Abstract: Antioxidants contribute to endogenous photoprotection
and are important for the maintenance of skin health. The study was carried out to compare the skin hydration and transepidermal
water loss (TEWL) effects of a stable cosmetic preparation
containing flavonoids, following two applications a day over a period
of tenth week. The skin trans-epidermal water loss and skin hydration
effect was measured at the beginning and up to the end of study period of ten weeks. Any effect produced was measured by Corneometer and TEWA meter (Non-invasive probe).
Two formulations were developed for this study design. Formulation one the control formulation in which no apple juice
extract( Flavonoids) was incorporated while second one was the active formulation in which the apple juice extract (3%) containing
flavonoids was incorporated into water in oil emulsion using Abil EM 90 as an emulsifier. Stable formulations (control and Active)
were applied on human cheeks (n = 12) for a study period of 10 weeks. Result of each volunteer of skin hydration and TEWL was
measured by corneometer and TEWA meter. By using ANOVA and Paired sample t test as a statistical evaluation, result of both base and
formulation were compared. Statistical significant results (p≤0.05)
were observed regarding skin hydration and TEWL when two creams, control and Formulation were compared. It showed that
desired formulation (Active) may have interesting application as an
active moisturizing cream on healthy skin.
Abstract: Swietenia mahagoni have been used in traditional
medicine for treatment of different diseases. Present study was
performed to evaluate anti-ulcerogenic activity of ethanol seed
extract against ethanol induced gastric mucosal injury in rats. Six
groups of rats were orally pre-treated respectively with
carboxymethyl cellulose, omeprazole 20 mg/kg, 50, 100, 200 and 400
mg/kg plant extract one hour before oral administration of absolute
ethanol to generate gastric mucosal injury. After additional hour, rats
were sacrificed and ulcer areas of gastric walls were determined.
Grossly, carboxymethyl cellulose group exhibited severe mucosal
injury, whereas pre-treatment with plant extract exhibited significant
protection of gastric mucosa. Histology, carboxymethyl cellulose
group exhibited severe damage of gastric mucosa; edema and
leucocytes infiltration of sub mucosa compared to plant extract which
showed gastric protection. Acute toxicity study did not manifest any
toxicological signs in rats. Conclusions, results suggest that S.
mahagoni promotes ulcer protection as ascertained grossly and
histologically.
Abstract: Current proposals for E-passport or ID-Card is similar to a regular passport with the addition of tiny contactless integrated circuit (computer chip) inserted in the back cover, which will act as a secure storage device of the same data visually displayed on the photo page of the passport. In addition, it will include a digital photograph that will enable biometric comparison, through the use of facial recognition technology at international borders. Moreover, the e-passport will have a new interface, incorporating additional antifraud and security features. However, its problems are reliability, security and privacy. Privacy is a serious issue since there is no encryption between the readers and the E-passport. However, security issues such as authentication, data protection and control techniques cannot be embedded in one process. In this paper, design and prototype implementation of an improved E-passport reader is presented. The passport holder is authenticated online by using GSM network. The GSM network is the main interface between identification center and the e-passport reader. The communication data is protected between server and e-passport reader by using AES to encrypt data for protection will transferring through GSM network. Performance measurements indicate a 19% improvement in encryption cycles versus previously reported results.
Abstract: The significance of environmental protection is wellknown in today's world. The execution of any program depends on sufficient knowledge and required familiarity with environment and its pollutants. Taking advantage of a systematic method, as a new science, in environmental planning can solve many problems. In this article, air pollution in Tehran and its relationship with health and population growth have been analyzed using dynamic systems. Firstly, by using casual loops, the relationship between the parameters effective on air pollution in Tehran were taken into consideration, then these casual loops were turned into flow diagrams [6], and finally, they were simulated using the software Vensim [16]in order to conclude what the effect of each parameter will be on air pollution in Tehran in the next 10 years, how changing of one or more parameters influences other parameters, and which parameter among all other parameters requires to be controlled more.
Abstract: In recent years there has been a continuous increase of
axle loads, tonnage, train speed and train length which has increased
both the productivity in the rail sector and the risk of rail breaks and
derailments. On the other hand, the environmental requirements (e.g.
noise reduction) for railway operations will become tighter in the
future. In our research we developed a new composite material which
does not change braking properties, is capable of taking extremely
high pressure loads, reduces noise and is environmentally friendly.
Part of our research was also the development of technology which
will be able to apply this material to the rail. The result of our
research was the system which reduces the wear out significantly and
almost completely eliminates the squealing noise at the same time,
and by using only one special material.
Abstract: RFID system, in which we give identification number to each item and detect it with radio frequency, supports more variable service than barcode system can do. For example, a refrigerator with RFID reader and internet connection will automatically notify expiration of food validity to us. But, in spite of its convenience, RFID system has some security threats, because anybody can get ID information of item easily. One of most critical threats is privacy invasion. Existing privacy protection schemes or systems have been proposed, and these schemes or systems defend normal users from attempts that any attacker tries to get information using RFID tag value. But, these systems still have weakness that attacker can get information using analogous value instead of original tag value. In this paper, we mention this type of attack more precisely and suggest 'Tag Broker Model', which can defend it. Tag broker in this model translates original tag value to random value, and user can only get random value. Attacker can not use analogous tag value, because he/she is not able to know original one from it.
Abstract: The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time secure image processing. In this research, Embedded Zerotree Wavelet (EZW) encoder which specially designs for wavelet compression is examined. With this algorithm, three methods are proposed to reduce the processing time, space and security protection that will be secured enough to protect the data.
Abstract: The international society focuses on the environment
protection and natural energy sources control for the global
cooperation against weather change and sustainable growth. The study
presents the overview of the water shortage status and the necessity of wastewater reuse facility in military facilities and for the possibility of
the introduction, compares the economics by means of cost-benefit
analysis. The military features such as the number of users of military barracks and the water use were surveyed by the design principles by
facility types, the application method of wastewater reuse facility was selected, the feed water, its application and the volume of reuse volume were defined and the expectation was estimated, confirming
the possibility of introducing a wastewater reuse possibility by means of cost-benefit analysis.
Abstract: Wireless sensor network can be applied to both abominable
and military environments. A primary goal in the design of
wireless sensor networks is lifetime maximization, constrained by
the energy capacity of batteries. One well-known method to reduce
energy consumption in such networks is data aggregation. Providing
efcient data aggregation while preserving data privacy is a challenging
problem in wireless sensor networks research. In this paper,
we present privacy-preserving data aggregation scheme for additive
aggregation functions. The Cluster-based Private Data Aggregation
(CPDA)leverages clustering protocol and algebraic properties of
polynomials. It has the advantage of incurring less communication
overhead. The goal of our work is to bridge the gap between
collaborative data collection by wireless sensor networks and data
privacy. We present simulation results of our schemes and compare
their performance to a typical data aggregation scheme TAG, where
no data privacy protection is provided. Results show the efficacy and
efficiency of our schemes.
Abstract: This paper describes a new method of unequal error
protection (UEP) for region of interest (ROI) with embedded zerotree
wavelet algorithm (EZW). ROI technique is important in applications
with different parts of importance. In ROI coding, a chosen ROI is
encoded with higher quality than the background (BG). Unequal
error protection of image is provided by different coding techniques.
In our proposed method, image is divided into two parts (ROI, BG)
that consist of more important bytes (MIB) and less important bytes
(LIB). The experimental results verify effectiveness of the design.
The results of our method demonstrate the comparison of the unequal
error protection (UEP) of image transmission with defined ROI and
the equal error protection (EEP) over multiple noisy channels.
Abstract: The concept of sacred and nature have long been
interlinked. Various cultural aspects such as religion, faith, traditions
bring people closer to nature and the natural environment. Memorial
Parks and Sacred Groves are examples of two such cultural
landscapes that exist today. The project mainly deals with the
significance of such sites to the environment and the deep rooted
significance it has to the people. These parks and groves play an
important role in biodiversity conservation and environmental
protection. There are many differences between the establishment of
memorial parks and sacred groves, but the underlying significance is
the same. Sentiments, emotions play an important role in landscape
planning and management. Hence the people and communities living
at these sites need to be involved in any planning activity or
decisions. The conservation of the environment should appeal to the
sentiments of the people; the need to be 'with nature' should be used
in the setting up of memorial forests and in the preservation of sacred
groves.
Abstract: This paper presents a SCR-based ESD protection devices for I/O clamp and power rail clamp, respectably. These devices have a low trigger voltage and high holding voltage characteristics than conventional SCR device. These devices are fabricated by using 0.35um BCD (Bipolar-CMOS-DMOS) processes. These devices were validated using a TLP system. From the experimental results, the device for I/O ESD clamp has a trigger voltage of 5.8V. Also, the device for power rail ESD clamp has a holding voltage of 7.7V.
Abstract: Power transformers are among the most important and
expensive equipments in the electric power systems. Consequently
the transformer protection is an essential part of the system
protection. This paper presents a new method for locating
transformer winding faults such as turn-to-turn, turn-to-core, turn-totransformer
body, turn-to-earth, and high voltage winding to low
voltage winding. In this study the current and voltage signals of input
and output terminals of the transformer are measured, which the
Fourier transform of measured signals and harmonic analysis
determine the fault's location.
Abstract: Materials used on exterior spacecraft surfaces are subjected to many environmental threats which can cause degradation, atomic oxygen is one of the most threats. We prepared organic silicon atomic-oxygen-protection film using method of polymerization. This paper presented the effects on the film structure and its durability of the preparation processing, and analyzed the polymerization theory, the film structure and composition of the film. At last, we tested the film in our ground based atomic oxygen simulator, and indicated that the film worked well.
Abstract: This paper presents the development of a wavelet
based algorithm, for distinguishing between magnetizing inrush
currents and power system fault currents, which is quite adequate,
reliable, fast and computationally efficient tool. The proposed
technique consists of a preprocessing unit based on discrete wavelet
transform (DWT) in combination with an artificial neural network
(ANN) for detecting and classifying fault currents. The DWT acts as
an extractor of distinctive features in the input signals at the relay
location. This information is then fed into an ANN for classifying
fault and magnetizing inrush conditions. A 220/55/55 V, 50Hz
laboratory transformer connected to a 380 V power system were
simulated using ATP-EMTP. The DWT was implemented by using
Matlab and Coiflet mother wavelet was used to analyze primary
currents and generate training data. The simulated results presented
clearly show that the proposed technique can accurately discriminate
between magnetizing inrush and fault currents in transformer
protection.
Abstract: This paper analyzes the linkage between migration,
economic globalization and terrorism concerns. On a broad level, I
analyze Canadian economic and political considerations, searching
for causal relationships between political and economic actors on the
one hand, and Canadian immigration law on the other. Specifically,
the paper argues that there are contradictory impulses affecting state
sovereignty. These impulses are are currently being played out in the
field of Canadian immigration law through several proposed changes
to Canada-s Immigration and Refugee Protection Act (IRPA). These
changes reflect an ideological conception of sovereignty that is
intrinsically connected with decision-making capacity centered on an
individual. This conception of sovereign decision-making views
Parliamentary debate and bureaucratic inefficiencies as both equally
responsible for delaying essential decisions relating to the protection
of state sovereignty, economic benefits and immigration control This
paper discusses these concepts in relation to Canadian immigration
policy under Canadian governments over the past twenty five years.
Abstract: The proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch. Web Application Firewall (WAF) is an intermediate tool between web server and users that provides comprehensive protection for web application. WAF is a negative security model where the detection and prevention mechanisms are based on predefined or user-defined attack signatures and patterns. However, WAF alone is not adequate to offer best defensive system against web vulnerabilities that are increasing in number and complexity daily. This paper presents a methodology to automatically design a positive security based model which identifies and allows only legitimate web queries. The paper shows a true positive rate of more than 90% can be achieved.
Abstract: As data to be stored in storage subsystems
tremendously increases, data protection techniques have become more
important than ever, to provide data availability and reliability. In this
paper, we present the file system-based data protection (WOWSnap)
that has been implemented using WORM (Write-Once-Read-Many)
scheme. In the WOWSnap, once WORM files have been created, only
the privileged read requests to them are allowed to protect data against
any intentional/accidental intrusions. Furthermore, all WORM files
are related to their protection cycle that is a time period during which
WORM files should securely be protected. Once their protection cycle
is expired, the WORM files are automatically moved to the
general-purpose data section without any user interference. This
prevents the WORM data section from being consumed by
unnecessary files. We evaluated the performance of WOWSnap on
Linux cluster.
Abstract: This paper analyzes the effect of a single uniform accounting rule on reporting quality by investigating the influence of IFRS on earnings management. This paper examines whether earnings management is reduced after IFRS adoption through the use of “loss avoidance thresholds”, a method that has been verified in earlier studies. This paper concentrates on two European countries: one that represents the continental code law tradition with weak protection of investors (France) and one that represents the Anglo-American common law tradition, which typically implies a strong enforcement system (the United Kingdom).
The research investigates a sample of 526 companies (6822 firm-year observations) during the years 2000 – 2013. The results are different for the two jurisdictions. This study demonstrates that a single set of accounting standards contributes to better reporting quality and reduces the pervasiveness of earnings management in France. In contrast, there is no evidence that a reduction in earnings management followed the implementation of IFRS in the United Kingdom. Due to the fact that IFRS benefit France but not the United Kingdom, other political and economic factors, such legal system or capital market strength, must play a significant role in influencing the comparability and transparency cross-border companies’ financial statements. Overall, the result suggests that IFRS moderately contribute to the accounting quality of reported financial statements and bring benefit for stakeholders, though the role played by other economic factors cannot be discounted.
Abstract: Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, objectbased watermarking schemes are needed for copyright protection. This paper proposes a novel blind object watermarking scheme for images and video using the in place lifting shape adaptive-discrete wavelet transform (SA-DWT). In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy image/video compression (e.g. JPEG, JPEG2000 and MPEG-4), scaling, adding noise, filtering, etc.