Abstract: Government spending is categorized into consumption spending and capital spending. Three categories of private consumption are used: food consumption, nonfood consumption, and services consumption. The estimated model indicates substitution effects of government consumption spending on budget shares of private nonfood consumption and of government capital spending on budget share of private food consumption. However, the results do not indicate whether the negative effects of changes in the budget shares of the nonfood and the food consumption equates to reduce total private consumption. The concept of aggregate demand comprising consumption, investment, government spending (consumption spending and capital spending), export, and import are used to estimate their relationship by using the Vector Error Correction Mechanism. The study found no effect of government capital spending on either the private consumption or the growth of GDP while the government consumption spending has negative effect on the growth of GDP.
Abstract: S-boxes (Substitution boxes) are keystones of modern
symmetric cryptosystems (block ciphers, as well as stream ciphers).
S-boxes bring nonlinearity to cryptosystems and strengthen their
cryptographic security. They are used for confusion in data security
An S-box satisfies the strict avalanche criterion (SAC), if and only if
for any single input bit of the S-box, the inversion of it changes each
output bit with probability one half. If a function (cryptographic
transformation) is complete, then each output bit depends on all of
the input bits. Thus, if it were possible to find the simplest Boolean
expression for each output bit in terms of the input bits, each of these
expressions would have to contain all of the input bits if the function
is complete. From some important properties of S-box, the most
interesting property SAC (Strict Avalanche Criterion) is presented
and to analyze this property three analysis methods are proposed.
Abstract: In this paper, we present a novel, principled approach to resolve the remained problems of substitution technique of audio steganography. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
Abstract: The purpose of this paper is to propose a framework for constructing correct parallel processing programs based on Equivalent Transformation Framework (ETF). ETF regards computation as In the framework, a problem-s domain knowledge and a query are described in definite clauses, and computation is regarded as transformation of the definite clauses. Its meaning is defined by a model of the set of definite clauses, and the transformation rules generated must preserve meaning. We have proposed a parallel processing method based on “specialization", a part of operation in the transformations, which resembles substitution in logic programming. The method requires “Memo-tree", a history of specialization to maintain correctness. In this paper we proposes the new method for the specialization-base parallel processing without Memo-tree.
Abstract: The heavy metal contamination of the technogenous
sediments and soils at the investigated dump-field show irregular
planar distribution. Also the heavy metal content in the surface water,
drainage water and in the groundwater was studied both in the dry as
well as during the rainy periods. The cementation process causes
substitution of iron by copper. Natural installation and development
of plant species was observed at the old mine waste dumps, specific
to the local chemical conditions such as low content of essential
nutrients and high content of heavy metals. The individual parts of
the plant tissues (roots, branches/stems, leaves/needles, flowers/
fruits) are contaminated by heavy metals and tissues are damaged
differently, respectively.
Abstract: Missing data is a persistent problem in almost all
areas of empirical research. The missing data must be treated very
carefully, as data plays a fundamental role in every analysis.
Improper treatment can distort the analysis or generate biased results.
In this paper, we compare and contrast various imputation techniques
on missing data sets and make an empirical evaluation of these
methods so as to construct quality software models. Our empirical
study is based on NASA-s two public dataset. KC4 and KC1. The
actual data sets of 125 cases and 2107 cases respectively, without
any missing values were considered. The data set is used to create
Missing at Random (MAR) data Listwise Deletion(LD), Mean
Substitution(MS), Interpolation, Regression with an error term and
Expectation-Maximization (EM) approaches were used to compare
the effects of the various techniques.
Abstract: The recent global financial problem urges government
to play role in stimulating the economy due to the fact that private
sector has little ability to purchase during the recession. A concerned
question is whether the increased government spending crowds out
private consumption and whether it helps stimulate the economy. If
the government spending policy is effective; the private consumption
is expected to increase and can compensate the recent extra
government expense. In this study, the government spending is
categorized into government consumption spending and government
capital spending. The study firstly examines consumer consumption
along the line with the demand function in microeconomic theory.
Three categories of private consumption are used in the study. Those
are food consumption, non food consumption, and services
consumption. The dynamic Almost Ideal Demand System of the three
categories of the private consumption is estimated using the Vector
Error Correction Mechanism model. The estimated model indicates
the substituting effects (negative impacts) of the government
consumption spending on budget shares of private non food
consumption and of the government capital spending on budget share
of private food consumption, respectively. Nevertheless the result
does not necessarily indicate whether the negative effects of changes
in the budget shares of the non food and the food consumption means
fallen total private consumption. Microeconomic consumer demand
analysis clearly indicates changes in component structure of
aggregate expenditure in the economy as a result of the government
spending policy. The macroeconomic concept of aggregate demand
comprising consumption, investment, government spending (the
government consumption spending and the government capital
spending), export, and import are used to estimate for their
relationship using the Vector Error Correction Mechanism model.
The macroeconomic study found no effect of the government capital
spending on either the private consumption or the growth of GDP
while the government consumption spending has negative effect on
the growth of GDP. Therefore no crowding out effect of the
government spending is found on the private consumption but it is
ineffective and even inefficient expenditure as found reducing growth
of the GDP in the context of Thailand.
Abstract: In cryptography, confusion and diffusion are very
important to get confidentiality and privacy of message in block
ciphers and stream ciphers. There are two types of network to provide
confusion and diffusion properties of message in block ciphers. They
are Substitution- Permutation network (S-P network), and Feistel
network. NLFS (Non-Linear feedback stream cipher) is a fast and
secure stream cipher for software application. NLFS have two modes
basic mode that is synchronous mode and self synchronous mode.
Real random numbers are non-deterministic. R-box (random box)
based on the dynamic properties and it performs the stochastic
transformation of data that can be used effectively meet the
challenges of information is protected from international destructive
impacts. In this paper, a new implementation of stochastic
transformation will be proposed.
Abstract: This paper deals with a periodic-review substitutable
inventory system for a finite and an infinite number of periods. Here
an upward substitution structure, a substitution of a more costly item
by a less costly one, is assumed, with two products. At the beginning
of each period, a stochastic demand comes for the first item only,
which is quality-wise better and hence costlier. Whenever an arriving
demand finds zero inventory of this product, a fraction of unsatisfied
customers goes for its substitutable second item. An optimal ordering
policy has been derived for each period. The results are illustrated
with numerical examples. A sensitivity analysis has been done to
examine how sensitive the optimal solution and the maximum profit
are to the values of the discount factor, when there is a large number
of periods.
Abstract: As the Textile Industry is the second largest industry
in Egypt and as small and medium-sized enterprises (SMEs) make up
a great portion of this industry therein it is essential to apply the
concept of Cleaner Production for the purpose of reducing pollution.
In order to achieve this goal, a case study concerned with ecofriendly
stone-washing of jeans-garments was investigated. A raw
material-substitution option was adopted whereby the toxic
potassium permanganate and sodium sulfide were replaced by the
environmentally compatible hydrogen peroxide and glucose
respectively where the concentrations of both replaced chemicals
together with the operating time were optimized. In addition, a
process-rationalization option involving four additional processes
was investigated. By means of criteria such as product quality,
effluent analysis, mass and heat balance; and cost analysis with the
aid of a statistical model, a process optimization treatment revealed
that the superior process optima were 50%, 0.15% and 50min for
H2O2 concentration, glucose concentration and time, respectively.
With these values the superior process ought to reduce the annual
cost by about EGP 105 relative to the currently used conventional
method.
Abstract: The mineral having chemical compositional formula MgAl2O4 is called “spinel". The ferrites crystallize in spinel structure are known as spinel-ferrites or ferro-spinels. The spinel structure has a fcc cage of oxygen ions and the metallic cations are distributed among tetrahedral (A) and octahedral (B) interstitial voids (sites). The X-ray diffraction (XRD) intensity of each Bragg plane is sensitive to the distribution of cations in the interstitial voids of the spinel lattice. This leads to the method of determination of distribution of cations in the spinel oxides through XRD intensity analysis. The computer program for XRD intensity analysis has been developed in C language and also tested for the real experimental situation by synthesizing the spinel ferrite materials Mg0.6Zn0.4AlxFe2- xO4 and characterized them by X-ray diffractometry. The compositions of Mg0.6Zn0.4AlxFe2-xO4(x = 0.0 to 0.6) ferrites have been prepared by ceramic method and powder X-ray diffraction patterns were recorded. Thus, the authenticity of the program is checked by comparing the theoretically calculated data using computer simulation with the experimental ones. Further, the deduced cation distributions were used to fit the magnetization data using Localized canting of spins approach to explain the “recovery" of collinear spin structure due to Al3+ - substitution in Mg-Zn ferrites which is the case if A-site magnetic dilution and non-collinear spin structure. Since the distribution of cations in the spinel ferrites plays a very important role with regard to their electrical and magnetic properties, it is essential to determine the cation distribution in spinel lattice.
Abstract: The P-Bigram method is a string comparison methods
base on an internal two characters-based similarity measure. The edit
distance between two strings is the minimal number of elementary
editing operations required to transform one string into the other. The
elementary editing operations include deletion, insertion, substitution
two characters. In this paper, we address the P-Bigram method to
sole the similarity problem in DNA sequence. This method provided
an efficient algorithm that locates all minimum operation in a string.
We have been implemented algorithm and found that our program
calculated that smaller distance than one string. We develop PBigram
edit distance and show that edit distance or the similarity and
implementation using dynamic programming. The performance of
the proposed approach is evaluated using number edit and percentage
similarity measures.
Abstract: The world economic crises and budget constraints
have caused authorities, especially those in developing countries, to
rationalize water quality monitoring activities. Rationalization
consists of reducing the number of monitoring sites, the number of
samples, and/or the number of water quality variables measured. The
reduction in water quality variables is usually based on correlation. If
two variables exhibit high correlation, it is an indication that some of
the information produced may be redundant. Consequently, one
variable can be discontinued, and the other continues to be measured.
Later, the ordinary least squares (OLS) regression technique is
employed to reconstitute information about discontinued variable by
using the continuously measured one as an explanatory variable. In
this paper, two record extension techniques are employed to
reconstitute information about discontinued water quality variables,
the OLS and the Line of Organic Correlation (LOC). An empirical
experiment is conducted using water quality records from the Nile
Delta water quality monitoring network in Egypt. The record
extension techniques are compared for their ability to predict
different statistical parameters of the discontinued variables. Results
show that the OLS is better at estimating individual water quality
records. However, results indicate an underestimation of the variance
in the extended records. The LOC technique is superior in preserving
characteristics of the entire distribution and avoids underestimation
of the variance. It is concluded from this study that the OLS can be
used for the substitution of missing values, while LOC is preferable
for inferring statements about the probability distribution.
Abstract: The use of wind energy for electricity generation is
growing rapidly across the world and in Portugal. However, the
geographical characteristics of the country along with the average
wind regime and with the environmental restrictions imposed to these
projects create limitations to the exploit of the onshore wind
resource. The best onshore wind spots are already committed and the
possibility of offshore wind farms in the Portuguese cost is now
being considered. This paper aims to make a contribution to the
evaluation of offshore wind power projects in Portugal. The technical
restrictions are addressed and the strategic, environmental and
financial interest of the project is analysed from the private company
and public points of view. The results suggest that additional support
schemes are required to ensure private investors interest for these
projects. Assuming an approach of direct substitution of energy
sources for electricity generation, the avoided CO2 equivalent
emissions for an offshore wind power project were quantified. Based
on the conclusions, future research is proposed to address the
environmental and social impacts of these projects.
Abstract: This paper presents a novel method for data hiding based on neighborhood pixels information to calculate the number of bits that can be used for substitution and modified Least Significant Bits technique for data embedding. The modified solution is independent of the nature of the data to be hidden and gives correct results along with un-noticeable image degradation. The technique, to find the number of bits that can be used for data hiding, uses the green component of the image as it is less sensitive to human eye and thus it is totally impossible for human eye to predict whether the image is encrypted or not. The application further encrypts the data using a custom designed algorithm before embedding bits into image for further security. The overall process consists of three main modules namely embedding, encryption and extraction cm.
Abstract: This paper investigates the effect of product substitution in the single-period 'newsboy-type' problem in a fuzzy environment. It is supposed that the single-period problem operates under uncertainty in customer demand, which is described by imprecise terms and modelled by fuzzy sets. To perform this analysis, we consider the fuzzy model for two-item with upward substitution. This upward substitutability is reasonable when the products can be stored according to certain attribute levels such as quality, brand or package size. We show that the explicit consideration of this substitution opportunity increase the average expected profit. Computational study is performed to observe the benefits of product's substitution.
Abstract: Fats and oils are made of esterified hydrocarbons
(RCOOR-) and this work demonstrates the substitution of R by
multi-walled CNTs (MWNTs). The resultant materials are fluidic, oily,
electrically conducting and excellent lubricants. Esterified MWNTs
can also respond to magnetic field when tubules contain long segments
of Fe
Abstract: Distributed wireless sensor network consist on several
scattered nodes in a knowledge area. Those sensors have as its only
power supplies a pair of batteries that must let them live up to five
years without substitution. That-s why it is necessary to develop
some power aware algorithms that could save battery lifetime as
much as possible. In this is document, a review of power aware
design for sensor nodes is presented. As example of implementations,
some resources and task management, communication, topology
control and routing protocols are named.
Abstract: This paper proposes a simple model of economic geography within the Dixit-Stiglitz-Iceberg framework that may be used to analyze migration patterns among three cities. The cost–benefit tradeoffs affecting incentives for three types of migration, including echelon migration, are discussed. This paper develops a tractable, heterogeneous-agent, general equilibrium model, where agents share constant human capital, and explores the relationship between the benefits of echelon migration and gross human capital. Using Chinese numerical solutions, we study the manifestation of echelon migration and how it responds to changes in transportation cost and elasticity of substitution. Numerical results demonstrate that (i) there are positive relationships between a migration-s benefit-and-wage ratio, (ii) there are positive relationships between gross human capital ratios and wage ratios as to origin and destination, and (iii) we identify 13 varieties of human capital convergence among cities. In particular, this model predicts population shock resulting from the processes of migration choice and echelon migration.
Abstract: Samples of CoFe2-xCrxO4 where x varies from 0.0 to 0.5 were prepared by co-precipitation route. These samples were sintered at 750°C for 2 hours. These particles were characterized by X-ray diffraction (XRD) at room temperature. The FCC spinel structure was confirmed by XRD patterns of the samples. The crystallite sizes of these particles were calculated from the most intense peak by Scherrer formula. The crystallite sizes lie in the range of 37-60 nm. The lattice parameter was found decreasing upon substitution of Cr. DC electrical resistivity was measured as a function of temperature. The room temperature thermoelectric power was measured for the prepared samples. The magnitude of Seebeck coefficient depends on the composition and resistivity of the samples.