Abstract: The lack of any centralized infrastructure in mobile ad
hoc networks (MANET) is one of the greatest security concerns in
the deployment of wireless networks. Thus communication in
MANET functions properly only if the participating nodes cooperate
in routing without any malicious intention. However, some of the
nodes may be malicious in their behavior, by indulging in flooding
attacks on their neighbors. Some others may act malicious by
launching active security attacks like denial of service. This paper
addresses few related works done on trust evaluation and
establishment in ad hoc networks. Related works on flooding attack
prevention are reviewed. A new trust approach based on the extent of
friendship between the nodes is proposed which makes the nodes to
co-operate and prevent flooding attacks in an ad hoc environment.
The performance of the trust algorithm is tested in an ad hoc network
implementing the Ad hoc On-demand Distance Vector (AODV)
protocol.
Abstract: The construction industry is the pillar industry in
China, accounting for about 6% of the gross domestic product. Along
with changes in the external environment of the construction industry
in China, the construction firm faces fierce competition. The paper
aims to investigate the relationship between diversified types of
construction firm and its performance in China. Based on generalist
and specialist strategy in organizational ecology, we think a generalist
organization can be applied to an enterprise with diversified
developments, while specialist groups are extended to professional
enterprises .This study takes advantage of annual financial data of
listed construction firm to empirically verify the relationship between
diversification and corporation performance establishing a regression
equation to econometric analysis. We find that: 1) Specialization can
significantly improve the level of profitability of listed construction
firms, and there is a significant positive relationship with corporate
performance; 2) The level of operating performance of listed
construction enterprises which engage in unrelated diversification is
higher than those with related diversification; 3) The relationship
between state-owned construction firms and corporate performance is
negative. The more the year of foundation is, the higher performance
will be; however, the more the year of being listed, the lower
performance will be.
Abstract: Grid computing provides a virtual framework for
controlled sharing of resources across institutional boundaries.
Recently, trust has been recognised as an important factor for
selection of optimal resources in a grid. We introduce a new method
that provides a quantitative trust value, based on the past interactions
and present environment characteristics. This quantitative trust value
is used to select a suitable resource for a job and eliminates run time
failures arising from incompatible user-resource pairs. The proposed
work will act as a tool to calculate the trust values of the various
components of the grid and there by improves the success rate of the
jobs submitted to the resource on the grid. The access to a resource
not only depend on the identity and behaviour of the resource but
also upon its context of transaction, time of transaction, connectivity
bandwidth, availability of the resource and load on the resource. The
quality of the recommender is also evaluated based on the accuracy
of the feedback provided about a resource. The jobs are submitted for
execution to the selected resource after finding the overall trust value
of the resource. The overall trust value is computed with respect to
the subjective and objective parameters.
Abstract: In this article the investigation about installation heat
recovery steam generation (HRSG) on the exhaust of turbo generators of phases 2&3 at South Pars Gas Complex is presented.
The temperature of exhaust gas is approximately 665 degree centigrade, Installation of heat recovery boiler was simulated in
ThermoFlow 17.0.2 software, based on test operation data and the
equipments site operation conditions in Pars exclusive economical energy area, the affect of installation HRSG package on the available
gas turbine and its operation parameters, ambient temperature, the
exhaust temperatures steam flow rate were investigated. Base on the results recommended HRSG package should have the capacity for 98
ton per hour high pressure steam generation this refinery, by use of
exhaust of three gas turbines for each package in operation condition of each refinery at 30 degree centigrade. Besides saving energy this
project will be an Environment-Friendly project. The Payback Period
is estimated approximately 1.8 year, with considering Clean Development Mechanism.
Abstract: The contact width is important design parameter for
optimizing the design of new metal gasket for asbestos substitution
gasket. The contact width is found have relationship with the helium
leak quantity. In the increasing of axial load value, the helium leak
quantity is decreasing and the contact width is increasing. This study
provides validity method using simulation analysis and the result is
compared to experimental using pressure sensitive paper. The results
denote similar trend data between simulation and experimental result.
Final evaluation is determined by helium leak quantity to check
leakage performance of gasket design. Considering the phenomena of
position change on the convex contact, it can be developed the
optimization of gasket design by increasing contact width.
Abstract: This study focuses on the development of triangular fuzzy numbers, the revising of triangular fuzzy numbers, and the constructing of a HCFN (half-circle fuzzy number) model which can be utilized to perform more plural operations. They are further transformed for trigonometric functions and polar coordinates. From half-circle fuzzy numbers we can conceive cylindrical fuzzy numbers, which work better in algebraic operations. An example of fuzzy control is given in a simulation to show the applicability of the proposed half-circle fuzzy numbers.
Abstract: Magetan area is going to be the object of this research
which is located in East Java, Indonesia. The data were obtained
from 270 civil servants working at the Magetan District government.
The data were analyzed using the Structural Equation Modeling with
Partial Least Square program. The research showed the following
findings: (1) job motivation variable has a positive and significant
effect on organizational citizenship behavior (OCB); (2) work
environment has positive and significant effect on OCB; (3)
leadership variable has positive and significant effect on OCB; (4)
job motivation variable has no significant effect on job satisfaction;
(5) work environment variable has no significant effect on job
satisfaction; (6) leadership variable has no significant effect on job
satisfaction; (7) OCB is positively and significantly associated with
job satisfaction; (8) job satisfaction variable is positively and
significantly correlated with quality of public service at the Magetan
District government.
Abstract: Educational institutions are increasingly exploring the affordances of 3D virtual worlds for instruction and research, but few studies have been done to document current practices and uses of this emerging technology. This observational survey examines the virtual presences of 170 accredited educational institutions found in one such 3D virtual world called Second Life®, created by San- Francisco based Linden Lab®. The study focuses on what educational institutions look like in this virtual environment, the types of spaces educational institutions are creating or simulating, and what types of activities are being conducted.
Abstract: Wimax (Worldwide Interoperability for Microwave Access)
is a promising technology which can offer high speed data,
voice and video service to the customer end, which is presently, dominated
by the cable and digital subscriber line (DSL) technologies.
The performance assessment of Wimax systems is dealt with. The
biggest advantage of Broadband wireless application (BWA) over its
wired competitors is its increased capacity and ease of deployment.
The aims of this paper are to model and simulate the fixed OFDM
IEEE 802.16d physical layer under variant combinations of digital
modulation (BPSK, QPSK, and 16-QAM) over diverse combination
of fading channels (AWGN, SUIs). Stanford University Interim (SUI)
Channel serial was proposed to simulate the fixed broadband wireless
access channel environments where IEEE 802.16d is to be deployed.
It has six channel models that are grouped into three categories
according to three typical different outdoor Terrains, in order to give
a comprehensive effect of fading channels on the overall performance
of the system.
Abstract: The electrochemical coagulation of a kaolin
suspension was investigated at the currents of 0.06, 0.12, 0.22, 0.44,
0.85 A (corresponding to 0.68, 1.36, 2.50, 5.00, 9.66 mA·cm-2,
respectively) for the contact time of 5, 10, 20, 30, and 50 min. The
TSS removal efficiency at currents of 0.06 A, 0.12 A and 0.22 A
increased with the amount of iron generated by the sacrificial anode,
while the removal efficiencies did not increase proportionally with
the amount of iron generated at the currents of 0.44 and 0.85 A,
where electroflotation was clearly observed. Zeta potential
measurement illustrated the presence of the highly positive charged
particles created by sorption of highly charged polymeric metal
hydroxyl species onto the negative surface charged kaolin particles at
both low and high applied currents. The disappearance of the
individual peaks after certain contact times indicated the attraction
between these positive and negative charged particles causing
agglomeration. It was concluded that charge neutralization of the
individual species was not the only mechanism operating in the
electrocoagulation process at any current level, but electrostatic
attraction was likely to co-operate or mainly operate.
Abstract: As far as the latest technological improvements are concerned, digital systems more become popular than the past. Despite this growing demand to the digital systems, content copy and attack against the digital cinema contents becomes a serious problem. To solve the above security problem, we propose “traceable watermarking using Hash functions for digital cinema system. Digital Cinema is a great application for traceable watermarking since it uses watermarking technology during content play as well as content transmission. The watermark is embedded into the randomly selected movie frames using CRC-32 techniques. CRC-32 is a Hash function. Using it, the embedding position is distributed by Hash Function so that any party cannot break off the watermarking or will not be able to change. Finally, our experimental results show that proposed DWT watermarking method using CRC-32 is much better than the convenient watermarking techniques in terms of robustness, image quality and its simple but unbreakable algorithm.
Abstract: This paper proposes a novel methodology for enabling
debugging and tracing of production web applications without
affecting its normal flow and functionality. This method of debugging
enables developers and maintenance engineers to replace a set of
existing resources such as images, server side scripts, cascading
style sheets with another set of resources per web session. The new
resources will only be active in the debug session and other sessions
will not be affected. This methodology will help developers in tracing
defects, especially those that appear only in production environments
and in exploring the behaviour of the system. A realization of the
proposed methodology has been implemented in Java.
Abstract: This paper presents an alternate approach that uses
artificial neural network to simulate the flood level dynamics in a
river basin. The algorithm was developed in a decision support
system environment in order to enable users to process the data. The
decision support system is found to be useful due to its interactive
nature, flexibility in approach and evolving graphical feature and can
be adopted for any similar situation to predict the flood level. The
main data processing includes the gauging station selection, input
generation, lead-time selection/generation, and length of prediction.
This program enables users to process the flood level data, to
train/test the model using various inputs and to visualize results. The
program code consists of a set of files, which can as well be modified
to match other purposes. This program may also serve as a tool for
real-time flood monitoring and process control. The running results
indicate that the decision support system applied to the flood level
seems to have reached encouraging results for the river basin under
examination. The comparison of the model predictions with the
observed data was satisfactory, where the model is able to forecast
the flood level up to 5 hours in advance with reasonable prediction
accuracy. Finally, this program may also serve as a tool for real-time
flood monitoring and process control.
Abstract: This paper presents a procedure for modeling and tuning the parameters of Thyristor Controlled Series Compensation (TCSC) controller in a multi-machine power system to improve transient stability. First a simple transfer function model of TCSC controller for stability improvement is developed and the parameters of the proposed controller are optimally tuned. Genetic algorithm (GA) is employed for the optimization of the parameter-constrained nonlinear optimization problem implemented in a simulation environment. By minimizing an objective function in which the oscillatory rotor angle deviations of the generators are involved, transient stability performance of the system is improved. The proposed TCSC controller is tested on a multi-machine system and the simulation results are presented. The nonlinear simulation results validate the effectiveness of proposed approach for transient stability improvement in a multimachine power system installed with a TCSC. The simulation results also show that the proposed TCSC controller is also effective in damping low frequency oscillations.
Abstract: The common practice of operating S-rotor is in an
open environment; however there are times when the rotor is
installed in a bounded environment and there might be changes in the
performance of the rotor. This paper presents the changes in the
performance of S-rotor when operated in bounded flows. The
investigation was conducted experimentally to compare the
performance of the rotors in bounded environment against open
environment. Three different rotors models were designed, fabricated
and subjected to experimental measurements. All of the three models
were having 600 mm height and 300 mm Diameter. They were tested
in three different flow environments; namely: partially bounded
environment, fully bounded environment and open environment.
Rotors were found to have better starting up capabilities when
operated in bounded environment. Apart from that, all rotors manage
to achieve higher Power and Torque Coefficients at a higher Tip
Speed Ratio as compared to the open environment.
Abstract: Developing a nation geared by the principle of
sustainable development has been one of the piers in moulding a
greater nation for Malaysia since its independence. This is seen by
the act of joining the United Nations in 1957, just a month after
gaining their independence. The United Nations is an international
organization that aims to unite the nations worldwide based on
justice, human dignity and human well-being. Malaysia has
established a local body called the United Nations Malaysia which
collaborates with the government to accomplish the aim of
supporting sustainable development in Malaysia. Agenda 21 is an
international document produced from the Earth Summit providing
guidelines of implementing sustainable development globally,
nationally and locally. Initiatives of applying Agenda 21 in Malaysia
have been taken by the government and non-profit organizations to
expose issues regarding sustainable development and providing
environmental education to the community to increase awareness
towards environmental protection.
Abstract: The increase on the demand of IT resources diverts
the enterprises to use the cloud as a cheap and scalable solution.
Cloud computing promises achieved by using the virtual machine as a
basic unite of computation. However, the virtual machine pre-defined
settings might be not enough to handle jobs QoS requirements. This
paper addresses the problem of mapping jobs have critical start
deadlines to virtual machines that have predefined specifications.
These virtual machines hosted by physical machines and shared a
fixed amount of bandwidth. This paper proposed an algorithm that
uses the idle virtual machines bandwidth to increase the quote of other
virtual machines nominated as executors to urgent jobs. An algorithm
with empirical study have been given to evaluate the impact of the
proposed model on impatient jobs. The results show the importance
of dynamic bandwidth allocation in virtualized environment and its
affect on throughput metric.
Abstract: In this paper, a mathematical model for data object replication in ad hoc networks is formulated. The derived model is general, flexible and adaptable to cater for various applications in ad hoc networks. We propose a game theoretical technique in which players (mobile hosts) continuously compete in a non-cooperative environment to improve data accessibility by replicating data objects. The technique incorporates the access frequency from mobile hosts to each data object, the status of the network connectivity, and communication costs. The proposed technique is extensively evaluated against four well-known ad hoc network replica allocation methods. The experimental results reveal that the proposed approach outperforms the four techniques in both the execution time and solution quality
Abstract: Today Environmental Impact Assessment (EIA) is known as one of the most important tools for decision makers in the construction of civil and industrial projects towards sustainable development. In the past, projects were evaluated based on cost and benefit analysis regardless of the physical and biological environmental effects and its socio-economical impacts. According to the Department of Environment (DOE) of Iran's regulations, the construction of hydroelectric dams is an activity that requires an EIA report. In this paper the environmental impact assessment of the Gotvand hydro-electrical dam has been evaluated in the three environment elements, biological, Physical-chemical and cultural units. This dam is one of the largest dams in Iran with a volume of 4500 MCM and is going to be the last dam on the Karoon River in the south of Iran. In this paper the ICOLD (International Commission on Large Dams) technique was employed for the environmental impact assessment of the dam. The research includes all socio economical and environmental effects of the dam during the construction and operation of the hydro electric dam and Environmental management, monitoring and mitigation of negative impacts were analyzed. In this project the results led to using some techniques to protect the destructive impacts on biological aspects beside the effective long time period impacts on the biological aspects. The impacts on physical aspects are temporary and negative commonly that could be restored and rehabilitated in natural process in the long time in operation period.
Abstract: In this paper, we are going to determine the threshold levels of adaptive modulation in a burst by burst CDMA system by a suboptimum method so that the above method attempts to increase the average bit per symbol (BPS) rate of transceiver system by switching between the different modulation modes in variable channel condition. In this method, we choose the minimum values of average bit error rate (BER) and maximum values of average BPS on different values of average channel signal to noise ratio (SNR) and then calculate the relative threshold levels of them, so that when the instantaneous SNR increases, a higher order modulation be employed for increasing throughput and vise-versa when the instantaneous SNR decreases, a lower order modulation be employed for improvement of BER. In transmission step, by this adaptive modulation method, in according to comparison between obtained estimation of pilot symbols and a set of above suboptimum threshold levels, above system chooses one of states no transmission, BPSK, 4QAM and square 16QAM for modulation of data. The expected channel in this paper is a slow Rayleigh fading.