Abstract: Power consumption of nodes in ad hoc networks is a
critical issue as they predominantly operate on batteries. In order to
improve the lifetime of an ad hoc network, all the nodes must be
utilized evenly and the power required for connections must be
minimized. In this project a link layer algorithm known as Power
Aware medium Access Control (PAMAC) protocol is proposed
which enables the network layer to select a route with minimum total
power requirement among the possible routes between a source and a
destination provided all nodes in the routes have battery capacity
above a threshold. When the battery capacity goes below a
predefined threshold, routes going through these nodes will be
avoided and these nodes will act only as source and destination.
Further, the first few nodes whose battery power drained to the set
threshold value are pushed to the exterior part of the network and the
nodes in the exterior are brought to the interior. Since less total
power is required to forward packets for each connection. The
network layer protocol AOMDV is basically an extension to the
AODV routing protocol. AOMDV is designed to form multiple
routes to the destination and it also avoid the loop formation so that it
reduces the unnecessary congestion to the channel. In this project, the
performance of AOMDV is evaluated using PAMAC as a MAC layer
protocol and the average power consumption, throughput and
average end to end delay of the network are calculated and the results
are compared with that of the other network layer protocol AODV.
Abstract: Sweet cherries (Prunus avium L.) contain various
phenolic compounds which contribute to total antioxidant activity.
Total polyphenols, tannins, flavonoids and anthocyanins, and
antioxidant capacity in a fruits of a number of selected sweet cherry
genotypes were investigated. Total polyphenols content ranged from
4.12 to 8.34 mg gallic acid equivantents/g dry fruit weight and total
tannins content ranged from 0.19 to 1.95 mg gallic acid equivalent/g
dry fruit weight. Total flavonoids were within the range 0.42-1.56 mg
of rutin equivalents/g dry fruit weight and total anthocyanins content
were between 0.35 and 0.69 mg cyanidin 3-glucoside equivalent/ g
dry fruit weight. Although sweet cherry fruits are a significant source
of different phenolic compounds, antioxidant activity of sweet
cherries is not related only with the total polyphenolics, flavonoids or
anthocyanins.
Abstract: Ad hoc networks are characterized by multihop wireless connectivity, frequently changing network topology and the need for efficient dynamic routing protocols. We compare the performance of three routing protocols for mobile ad hoc networks: Dynamic Source Routing (DSR) , Ad Hoc On-Demand Distance Vector Routing (AODV), location-aided routing(LAR1).The performance differentials are analyzed using varying network load, mobility, and network size. We simulate protocols with GLOMOSIM simulator. Based on the observations, we make recommendations about when the performance of either protocol can be best.
Abstract: Knowledge modelling, a main activity for the development of Knowledge Based Systems, have no set standards and are mostly done in an ad hoc way. There is a lack of support for the transition from abstract level to implementation. In this paper, a methodology for the development of the knowledge model, which is inspired by both Software and Knowledge Engineering, is proposed. Use of UML which is the de-facto standard for modelling in the software engineering arena is explored for knowledge modelling. The methodology proposed, is used to develop a knowledge model of a knowledge based system for recommending suitable hotels for tourists visiting Mauritius.
Abstract: The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have been proposed for establishing secure communication between end users, these schemes identify that the secure operation of AODV is a bi tier task (routing and secure exchange of information at separate levels). Our endeavor in this paper would focus on achieving the routing and secure data exchange in a single step. This will facilitate the user nodes to perform routing, mutual authentications, generation and secure exchange of session key in one step thus ensuring confidentiality, integrity and authentication of data exchange in a more suitable way.
Abstract: Food safety is an important concern for holiday
makers in foreign and unfamiliar tourist destinations. In fact, risk
from food in these tourist destinations has an influence on tourist
perception. This risk can potentially affect physical health and lead to
an inability to pursue planned activities. The objective of this paper
was to compare foreign tourists- demographics including gender, age
and education level, with the level of perceived risk towards food
safety. A total of 222 foreign tourists during their stay at Khao San
Road in Bangkok were used as the sample. Independent- samples ttest,
analysis of variance, and Least Significant Difference or LSD
post hoc test were utilized. The findings revealed that there were few
demographic differences in level of perceived risk among the foreign
tourists. The post hoc test indicated a significant difference among
the old and the young tourists, and between the higher and lower
level of education. Ranks of tourists- perceived risk towards food
safety unveiled some interesting results. Tourists- perceived risk of
food safety in established restaurants can be ranked as i) cleanliness
of dining utensils, ii) sanitation of food preparation area, and iii)
cleanliness of food seasoning and ingredients. Whereas, the tourists-
perceived risk of food safety in street food and drink can be ranked
as i) cleanliness of stalls and pushcarts, ii) cleanliness of food sold,
and iii) personal hygiene of street food hawkers or vendors.
Abstract: Position based routing protocols are the kinds of
routing protocols, which they use of nodes location information,
instead of links information to routing. In position based routing
protocols, it supposed that the packet source node has position
information of itself and it's neighbors and packet destination node.
Greedy is a very important position based routing protocol. In one of
it's kinds, named MFR (Most Forward Within Radius), source node
or packet forwarder node, sends packet to one of it's neighbors with
most forward progress towards destination node (closest neighbor to
destination). Using distance deciding metric in Greedy to forward
packet to a neighbor node, is not suitable for all conditions. If closest
neighbor to destination node, has high speed, in comparison with
source node or intermediate packet forwarder node speed or has very
low remained battery power, then packet loss probability is
increased. Proposed strategy uses combination of metrics distancevelocity
similarity-power, to deciding about giving the packet to
which neighbor. Simulation results show that the proposed strategy
has lower lost packets average than Greedy, so it has more reliability.
Abstract: Decision Support System (DSS) are interactive
software systems that are built to assist the management of an
organization in the decision making process when faced with nonroutine
problems in a specific application domain. Non-functional
requirements (NFRs) for a DSS deal with the desirable qualities and
restrictions that the DSS functionalities must satisfy. Unlike the
functional requirements, which are tangible functionalities provided
by the DSS, NFRs are often hidden and transparent to DSS users but
affect the quality of the provided functionalities. NFRs are often
overlooked or added later to the system in an ad hoc manner, leading
to a poor overall quality of the system. In this paper, we discuss the
development of NFRs as part of the requirements engineering phase
of the system development life cycle of DSSs. To help eliciting
NFRs, we provide a comprehensive taxonomy of NFRs for DSSs.
Abstract: After a strong earthquake occurs, a secondary disaster due to strong aftershocks, flood, landslide or heavy snow can possible to occur and the secondary disaster due to resident-s action also can possible to happen. However, until now seldom researchers have paid attention at it. This paper focused on the Inhabitant-s action after the strong earthquake occurs when a terrible even becomes calm. An inappropriate behavior of people with disadvantaged climate after the worse earthquake can bring a tragedy to their life.
Abstract: The nature of wireless ad hoc and sensor networks
make them very attractive to attackers. One of the most popular and
serious attacks in wireless ad hoc networks is wormhole attack and
most proposed protocols to defend against this attack used
positioning devices, synchronized clocks, or directional antennas.
This paper analyzes the nature of wormhole attack and existing
methods of defending mechanism and then proposes round trip time
(RTT) and neighbor numbers based wormhole detection mechanism.
The consideration of proposed mechanism is the RTT between two
successive nodes and those nodes- neighbor number which is needed
to compare those values of other successive nodes. The identification
of wormhole attacks is based on the two faces. The first consideration
is that the transmission time between two wormhole attack affected
nodes is considerable higher than that between two normal neighbor
nodes. The second detection mechanism is based on the fact that by
introducing new links into the network, the adversary increases the
number of neighbors of the nodes within its radius. This system does
not require any specific hardware, has good performance and little
overhead and also does not consume extra energy. The proposed
system is designed in ad hoc on-demand distance vector (AODV)
routing protocol and analysis and simulations of the proposed system
are performed in network simulator (ns-2).
Abstract: Characteristics of ad hoc networks and even their existence depend on the nodes forming them. Thus, services and applications designed for ad hoc networks should adapt to this dynamic and distributed environment. In particular, multicast algorithms having reliability and scalability requirements should abstain from centralized approaches. We aspire to define a reliable and scalable multicast protocol for ad hoc networks. Our target is to utilize epidemic techniques for this purpose. In this paper, we present a brief survey of epidemic algorithms for reliable multicasting in ad hoc networks, and describe formulations and analytical results for simple epidemics. Then, P2P anti-entropy algorithm for content distribution and our prototype simulation model are described together with our initial results demonstrating the behavior of the algorithm.
Abstract: This study employs a bivariate asymmetric GARCH
model to reveal the hidden dynamics price changes and volatility
among the emerging markets of Thailand and Malaysian after the
Asian financial crisis from January 2001 to December 2008. Our
results indicated that the equity markets are sharing the common
information (shock) that transmitted among each others. These
empirical findings are used to demonstrate the importance of shock
and volatility dynamic transmissions in the cross-market hedging and
market risk.
Abstract: Image interpolation is a common problem in imaging applications. However, most interpolation algorithms in existence suffer visually the effects of blurred edges and jagged artifacts in the image to some extent. This paper presents an adaptive feature preserving bidirectional flow process, where an inverse diffusion is performed to sharpen edges along the normal directions to the isophote lines (edges), while a normal diffusion is done to remove artifacts (“jaggies") along the tangent directions. In order to preserve image features such as edges, corners and textures, the nonlinear diffusion coefficients are locally adjusted according to the directional derivatives of the image. Experimental results on synthetic images and nature images demonstrate that our interpolation algorithm substantially improves the subjective quality of the interpolated images over conventional interpolations.
Abstract: Transcription factor p53 has a powerful tumor
suppressing function that is associated with many cancers. However,
p53 of the molecular weight was higher make the limitation across to
skin or cell membrane. Thymidine dinucleotide (pTT), an
oligonucleotide, can activate the p53 transcription factor. pTT is a
hydrophilic and negative charge oligonucleotide, which delivery in to
cell membrane need an appropriate carrier. The aim of this study was
to improve the bioavailability of the nucleotide fragment, thymidine
dinucleotide (pTT), using elasic liposome carriers to deliver the drug
into the skin. The study demonstrate that dioleoylphosphocholine
(DOPC) incorporated with sodium cholate at molar ratio 1:1 can
archived the particle size about 220 nm. This elastic liposome could
penetration through skin from stratum corneum to whole epidermis by
confocal laser scanning microscopy (CLSM). Moreover, we observed
the the slight increase in generation of p53 by western blot.
Abstract: Explosive forming is one of the unconventional
techniques in which, most commonly, the water is used as the
pressure transmission medium. One of the newest methods in
explosive forming is gas detonation forming which uses a normal
shock wave derived of gas detonation, to form sheet metals. For this
purpose a detonation is developed from the reaction of H2+O2
mixture in a long cylindrical detonation tube. The detonation wave
goes through the detonation tube and acts as a blast load on the steel
blank and forms it. Experimental results are compared with a finite
element model; and the comparison of the experimental and
numerical results obtained from strain, thickness variation and
deformed geometry is carried out. Numerical and experimental
results showed approximately 75 – 90 % similarity in formability of
desired shape. Also optimum percent of gas mixture obtained when
we mix 68% H2 with 32% O2.
Abstract: We studied the evolution of elliptic heavy SF6
gas cylinder surrounded by air when accelerated by a planar
Mach 1.25 shock. A multiple dynamics imaging technology has
been used to obtain one image of the experimental initial
conditions and five images of the time evolution of elliptic
cylinder. We compared the width and height of the circular and
two kinds of elliptic gas cylinders, and analyzed the vortex
strength of the elliptic ones. Simulations are in very good
agreement with the experiments, but due to the different initial
gas cylinder shapes, a certain difference of the initial density
peak and distribution exists between the circular and elliptic
gas cylinders, and the latter initial state is more sensitive and
more inenarrable.
Abstract: Despite so many years- development, the mainstream of workflow solutions from IT industries has not made ad-hoc workflow-support easy or inexpensive in MIS. Moreover, most of academic approaches tend to make their resulted BPM (Business Process Management) more complex and clumsy since they used to necessitate modeling workflow. To cope well with various ad-hoc or casual requirements on workflows while still keeping things simple and inexpensive, the author puts forth first the TSM design pattern that can provide a flexible workflow control while minimizing demand of predefinitions and modeling workflow, which introduces a generic approach for building BPM in workflow-aware MISs (Management Information Systems) with low development and running expenses.
Abstract: Little attention has been paid to information
transmission between the portfolios of large stocks and small stocks in the Korean stock market. This study investigates the return and volatility transmission mechanisms between large and small stocks in
the Korea Exchange (KRX). This study also explores whether bad news in the large stock market leads to a volatility of the small stock
market that is larger than the good news volatility of the large stock market. By employing the Granger causality test, we found
unidirectional return transmissions from the large stocks to medium
and small stocks. This evidence indicates that pat information about
the large stocks has a better ability to predict the returns of the medium and small stocks in the Korean stock market. Moreover, by using the
asymmetric GARCH-BEKK model, we observed the unidirectional relationship of asymmetric volatility transmission from large stocks to
the medium and small stocks. This finding suggests that volatility in
the medium and small stocks following a negative shock in the large
stocks is larger than that following a positive shock in the large stocks.
Abstract: In the present work steady inviscid hypersonic flows
are calculated by approximate Method. Maslens' inverse method is the chosen approximate method. For the inverse problem, parabolic
shock shape is chosen for the two-dimensional flow, and the body shape and flow field are calculated using Maslen's method. For the axisymmetric inverse problem paraboloidal shock is chosen and the
surface distribution of pressure is obtained.
Abstract: The flash memory has many advantages such as low power consumption, strong shock resistance, fast I/O and non-volatility. And it is increasingly used in the mobile storage device. The YAFFS, one of the NAND flash file system, is widely used in the embedded device. However, the existing YAFFS takes long time to mount the file system because it scans whole spare areas in all pages of NAND flash memory. In order to solve this problem, we propose a new content-based flash file system using a mounting time reduction technique. The proposed method only scans partial spare areas of some special pages by using content-based block management. The experimental results show that the proposed method reduces the average mounting time by 87.2% comparing with JFFS2 and 69.9% comparing with YAFFS.