigated in a batch system. The effects of operating parameters such as temperature, adsorbent dosage, contact time, adsorbent size, and agitation speed on the sorption of Malachite green were analyzed using response surface methodology (RSM). The proposed quadratic model for central composite design (CCD) fitted very well to the experimental data that it could be used to navigate the design space according to ANOVA results. The optimum sorption conditions were determined as temperature - 43.5oC, adsorbent dosage - 0.26g, contact time - 200min, adsorbent size - 0.205mm (65mesh), and agitation speed - 230rpm. The Langmuir and Freundlich isotherm models were applied to the equilibrium data. The maximum monolayer coverage capacity of Hydrilla verticillata biomass for MG was found to be 91.97 mg/g at an initial pH 8.0 indicating that the optimum sorption initial pH. The external and intra particle diffusion models were also applied to sorption data of Hydrilla verticillata biomass with MG, and it was found that both the external diffusion as well as intra particle diffusion contributes to the actual sorption process. The pseudo-second order kinetic model described the MG sorption process with a good fitting.
Abstract: Composting is the process in which municipal solid
waste (MSW) and other organic waste materials such as biosolids
and manures are decomposed through the action of bacteria and other
microorganisms into a stable granular material which, applied to
land, as soil conditioner. Microorganisms, especially those that are
able to degrade polymeric organic material have a key role in speed
up this process. The aim of this study has been established to
isolation of microorganisms with high ability to production
extracellular enzymes for degradation of natural polymers that are
exists in MSW for decreasing time of degradation phase. Our
experimental study for isolation designed in two phases: in first
phase we isolated degrading microorganism with selected media that
consist a special natural polymer such as cellulose, starch, lipids and
etc as sole source of carbon. In second phase we selected
microorganism that had high degrading enzyme production with
enzymatic assay for seed production. However, our findings in pilot
scale have indicated that usage of this microbial consortium had high
efficiency for decreasing degradation phase.
Abstract: This method decrease usage power (expenditure) in networks on chips (NOC). This method data coding for data transferring in order to reduces expenditure. This method uses data compression reduces the size. Expenditure calculation in NOC occurs inside of NOC based on grown models and transitive activities in entry ports. The goal of simulating is to weigh expenditure for encoding, decoding and compressing in Baseline networks and reduction of switches in this type of networks. KeywordsNetworks on chip, Compression, Encoding, Baseline networks, Banyan networks.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.