Abstract: In this paper, a design methodology to implement low-power and high-speed 2nd order recursive digital Infinite Impulse Response (IIR) filter has been proposed. Since IIR filters suffer from a large number of constant multiplications, the proposed method replaces the constant multiplications by using addition/subtraction and shift operations. The proposed new 6T adder cell is used as the Carry-Save Adder (CSA) to implement addition/subtraction operations in the design of recursive section IIR filter to reduce the propagation delay. Furthermore, high-level algorithms designed for the optimization of the number of CSA blocks are used to reduce the complexity of the IIR filter. The DSCH3 tool is used to generate the schematic of the proposed 6T CSA based shift-adds architecture design and it is analyzed by using Microwind CAD tool to synthesize low-complexity and high-speed IIR filters. The proposed design outperforms in terms of power, propagation delay, area and throughput when compared with MUX-12T, MCIT-7T based CSA adder filter design. It is observed from the experimental results that the proposed 6T based design method can find better IIR filter designs in terms of power and delay than those obtained by using efficient general multipliers.
Abstract: Sesame is one of the oldest and most important oil
crops as main crop and second crop agriculture. This study was
carried out to determine the effects of different inter- and intra-row
spacings on the yield and yield components on second crop sesame;
was set up in Antalya West Mediterranean Agricultural Research
Institue in 2009. Muganlı 57 sesame cultivar was used as plant
material. The field experiment was set up in a split plot design and
row spacings (30, 40, 50, 60 and 70 cm) were assigned to the main
plots and and intra-row spacings (5, 10, 20 and 30 cm) were assigned
to the subplots. Seed yield, oil ratio, oil yield, protein ratio and
protein yield were investigated. In general, wided inter row spacings
and intra-row spacings, resulted in decreased seed yield, oil yield and
protein yield. The highest seed yield, oil yield and protein yield
(respectively, 1115.0 kg ha-1, 551.3 kg ha-1, 224.7 kg ha-1) were
obtained from 30x5 cm plant density while the lowest seed yield, oil
yield and protein yield (respectively, 677.0 kg ha-1, 327.0 kg ha-1,
130.0 kg ha-1) were recorded from 70x30 cm plant density. As a
result, in terms of oil yield for second crop sesame agriculture, 30 cm
row spacing, and 5 cm intra row spacing are the most suitable plant
densities.
Abstract: Protein structure determination and prediction has
been a focal research subject in the field of bioinformatics due to the
importance of protein structure in understanding the biological and
chemical activities of organisms. The experimental methods used by
biotechnologists to determine the structures of proteins demand
sophisticated equipment and time. A host of computational methods
are developed to predict the location of secondary structure elements
in proteins for complementing or creating insights into experimental
results. However, prediction accuracies of these methods rarely
exceed 70%.
Abstract: This research focuses on the effect of weight
percentage variation and size variation of MgFeSi added,
gating system design and reaction chamber design on inmold
process. By using inmold process, well-known problem of
fading is avoided because the liquid iron reacts with
magnesium in the mold and not, as usual, in the ladle. During
the pouring operation, liquid metal passes through the
chamber containing the magnesium, where the reaction of the
metal with magnesium proceeds in the absence of atmospheric
oxygen [1].In this paper, the results of microstructural
characteristic of ductile iron on this parameters are mentioned.
The mechanisms of the inmold process are also described [2].
The data obtained from this research will assist in producing
the vehicle parts and other machinery parts for different
industrial zones and government industries and in transferring
the technology to all industrial zones in Myanmar. Therefore,
the inmold technology offers many advantages over traditional
treatment methods both from a technical and environmental,
as well as an economical point of view. The main objective of
this research is to produce ductile iron castings in all industrial
sectors in Myanmar more easily with lower costs. It will also
assist the sharing of knowledge and experience related to the
ductile iron production.
Abstract: Aldehydes as secondary lipid oxidation products are highly specific to the oxidative degradation of particular polyunsaturated fatty acids present in foods. Gas chromatographic analysis of those volatile compounds has been widely used for monitoring of the deterioration of food products. Developed static headspace gas chromatography method using flame ionization detector (SHS GC FID) was applied to monitor the aldehydes present in processed foods such as bakery, meat and confectionary products.
Five selected aldehydes were determined in samples without any sample preparation, except grinding for bakery and meat products. SHS–GC analysis allows the separation of propanal, pentanal, hexanal, heptanal and octanal, within 15min. Aldehydes were quantified in fresh and stored samples, and the obtained range of aldehydes in crackers was 1.62±0.05 – 9.95±0.05mg/kg, in sausages 6.62±0.46 – 39.16±0.39mg/kg; and in cocoa spread cream 0.48±0.01 – 1.13±0.02mg/kg. Referring to the obtained results, the following can be concluded, proposed method is suitable for different types of samples, content of aldehydes varies depending on the type of a sample, and differs in fresh and stored samples of the same type.
Abstract: Nowadays, we are facing with network threats that
cause enormous damage to the Internet community day by day. In
this situation, more and more people try to prevent their network
security using some traditional mechanisms including firewall,
Intrusion Detection System, etc. Among them honeypot is a versatile
tool for a security practitioner, of course, they are tools that are meant
to be attacked or interacted with to more information about attackers,
their motives and tools. In this paper, we will describe usefulness of
low-interaction honeypot and high-interaction honeypot and
comparison between them. And then we propose hybrid honeypot
architecture that combines low and high -interaction honeypot to
mitigate the drawback. In this architecture, low-interaction honeypot
is used as a traffic filter. Activities like port scanning can be
effectively detected by low-interaction honeypot and stop there.
Traffic that cannot be handled by low-interaction honeypot is handed
over to high-interaction honeypot. In this case, low-interaction
honeypot is used as proxy whereas high-interaction honeypot offers
the optimal level realism. To prevent the high-interaction honeypot
from infections, containment environment (VMware) is used.
Abstract: Today many developers use the Java components
collected from the Internet as external LIBs to design and
develop their own software. However, some unknown security
bugs may exist in these components, such as SQL injection bug
may comes from the components which have no specific check
for the input string by users. To check these bugs out is very
difficult without source code. So a novel method to check the
bugs in Java bytecode based on points-to dataflow analysis is in
need, which is different to the common analysis techniques base
on the vulnerability pattern check. It can be used as an assistant
tool for security analysis of Java bytecode from unknown
softwares which will be used as extern LIBs.
Abstract: Soft topological spaces are considered as mathematical tools for dealing with uncertainties, and a fuzzy topological space is a special case of the soft topological space. The purpose of this paper is to study soft topological spaces. We introduce some new concepts in soft topological spaces such as soft first-countable spaces, soft second-countable spaces and soft separable spaces, and some basic properties of these concepts are explored.
Abstract: The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital-electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent levels of trust and security served in conventional paper-based payment transactions. The paper addresses the challenge of the first trade problem in e-commerce, provides a brief literature review on electronic payment and attempts to explain the underlying concept and method of trust in relevance to electronic payment.
Abstract: Nylon 6-clay hybrid/neat nylon 6, sheath/core
bicomponent nanocomposite fibers containing 4 wt% of clay in
sheath section were melt spun at different take-up speeds. Their
orientation and crystalline structure were compared to those of neat
nylon 6 fibers. Birefringence measurements showed that the
orientation development in sheath and core parts of bicomponent
fibers was different. Crystallinity results showed that clay did not act
as a nucleating agent for bicomponent fibers. The neat nylon 6 fiber
had a smooth surface while striped pattern was appeared on the
surface of bicomponent fiber containing clay due to thermal
shrinkage of the core part.
Abstract: The aim of this research is to develop a fast and
reliable surveillance system based on a personal digital assistant
(PDA) device. This is to extend the capability of the device to detect
moving objects which is already available in personal computers.
Secondly, to compare the performance between Background
subtraction (BS) and Temporal Frame Differencing (TFD) techniques
for PDA platform as to which is more suitable. In order to reduce
noise and to prepare frames for the moving object detection part,
each frame is first converted to a gray-scale representation and then
smoothed using a Gaussian low pass filter. Two moving object
detection schemes i.e., BS and TFD have been analyzed. The
background frame is updated by using Infinite Impulse Response
(IIR) filter so that the background frame is adapted to the varying
illuminate conditions and geometry settings. In order to reduce the
effect of noise pixels resulting from frame differencing
morphological filters erosion and dilation are applied. In this
research, it has been found that TFD technique is more suitable for
motion detection purpose than the BS in term of speed. On average
TFD is approximately 170 ms faster than the BS technique
Abstract: In 2011, Debiao et al. pointed out that S-3PAKE protocol proposed by Lu and Cao for password-authenticated key exchange in the three-party setting is vulnerable to an off-line dictionary attack. Then, they proposed some countermeasures to eliminate the security vulnerability of the S-3PAKE. Nevertheless, this paper points out their enhanced S-3PAKE protocol is still vulnerable to undetectable on-line dictionary attacks unlike their claim.
Abstract: Building life cycle will never be excused from the existence of defects and deterioration. They are common problems in building, existed in newly build or in aged building. Buildings constructed from wood are indeed affected by its agent and serious defects and damages can reduce values to a building. In repair works, it is important to identify the causes and repair techniques that best suites with the condition. This paper reviews the conservation of traditional timber mosque in Malaysia comprises the concept, principles and approaches of mosque conservation in general. As in conservation practice, wood in historic building can be conserved by using various restoration and conservation techniques which this can be grouped as Fully and Partial Replacement, Mechanical Reinforcement, Consolidation by Impregnation and Reinforcement, Removing Paint and also Preservation of Wood and Control Insect Invasion, as to prolong and extended the function of a timber in a building. It resulted that the common techniques adopted in timber mosque conservation are from the conventional ways and the understanding of the repair technique requires the use of only preserve wood to prevent the future immature defects.
Abstract: Building maintenance plays an important role among other activities in building operation. Building defect and damages are part of the building maintenance 'bread and butter' as their input indicated in the building inspection is very much justified, particularly as to determine the building performance. There will be no escape route or short cut from building maintenance work. This study attempts to identify a competitive performance that translates the Critical Success Factor achievements and satisfactorily meet the university-s expectation. The quality and efficiency of maintenance management operation of building depends, to some extent, on the building condition information, the expectation from the university sector and the works carried out for each maintenance activity. This paper reviews the critical success factor in building maintenance management practice for university sectors from four (4) perspectives which include (1) customer (2) internal processes (3) financial and (4) learning and growth perspective. The enhancement of these perspectives is capable to reach the maintenance management goal for a better living environment in university campus.
Abstract: Traditional wind tunnel models are meticulously machined from metal in a process that can take several months. While very precise, the manufacturing process is too slow to assess a new design's feasibility quickly. Rapid prototyping technology makes this concurrent study of air vehicle concepts via computer simulation and in the wind tunnel possible. This paper described the Affects layer thickness models product with rapid prototyping on Aerodynamic Coefficients for Constructed wind tunnel testing models. Three models were evaluated. The first model was a 0.05mm layer thickness and Horizontal plane 0.1μm (Ra) second model was a 0.125mm layer thickness and Horizontal plane 0.22μm (Ra) third model was a 0.15mm layer thickness and Horizontal plane 4.6μm (Ra). These models were fabricated from somos 18420 by a stereolithography (SLA). A wing-body-tail configuration was chosen for the actual study. Testing covered the Mach range of Mach 0.3 to Mach 0.9 at an angle-of-attack range of -2° to +12° at zero sideslip. Coefficients of normal force, axial force, pitching moment, and lift over drag are shown at each of these Mach numbers. Results from this study show that layer thickness does have an effect on the aerodynamic characteristics in general; the data differ between the three models by fewer than 5%. The layer thickness does have more effect on the aerodynamic characteristics when Mach number is decreased and had most effect on the aerodynamic characteristics of axial force and its derivative coefficients.
Abstract: This paper studies the optimum design for reducing
optical loss of an 8x8 mechanical type optical switch due to the
temperature change. The 8x8 optical switch is composed of a base, 8
input fibers, 8 output fibers, 3 fixed mirrors and 17 movable mirrors.
First, an innovative switch configuration is proposed with
thermal-compensated design. Most mechanical type optical switches
have a disadvantage that their precision and accuracy are influenced
by the ambient temperature. Therefore, the thermal-compensated
design is to deal with this situation by using materials with different
thermal expansion coefficients (α). Second, a parametric modeling
program is developed to generate solid models for finite element
analysis, and the thermal and structural behaviors of the switch are
analyzed. Finally, an integrated optimum design program, combining
Autodesk Inventor Professional software, finite element analysis
software, and genetic algorithms, is developed for improving the
thermal behaviors that the optical loss of the switch is reduced. By
changing design parameters of the switch in the integrated design
program, the final optimum design that satisfies the design constraints
and specifications can be found.
Abstract: Today the intangible assets are the capital of knowledge and are the most important and the most valuable resource for organizations. All employees have knowledge independently of the kind of jobs they do. Knowledge is thus an asset, which influences business operations. The objective of this article is to identify knowledge continuity as an objective of business continuity management. The article has been prepared based on the analysis of secondary sources and the evaluation of primary sources of data by means of a quantitative survey conducted in the Czech Republic. The conclusion of the article is that organizations that apply business continuity management do not focus on the preservation of the knowledge of key employees. Organizations ensure knowledge continuity only intuitively, on a random basis, non-systematically and discontinuously. The non-ensuring of knowledge continuity represents a threat of loss of key knowledge for organizations and can also negatively affect business continuity.
Abstract: In this paper we have suggested a new system for egovernment.
In this method a government can design a precise and
perfect system to control people and organizations by using five
major documents. These documents contain the important
information of each member of a society and help all organizations to
do their informatics tasks through them. This information would be
available by only a national code and a secure program would
support it. The suggested system can give a good awareness to the
society and help it be managed correctly.
Abstract: The purpose of this paper is to guide the effort in
improving the economic added value of Indonesian fisheries product
through post fishing program, which is cold storage program.
Indonesia's fisheries potential has been acknowledged by the world.
FAO (2009) stated that Indonesia is one of the tenth highest
producers of fishery products in the world. Based on BPS (Statistics
Indonesia data), the national fisheries production in 2011 reached
5.714 million tons, which 93.55% came from marine fisheries and
6.45% from open waters. Indonesian territory consist of 2/3 of
Indonesian waters, has given enormous benefits for Indonesia,
especially fishermen. To improve the economic level of fishermen
requires efforts to develop fisheries business unit. On of the efforts is
by improving the quality of products which are marketed in the
regional and international levels. It is certainly need the support of
the existence of various fishery facilities (infrastructure to
superstructure), one of which is cold storage. Given the many
benefits of cold storage as a means of processing of fishery resources,
Indonesia Maritime Security Coordinating Board (IMSCB) as one of
the maritime institutions for maritime security and safety, has a
program to empower the coastal community through encourages the
development of cold storage in the middle and lower fishery business
unit. The development of cold storage facilities which able to run its
maximum role requires synergistic efforts of various parties.
Abstract: Wireless sensor networks (WSN) consists of many
sensor nodes that are placed on unattended environments such as
military sites in order to collect important information.
Implementing a secure protocol that can prevent forwarding forged
data and modifying content of aggregated data and has low delay
and overhead of communication, computing and storage is very
important. This paper presents a new protocol for concealed data
aggregation (CDA). In this protocol, the network is divided to
virtual cells, nodes within each cell produce a shared key to send
and receive of concealed data with each other. Considering to data
aggregation in each cell is locally and implementing a secure
authentication mechanism, data aggregation delay is very low and
producing false data in the network by malicious nodes is not
possible. To evaluate the performance of our proposed protocol, we
have presented computational models that show the performance
and low overhead in our protocol.