Abstract: In this work we report on preliminary analysis of a novel optoelectronic gas sensor based on an optical fiber integrated with a tetrakis(4-sulfonatophenyl)porphyrin (TPPS) thin film. The sensitive materials are selectively deposited on the core region of a fiber tip by UV light induced deposition technique. A simple and cheap process which can be easily extended to different porphyrin derivatives. When the TPPS film on the fiber tip is exposed to acid and/or base vapors, dramatic changes occur in the aggregation structure of the dye molecules in the film, from J- to H-type, resulting in a profound modification of their corresponding reflectance spectra. From the achieved experimental results it is evident that the presence of intense and narrow band peaks in the reflected spectra could be monitored to detect hazardous vapors.
Abstract: In this paper, we propose a fuzzy aggregate
production planning (APP) model for blending problem in a brass
factory which is the problem of computing optimal amounts of raw
materials for the total production of several types of brass in a
period. The model has deterministic and imprecise parameters
which follows triangular possibility distributions. The brass casting
APP model can not always be solved by using common approaches
used in the literature. Therefore a mathematical model is presented
for solving this problem. In the proposed model, the Lai and
Hwang-s fuzzy ranking concept is relaxed by using one constraint
instead of three constraints. An application of the brass casting
APP model in a brass factory shows that the proposed model
successfully solves the multi-blend problem in casting process and
determines the optimal raw material purchasing policies.
Abstract: Software reuse can be considered as the most realistic
and promising way to improve software engineering productivity and
quality. Automated assistance for software reuse involves the
representation, classification, retrieval and adaptation of components.
The representation and retrieval of components are important to
software reuse in Component-Based on Software Development
(CBSD). However, current industrial component models mainly focus
on the implement techniques and ignore the semantic information
about component, so it is difficult to retrieve the components that
satisfy user-s requirements. This paper presents a method of business
component retrieval based on specification matching to solve the
software reuse of enterprise information system. First, a business
component model oriented reuse is proposed. In our model, the
business data type is represented as sign data type based on XML,
which can express the variable business data type that can describe the
variety of business operations. Based on this model, we propose
specification match relationships in two levels: business operation
level and business component level. In business operation level, we
use input business data types, output business data types and the
taxonomy of business operations evaluate the similarity between
business operations. In the business component level, we propose five
specification matches between business components. To retrieval
reusable business components, we propose the measure of similarity
degrees to calculate the similarities between business components.
Finally, a business component retrieval command like SQL is
proposed to help user to retrieve approximate business components
from component repository.
Abstract: A dynamic software risk assessment model is
presented. Analogies between dynamic financial analysis and
software risk assessment models are established and based on these
analogies it suggested that dynamic risk model for software projects
is the way to move forward for the risk assessment of software
project. It is shown how software risk assessment change during
different phases of a software project and hence requires a dynamic
risk assessment model to capture these variations. Further evolution
of dynamic financial analysis models is discussed and mapped to the
evolution of software risk assessment models.
Abstract: This paper solves the Non Linear Schrodinger
Equation using the Split Step Fourier method for modeling an optical
fiber. The model generates a complex wave of optical pulses and
using the results obtained two graphs namely Loss versus
Wavelength and Dispersion versus Wavelength are generated. Taking
Chromatic Dispersion and Polarization Mode Dispersion losses into
account, the graphs generated are compared with the graphs
formulated by JDS Uniphase Corporation which uses standard values
of dispersion for optical fibers. The graphs generated when compared
with the JDS Uniphase Corporation plots were found to be more or
less similar thus verifying that the model proposed is right.
MATLAB software was used for doing the modeling.
Abstract: In this paper we present an energy efficient match-line
(ML) sensing scheme for high-speed ternary content-addressable
memory (TCAM). The proposed scheme isolates the sensing unit of
the sense amplifier from the large and variable ML capacitance. It
employs feedback in the sense amplifier to successfully detect a
match while keeping the ML voltage swing low. This reduced voltage
swing results in large energy saving. Simulation performed using
130nm 1.2V CMOS logic shows at least 30% total energy saving in
our scheme compared to popular current race (CR) scheme for
similar search speed. In terms of speed, dynamic energy, peak power
consumption and transistor count our scheme also shows better
performance than mismatch-dependant (MD) power allocation
technique which also employs feedback in the sense amplifier.
Additionally, the implementation of our scheme is simpler than CR
or MD scheme because of absence of analog control voltage and
programmable delay circuit as have been used in those schemes.
Abstract: Electricity market activities and a growing demand for electricity have led to heavily stressed power systems. This requires operation of the networks closer to their stability limits. Power system operation is affected by stability related problems, leading to unpredictable system behavior. Voltage stability refers to the ability of a power system to sustain appropriate voltage levels through large and small disturbances. Steady-state voltage stability is concerned with limits on the existence of steady-state operating points for the network. FACTS devices can be utilized to increase the transmission capacity, the stability margin and dynamic behavior or serve to ensure improved power quality. Their main capabilities are reactive power compensation, voltage control and power flow control. Among the FACTS controllers, Static Var Compensator (SVC) provides fast acting dynamic reactive compensation for voltage support during contingency events. In this paper, voltage stability assessment with appropriate representations of tap-changer transformers and SVC is investigated. Integrating both of these devices is the main topic of this paper. Effect of the presence of tap-changing transformers on static VAR compensator controller parameters and ratings necessary to stabilize load voltages at certain values are highlighted. The interrelation between transformer off nominal tap ratios and the SVC controller gains and droop slopes and the SVC rating are found. P-V curves are constructed to calculate loadability margins.
Abstract: In the fifteenth century, the Malacca Empire emerged
as the centre of Islamic civilization in the Malay Archipelago. The
history had been recorded in Sulalat Al-Salatin, an important literary
source about the genealogy of all Kings in Malacca. The objective of
this study was to analyze the understanding of sayings from Prophet
Muhammad among Malays in Malacca during the fifteenth century
through all of the hadith quoted in Sulalat Al-Salatin. This study used
content analysis methodology to validate the sayings where all of
them were critically analyzed and compared with the classical hadith
sources from prominent Muslim scholars. As a result, only two out of
the four quotations were considered as authentic sayings of Prophet
Muhammad. This study also showed the importance of the palace as
the centre of the Islamic education system and the role played by
Muslim preachers from outside of Malacca to propagate Islam in
Malacca.
Abstract: The purpose of the present study was to evaluate the
epidemiology of waterborne diarrhoeal among children aged 6-36
months old in Busia town, western Kenya. The study was carried out
between Feb. 2008 and Feb. 2010. Cases of diarrhoea reported in 385
households were linked to household water handling practices. A
mother with a child of 6-36 months old was also included in the
study. Diarrhoea prevalence among children 6-36 months was 16.7%
in Busia town, Bwamani (19.6%) and Mayenje (10.6%) clustered in
Mayenje sub-location reported the highest and the lowest prevalence
of diarrhoea. There was a positive correlation between the prevalence
of diarrhoea in children and the level of the mother-s education,
29.9% (n= 100). Diarrhoea cases decreased in range from 35.5% (n
=102) to 4.8% (n= 16), corresponding to increase in age from 6-35
months on average. In conclusion, prevalence of diarrhoea in
children of 6-36 months old was 16.7% in Busia town. This was
higher in children whose mother-s age was below 18 years and with
low level of education, the rate decreased with increase in age of
children. Prevalence of diarrhoea in children aged 6-36months in
households was higher in children aged 6-17 and 36 months and
whose mothers were less educated and fell between the ages of 18-24
years. The Influence of human activities at the main source of
drinking water on the prevalence of diarrhoea in these children was
insignificant.
Abstract: Network on a chip (NoC) has been proposed as a viable solution to counter the inefficiency of buses in the current VLSI on-chip interconnects. However, as the silicon chip accommodates more transistors, the probability of transient faults is increasing, making fault tolerance a key concern in scaling chips. In packet based communication on a chip, transient failures can corrupt the data packet and hence, undermine the accuracy of data communication. In this paper, we present a comparative analysis of transient fault tolerant techniques including end-to-end, node-by-node, and stochastic communication based on flooding principle.
Abstract: The adaptive backstepping controller for inverted pendulum is designed by using the general motion control model. Backstepping is a novel nonlinear control technique based on the Lyapunov design approach, used when higher derivatives of parameter estimation appear. For easy parameter adaptation, the mathematical model of the inverted pendulum converted into the motion control model. This conversion is performed by taking functions of unknown parameters and dynamics of the system. By using motion control model equations, inverted pendulum is simulated without any information about not only parameters but also measurable dynamics. Also these results are compare with the adaptive backstepping controller which extended with integral action that given from [1].
Abstract: Aiming the application of localized hyperthermia, a
magnetic induction system with new approaches is proposed. The techniques in this system for improving the effectiveness of localized hyperthermia are that using magnetic circuit and the multiple-coil array instead of a giant coil for generating magnetic field. Specially, amorphous metal is adopted as the material of magnetic circuit. Detail
design parameters of hardware are well described. Simulation tool is
employed for this work and experiment result is reported as well.
Abstract: This paper presents a general trainable framework
for fast and robust upright human face and non-human object
detection and verification in static images. To enhance the
performance of the detection process, the technique we develop is
based on the combination of fast neural network (FNN) and
classical neural network (CNN). In FNN, a useful correlation is
exploited to sustain high level of detection accuracy between input
image and the weight of the hidden neurons. This is to enable the
use of Fourier transform that significantly speed up the time
detection. The combination of CNN is responsible to verify the
face region. A bootstrap algorithm is used to collect non human
object, which adds the false detection to the training process of the
human and non-human object. Experimental results on test images
with both simple and complex background demonstrate that the
proposed method has obtained high detection rate and low false
positive rate in detecting both human face and non-human object.
Abstract: Ipomoea batatas (Sweetpotato) is currently ranked
sixth in the total world food production and are planted mainly for
their storage roots. The present study was undertaken to evaluate and
compare the antioxidant properties of the leaf and carotenoids extract
from the Ipomoea batatas var. Oren leaves. Total flavonoids in the
leaf extract was 144.6 ± 40.5 μg/g compared to 114.86 ± 4.35 μg/g
catechin equivalent in the carotenoids extract. Total polyphenols in
the leaf extracts (3.470 ± 0.024 GAE g/100g DW) was slightly higher
compared to carotenoids extract (2.994 ± 0.078 GAE g/100g DW).
The carotenoids extract marked a higher radical scavenging capacity
with the IC50= 491.86 μg/ml compared to leaf extract (IC50= 545.39
μg/ml). Concentration-dependent reducing activity was observed for
both extracts. Thus, the carotenoids extraction process retained most
of the antioxidant capacity from the leaves and can be made into
potential natural yellow dye with antioxidant property.
Abstract: A modified Saleh-Valenzuela channel model has been
adapted for Ultra Wideband (UWB) system. The suggested realistic
channel is assessed by its distribution of fading amplitude and time of
arrivals. Furthermore, the propagation characteristic has been distinct
into four channel models, namely CM 1 to 4. Each are differentiate in
terms of cluster arrival rates, rays arrival rate within each cluster and
its respective constant decay rates. This paper described the
multiband OFDM system performance simulates under these
multipath conditions. Simulation work described in this paper is
based on WiMedia ECMA-368 standard, which has been deployed
for practical implementation of low cost and low power UWB
devices.
Abstract: Solidarity and kinship has long been an intangible
emblem to Malay community especially in the rural area. It is visibly
seen through the dependability among each unit of the community
either in religious and social events including the matrimonial or
wedding. Nevertheless, the inevitable phenomenon, modernization
legitimately alters every facets of human life not only the routines,
traditions, rituals, norms but also to the daily activities and the
specific occasion. Using triangulation approach of interview and self
completed questionnaire this study empirically examine the level of
alteration of Malays wedding foodways which relate to the
preparation and consumption of it and its impact on the community
social bonding. Some meaningful insights were obtained whereby
modernization through technology (modern equipments) and social
factors (education, migration, and high disposal income) significantly
contribute to the alteration of wedding foodways from preparation up
to consumption stages. The domino effect of this alteration
consequently leads to the fragility of social kinship or somehow
reduced cohesiveness and interaction among the individual of Malay
society in the rural area.
Abstract: The 9/11 suicide attacks in New York, Washington, D.C., and Pennsylvania, triggered a number of security responses both in the United States of America and other Countries in the World. Kenya, which is an ally and a close partner to North America and Europe, was not left behind. While many states had been parties to numerous terrorism conventions, their response in implementing them had been slow and needed this catalyst. This special case offered a window of opportunity for many “security conscious" regimes in cementing their legal-criminological and political security apparatus. At the international level, the 9/11 case led to the hasty adoption of Security Council resolution 1373 in 2001, which called upon states to adopt wide-ranging and comprehensive steps and strategies to combat international terrorism and to become parties to the relevant international conventions and protocols relating to terrorism. Since then, Kenya has responded with speed in devising social-legal-criminological-political actions.
Abstract: Mendelian Disease Genes represent a collection of single points of failure for the various systems they constitute. Such genes have been shown, on average, to encode longer proteins than 'non-disease' proteins. Existing models suggest that this results from the increased likeli-hood of longer genes undergoing mutations. Here, we show that in saturated mutagenesis experiments performed on model organisms, where the likelihood of each gene mutating is one, a similar relationship between length and the probability of a gene being lethal was observed. We thus suggest an extended model demonstrating that the likelihood of a mutated gene to produce a severe phenotype is length-dependent. Using the occurrence of conserved domains, we bring evidence that this dependency results from a correlation between protein length and the number of functions it performs. We propose that protein length thus serves as a proxy for protein cardinality in different networks required for the organism's survival and well-being. We use this example to argue that the collection of Mendelian Disease Genes can, and should, be used to study the rules governing systems vulnerability in living organisms.
Abstract: We depend upon explanation in order to “make sense"
out of our world. And, making sense is all the more important when
dealing with change. But, what happens if our explanations are
wrong? This question is examined with respect to two types of
explanatory model. Models based on labels and categories we shall
refer to as “representations." More complex models involving
stories, multiple algorithms, rules of thumb, questions, ambiguity we
shall refer to as “compressions." Both compressions and
representations are reductions. But representations are far more
reductive than compressions. Representations can be treated as a set
of defined meanings – coherence with regard to a representation is
the degree of fidelity between the item in question and the definition
of the representation, of the label. By contrast, compressions contain
enough degrees of freedom and ambiguity to allow us to make
internal predictions so that we may determine our potential actions in
the possibility space. Compressions are explanatory via mechanism.
Representations are explanatory via category. Managers are often
confusing their evocation of a representation (category inclusion) as
the creation of a context of compression (description of mechanism).
When this type of explanatory error occurs, more errors follow. In
the drive for efficiency such substitutions are all too often proclaimed
– at the manager-s peril..
Abstract: This paper proposes a fast tree join scheme to provide
seamless multicast handover in the mobile networks based on the Fast
Mobile IPv6 (FMIPv6). In the existing FMIPv6-based multicast
handover scheme, the bi-directional tunnelling or the remote
subscription is employed with the packet forwarding from the previous
access router (AR) to the new AR. In general, the remote subscription
approach is preferred to the bi-directional tunnelling one, since in the
remote subscription scheme we can exploit an optimized multicast
path from a multicast source to many mobile receivers. However, in
the remote subscription scheme, if the tree joining operation takes a
long time, the amount of data packets to be forwarded and buffered for
multicast handover will increase, and thus the corresponding buffer
may overflow, which results in severe packet losses. In order to reduce
these costs associated with packet forwarding and buffering, this paper
proposes the fast join to multicast tree, in which the new AR will join
the multicast tree as fast as possible, so that the new multicast data
packets can also arrive at the new AR, by which the packet forwarding
and buffering costs can be reduced. From numerical analysis, it is
shown that the proposed scheme can give better performance than the
existing FMIPv6-based multicast handover schemes in terms of the
multicast packet delivery costs.