Abstract: Voice over Internet Protocol (VoIP) is a form of voice
communication that uses audio data to transmit voice signals to the
end user. VoIP is one of the most important technologies in the
World of communication. Around, 20 years of research on VoIP,
some problems of VoIP are still remaining. During the past decade
and with growing of wireless technologies, we have seen that many
papers turn their concentration from Wired-LAN to Wireless-LAN.
VoIP over Wireless LAN (WLAN) faces many challenges due to the
loose nature of wireless network. Issues like providing Quality of
Service (QoS) at a good level, dedicating capacity for calls and
having secure calls is more difficult rather than wired LAN.
Therefore VoIP over WLAN (VoWLAN) remains a challenging
research topic. In this paper we consolidate and address major
VoWLAN issues. This research is helpful for those researchers wants
to do research in Voice over IP technology over WLAN network.
Abstract: An application framework provides a reusable design
and implementation for a family of software systems. Application
developers extend the framework to build their particular
applications using hooks. Hooks are the places identified to show
how to use and customize the framework. Hooks define the
Framework Interface Classes (FICs) and the specifications of their
methods. As part of the development life cycle, it is required to test
the implementations of the FICs. Building a testing model to express
the behavior of a class is an essential step for the generation of the
class-based test cases. The testing model has to be consistent with the
specifications provided for the hooks. State-based models consisting
of states and transitions are testing models well suited to objectoriented
software. Typically, hand-construction of a state-based
model of a class behavior is expensive, error-prone, and may result in
constructing an inconsistent model with the specifications of the class
methods, which misleads verification results. In this paper, a
technique is introduced to automatically synthesize a state-based
testing model for FICs using the specifications provided for the
hooks. A tool that supports the proposed technique is introduced.
Abstract: The use of sewage sludge and effluents from
wastewater treatment plants for irrigation of agricultural lands is on
the rise particularly in peri-urban areas of developing countries.
The reuse of nutrients and organic matter in treated wastewater
and sewage sludge via land application is a desirable goal. However,
trace or heavy metals present in sludge pose the risk of human or
phytotoxicity from land application. Long-term use of sewage
sludge, heavy metals can accumulate to phytotoxic levels and results
in reduced plants growth and/or enhanced metal concentrations in
plants, which consumed by animals then enter the food chain. In this
research, the amount of heavy metals was measured in plants
irrigated with wastewater and sludge application. For this purpose,
three pilots were made in a Shush treatment plant in south of Tehran.
Three plants species, spinach, lettuce and radish were selected and
planted in the pilots.First pilot was irrigated just with wastewater of
treatment plant and second pilot was irrigated with wastewater and
sludge application .Third pilot was irrigated with simulated heavy
metals solution equal 50 years of irrigation. The results indicate that
the average of amount of heavy metals Pb, Cd in three plant species
in first pilot were lower than permissible limits .In second pilot,
Cadmium accumulations are high in three species plants and more
than the standard limits. Concentration of Cd , Pb have exceed their
permitted limits in plants in third pilot . It was concluded that the use
of wastewater and sludge application in agricultural lands enriched
soils with heavy metals to concentrations that may pose potential
environmental and health risks in the long-term.
Abstract: Present study summarizes the control of Vibrio
alginolyticus infection in hatchery reared Clownfish, Amphiprion
sebae with the extract of the mangrove plant, Avicennia marina.
Fishes with visible symptoms of hemorrhagic spots were chosen and
the genomic DNA of the causative bacterium was isolated and
sequenced based on 16S rDNA gene. The in vitro assay revealed that
a fraction of A. marina leaf extract elucidated with ethyl acetate:
methanol (6:4) showed a high activity (28 mm) at 125 μg/ml
concentrations. About 4 % of the fraction fed along with live V.
alginolyticus was significantly decreased the cumulative mortality
(P
Abstract: Lightweight ceramic materials in the form of bricks
and blocks are widely used in modern construction. They may be
obtained by adding of rice husk, rye straw, etc, as porous forming
materials. Rice husk is a major by-product of the rice milling
industry. Its utilization as a valuable product has always been a
problem. Various technologies for utilization of rice husk through
biological and thermochemical conversion are being developed.
The purpose of this work is to develop lightweight ceramic
materials with clay matrix and filler of rice husk and examine their
main physicomechanical properties. The results obtained allow to
suppose that the materials synthesized on the basis of waste materials
can be used as lightweight materials for construction purpose.
Abstract: In this work, we treat the problems related to chemical and petrochemical plants of a certain complex process taking the centrifugal compressor as an example, a system being very complex by its physical structure as well as its behaviour (surge phenomenon). We propose to study the application possibilities of the recent control approaches to the compressor behaviour, and consequently evaluate their contribution in the practical and theoretical fields. Facing the studied industrial process complexity, we choose to make recourse to fuzzy logic for analysis and treatment of its control problem owing to the fact that these techniques constitute the only framework in which the types of imperfect knowledge can jointly be treated (uncertainties, inaccuracies, etc..) offering suitable tools to characterise them. In the particular case of the centrifugal compressor, these imperfections are interpreted by modelling errors, the neglected dynamics, no modelisable dynamics and the parametric variations. The purpose of this paper is to produce a total robust nonlinear controller design method to stabilize the compression process at its optimum steady state by manipulating the gas rate flow. In order to cope with both the parameter uncertainty and the structured non linearity of the plant, the proposed method consists of a linear steady state regulation that ensures robust optimal control and of a nonlinear compensation that achieves the exact input/output linearization.
Abstract: In Secondary Surveillance Radar (SSR) systems, it is
more difficult to locate and recognise aircrafts in the neighbourhood of civil airports since aerial traffic becomes greater. Here, we propose to apply a recent Blind Source Separation (BSS) algorithm based
on Time-Frequency Analysis, in order to separate messages sent by different aircrafts and falling in the same radar beam in reception. The above source separation method involves joint-diagonalization
of a set of smoothed version of spatial Wigner-Ville distributions.
The technique makes use of the difference in the t-f signatures of the nonstationary sources to be separated. Consequently, as the SSR sources emit different messages at different frequencies, the above fitted to this new application. We applied the technique in simulation to separate SSR replies. Results are provided at the end
of the paper.
Abstract: Microbial contamination, most of which are fecal born in drinking water and food industry is a serious threat to humans. Escherichia coli is one of the most common and prevalent among them. We have developed a sensor for rapid and an early detection of contaminants, taking E.coli as a threat indicator organism. The sensor is based on co-polymerizations of aniline and formaldehyde in form of thin film over glass surface using the vacuum deposition technique. The particular doping combination of thin film with Fe-Al and Fe-Cu in different concentrations changes its non conducting properties to p- type semi conductor. This property is exploited to detect the different contaminants, believed to have the different surface charge. It was found through experiments that different microbes at same OD (0.600 at 600 nm) have different conductivity in solution. Also the doping concentration is found to be specific for attracting microbes on the basis of surface charge. This is a simple, cost effective and quick detection method which not only decreases the measurement time but also gives early warnings for highly contaminated samples.
Abstract: It-s difficult for China-s current land transfer
institutions limited to county-wide to solve the contradiction between
urban-rural development and construction land shortage. On the basis of analyzing China-s construction land transfer system, and evaluation
toward Transfer of development rights (TDR) practices in Anhui and
Chongqing, the passage proposes: (1) we should establish a multi-level
land indicators trade market under the guidance of regional spatial
objectives, and allow land transfer paid across cities and counties
within a specific area following the regulation of both government and
market; (2) it would be better to combine organically the policy ntentions of land plan, regional plan, urban plan and economic plan, and link them with land indicators transfer to promote a wider range of
urban-rural balance and regional coordination.
Abstract: In this paper, for the understanding of the phytoplankton dynamics in marine ecosystem, a susceptible and an infected class of phytoplankton population is considered in spatiotemporal domain.
Here, the susceptible phytoplankton is growing logistically and the
growth of infected phytoplankton is due to the instantaneous Holling
type-II infection response function. The dynamics are studied in terms of the local and global stabilities for the system and further
explore the possibility of Hopf -bifurcation, taking the half saturation period as (i.e., ) the bifurcation parameter in temporal domain.
It is also observe that the reaction diffusion system exhibits spatiotemporal
chaos and pattern formation in phytoplankton dynamics,
which is particularly important role play for the spatially extended phytoplankton system. Also the effect of the diffusion coefficient
on the spatial system for both one and two dimensional case is obtained. Furthermore, we explore the higher-order stability analysis
of the spatial phytoplankton system for both linear and no-linear system. Finally, few numerical simulations are carried out for pattern
formation.
Abstract: Culture and family structure provide a sense security.
Further, the chrono, macro and micro contexts of development
influence developmental transitions and timetable particularly owing
to variations in the macrosystem associated with non normative life
events like migration. Migration threatens family links, security and
attachment bonds. Rising migratory trends have prompted an
increased interest in migration consequences on familial bonds,
developmental autonomy, socialization process, and sense of
security. This paper takes a narrative approach and applies the
attachment paradigm from a lifespan perspective, to examine the
settlement experiences of an India-born migrant student in Sydney,
Australia. It focuses on her quest to preserve family ties; her remote
secure base; her continual struggle to balance dependency and
autonomy, a major developmental milestone. As positional parental
power is culturally more potent in the Indian society, the paper
therefore raises some important concerns related to cultural
expectations, adaptation, acculturative stress and sense of security.
Abstract: Plant tissue culture is an important in vitro technology applied for agricultural and industrial production. A sterile condition of culture medium is one of the main aspects. The alternative technique for medium sterilization to replace autoclaving was carried out. For sterilization of plant tissue culture medium without autoclaving, ten commercial pure essential oils and 5 disinfectants were tested. Each essential oil or disinfectant was added to a 20-mL Murashige and Skoog (MS) medium before medium was solidified in a 120-mL container, kept for 2 weeks before evaluating sterile conditions. Treated media, supplemented with essential oils or disinfectants, were compared to control medium, autoclaved at 121 degree Celsius for 15 min. Sterile conditions of MS medium were found 100% from betel oil or clove oil (18 mL/20 mL medium), cinnamon oil (36 mL/20 mL medium), lavender oil or holy basil oil (108 mL/20 mL medium), and lemon oil or tea tree oil or turmeric oil (252 mL/20 mL medium), compared to 100% sterile condition from autoclaved medium. For disinfectants, 2% iodine + 2.4% potassium iodide, 2% merbromine solution, 10% povidone-iodine, 6% sodium hypochlorite or 0.1% thimerosal at 36 mL/20 mL medium provided 100% sterile conditions. Furthermore, growth of new shoots from chrysanthemum node explants on treated media (fresh weight, shoot length, root length and number of node) were also reported and discussed in the comparison of those on autoclaved medium.
Abstract: In recent years, an increased competition and lower profit margins have necessitated a focus on improving the performance of the product development process, an area that traditionally have been excluded from detailed steering and evaluation. A systematic improvement requires a good understanding of the current performance, wherefore the interest for product development performance measurement has increased dramatically. This paper presents a case study that evaluates the performance of the product development performance measurement system used in a Swedish company that is a part of a global corporate group. The study is based on internal documentation and eighteen in-depth interviews with stakeholders involved in the product development process. The results from the case study includes a description of what metrics that are in use, how these are employed, and its affect on the quality of the performance measurement system. Especially, the importance of having a well-defined process proved to have a major impact on the quality of the performance measurement system in this particular case.
Abstract: Mobiles are considered to be the most frequently used
electronic items in world after electricity. It is probably the only
device that can be used by any gender with no age limits depending
on its functionality. This paper present the interactive interface of
Mobile and particularly aiming the use of advanced phones which are
also called smart phones. With the changes in the trend where users
are now moving from ordinary mobiles to the one with touch screens
and facilities such as WiFi and internet browsing.
Abstract: Competing risks survival data that comprises of more
than one type of event has been used in many applications, and one
of these is in clinical study (e.g. in breast cancer study). The
decision tree method can be extended to competing risks survival
data by modifying the split function so as to accommodate two or
more risks which might be dependent on each other. Recently,
researchers have constructed some decision trees for recurrent
survival time data using frailty and marginal modelling. We further
extended the method for the case of competing risks. In this paper,
we developed the decision tree method for competing risks survival
time data based on proportional hazards for subdistribution of
competing risks. In particular, we grow a tree by using deviance
statistic. The application of breast cancer data is presented. Finally,
to investigate the performance of the proposed method, simulation
studies on identification of true group of observations were executed.
Abstract: This paper describes a paradigmatic approach to develop architecture of secure systems by describing the requirements from four different points of view: that of the owner, the administrator, the user, and the network. Deriving requirements and developing architecture implies the joint elicitation and describing the problem and the structure of the solution. The view points proposed in this paper are those we consider as requirements towards their contributions as major parties in the design, implementation, usage and maintenance of secure systems. The dramatic growth of the technology of Internet and the applications deployed in World Wide Web have lead to the situation where the security has become a very important concern in the development of secure systems. Many security approaches are currently being used in organizations. In spite of the widespread use of many different security solutions, the security remains a problem. It is argued that the approach that is described in this paper for the development of secure architecture is practical by all means. The models representing these multiple points of view are termed the requirements model (views of owner and administrator) and the operations model (views of user and network). In this paper, this multiple view paradigm is explained by first describing the specific requirements and or characteristics of secure systems (particularly in the domain of networks) and the secure architecture / system development methodology.
Abstract: The river flow forecasting represents a crucial point to employ for improving a management policy addressed to the right use of water resources as well as for conjugating prevention and defense actions against environmental degradation. The difficulties occurring during the field activities encourage the development and implementation of operative computation and measuring methods addressed to time reduction for data acquisition and processing maintaining a good level of accuracy. Therefore, the aim of the present work is to test a new entropy based expeditive methodology for the evaluation of the rating curves on three gauged sections with different geometric and morphological characteristics. The methodology requires the choice of only three verticals along the measure section and the sampling of only the maximum velocity. The results underline how in most conditions the rating curves drawn can replace those built with classic methodologies, simplifying thus the procedures of data monitoring and calculation.
Abstract: A semi-analytic boundary discretization method, the Method of Auxiliary Sources (MAS) is used to analyze Optical Antennas consisting of metallic parts. In addition to standard dipoletype antennas, consisting of two pieces of metal, a new structure consisting of a single metal piece with a tiny groove in the center is analyzed. It is demonstrated that difficult numerical problems are caused because optical antennas exhibit strong material dispersion, loss, and plasmon-polariton effects that require a very accurate numerical simulation. This structure takes advantage of the Channel Plasmon-Polariton (CPP) effect and exhibits a strong enhancement of the electric field in the groove. Also primitive 3D antenna model with spherical nano particles is analyzed.
Abstract: In the forming of ceramic materials the plasticity
concept is commonly used. This term is related to a particular
mechanical behavior when clay is mixed with water. A plastic
ceramic material shows a permanent strain without rupture
when a compressive load produces a shear stress that exceeds
the material-s yield strength. For a plastic ceramic body it
observes a measurable elastic behavior before the yield
strength and when the applied load is removed. In this work, a
mathematical model was developed from applied concepts of
the plasticity theory by using the stress/strain diagram under
compression.
Abstract: Recently, Denial of Service(DoS) attacks and Distributed DoS(DDoS) attacks which are stronger form of DoS attacks from plural hosts have become security threats on the Internet. It is important to identify the attack source and to block attack traffic as one of the measures against these attacks. In general, it is difficult to identify them because information about the attack source is falsified. Therefore a method of identifying the attack source by tracing the route of the attack traffic is necessary. A traceback method which uses traffic patterns, using changes in the number of packets over time as criteria for the attack traceback has been proposed. The traceback method using the traffic patterns can trace the attack by matching the shapes of input traffic patterns and the shape of output traffic pattern observed at a network branch point such as a router. The traffic pattern is a shapes of traffic and unfalsifiable information. The proposed trace methods proposed till date cannot obtain enough tracing accuracy, because they directly use traffic patterns which are influenced by non-attack traffics. In this paper, a new traffic pattern matching method using Independent Component Analysis(ICA) is proposed.