Abstract: The toxicity of aqueous extracts of two plants,
Nicotiana tobacum and Eucalyptus globulus were investigated against second instar larvae of Lycoriella auripila, one of the most
important pests of button mushroom, using agar dilution technique.
Seven concentrations of aqueous extracts of both plants were applied
on second instar larvae and their mortality were evaluated after 24, 48 and 72 h. The obtained results revealed that aqueous extracts of N.
tabacum and E. globulus caused 77.55 and 72.5% mortality of larvae
of L. auripila at concentration of 4000 ppm after 72h, respectively. Toxicities of tobacco extract after 24, 48 and 72 h were 1.52, 1.85
and 1.70 times greather than eucalyptus, respectively. The estimated LC50 after 24, 48 and 72 h were 7316.5, 2468.5 and 2013.1 ppm for
tobacco and 64870.0, 6839.5 and 3326.4 ppm for eucalyptus, respectively. These plants merit further study as potential insecticides
for the control of L. auripila.
Abstract: The objective of this paper is to develop a neural
network-based residual generator to detect the fault in the actuators
for a specific communication satellite in its attitude control system
(ACS). First, a dynamic multilayer perceptron network with dynamic
neurons is used, those neurons correspond a second order linear
Infinite Impulse Response (IIR) filter and a nonlinear activation
function with adjustable parameters. Second, the parameters from the
network are adjusted to minimize a performance index specified by
the output estimated error, with the given input-output data collected
from the specific ACS. Then, the proposed dynamic neural network
is trained and applied for detecting the faults injected to the wheel,
which is the main actuator in the normal mode for the communication
satellite. Then the performance and capabilities of the proposed
network were tested and compared with a conventional model-based
observer residual, showing the differences between these two
methods, and indicating the benefit of the proposed algorithm to
know the real status of the momentum wheel. Finally, the application
of the methods in a satellite ground station is discussed.
Abstract: Until recently it would have been unusual to consider classifying population movements and refugees as security problem. However, efforts at shaping our world to make ourselves secure have paradoxically led to ever greater insecurity. The feeling of uncertainty, pertinent throughout all discourses of security, has led to the creation of security production into seemingly benign routines of everyday life. Yet, the paper argues, neither of security discourses accounted for, disclosed and challenged the fundamental aporias embedded in Western security narratives. In turn, the paper aims to unpick the conventional security wisdom, which is haunted with strong ontologies, embedded in the politics of Orientalism, and (in)security nexus. The paper concludes that current security affair conceals the integral impossibility of fulfilling its very own promise of assured security. The paper also provides suggestions about alternative security discourse based on mutual dialogue.
Abstract: A analysis on the conventional the blood pressure estimation method using an oscillometric sphygmomanometer was
performed through a computer simulation using an arterial pressure-volume (APV) model. Traditionally, the maximum amplitude algorithm (MAP) was applied on the oscillation waveforms of the APV model to obtain the mean arterial pressure and the characteristic ratio. The estimation of mean arterial pressure and
characteristic ratio was significantly affected with the shape of the blood pressure waveforms and the cutoff frequency of high-pass filter
(HPL) circuitry. Experimental errors are due to these effects when estimating blood pressure. To find out an algorithm independent from
the influence of waveform shapes and parameters of HPL, the volume
oscillation of the APV model and the phase shift of the oscillation with fast fourier transform (FFT) were testified while increasing the cuff
pressure from 1 mmHg to 200 mmHg (1 mmHg per second). The phase shift between the ranges of volume oscillation was then only observed between the systolic and the diastolic blood pressures. The same results were also obtained from the simulations performed on two different the arterial blood pressure waveforms and one
hyperthermia waveform.
Abstract: This work was to study batch biosorption of Pb(II)
ions from aqueous solution by Luffa charcoal. The effect of operating
parameters such as adsorption contact time, initial pH solution and
different initial Pb(II) concentration on the sorption of Pb(II) were
investigated. The results showed that the adsorption of Pb(II) ions
was initially rapid and the equilibrium time was 10 h. Adsorption
kinetics of Pb(II) ions onto Luffa charcoal could be best described by
the pseudo-second order model. At pH 5.0 was favorable for the
adsorption and removal of Pb(II) ions. Freundlich adsorption
isotherm model was better fitted for the adsorption of Pb(II) ions than
Langmuir and Timkin isotherms, respectively. The highest monolayer
adsorption capacity obtained from Langmuir isotherm model was
51.02 mg/g. This study demonstrated that Luffa charcoal could be
used for the removal of Pb(II) ions in water treatment.
Abstract: The paper proposes a unified model for multimedia data retrieval which includes data representatives, content representatives, index structure, and search algorithms. The multimedia data are defined as k-dimensional signals indexed in a multidimensional k-tree structure. The benefits of using the k-tree unified model were demonstrated by running the data retrieval application on a six networked nodes test bed cluster. The tests were performed with two retrieval algorithms, one that allows parallel searching using a single feature, the second that performs a weighted cascade search for multiple features querying. The experiments show a significant reduction of retrieval time while maintaining the quality of results.
Abstract: A measurement system was successfully fabricated to
detect ion concentrations (hydrogen and chlorine) in this study.
PIC18F4520, the microcontroller was used as the control unit in the
measurement system. The measurement system was practically used
to sense the H+ and Cl- in different examples, and the pH and pCl
values were exhibited on real-time LCD display promptly. In the study,
the measurement method is used to judge whether the response voltage
is stable. The change quantity is smaller than 0.01%, that the present
response voltage compares with next response voltage for H+
measurement, and the above condition is established only 6 sec.
Besides, the change quantity is smaller than 0.01%, that the present
response voltage compares with next response voltage for Clmeasurement,
and the above condition is established only 5 sec.
Furthermore, the average error quantities would also be considered,
and they are 0.05 and 0.07 for measurements of pH and pCl values,
respectively.
Abstract: Vehicular communications play a substantial role in providing safety in transportation by means of safety message exchange. Researchers have proposed several solutions for securing safety messages. Protocols based on a fixed key infrastructure are more efficient in implementation and maintain stronger security in comparison with dynamic structures. These protocols utilize zone partitioning to establish distinct key infrastructure under Certificate Authority (CA) supervision in different regions. Secure anonymous broadcasting (SAB) is one of these protocols that preserves most of security aspects but it has some deficiencies in practice. A very important issue is region change of a vehicle for its mobility. Changing regions leads to change of CA and necessity of having new key set to resume communication. In this paper, we propose solutions for informing vehicles about region change to obtain new key set before entering next region. This hinders attackers- intrusion, packet loss and lessons time delay. We also make key request messages secure by confirming old CA-s public key to the message, hence stronger security for safety message broadcasting is attained.
Abstract: This paper investigates the indices of a creative city in
Isfahan. Its main aim is to evaluate quantitative status of the creative
city indices in Isfahan city, analyze the dispersion and distribution of
these indices in Isfahan city. Concerning these, this study tries to
analyze the creative city indices in fifteen area of Isfahan through
secondary data, questionnaire, TOPSIS model, Shannon entropy and
SPSS. Based on this, the fifteen areas of Isfahan city have been
ranked with 12 factors of creative city indices. The results of studies
show that fifteen areas of Isfahan city are not equally benefiting from
creative indices and there is much difference between the areas of
Isfahan city.
Abstract: A novel robust audio watermarking scheme is
proposed in this paper. In the proposed scheme, the host audio signals
are segmented into frames. Two consecutive frames are assessed if
they are suitable to represent a watermark bit. If so, frequency
transform is performed on these two frames. The compressionexpansion
technique is adopted to generate distortion over the two
frames. The distortion is used to represent one watermark bit.
Psychoacoustic model is applied to calculate local auditory mask to
ensure that the distortion is not audible. The watermarking schemes
using mono and stereo audio signals are designed differently. The
correlation-based detection method is used to detect the distortion
and extract embedded watermark bits. The experimental results show
that the quality degradation caused by the embedded watermarks is
perceptually transparent and the proposed schemes are very robust
against different types of attacks.
Abstract: This paper presents the design of a low power second-order continuous-time sigma-delta modulator for low power
applications. The loop filter of this modulator has been implemented based on the nonlinear transconductance-capacitor (Gm-C) by employing current-mode technique. The nonlinear transconductance uses floating gate MOS (FG-MOS) transistors that operate in weak inversion region. The proposed modulator features low power consumption (
Abstract: This survey of recent literature examines the link between growth and poverty. It is widely accepted that economic growth is a necessary condition for sustainable poverty reduction. But it is the fact that the economic growth of some countries has been pro-poor while others not. Some factors such as labor market, policies and demographic factors may lead to a weak relationship between economic performance and poverty rate. In this sense pro-growth policies should be pro-poor to increase the poverty alleviation effects of the growth. The purpose of this study is to review the recent studies on the effects of macroeconomic policies on poverty and inequality and to review the poverty analyses which examine the relationship between growth, poverty and inequality. Also this study provides some facts about the relationship between economic growth, inequality and poverty from Turkey. Keywordseconomic growth, inequality, macroeconomic policy, poverty
Abstract: Development of knowledge based society carries multiple challenges to the higher education system. Some of the challenges laid before the higher education sector of countries which aspire to become knowledge based societies are: the entrepreneurial leadership of the higher education institutions, finding new sources of financing in order to minimize dependence on public resources, creating connections with the labor market, commercial utilization of R&D results, promotion of innovations as well as the overall promotion of science excellence relevant to the economic sector. Within a framework of this paper and its main subject of research, the challenge which is being put before the higher education institutions is an effort of establishing regional mission of higher education through the open collaboration with regional key factors, both private and public. Development of the mentioned collaboration and its contribution to the overall regional development in Croatia is the main subject of empirical research in this paper.
Abstract: With the rapid development of wireless mobile communication, applications for mobile devices must focus on network security. In 2008, Chang-Chang proposed security improvements on the Lu et al.-s elliptic curve authentication key agreement protocol for wireless mobile networks. However, this paper shows that Chang- Chang-s improved protocol is still vulnerable to off-line password guessing attacks unlike their claims.
Abstract: In this paper, linear multistep technique using power
series as the basis function is used to develop the block methods
which are suitable for generating direct solution of the special second
order ordinary differential equations with associated initial or
boundary conditions. The continuous hybrid formulations enable us
to differentiate and evaluate at some grids and off – grid points to
obtain two different four discrete schemes, each of order (5,5,5,5)T,
which were used in block form for parallel or sequential solutions of
the problems. The computational burden and computer time wastage
involved in the usual reduction of second order problem into system
of first order equations are avoided by this approach. Furthermore, a
stability analysis and efficiency of the block methods are tested on
linear and non-linear ordinary differential equations and the results
obtained compared favorably with the exact solution.
Abstract: Cements, which are intrinsically brittle materials, can
exhibit a degree of pseudo-ductility when reinforced with a sufficient
volume fraction of a fibrous phase. This class of materials, called
Engineered Cement Composites (ECC) has the potential to be used in
future tunneling applications where a level of pseudo-ductility is
required to avoid brittle failures. However uncertainties remain
regarding mechanical performance. Previous work has focused on
comparatively thin specimens; however for future civil engineering
applications, it is imperative that the behavior in tension of thicker
specimens is understood. In the present work, specimens containing
cement powder and admixtures have been manufactured following
two different processes and tested in tension. Multiple matrix
cracking has been observed during tensile testing, leading to a
“strain-hardening" behavior, confirming the possible suitability of
ECC material when used as thick sections (greater than 50mm) in
tunneling applications.
Abstract: Quality control is the crucial step for ISO 9001
Quality System Management Standard for companies. While
measuring the quality level of both raw material and semi
product/product, the calibration of the measuring device is an
essential requirement. Calibration suppliers are in the service sector
and therefore the calibration supplier selection is becoming a worthy
topic for improving service quality.
This study presents the results of a questionnaire about the
selection criteria of a calibration supplier. The questionnaire was
applied to 103 companies and the results are discussed in this paper.
The analysis was made with MINITAB 14.0 statistical programs.
“Competence of documentations" and “technical capability" are
defined as the prerequisites because of the ISO/IEC17025:2005
standard. Also “warranties and complaint policy", “communication",
“service features", “quality" and “performance history" are defined as
very important criteria for calibration supplier selection.
Abstract: Recent changes in food retailing structure have led to the development of large supercenters in suburban areas of the United States. These changes have led some authors to suggest that there are food deserts in some urban areas, where food is difficult to access, especially for disadvantaged consumers. This study tests the food desert hypothesis by comparing the distance from food retailers to food secure and food insecure households in one urban, Midwest neighborhood. This study utilizes GIS to compare household survey respondent locations against the location of various types of area food retailers. Results of this study indicate no apparent difference between food secure and insecure households in the reported importance of distance on the decision to shop at various retailers. However, there were differences in the spatial relationship between households and retailers. Food insecure households tended to be located slightly farther from large food retailers and slightly closer to convenience stores. Furthermore, food insecure households reported traveling slightly farther to their primary food retailer. The differences between the two groups was, however, relatively small.
Abstract: In this paper, we propose a new method to distinguish
between arousal and relaxation states by using multiple features
acquired from a photoplethysmogram (PPG) and support vector
machine (SVM). To induce arousal and relaxation states in subjects, 2
kinds of sound stimuli are used, and their corresponding biosignals are
obtained using the PPG sensor. Two features–pulse to pulse interval
(PPI) and pulse amplitude (PA)–are extracted from acquired PPG
data, and a nonlinear classification between arousal and relaxation is
performed using SVM.
This methodology has several advantages when compared with
previous similar studies. Firstly, we extracted 2 separate features from
PPG, i.e., PPI and PA. Secondly, in order to improve the classification
accuracy, SVM-based nonlinear classification was performed.
Thirdly, to solve classification problems caused by generalized
features of whole subjects, we defined each threshold according to
individual features.
Experimental results showed that the average classification
accuracy was 74.67%. Also, the proposed method showed the better
identification performance than the single feature based methods.
From this result, we confirmed that arousal and relaxation can be
classified using SVM and PPG features.
Abstract: Power System Security is a major concern in real time
operation. Conventional method of security evaluation consists of
performing continuous load flow and transient stability studies by
simulation program. This is highly time consuming and infeasible
for on-line application. Pattern Recognition (PR) is a promising
tool for on-line security evaluation. This paper proposes a Support
Vector Machine (SVM) based binary classification for static and
transient security evaluation. The proposed SVM based PR approach
is implemented on New England 39 Bus and IEEE 57 Bus systems.
The simulation results of SVM classifier is compared with the other
classifier algorithms like Method of Least Squares (MLS), Multi-
Layer Perceptron (MLP) and Linear Discriminant Analysis (LDA)
classifiers.