Abstract: One of the efficient factors in comprehensive
development of an area is to provide water sources and on the other
hand the appropriate management of them. Population growth and
nourishment security for such a population necessitate the
achievement of constant development besides the reforming of
traditional management in order to increase the profit of sources; In
this case, the constant exploitation of sources for the next generations
will be considered in this program. The achievement of this
development without the consideration and possibility of water
development will be too difficult. Zayanderood basin with 41500
areas in square kilometers contains 7 sub-basins and 20 units of
hydrologic. In this basin area, from the entire environment
descending, just a small part will enter into the river currents and the
rest will be out of efficient usage by various ways. The most
important surface current of this basin is Zayanderood River with
403 kilometers length which is originated from east slopes of Zagros
mount and after draining of this basin area it will enter into
Gaavkhooni pond. The existence of various sources and
consumptions of water in Zayanderood basin, water transfer of the
other basin areas into this basin, of course the contradiction between
the upper and lower beneficiaries, the existence of worthwhile
natural ecosystems such as Gaavkhooni swamp in this basin area and
finally, the drought condition and lack of water in this area all
necessitate the existence of comprehensive management of water
sources in this central basin area of Iran as this method is a kind of
management which considers the development and the management
of water sources as an equilibrant way to increase the economical
and social benefits. In this study, it is tried to survey the network of
surface water sources of basin in upper and lower sections; at the
most, according to the difficulties and deficiencies of an efficient
management of water sources in this basin area, besides the
difficulties of water draining and the destructive phenomenon of
flood-water, the appropriate guidelines according to the region
conditions are presented in order to prevent the deviation of water in
upper sections and development of regions in lower sections of
Zayanderood dam.
Abstract: With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like image encryption and Visual Cryptography). Implementations of these two algorithms have been realized for experimental purposes. The results of analysis are given in this paper.
Abstract: In recent years, there have been attempts to store
natural gas in adsorptive form. This is called adsorptive natural gas,
or ANG. The problem with this technology is the low sorption
capacity. The purpose is to achieve compressed natural gas (CNG)
capacity of 230 V/V. Further research is required to achieve such
target. Several research studies have been performed with this target;
through either the modification or development of new sorbents or
the optimization of the operation sorption process itself. In this work,
storage of methane on molecular sieves 5A and 13X was studied on
dry basis, and on wet basis to certain extent. The temperature and the
pressure dynamics were investigated. The results indicated that
regardless of the charge pressure, the time for the peak temperature
during the methane charge process is always the same. This can be
used as a characteristic of the adsorbent. The total achieved
deliveries using molecular sieves were much lower than that of
activated carbons; 53.0 V/V for the case of 13X molecular sieves and
43 V/V for the case of 5A molecular sieves, both at 2oC and 4 MPa
(580 psi). Investigation of charge pressure dynamic using wet
molecular sieves at 2oC and a mass ratio of 0.5, revealed slowness of
the process and unexpected behavior.
Abstract: The Indian subcontinent is facing a massive challenge with regards to the energy security in member countries, i.e. providing a reliable source of electricity to facilitate development across various sectors of the economy and thereby achieve the developmental targets it has set for itself. A highly precarious situation exists in the subcontinent which is observed in the series of system failures which most of the times leads to system collapses-blackouts. To mitigate the issues related with energy security as well as keep in check the increasing supply demand gap, a possible solution that stands in front of the subcontinent is the deployment of an interconnected electricity ‘Supergrid’ designed to carry huge quanta of power across the sub continent as well as provide the infra structure for RES integration. This paper assesses the need and conditions for a Supergrid deployment and consequently proposes a meshed topology based on VSC HVDC converters for the Supergrid modeling.
Abstract: The amount and heterogeneity of data in biomedical research, notably in interdisciplinary research, requires new methods for the collection, presentation and analysis of information. Important data from laboratory experiments as well as patient trials are available but come out of distributed resources. The Charite Medical School in Berlin has established together with the German Research Foundation (DFG) a new information service center for kidney diseases and transplantation (Open European Nephrology Science Centre - OpEN.SC). The system is based on a service-oriented architecture (SOA) with main and auxiliary modules arranged in four layers. To improve the reuse and efficient arrangement of the services the functionalities are described as business processes using the standardised Business Process Execution Language (BPEL).
Abstract: Knowledge management (KM) is generally
considered to be a positive process in an organisation, facilitating
opportunities to achieve competitive advantage via better quality
information handling, compilation of expert know-how and rapid
response to fluctuations in the business environment. The KM
paradigm as portrayed in the literature informs the processes that can
increase intangible assets so that corporate knowledge is preserved.
However, in some instances, knowledge management exists in a
universe of dynamic tension among the conflicting needs to respect
privacy and intellectual property (IP), to guard against data theft, to
protect national security and to stay within the laws. While the
Knowledge Management literature focuses on the bright side of the
paradigm, there is also a different side in which knowledge is
distorted, suppressed or misappropriated due to personal or
organisational motives (the paradox). This paper describes the ethical
paradoxes that occur within the taxonomy and deontology of
knowledge management and suggests that recognising both the
promises and pitfalls of KM requires wisdom.
Abstract: In this work, a characterization and modeling of
packet loss of a Voice over Internet Protocol (VoIP) communication
is developed. The distributions of the number of consecutive received
and lost packets (namely gap and burst) are modeled from the
transition probabilities of two-state and four-state model.
Measurements show that both models describe adequately the burst
distribution, but the decay of gap distribution for non-homogeneous
losses is better fit by the four-state model. The respective
probabilities of transition between states for each model were
estimated with a proposed algorithm from a set of monitored VoIP
calls in order to obtain representative minimum, maximum and
average values for both models.
Abstract: In this paper, enhanced ground proximity warning simulation and validation system is designed and implemented. First, based on square grid and sub-grid structure, the global digital terrain database is designed and constructed. Terrain data searching is implemented through querying the latitude and longitude bands and separated zones of global terrain database with the current aircraft position. A combination of dynamic scheduling and hierarchical scheduling is adopted to schedule the terrain data, and the terrain data can be read and delete dynamically in the memory. Secondly, according to the scope, distance, approach speed information etc. to the dangerous terrain in front, and using security profiles calculating method, collision threat detection is executed in real-time, and provides caution and warning alarm. According to this scheme, the implementation of the enhanced ground proximity warning simulation system is realized. Simulations are carried out to verify a good real-time in terrain display and alarm trigger, and the results show simulation system is realized correctly, reasonably and stable.
Abstract: People have always needed to believe in some
supernatural power, which could explain nature phenomena.
Different kinds of religions like Christianity, Hinduism, Islam,
Buddhism have thought believers in all world, how to behave
themselves. We think the most important role of religion in modern
society most important role of religion in modern society is safety of
the People. World and traditional religion played a prominent role in
the socio-cultural progress, and in the development of man as a
spiritual being. At the heart of religious morals the belief in god and
responsibility before it lies and specifies religious and ethical values
and categories . The religion is based on ethical standards historically
developed by society, requirements and concepts, but it puts all
social and moral relations of the person in dependence on religious
values. For everything that the believer makes on a debt or a duty, he
bears moral responsibility before conscience, people and god. The
concept of value of religious morals takes the central place because
the religion from all forms of public consciousness most values is
painted as it is urged to answer vital questions. Any religion not only
considers questions of creation of the world, sense of human
existence, relationship of god and the person, but also offers the
ethical concept, develops rules of behavior of people. The religion a
long time dominated in the history of culture, and during this time
created a set of cultural and material values. The identity of Kazakh
culture can be defined as a Cultural identity traditional ,national
identity and the identity values developed by Kazakh people in
process of cultural-historical development, promoting formation of
Kazakh culture identity on public consciousness. Identity is the
historical process but always the tradition exists in it as a component
of stability, as a component of self that what this identity formed .
Abstract: This paper presents an economic game for sybil
detection in a distributed computing environment. Cost parameters
reflecting impacts of different sybil attacks are introduced in the sybil
detection game. The optimal strategies for this game in which both
sybil and non-sybil identities are expected to participate are devised.
A cost sharing economic mechanism called Discriminatory
Rewarding Mechanism for Sybil Detection is proposed based on this
game. A detective accepts a security deposit from each active agent,
negotiates with the agents and offers rewards to the sybils if the latter
disclose their identity. The basic objective of the detective is to
determine the optimum reward amount for each sybil which will
encourage the maximum possible number of sybils to reveal
themselves. Maintaining privacy is an important issue for the
mechanism since the participants involved in the negotiation are
generally reluctant to share their private information. The mechanism
has been applied to Tor by introducing a reputation scoring function.
Abstract: As the mobile Internet has become widespread in
recent years, communication based on mobile networks is increasing.
As a result, security threats have been posed with regard to the
abnormal traffic of mobile networks, but mobile security has been
handled with focus on threats posed by mobile malicious codes, and
researches on security threats to the mobile network itself have not
attracted much attention. In mobile networks, the IP address of the data
packet is a very important factor for billing purposes. If one mobile
terminal use an incorrect IP address that either does not exist or could
be assigned to another mobile terminal, billing policy will cause
problems. We monitor and analyze 3G mobile data networks traffics
for a period of time and finds some abnormal IP packets. In this paper,
we analyze the reason for abnormal IP packets on 3G Mobile Data
Networks. And we also propose an algorithm based on IP address table
that contains addresses currently in use within the mobile data network
to detect abnormal IP packets.
Abstract: The significant effects of the interactions between the
system boundaries and the near wall molecules in miniaturized
gaseous devices lead to the formation of the Knudsen layer in which
the Navier-Stokes-Fourier (NSF) equations fail to predict the correct
associated phenomena. In this paper, the well-known lattice
Boltzmann method (LBM) is employed to simulate the fluid flow and
heat transfer processes in rarefied gaseous micro media. Persuaded
by the problematic deficiency of the LBM in capturing the Knudsen
layer phenomena, present study tends to concentrate on the effective
molecular mean free path concept the main essence of which is to
compensate the incapability of this mesoscopic method in dealing
with the momentum and energy transport within the above mentioned
kinetic boundary layer. The results show qualitative and quantitative
accuracy comparable to the solutions of the linearized Boltzmann
equation or the DSMC data for the Knudsen numbers of O (1) .
Abstract: The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and different sequence in each round. The algorithm was previously software implemented in Cµ code. In this paper, a hardware implementation of the algorithm, using Field Programmable Gate Arrays (FPGA), is presented. In this work, we discuss the algorithm, the implemented micro-architecture, and the simulation and implementation results. Moreover, we present a detailed comparison with other implemented standard algorithms. In addition, we include the floor plan as well as the circuit diagrams of the various micro-architecture modules.
Abstract: Designing and implementing intelligent systems has become a crucial factor for the innovation and development of better products of space technologies. A neural network is a parallel system, capable of resolving paradigms that linear computing cannot. Field programmable gate array (FPGA) is a digital device that owns reprogrammable properties and robust flexibility. For the neural network based instrument prototype in real time application, conventional specific VLSI neural chip design suffers the limitation in time and cost. With low precision artificial neural network design, FPGAs have higher speed and smaller size for real time application than the VLSI and DSP chips. So, many researchers have made great efforts on the realization of neural network (NN) using FPGA technique. In this paper, an introduction of ANN and FPGA technique are briefly shown. Also, Hardware Description Language (VHDL) code has been proposed to implement ANNs as well as to present simulation results with floating point arithmetic. Synthesis results for ANN controller are developed using Precision RTL. Proposed VHDL implementation creates a flexible, fast method and high degree of parallelism for implementing ANN. The implementation of multi-layer NN using lookup table LUT reduces the resource utilization for implementation and time for execution.
Abstract: The design of chaos-based secure communication
via synchronized modified Chua-s systems is investigated in
this paper. A continuous control law is proposed to ensure
synchronization of the master and slave modified Chua-s
systems by using the variable structure control technique.
Particularly, the concept of extended systems is introduced
such that a continuous control input is obtained to avoid
chattering phenomenon. Then, it becomes possible to ensure
that the message signal embedded in the transmitter can be
recovered in the receiver.
Abstract: Diagnostic goal of transformers in service is to detect the winding or the core in fault. Transformers are valuable equipment which makes a major contribution to the supply security of a power system. Consequently, it is of great importance to minimize the frequency and duration of unwanted outages of power transformers. So, Frequency Response Analysis (FRA) is found to be a useful tool for reliable detection of incipient mechanical fault in a transformer, by finding winding or core defects. The authors propose as first part of this article, the coupled circuits method, because, it gives most possible exhaustive modelling of transformers. And as second part of this work, the application of FRA in low frequency in order to improve and simplify the response reading. This study can be useful as a base data for the other transformers of the same categories intended for distribution grid.
Abstract: Securing instream flows for aquatic ecosystems is
critical for sustainable water management and the promotion of
human and environmental health. Using a case study from the semiarid
region of southern Alberta (Canada) this paper considers how
the determination of instream flow standards requires judgments with
respect to: (1) The relationship between instream flow indicators and
assessments of overall environmental health; (2) The indicators used
to determine adequate instream flows, and; (3) The assumptions
underlying efforts to model instream flows given data constraints. It
argues that judgments in each of these areas have an inherently
ethical component because instream flows have direct effects on the
water(s) available to meet obligations to humans and non-humans.
The conclusion expands from the case study to generic issues
regarding instream flows, the growing water ethics literature and
prospects for linking science to policy.
Abstract: We investigated a modified thermal evaporation
method in the growth process of ZnO nanowires. ZnO nanowires
were fabricated on p-type silicon substrates without using a metal
catalyst. A simple horizontal double-tube system along with
chemical vapor diffusion of the precursor was used to grow the ZnO
nanowires. The substrates were placed in different temperature
zones, and ZnO nanowires with different diameters were obtained for
the different substrate temperatures. In addition to the nanowires,
ZnO microdiscs with different diameters were obtained on another
substrate, which was placed at a lower temperature than the other
substrates. The optical properties and crystalline quality of the ZnO
nanowires and microdiscs were characterized by room temperature
photoluminescence (PL) and Raman spectrometers. The PL and
Raman studies demonstrated that the ZnO nanowires and microdiscs
grown using such set-up had good crystallinity with excellent optical
properties. Rectifying behavior of ZnO/Si heterostructures was
characterized by a simple DC circuit.
Abstract: The worldwide prevalence of H3N2 influenza virus
and its increasing resistance to the existing drugs necessitates for the
development of an improved/better targeting anti-influenza drug.
H3N2 influenza neuraminidase is one of the two membrane-bound
proteins belonging to group-2 neuraminidases. It acts as key player
involved in viral pathogenicity and hence, is an important target of
anti-influenza drugs. Oseltamivir is one of the potent drugs targeting
this neuraminidase. In the present work, we have taken subtype N2
neuraminidase as the receptor and probable analogs of oseltamivir as
drug molecules to study the protein-drug interaction in anticipation of
finding efficient modified candidate compound. Oseltamivir analogs
were made by modifying the functional groups using Marvin Sketch
software and were docked using Schrodinger-s Glide. Oseltamivir
analog 10 was detected to have significant energy value (16% less
compared to Oseltamivir) and could be the probable lead molecule. It
infers that some of the modified compounds can interact in a novel
manner with increased hydrogen bonding at the active site of
neuraminidase and it might be better than the original drug. Further
work can be carried out such as enzymatic inhibition studies;
synthesis and crystallizing the drug-target complex to analyze the
interactions biologically.
Abstract: In this paper, encrypted audio communications based on synchronization of coupled unified chaotic systems in master-slave configuration is numerically studied. We transmit the encrypted audio messages by using two unsecure channels. Encoding, transmission, and decoding audio messages in chaotic communication is presented.