Abstract: The focal spot of a high intensity focused ultrasound
transducer is small. To heat a large target volume, multiple treatment spots are required. If the power of each treatment spot is fixed, it could
results in insufficient heating of initial spots and over-heating of later ones, which is caused by the thermal diffusion. Hence, to produce a
uniform heated volume, the delivered energy of each treatment spot
should be properly adjusted. In this study, we proposed an iterative, extrapolation technique to adjust the required ultrasound energy of
each treatment spot. Three different scanning pathways were used to evaluate the performance of this technique. Results indicate that by using the proposed technique, uniform heating volume could be obtained.
Abstract: Computer technology and the Internet have made a
breakthrough in the existence of data communication. This has
opened a whole new way of implementing steganography to ensure
secure data transfer. Steganography is the fine art of hiding the
information. Hiding the message in the carrier file enables the
deniability of the existence of any message at all. This paper designs
a stego machine to develop a steganographic application to hide data
containing text in a computer video file and to retrieve the hidden
information. This can be designed by embedding text file in a video
file in such away that the video does not loose its functionality using
Least Significant Bit (LSB) modification method. This method
applies imperceptible modifications. This proposed method strives
for high security to an eavesdropper-s inability to detect hidden
information.
Abstract: The paper describes the carbonate microfacies identified in the Sinjar Formation (Late Paleocene–Early Eocene) cropping out in Qara Dagh Mountain, near Sulekan Village approximately 20km south–west of Sulaimani (Iraq). One section (62m thick) has been measured in the field and closely sampled to undertake detailed microfaciesal and micropalaeontological studies to determine the formation-s age and environment of deposition. A samples were collected illustrating all the lithological changes along the section. The limestone in the studied area is hard and extremely rich in large foraminifers (soritids, rotaliids, nummulites, miliolids) and green algae (dasycladales). The investigation of the thin sections allowed us to identify the carbonate microfacies (18 types and subtypes) and the micropaleontological association (foraminifers and green algae), to determine the age of formation and to reconstruct the paleoenvironment of deposition (fore-reef, reef, back-reef). Based on the field observations and the studied thin sections, we determined three Units of a carbonate platform (I, II and III) from the base to the top of the section: Unit I with coralgal associations, Unit II is dominated by larger foraminifers and haracterized by the absence of coralgal associations, while Unit III is dominated by small foraminifers (mostly miliolids), peloids and green algae. It is partially dolomitized.
Abstract: Sustainable development is a concept which was
originated in Burtland commission in 1978. Although this concept
was born with environmental aspects, it is penetrated in all areas
rapidly, turning into a dominate view of planning. Concentrating on
future generation issue, especially when talking about heritage has a
long story. Each approach with all of its characteristics illustrates
differences in planning, hence planning always reflects the dominate
idea of its age. This paper studies sustainable development in
planning for historical cities with the aim of finding ways to deal
with heritage in planning for historical cities in Iran. Through this, it
will be illustrated how challenges between sustainable concept and
heritage could be concluded in planning.
Consequently, the paper will emphasize on:
Sustainable development in city planning
Trends regarding heritage
Challenges due to planning for historical cities in Iran
For the first two issues, documentary method regarding the
sustainable development and heritage literature is considered. As the
next step focusing on Iranian historical cities require considering the
urban planning and management structure and identifying the main
challenges related to heritage, so analyzing challenges regarding
heritage is considered. As the result it would be illustrated that key
issue in such planning is active conservation to improve and use the
potential of heritage while it's continues conservation is guaranteed.
By emphasizing on the planning system in Iran it will be obvious that
some reforms are needed in this system and its way of relating with
heritage. The main weakness in planning for historical cities in Iran
is the lack of independent city management. Without this factor
achieving active conservation as the main factor of sustainable
development would not be possible.
Abstract: The area of Project Risk Management (PRM) has
been extensively researched, and the utilization of various tools and
techniques for managing risk in several industries has been
sufficiently reported. Formal and systematic PRM practices have
been made available for the construction industry. Based on such
body of knowledge, this paper tries to find out the global picture of
PRM practices and approaches with the help of a survey to look into
the usage of PRM techniques and diffusion of software tools, their
level of maturity, and their usefulness in the construction sector.
Results show that, despite existing techniques and tools, their usage is
limited: software tools are used only by a minority of respondents
and their cost is one of the largest hurdles in adoption. Finally, the
paper provides some important guidelines for future research
regarding quantitative risk analysis techniques and suggestions for
PRM software tools development and improvement.
Abstract: The paper contains an investigation of zeros Of Bargmann analytic representation. A brief introduction to Harmonic oscillator formalism is given. The Bargmann analytic representation has been studied. The zeros of Bargmann analytic function are considered. The Q or Husimi functions are introduced. The The Bargmann functions and the Husimi functions have the same zeros. The Bargmann functions f(z) have exactly q zeros. The evolution time of the zeros μn are discussed. Various examples have been given.
Abstract: Traditional development of wireless sensor network
mote is generally based on SoC1 platform. Such method of
development faces three main drawbacks: lack of flexibility in terms
of development due to low resource and rigid architecture of SoC;
low capability of evolution and portability versus performance if
specific micro-controller architecture features are used; and the rapid
obsolescence of micro-controller comparing to the long lifetime of
power plants or any industrial installations. To overcome these
drawbacks, we have explored a new approach of development of
wireless sensor network mote using a hybrid FPGA technology. The
application of such approach is illustrated through the
implementation of an innovative wireless sensor network protocol
called OCARI.
Abstract: Verification of real-time software systems can be
expensive in terms of time and resources. Testing is the main method
of proving correctness but has been shown to be a long and time
consuming process. Everyday engineers are usually unwilling to
adopt formal approaches to correctness because of the overhead
associated with developing their knowledge of such techniques.
Performance modelling techniques allow systems to be evaluated
with respect to timing constraints. This paper describes PARTES, a
framework which guides the extraction of performance models from
programs written in an annotated subset of C.
Abstract: This paper describes the results of an extensive study
and comparison of popular hash functions SHA-1, SHA-256,
RIPEMD-160 and RIPEMD-320 with JERIM-320, a 320-bit hash
function. The compression functions of hash functions like SHA-1
and SHA-256 are designed using serial successive iteration whereas
those like RIPEMD-160 and RIPEMD-320 are designed using two
parallel lines of message processing. JERIM-320 uses four parallel
lines of message processing resulting in higher level of security than
other hash functions at comparable speed and memory requirement.
The performance evaluation of these methods has been done by using
practical implementation and also by using step computation
methods. JERIM-320 proves to be secure and ensures the integrity of
messages at a higher degree. The focus of this work is to establish
JERIM-320 as an alternative of the present day hash functions for the
fast growing internet applications.
Abstract: Delivering streaming video over wireless is an
important component of many interactive multimedia applications
running on personal wireless handset devices. Such personal devices
have to be inexpensive, compact, and lightweight. But wireless
channels have a high channel bit error rate and limited bandwidth.
Delay variation of packets due to network congestion and the high bit
error rate greatly degrades the quality of video at the handheld
device. Therefore, mobile access to multimedia contents requires
video transcoding functionality at the edge of the mobile network for
interworking with heterogeneous networks and services. Therefore,
to guarantee quality of service (QoS) delivered to the mobile user, a
robust and efficient transcoding scheme should be deployed in
mobile multimedia transporting network. Hence, this paper
examines the challenges and limitations that the video transcoding
schemes in mobile multimedia transporting network face. Then
handheld resources, network conditions and content based mobile
and wireless video transcoding is proposed to provide high QoS
applications. Exceptional performance is demonstrated in the
experiment results. These experiments were designed to verify and
prove the robustness of the proposed approach. Extensive
experiments have been conducted, and the results of various video
clips with different bit rate and frame rate have been provided.
Abstract: This paper discusses the cued speech recognition
methods in videoconference. Cued speech is a specific gesture
language that is used for communication between deaf people. We
define the criteria for sentence intelligibility according to answers of
testing subjects (deaf people). In our tests we use 30 sample videos
coded by H.264 codec with various bit-rates and various speed of
cued speech. Additionally, we define the criteria for consonant sign
recognizability in single-handed finger alphabet (dactyl) analogically
to acoustics. We use another 12 sample videos coded by H.264 codec
with various bit-rates in four different video formats. To interpret the
results we apply the standard scale for subjective video quality
evaluation and the percentual evaluation of intelligibility as in
acoustics. From the results we construct the minimum coded bit-rate
recommendations for every spatial resolution.
Abstract: A self-compacting concrete (SCC) is the one that can
be placed in the form and can go through obstructions by its own
weight and without the need of vibration. Since its first development
in Japan in 1988, SCC has gained wider acceptance in Japan, Europe
and USA due to its inherent distinct advantages. Although there are
visible signs of its gradual acceptance in the North Africa through its
limited use in construction, Libya has yet to explore the feasibility
and applicability of SCC in new construction. The contributing
factors to this reluctance appear to be lack of any supportive
evidence of its suitability with local aggregates and the harsh
environmental conditions. The primary aim of this study is to explore
the feasibility of using SCC made with local aggregates of Eastern
Province of Libya by examining its basic properties characteristics.
This research consists of: (i) Development of a suitable mix for SCC
such as the effect of water to cement ratio, limestone and silica fume
that would satisfy the requirements of the plastic state; (ii) Casting of
concrete samples and testing them for compressive strength and unit
weight. Local aggregates, cement, admixtures and industrial waste
materials were used in this research.
The significance of this research lies in its attempt to provide
some performance data of SCC made in the Eastern Province of
Libya so as to draw attention to the possible use of SCC.
Abstract: The objective of this research was to determine the
potency of indigenous acid-aluminium tolerant Bradyrhizobium
japonicum as producer of indole acetic acid (IAA) and applied it as
nitrogen fixation on local soybeans viz Anjasmoro, Tanggamus
(yellow soybean seeds), and Detam (black soybean seed). Three
isolates of acid-aluminium tolerant Bradyrhizobium japonicum (BJ)
were used in this research, i.e. BJ 11 (wt), BJ 11 (19) - BJ 11(wt)
mutant, and USDA 110 as a reference isolate. All of isolates tested to
produce the IAA by using Salkowsky method. Effect of IAA
production by each of B. japonicum was tested on growth pouch and
greenhouse using three varieties of soybean. All isolates could grow
well and produce IAA on yeast mannitol broth (YMB) medium in
the presence of 0.5 mM L-tryptophan. BJ 11 (19) produced the
highest of IAA at 4 days incubation compared to BJ 11 (wt) and
USDA 110. All tested isolates of Bradyrhizobium japonicum have
showed effect on stimulating the formation of root nodules in
soybean varieties grown on Leonard bottle. The concentration of
IAA on root nodules of soybean symbiotic with B. japonicum was
significantly different with control, except on the treatment using
Tanggamus soybean.
Abstract: The use of buffer thresholds, blocking and adequate
service strategies are well-known techniques for computer networks
traffic congestion control. This motivates the study of series queues
with blocking, feedback (service under Head of Line (HoL) priority
discipline) and finite capacity buffers with thresholds. In this paper,
the external traffic is modelled using the Poisson process and the
service times have been modelled using the exponential distribution.
We consider a three-station network with two finite buffers, for
which a set of thresholds (tm1 and tm2) is defined. This computer
network behaves as follows. A task, which finishes its service at
station B, gets sent back to station A for re-processing with
probability o. When the number of tasks in the second buffer exceeds
a threshold tm2 and the number of task in the first buffer is less than
tm1, the fed back task is served under HoL priority discipline. In
opposite case, for fed backed tasks, “no two priority services in
succession" procedure (preventing a possible overflow in the first
buffer) is applied. Using an open Markovian queuing schema with
blocking, priority feedback service and thresholds, a closed form
cost-effective analytical solution is obtained. The model of servers
linked in series is very accurate. It is derived directly from a twodimensional
state graph and a set of steady-state equations, followed
by calculations of main measures of effectiveness. Consequently,
efficient expressions of the low computational cost are determined.
Based on numerical experiments and collected results we conclude
that the proposed model with blocking, feedback and thresholds can
provide accurate performance estimates of linked in series networks.
Abstract: Nowadays, the focus on renewable energy and alternative fuels has increased due to increasing oil prices, environment pollution, and also concern on preserving the nature. Biodiesel has been known as an attractive alternative fuel although biodiesel produced from edible oil is very expensive than conventional diesel. Therefore, the uses of biodiesel produced from non-edible oils are much better option. Currently Jatropha biodiesel (JBD) is receiving attention as an alternative fuel for diesel engine. Biodiesel is non-toxic, biodegradable, high lubricant ability, highly renewable, and its use therefore produces real reduction in petroleum consumption and carbon dioxide (CO2) emissions. Although biodiesel has many advantages, but it still has several properties need to improve, such as lower calorific value, lower effective engine power, higher emission of nitrogen oxides (NOX) and greater sensitivity to low temperature. Exhaust gas recirculation (EGR) is effective technique to reduce NOX emission from diesel engines because it enables lower flame temperature and oxygen concentration in the combustion chamber. Some studies succeeded to reduce the NOX emission from biodiesel by EGR but they observed increasing soot emission. The aim of this study was to investigate the engine performance and soot emission by using blended Jatropha biodiesel with different EGR rates. A CI engine that is water-cooled, turbocharged, using indirect injection system was used for the investigation. Soot emission, NOX, CO2, carbon monoxide (CO) were recorded and various engine performance parameters were also evaluated.
Abstract: This study aims to explore the relationship between the
disposition effect and herding behavior of investors trading Taiwanese
information technology stocks. This study differs from previous
literature in two aspects. First, in contrast with the earlier studies that
focused on investigating investors’ herding behavior, this study
explores the possibility that the disposition effect drives investors’
herding behavior. Additionally, it takes an in-depth look at the
interdependence between the disposition effect and herding behavior
of investors, including lead-lag relationship and volatility transmission
effect. Empirical results show that investors trading Taiwan’s
information technology stocks exhibit pronounced herding behavior
and that the disposition effect has a great impact on their herding
behavior.
Abstract: These days MANET is attracting much attention as
they are expected to gratefully influence communication between
wireless nodes. Along with this great strength, there is much more
chance of leave and being attacked by a malicious node. Due to this
reason much attention is given to the security and the private issue in
MANET. A lot of research in MANET has been doing. In this paper
we present the overview of MANET, the security issues of MANET,
IP configuration in MANET, the solution to puzzle out the security
issues and the simulation of the proposal idea. We add the method to
figure out the malicious nodes so that we can prevent the attack from
them. Nodes exchange the information about nodes to prevent DAD
attack. We can get 30% better performance than the previous
MANETConf.
Abstract: This paper considers H∞ performance for Markovian jump systems with Time-varying delays. The systems under consideration involve disturbance signal, Markovian switching and timevarying delays. By using a new Lyapunov-Krasovskii functional and a convex optimization approach, a delay-dependent stability condition in terms of linear matrix inequality (LMI) is addressed, which guarantee asymptotical stability in mean square and a prescribed H∞ performance index for the considered systems. Two numerical examples are given to illustrate the effectiveness and the less conservatism of the proposed main results. All these results are expected to be of use in the study of stochastic systems with time-varying delays.
Abstract: This paper describes Independent Component Analysis (ICA) based fixed-point algorithm for the blind separation of the convolutive mixture of speech, picked-up by a linear microphone array. The proposed algorithm extracts independent sources by non- Gaussianizing the Time-Frequency Series of Speech (TFSS) in a deflationary way. The degree of non-Gaussianization is measured by negentropy. The relative performances of algorithm under random initialization and Null beamformer (NBF) based initialization are studied. It has been found that an NBF based initial value gives speedy convergence as well as better separation performance
Abstract: The requirement to improve software productivity has
promoted the research on software metric technology. There are
metrics for identifying the quality of reusable components but the
function that makes use of these metrics to find reusability of
software components is still not clear. These metrics if identified in
the design phase or even in the coding phase can help us to reduce the
rework by improving quality of reuse of the component and hence
improve the productivity due to probabilistic increase in the reuse
level. CK metric suit is most widely used metrics for the objectoriented
(OO) software; we critically analyzed the CK metrics, tried
to remove the inconsistencies and devised the framework of metrics
to obtain the structural analysis of OO-based software components.
Neural network can learn new relationships with new input data and
can be used to refine fuzzy rules to create fuzzy adaptive system.
Hence, Neuro-fuzzy inference engine can be used to evaluate the
reusability of OO-based component using its structural attributes as
inputs. In this paper, an algorithm has been proposed in which the
inputs can be given to Neuro-fuzzy system in form of tuned WMC,
DIT, NOC, CBO , LCOM values of the OO software component and
output can be obtained in terms of reusability. The developed
reusability model has produced high precision results as expected by
the human experts.