Abstract: In this work, we study the impact of dynamically changing link slowdowns on the stability properties of packetswitched networks under the Adversarial Queueing Theory framework. Especially, we consider the Adversarial, Quasi-Static Slowdown Queueing Theory model, where each link slowdown may take on values in the two-valued set of integers {1, D} with D > 1 which remain fixed for a long time, under a (w, p)-adversary. In this framework, we present an innovative systematic construction for the estimation of adversarial injection rate lower bounds, which, if exceeded, cause instability in networks that use the LIS (Longest-in- System) protocol for contention-resolution. In addition, we show that a network that uses the LIS protocol for contention-resolution may result in dropping its instability bound at injection rates p > 0 when the network size and the high slowdown D take large values. This is the best ever known instability lower bound for LIS networks.
Abstract: Medical negligence disputes in Malaysia are mainly resolved through litigation by using the tort system. The tort system, being adversarial in nature has subjected parties to litigation hazards such as delay, excessive costs and uncertainty of outcome. The dissatisfaction of the tort system in compensating medically injured victims has created various alternatives to litigation. Amongst them is the implementation of a no-fault compensation system which would allow compensation to be given without the need of proving fault on the medical personnel. Instead, the community now bears the burden of compensating and at the end, promotes collective responsibility. For Malaysia, introducing a no-fault system would provide a tempting solution and may ultimately, achieve justice for the medical injured victims. Nevertheless, such drastic change requires a great deal of consideration to determine the suitability of the system and whether or not it will eventually cater for the needs of the Malaysian population
Abstract: This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes are assumed to know their coordinates, the straight line distance between each pair of them can be calculated and then compared with the corresponding hop distance, which in this paper equals hop counts × node-s transmission range R. Dramatic difference may emerge because of an existing wormhole. Our detection mechanism is based on this. The approximate location of the wormhole can also be derived in further steps based on this information. To the best of our knowledge, our method is much easier than other wormhole detecting schemes which also use beacon nodes, and to those have special requirements on each nodes (e.g., GPS receivers or tightly synchronized clocks or directional antennas), ours is more economical. Simulation results show that the algorithm is successful in detecting and locating wormholes when the density of beacon nodes reaches 0.008 per m2.
Abstract: Web intelligence, if made personal, can fuel the process of building communications around the interests and preferences of each individual customer or prospect, by providing specific behavioral insights about each individual. To become fully efficient, Web intelligence must reach a stage of a high-level maturity, passing throughout a process that involves five steps: (1) Web site analysis; (2) Web site and advertising optimization; (3) Segment targeting; (4) Interactive marketing (online only); and (5) Interactive marketing (online and offline). Discussing these steps in detail, the paper uncovers the real gold mine that is personal-level Web intelligence.
Abstract: Biochemical investigations were carried out to assess
the effect of different exposure regimes of Kazakhstan crude oil
(KCO) on hepatic antioxidant defense system in albino rats.
Contaminants were delivered under two different dosing regimes,
with all treatments receiving the same total contaminant load by the
end of the exposure period. Rats in regime A injected with KCO
once at a dose of 6 ml/kg bw while in regime B injected multiply at a
dose of 1.5 ml/kg bw on day 1, 3, 5 and 8. Antioxidant biomarkers
were measured in hepatic tissue after 1, 3, 5 and 8 days. Significant
induction was observed in serum aminotransferases (ALT, AST)
(p
Abstract: The progress of concentrations of particular heavy metals was assessed in chosen localities in region Moravia, the Czech Republic, from 2007 to 2009. Particular metals were observed in localities with various types and characterization of zone. Pb, Ni, As and Cd were emphasized as a result of their toxicity and potential adverse health effect to the exposed population. The progress of metal concentrations and their health effects in the most polluted localities were examined. According to the results, the air pollution limit values were not exceeded. Based on the health risk assessment, the probability of developing tumorous diseases is acceptable, except for the increased probability of cancer risk from long-term exposure to As.
Abstract: In today-s competitive environment, the security concerns have grown tremendously. In the modern world, possession is known to be 9/10-ths of the law. Hence, it is imperative for one to be able to safeguard one-s property from worldly harms such as thefts, destruction of property, people with malicious intent etc. Due to the advent of technology in the modern world, the methodologies used by thieves and robbers for stealing have been improving exponentially. Therefore, it is necessary for the surveillance techniques to also improve with the changing world. With the improvement in mass media and various forms of communication, it is now possible to monitor and control the environment to the advantage of the owners of the property. The latest technologies used in the fight against thefts and destruction are the video surveillance and monitoring. By using the technologies, it is possible to monitor and capture every inch and second of the area in interest. However, so far the technologies used are passive in nature, i.e., the monitoring systems only help in detecting the crime but do not actively participate in stopping or curbing the crime while it takes place. Therefore, we have developed a methodology to detect the motion in a video stream environment and this is an idea to ensure that the monitoring systems not only actively participate in stopping the crime, but do so while the crime is taking place. Hence, a system is used to detect any motion in a live streaming video and once motion has been detected in the live stream, the software will activate a warning system and capture the live streaming video.
Abstract: A one-step conservative level set method, combined with a global mass correction method, is developed in this study to simulate the incompressible two-phase flows. The present framework do not need to solve the conservative level set scheme at two separated steps, and the global mass can be exactly conserved. The present method is then more efficient than two-step conservative level set scheme. The dispersion-relation-preserving schemes are utilized for the advection terms. The pressure Poisson equation solver is applied to GPU computation using the pCDR library developed by National Center for High-Performance Computing, Taiwan. The SMP parallelization is used to accelerate the rest of calculations. Three benchmark problems were done for the performance evaluation. Good agreements with the referenced solutions are demonstrated for all the investigated problems.
Abstract: This paper develops the fiscal health index of 21 local
governments in Taiwan over the 1984 to 2010 period. A quantile
regression analysis was used to explore the extent that economic
variables, political budget cycles, and legislative checks and balances,
impact different quantiles of fiscal health index for a country over a
sample period of time. Our findings suggest that local governments at
the lower quantile are significantly benefited from political budget
cycles and the increase in central government revenues, while
legislative effective checks and balances and the increase in central
government expenditures have a significantly negative effect on local
fiscal health. When local governments are in the upper tail of the
distribution, legislative checks and balances and growth in
macroeconomics have significant and adverse effects on the fiscal
health of local governments. However, increases in central
government revenues have significant and positive effects on the
health status of local government in Taiwan.
Abstract: Palestinian cities face the challenges of land scarcity,
high population growth rates, rapid urbanization, uneven
development and territorial fragmentation. Due to geopolitical
constrains and the absence of an effective Palestinian planning
institution, urban development in Palestinian cities has not followed
any discernable planning scheme. This has led to a number of
internal contradictions in the structure of cities, and adversely
affected land use, the provision of urban services, and the quality of
the living environment.
This paper explores these challenges, and the potential that exists
for introducing a more sustainable urban development pattern in
Palestinian cities. It assesses alternative development approaches
with a particular focus on sustainable development, promoting ecodevelopment
imperatives, limiting random urbanization, and meeting
present and future challenges, including fulfilling the needs of the
people and conserving the scarce land and limited natural resources.
This paper concludes by offering conceptual proposals and guidelines
for promoting sustainable physical development in Palestinian cities.
Abstract: Several studies have shown the association between
ambient particulate matter (PM) and adverse health effects and
climate change, thus highlighting the need to limit the anthropogenic
sources of PM. PM Exposure is commonly monitored as mass
concentration of PM10 (particle aerodynamic diameter < 10μm) or
PM2.5 (particle aerodynamic diameter < 2.5μm), although increasing
toxicity with decreasing aerodynamic diameter has been reported due
to increased surface area and enhanced chemical reactivity with other
species. Additionally, the light scattering properties of PM increases
with decreasing size. Hence, it is important to study the chemical
characterization of finer fraction of the particulate matter and to
identify their sources so that they can be controlled appropriately to a
large extent at the sources before reaching to the receptors.
Abstract: This study examines the issue of recommendation
sources from the perspectives of gender and consumers- perceived
risk, and validates a model for the antecedents of consumer online
purchases. The method of obtaining quantitative data was that of the
instrument of a survey questionnaire. Data were collected via
questionnaires from 396 undergraduate students aged 18-24, and a
multiple regression analysis was conducted to identify causal
relationships. Empirical findings established the link between
recommendation sources (word-of-mouth, advertising, and
recommendation systems) and the likelihood of making online
purchases and demonstrated the role of gender and perceived risk as
moderators in this context. The results showed that the effects of
word-of-mouth on online purchase intentions were stronger than those
of advertising and recommendation systems. In addition, female
consumers have less experience with online purchases, so they may be
more likely than males to refer to recommendations during the
decision-making process. The findings of the study will help
marketers to address the recommendation factor which influences
consumers- intention to purchase and to improve firm performances to
meet consumer needs.
Abstract: Computational study of two dimensional supersonic reacting hydrogen-air flows is performed to investigate the nitrogen effects on ignition delay time for premixed and diffusion flames. Chemical reaction is treated using detail kinetics and the advection upstream splitting method is used to calculate the numerical inviscid fluxes. The results show that just in stoichiometric condition for both premixed and diffusion flames, there is monotone dependency of the ignition delay time to the nitrogen addition. In other situations, the optimal condition from ignition viewpoint should be found using numerical investigations.
Abstract: Simultaneous recovery of copper and DCA from
simulated MEUF concentrated stream was investigated. Effects of
surfactant (DCA) and metal (copper) concentrations, surfactant to
metal molar ratio (S/M ratio), electroplating voltage, EDTA
concentration, solution pH, and salt concentration on metal recovery
and current efficiency were studied. Electric voltage of -0.5 V was
shown to be optimum operation condition in terms of Cu recovery,
current efficiency, and surfactant recovery. Increasing Cu recovery and
current efficiency were observed with increases of Cu concentration
while keeping concentration of DCA constant. However, increasing
both Cu and DCA concentration while keeping S/M ratio constant at
2.5 showed detrimental effect on Cu recovery at DCA concentration
higher than 15 mM. Cu recovery decreases with increasing pH while
current efficiency showed an opposite trend. It is believed that
conductivity is the main cause for discrepancy of Cu recovery and
current efficiency observed at different pH. Finally, it was shown that
EDTA had adverse effect on both Cu recovery and current efficiency
while addition of NaCl salt had negative impact on current efficiency
at concentration higher than 8000 mg/L.
Abstract: Fisheries management all around the world is
hampered by the lack, or poor quality, of critical data on fish
resources and fishing operations. The main reasons for the chronic
inability to collect good quality data during fishing operations is the
culture of secrecy common among fishers and the lack of modern
data gathering technology onboard most fishing vessels. In response,
OLRAC-SPS, a South African company, developed fisheries datalogging
software (eLog in short) and named it Olrac. The Olrac eLog
solution is capable of collecting, analysing, plotting, mapping,
reporting, tracing and transmitting all data related to fishing
operations. Olrac can be used by skippers, fleet/company managers,
offshore mariculture farmers, scientists, observers, compliance
inspectors and fisheries management authorities. The authors believe
that using eLog onboard fishing vessels has the potential to
revolutionise the entire process of data collection and reporting
during fishing operations and, if properly deployed and utilised,
could transform the entire commercial fleet to a provider of good
quality data and forever change the way fish resources are managed.
In addition it will make it possible to trace catches back to the actual
individual fishing operation, to improve fishing efficiency and to
dramatically improve control of fishing operations and enforcement
of fishing regulations.
Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: This paper presents a systematic procedure for modelling and simulation of a power system installed with a power system stabilizer (PSS) and a flexible ac transmission system (FACTS)-based controller. For the design purpose, the model of example power system which is a single-machine infinite-bus power system installed with the proposed controllers is developed in MATLAB/SIMULINK. In the developed model synchronous generator is represented by model 1.1. which includes both the generator main field winding and the damper winding in q-axis so as to evaluate the impact of PSS and FACTS-based controller on power system stability. The model can be can be used for teaching the power system stability phenomena, and also for research works especially to develop generator controllers using advanced technologies. Further, to avoid adverse interactions, PSS and FACTS-based controller are simultaneously designed employing genetic algorithm (GA). The non-linear simulation results are presented for the example power system under various disturbance conditions to validate the effectiveness of the proposed modelling and simultaneous design approach.
Abstract: Saccharomyces cerevisiae (baker-s yeast) can exhibit
sustained oscillations during the operation in a continuous bioreactor
that adversely affects its stability and productivity. Because of
heterogeneous nature of cell populations, the cell population balance
models can be used to capture the dynamic behavior of such cultures.
In this paper an unstructured, segregated model is used which is
based on population balance equation(PBE) and then in order to
simulation, the 4th order Rung-Kutta is used for time dimension and
three methods, finite difference, orthogonal collocation on finite
elements and Galerkin finite element are used for discretization of the
cell mass domain. The results indicate that the orthogonal collocation
on finite element not only is able to predict the oscillating behavior of
the cell culture but also needs much little time for calculations.
Therefore this method is preferred in comparison with other methods.
In the next step two controllers, a globally linearizing control (GLC)
and a conventional proportional-integral (PI) controller are designed
for controlling the total cell mass per unit volume, and performances
of these controllers are compared through simulation. The results
show that although the PI controller has simpler structure, the GLC
has better performance.
Abstract: Environmental impact assessment (EIA) is a procedure tool of environmental management for identifying, predicting, evaluating and mitigating the adverse effects of development proposals. EIA reports usually analyze how the amounts or concentrations of pollutants obey the relevant standards. Actually, many analytical tools can deepen the analysis of environmental impacts in EIA reports, such as life cycle assessment (LCA) and environmental risk assessment (ERA). Life cycle impact assessment (LCIA) is one of steps in LCA to introduce the causal relationships among environmental hazards and damage. Incorporating the LCIA concept into ERA as an integrated tool for EIA can extend the focus of the regulatory compliance of environmental impacts to determine of the significance of environmental impacts. Sometimes, when using integrated tools, it is necessary to consider fuzzy situations due to insufficient information; therefore, ERA should be generalized to fuzzy risk assessment (FRA). Finally, the use of the proposed methodology is demonstrated through the study case of the expansion plan of the world-s largest plastics processing factory.
Abstract: The presence of cold air with the convergent
topography of the Lut valley over the valley-s sloping terrain can
generate Low Level Jets (LLJ). Moreover, the valley-parallel
pressure gradients and northerly LLJ are produced as a result of the
large-scale processes. In the numerical study the regional MM5
model was run leading to achieve an appropriate dynamical analysis
of flows in the region for summer and winter. The results of this
study show the presence of summer synoptical systems cause the
formation of north-south pressure gradients in the valley which could
be led to the blowing of winds with the velocity more than 14 ms-1
and vulnerable dust and wind storms lasting more than 120 days.
Whereas the presence of cold air masses in the region in winter,
cause the average speed of LLJs decrease. In this time downslope
flows are noticeable in creating the night LLJs.