Abstract: Higher capacities of power plants together with
increased awareness on environmental considerations have led to
taller height of stacks. It is seen that strong wind can result in falling
of stacks. So, aerodynamic consideration of stacks is very important
in order to save the falling of stacks. One stack is not enough in
industries and power sectors and two or three stacks are required for
proper operation of the unit. It is very important to arrange the stacks
in proper way to resist their downfall. The present experimental
study concentrates on the mutual effect of three nearby stacks on
each other at three different arrangements, viz. linear, side-by-side
and triangular. The experiments find out the directions of resultant
forces acting on the stacks in different configurations so that proper
arrangement of supports can be made with respect to the wind
directionality obtained from local meteorological data. One can also
easily ascertain which stack is more vulnerable to wind in
comparison to the others for a particular configuration. Thus, this
study is important in studying the effect of wind force on three stacks
in different arrangements and is very helpful in placing the supports
in proper places in order to avoid failing of stack-like structures due
to wind.
Abstract: This paper presents a novel approach for the design of
microwave circuits using Adaptive Network Fuzzy Inference
Optimizer (ANFIO). The method takes advantage of direct synthesis
of subsections of the amplifier using very fast and accurate ANFIO
models based on exact simulations using ADS. A mapping from
course space to fine space known as space mapping is also used. The
proposed synthesis approach takes into account the noise and
scattering parameters due to parasitic elements to achieve optimal
results. The overall ANFIO system is capable of designing different
LNAs at different noise and scattering criteria. This approach offers
significantly reduced time in the design of microwave amplifiers
within the validity range of the ANFIO system. The method has been
proven to work efficiently for a 2.4GHz LNA example. The S21 of
10.1 dB and noise figure (NF) of 2.7 dB achieved for ANFIO while
S21 of 9.05 dB and NF of 2.6 dB achieved for ANN.
Abstract: The ability of pomelo peel, a natural biosorbent, to remove Cd(II) ions from aqueous solution by biosorption was investigated. The experiments were carried out by batch method at 25 °C. The influence of solution pH, initial cadmium ion concentrations and contact times were evaluated. Cadmium ion removal increased significantly as the pH of the solution increased from pH 1 to pH 5. At pH 5, the cadmium ion removal reached a maximum value. The equilibrium process was described well by the Langmuir isotherm model, with a maximum biosorption capacity of 21.83 mg/g. The biosorption was relatively quick, (approx. 20 min). Biosorption kinetics followed a pseudo-second-order model. The result showed that pomelo peel was effective as a biosorbent for removing cadmium ions from aqueous solution. It is a low cost material that shows potential to be applied in wastewater technology for remediation of heavy metal contamination.
Abstract: Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.
Abstract: In this paper we present a novel error model for
packet loss and subsequent error description. The proposed model
simulates the error performance of wireless communication link. The
model is designed as two independent Markov chains, where the first
one is used for packet generation and the second one generates
correctly and incorrectly transmitted bits for received packets from
the first chain. The statistical analyses of real communication on the
wireless link are used for determination of model-s parameters. Using
the obtained parameters and the implementation of the generator, we
collected generated traffic. The obtained results generated by
proposed model are compared with the real data collection.
Abstract: In view of growing competition in the service sector,
services are as much in need of modeling, analysis and improvement
as business or working processes. Graphical process models are
important means to capture process-related know-how for an
effective management of the service process. In this contribution, a
human performance analysis of process model development paying
special attention to model development time and the working method
was conducted. It was found that modelers with higher application
experience need significantly less time for mental activities than
modelers with lower application experience, spend more time on
labeling graphical elements, and achieved higher process model
quality in terms of activity label quality.
Abstract: This study investigates the investors- behavioral
reaction to the investment rating change announcements from the
views of behavioral finance. The empirical results indicate that
self-interest does affect the intention of securities firms to release
investment ratings for individual stocks. In addition, behavioral
pitfalls are also found in the response of retail investors to investment
rating change announcements.
Abstract: Our goal is to effectively increase the number of boats in the river during a six month period. The main factors of determining the number of boats are duration and “select the priority trip". In the microcosmic simulation model, the best result is 4 to 24 nights with DSCF, and the number of boats is 812 with an increasing ratio of 9.0% related to the second best result. However, the number of boats is related to 31.6% less than the best one in 6 to 18 nights with FCFS. In the discrete duration model, we get from 6 to 18 nights, the numbers of boats have increased to 848 with an increase ratio of 29.7% than the best result in model I for the same time range. Moreover, from 4 to 24 nights, the numbers of boats have increase to 1194 with an increase ratio of 47.0% than the best result in model I for the same time range.
Abstract: In this paper we consider a nonlinear feedback
control called augmented automatic choosing control (AACC)
using the automatic choosing functions of gradient optimization
type for nonlinear systems. Constant terms which arise from sectionwise
linearization of a given nonlinear system are treated as
coefficients of a stable zero dynamics. Parameters included in the
control are suboptimally selected by minimizing the Hamiltonian
with the aid of the genetic algorithm. This approach is applied to
a field excitation control problem of power system to demonstrate
the splendidness of the AACC. Simulation results show that the
new controller can improve performance remarkably well.
Abstract: Quality of school meals is one of the major concerns of governments and international organizations worldwide. This study aims to evaluate nutritional compliance of meals served at a Portuguese primary school considering the portions stated by Portuguese Education Ministry. To evaluate adequacy of portions served, weighing of all meal components offered to students and leftovers was performed during ten consecutive days at two different moments. Plate waste (%) was calculated by the ratio of food discarded and food served to the children. Nutritional evaluation of menus was made using the Portuguese Food Composition Table. Meals evaluated showed a percent contribution to energetic daily intake higher than recommendations. Meals served to children were considered high energy and protein dense. No significant waste of soup was accounted and the main meal components wasted were fish and vegetables. It will be necessary to adjust portions indicated by Ministry of Education in order to comply with recommendations and reduce food waste.
Abstract: The most common forensic activity is searching a hard
disk for string of data. Nowadays, investigators and analysts are
increasingly experiencing large, even terabyte sized data sets when
conducting digital investigations. Therefore consecutive searching can
take weeks to complete successfully. There are two primary search
methods: index-based search and bitwise search. Index-based
searching is very fast after the initial indexing but initial indexing
takes a long time. In this paper, we discuss a high speed bitwise search
model for large-scale digital forensic investigations. We used pattern
matching board, which is generally used for network security, to
search for string and complex regular expressions. Our results indicate
that in many cases, the use of pattern matching board can substantially
increase the performance of digital forensic search tools.
Abstract: This article discusses the problem of estimating the
orientation of inclined ground on which a human subject stands based
on information provided by the vestibular system consisting of the
otolith and semicircular canals. It is assumed that body segments are
not necessarily aligned and thus forming an open kinematic chain.
The semicircular canals analogues to a technical gyrometer provide a
measure of the angular velocity whereas the otolith analogues to a
technical accelerometer provide a measure of the translational
acceleration. Two solutions are proposed and discussed. The first is
based on a stand-alone Kalman filter that optimally fuses the two
measurements based on their dynamic characteristics and their noise
properties. In this case, no body dynamic model is needed. In the
second solution, a central extended disturbance observer that
incorporates a body dynamic model (internal model) is employed.
The merits of both solutions are discussed and demonstrated by
experimental and simulation results.
Abstract: In this study, a novel approach of image embedding is introduced. The proposed method consists of three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six bits represent the original image with very little difference in contrast. The proposed method embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images. Image embedding method is considered to be one of the good compression methods, in terms of reserving memory space. Moreover, information hiding within digital image can be used for security information transfer. The creation and extraction of three embedded images, and hiding text information is discussed and illustrated, in the following sections.
Abstract: A simple network model is developed in OPNET to
study the performance of the Wi-Fi protocol. The model is simulated
in OPNET and performance factors such as load, throughput and delay
are analysed from the model. Four applications such as oracle, http, ftp
and voice are applied over the Wireless LAN network to determine the
throughput. The voice application utilises a considerable amount of
bandwidth of up to 5Mbps, as a result the 802.11g standard of the
Wi-Fi protocol was chosen which can support a data rate of up to
54Mbps. Results indicate that when the load in the Wi-Fi network is
increased the queuing delay on the point-to-point links in the Wi-Fi
network significantly reduces until it is comparable to that of WiMAX.
In conclusion, the queuing delay of the Wi-Fi protocol for the network
model simulated was about 0.00001secs comparable to WiMAX
network values.
Abstract: Innovations and innovative activity get the increasing
value for successful financial and economic activity of the countries
and regions. The level of innovative sphere development determines
place of a country or a region in world economy and forms a basis of
steady economic growth. This article is devoted to different aspects
of organization of the national economic safety in the conditions of
innovative development, its problems, risks and threats. Economy
can be considered as aspiring for transition to innovative way only
with finding of economic safety: financial independence, power
stability and technological progress. There are statistical indicators,
defining the level of economic security and factors, threatening
economic safety of the state. The research is based on the analysis of
factors and indicators in conditions of innovative development. The
paper is illustrated by the examples of possible estimated system of
the economic safety level.
Abstract: This paper contributes to our knowledge about buyerseller
relations by identifying barriers and conflict situations
associated with maintaining and developing durable business
relationships by small companies. The contribution of prior studies
with regard to negative aspects of marketing relationships is
presented in the first section. The international research results are
discussed with regard to the existing conceptualizations and main
research implications identified at the end.
Abstract: This paper presents the hardware design of a unified
architecture to compute the 4x4, 8x8 and 16x16 efficient twodimensional
(2-D) transform for the HEVC standard. This
architecture is based on fast integer transform algorithms. It is
designed only with adders and shifts in order to reduce the hardware
cost significantly. The goal is to ensure the maximum circuit reuse
during the computing while saving 40% for the number of operations.
The architecture is developed using FIFOs to compute the second
dimension. The proposed hardware was implemented in VHDL. The
VHDL RTL code works at 240 MHZ in an Altera Stratix III FPGA.
The number of cycles in this architecture varies from 33 in 4-point-
2D-DCT to 172 when the 16-point-2D-DCT is computed. Results
show frequency improvements reaching 96% when compared to an
architecture described as the direct transcription of the algorithm.
Abstract: Inflammatory bowel disease (IBD) is a chronic
relapsing-remitting condition that afflicts millions of people
throughout the world and impairs their daily functions and quality of
life. Treatment of IBD depends largely on 5-aminosalicylic acid (5-
ASA) and corticosteroids. The present study aimed to clarify the
effects of 5-aminosalicylic acid, budesonide and currcumin on 90
male albino rats against trinitrobenzene sulfonic acid (TNB) induced
colitis. TNB was injected intrarectally to 50 rats. The other 40 rats
served as control groups. Both 5-ASA (in a dose of 120 mg/kg) and
budesonide (in a dose of 0.1 mg/kg) were administered daily for one
week whereas currcumin was injected intraperitonially (in a dose of
30 mg/kg daily) for 14 days after injection of either TNB in the
colitis rats (group B) or saline in control groups (group A). The study
included estimation of macroscopic score index, histological
examination of H&E stained sections of the colonic tissue,
biochemical estimation of myeloperoxidase (MPO), nitric oxide
(NO), and caspase-3 levels, in addition to studying the effect of tested
drugs on colonic motility. It was found that budesonide and curcumin
improved mucosal healing, reduced both NO production and caspase-
3 level. They had the best impact on the disturbed colonic motility in
TNBS-model of colitis.
Abstract: Quantum cryptography offers a way of key agreement,
which is unbreakable by any external adversary. Authentication is
of crucial importance, as perfect secrecy is worthless if the identity
of the addressee cannot be ensured before sending important information.
Message authentication has been studied thoroughly, but no
approach seems to be able to explicitly counter meet-in-the-middle
impersonation attacks. The goal of this paper is the development of
an authentication scheme being resistant against active adversaries
controlling the communication channel. The scheme is built on top
of a key-establishment protocol and is unconditionally secure if built
upon quantum cryptographic key exchange. In general, the security
is the same as for the key-agreement protocol lying underneath.
Abstract: The aim of the study is to investigate a number of characteristics of Corporate Social Responsibility (CSR) indicators that should be adopted by CSR assessment methodologies. For the purpose of this paper, a survey among the Greek companies that belong to FTSE 20 in Athens Exchange (FTSE/Athex-20) has been conducted, as these companies are expected to pioneer in the field of CSR. The results show consensus as regards the characteristics of indicators such as the need for the adoption of general and specific sector indicators, financial and non-financial indicators, the origin and the weight rate. However, the results are contradictory concerning the appropriate number of indicators for the assessment of CSR and the unit of measurement. Finally, the company-s sector is a more important dimension of CSR than the size and the country where the company operates. The purpose of this paper is to standardize the main characteristics of CSR indicators.