Abstract: In this work, we successfully extended one-dimensional differential transform method (DTM), by presenting and proving some theorems, to solving nonlinear high-order multi-pantograph equations. This technique provides a sequence of functions which converges to the exact solution of the problem. Some examples are given to demonstrate the validity and applicability of the present method and a comparison is made with existing results.
Abstract: The purpose of this research is to study motivation
factors and also to study factors relation to job performance to
compare motivation factors under the personal factor classification
such as gender, age, income, educational level, marital status, and
working duration; and to study the relationship between Motivation
Factors and Job Performance with job satisfactions. The sample
groups utilized in this research were 400 Suan Sunandha Rajabhat
University employees. This research is a quantitative research using
questionnaires as research instrument. The statistics applied for data
analysis including percentage, mean, and standard deviation. In
addition, the difference analysis was conducted by t value computing,
one-way analysis of variance and Pearson’s correlation coefficient
computing. The findings of the study results were as follows the
findings showed that the aspects of job promotion and salary were at
the moderate levels. Additionally, the findings also showed that the
motivations that affected the revenue branch chiefs’ job performance
were job security, job accomplishment, policy and management, job
promotion, and interpersonal relation.
Abstract: A low cost Short Message System (SMS) based Home security system equipped with motion, smoke, temperature, humidity and light sensors has been studied and tested. The sensors are controlled by a microprocessor PIC 18F4520 through the SMS having password protection code for the secure operation. The user is able to switch light and the appliances and get instant feedback. Also in cases of emergencies such as fire or robbery the system will send alert message to occupant and relevant civil authorities. The operation of the home security has been tested on Vodafone- Fiji network and Digicel Fiji Network for emergency and feedback responses for 25 samples. The experiment showed that it takes about 8-10s for the security system to respond in case of emergency. It takes about 18-22s for the occupant to switch and monitor lights and appliances and then get feedback depending upon the network traffic.
Abstract: Software and applications are subjected to serious and damaging security threats, these threats are increasing as a result of increased number of potential vulnerabilities. Security testing is an indispensable process to validate software security requirements and to identify security related vulnerabilities. In this paper we analyze and compare different available vulnerabilities testing techniques based on a pre defined criteria using analytical hierarchy process (AHP). We have selected five testing techniques which includes Source code analysis, Fault code injection, Robustness, Stress and Penetration testing techniques. These testing techniques have been evaluated against five criteria which include cost, thoroughness, Ease of use, effectiveness and efficiency. The outcome of the study is helpful for researchers, testers and developers to understand effectiveness of each technique in its respective domain. Also the study helps to compare the inner working of testing techniques against a selected criterion to achieve optimum testing results.
Abstract: The potential of economically cheaper cellulose
containing natural materials like rice husk was assessed for nickel
adsorption from aqueous solutions. The effects of pH, contact time,
sorbent dose, initial metal ion concentration and temperature on the
uptake of nickel were studied in batch process. The removal of nickel
was dependent on the physico-chemical characteristics of the
adsorbent, adsorbate concentration and other studied process
parameters. The sorption data has been correlated with Langmuir,
Freundlich and Dubinin-Radush kevich (D-R) adsorption models. It
was found that Freundlich and Langmuir isotherms fitted well to the
data. Maximum nickel removal was observed at pH 6.0. The
efficiency of rice husk for nickel removal was 51.8% for dilute
solutions at 20 g L-1 adsorbent dose. FTIR, SEM and EDAX were
recorded before and after adsorption to explore the number and
position of the functional groups available for nickel binding on to
the studied adsorbent and changes in surface morphology and
elemental constitution of the adsorbent. Pseudo-second order model
explains the nickel kinetics more effectively. Reusability of the
adsorbent was examined by desorption in which HCl eluted 78.93%
nickel. The results revealed that nickel is considerably adsorbed on
rice husk and it could be and economic method for the removal of
nickel from aqueous solutions.
Abstract: In this article, using finite element analysis (FEA)
and an X-ray diffractometer (XRD), cold-sprayed titanium particles
on a steel substrate is investigated in term of cooling time and the
development of residual strains. Three cooling-down models of
sprayed particles after deposition stage are simulated and discussed:
the first model (m1) considers conduction effect to the substrate only,
the second model (m2) considers both conduction as well as
convection effect to the environment, and the third model (m3) which
is the same as the second model but with the substrate heated to a
near particle temperature before spraying. Thereafter, residual strains
developed in the third model is compared with the experimental
measurement of residual strains, which involved a Bruker D8
Advance Diffractometer using CuKa radiation (40kV, 40mA)
monochromatised with a graphite sample monochromator. For
deposition conditions of this study, a good correlation was found to
exist between the FEA results and XRD measurements of residual
strains.
Abstract: Since polymerase chain reaction (PCR) has been
invented, it has emerged as a powerful tool in genetic analysis. The
PCR products are closely linked with thermal cycles. Therefore, to
reduce the reaction time and make temperature distribution uniform in
the reaction chamber, a novel oscillatory thermal cycler is designed.
The sample is placed in a fixed chamber, and three constant isothermal
zones are established and lined in the system. The sample is oscillated
and contacted with three different isothermal zones to complete
thermal cycles. This study presents the design of the geometric
characteristics of the chamber. The commercial software
CFD-ACE+TM is utilized to investigate the influences of various
materials, heating times, chamber volumes, and moving speed of the
chamber on the temperature distributions inside the chamber. The
chamber moves at a specific velocity and the boundary conditions
with time variations are related to the moving speed. Whereas the
chamber moves, the boundary is specified at the conditions of the
convection or the uniform temperature. The user subroutines compiled
by the FORTRAN language are used to make the numerical results
realistically. Results show that the reaction chamber with a rectangular
prism is heated on six faces; the effects of various moving speeds of
the chamber on the temperature distributions are examined. Regarding
to the temperature profiles and the standard deviation of the
temperature at the Y-cut cross section, the non-uniform temperature
inside chamber is found as the moving speed is larger than 0.01 m/s.
By reducing the heating faces to four, the standard deviation of the
temperature of the reaction chamber is under 1.4×10-3K with the range
of velocities between 0.0001 m/s and 1 m/s. The nature convective
boundary conditions are set at all boundaries while the chamber moves
between two heaters, the effects of various moving velocities of the
chamber on the temperature distributions are negligible at the assigned
time duration.
Abstract: Five original strains of entomopathogenic bacteria
with insecticidal activity against mosquito larvae of the genera Aedes,
Culex and Anopheles have been isolated from natural conditions in
Armenia and characterized. According to morphological,
physiological and biochemical parameters, all isolates were identified
as Bacillus thuringiensis spp. israelensis (Bti). High larvicidal
activity has been showed by three strains Bti. These strains can be
recommended for industrial production of bacterial preparations.
Abstract: Traffic enforcement units (the Police) are partly
responsible for the severity and frequency of the traffic accidents via
the effectiveness of their safety measures. The Police claims that the
reductions in accidents and their severities occur largely by their
timely interventions at the black spots, through traffic management
or temporary changes in the road design (guiding, reducing speeds
and eliminating sight obstructions, etc.). Yet, some other external
factors than the Police measures may intervene into which such
claims require a statistical confirmation. In order to test the net
impact of the Police contribution in the reduction of the number of
crashes, Chi square test was applied for 25 spots (streets and
intersections) and an average evaluation was achieved for general
conclusion in the case study of Izmir city. Separately, the net impact
of economic crisis in the reduction of crashes is assessed by the
trend analysis for the case of the economic crisis with the probable
reduction effects on the trip generation or modal choice. Finally, it
was proven that the Police measures were effective to some degree as
they claimed, though the economic crisis might have only negligible
contribution to the reductions in the same period observed.
Abstract: Adolescents in Northern Uganda are at risk of teenage
pregnancies, unsafe abortions and sexually transmitted infections
(STIs). There is silence on sex both at home and school. This cross
sectional descriptive analytical study interviews a random sample of
827 students and 13 teachers on knowledge, perception and
acceptability to a comprehensive adolescent sexual and reproductive
health education in “O” and “A” level secondary schools in Gulu
District. Quantitative data was analyzed using SPSS 16.0. Directed
content analysis of themes of transcribed qualitative data was
conducted manually for common codes, sub-categories and
categories. Of the 827 students; 54.3% (449) reported being in a
sexual relationship especially those aged 15-17 years. Majority
96.1% (807) supported the teaching of a comprehensive ASRHE,
citing no negative impact 71.5% (601). Majority 81.6% (686) agreed
that such education could help prevention of STIs, abortions and
teenage pregnancies, and that it should be taught by health workers
69.0% (580). Majority 76.6% (203) reported that ASRHE was not
currently being taught in their schools. Students had low knowledge
levels and misconceptions about ASRHE. ASRHE was highly
acceptable though not being emphasized; its success in school
settings requires multidisciplinary culturally sensitive approaches
amongst which health workers should be frontiers.
Abstract: This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS), coupled with the decoy system to perform intrusion prevention. When NIDS detects an activity of intrusions, it will signal a redirection module to redirect all malicious traffics to attack the decoy system instead, and hence the production system is protected and safe. However, in a normal situation, traffic will be simply forwarded to the production system as usual. Furthermore, we assess the performance of the model with various bandwidths, packet sizes and inter-attack intervals (attacking frequencies).
Abstract: This paper proposes an auto-classification algorithm
of Web pages using Data mining techniques. We consider the
problem of discovering association rules between terms in a set of
Web pages belonging to a category in a search engine database, and
present an auto-classification algorithm for solving this problem that
are fundamentally based on Apriori algorithm. The proposed
technique has two phases. The first phase is a training phase where
human experts determines the categories of different Web pages, and
the supervised Data mining algorithm will combine these categories
with appropriate weighted index terms according to the highest
supported rules among the most frequent words. The second phase is
the categorization phase where a web crawler will crawl through the
World Wide Web to build a database categorized according to the
result of the data mining approach. This database contains URLs and
their categories.
Abstract: India recognizes the personal laws of the various
religious communities that reside in the country. At the same time all
the institutions of the state in India are committed to the value of
secularism. This paper has been developed on the basis of a case
study that indicates the dynamics of religion in the working of the
lower judiciary in India. Majority of the commentary on religion and
the judiciary has focused on debates surrounding the existence and
application of personal laws. This paper, through a case study in the
lower judiciary, makes an attempt to examine whether the interface
between religion and the judiciary goes beyond personal laws.
The first part of this paper explains the history and application of
personal laws in social, political and legal contexts in India. The
second part examines the case study located in two courts of first
instance, following into the third part which provides an analysis of
the empirical evidence. The fourth part focuses on preliminary
observations about why there is a hesitancy to speak about religion in
relation to the working of the judicial system.
Abstract: A topologically oriented neural network is very
efficient for real-time path planning for a mobile robot in changing
environments. When using a recurrent neural network for this
purpose and with the combination of the partial differential equation
of heat transfer and the distributed potential concept of the network,
the problem of obstacle avoidance of trajectory planning for a
moving robot can be efficiently solved. The related dimensional
network represents the state variables and the topology of the robot's
working space. In this paper two approaches to problem solution are
proposed. The first approach relies on the potential distribution of
attraction distributed around the moving target, acting as a unique
local extreme in the net, with the gradient of the state variables
directing the current flow toward the source of the potential heat. The
second approach considers two attractive and repulsive potential
sources to decrease the time of potential distribution. Computer
simulations have been carried out to interrogate the performance of
the proposed approaches.
Abstract: Over the past few years, a number of efforts have
been exerted to build parallel processing systems that utilize the idle
power of LAN-s and PC-s available in many homes and corporations.
The main advantage of these approaches is that they provide cheap
parallel processing environments for those who cannot afford the
expenses of supercomputers and parallel processing hardware.
However, most of the solutions provided are not very flexible in the
use of available resources and very difficult to install and setup.
In this paper, a multi-level web-based parallel processing system
(MWPS) is designed (appendix). MWPS is based on the idea of
volunteer computing, very flexible, easy to setup and easy to use.
MWPS allows three types of subscribers: simple volunteers (single
computers), super volunteers (full networks) and end users. All of
these entities are coordinated transparently through a secure web site.
Volunteer nodes provide the required processing power needed by
the system end users. There is no limit on the number of volunteer
nodes, and accordingly the system can grow indefinitely. Both
volunteer and system users must register and subscribe. Once, they
subscribe, each entity is provided with the appropriate MWPS
components. These components are very easy to install.
Super volunteer nodes are provided with special components that
make it possible to delegate some of the load to their inner nodes.
These inner nodes may also delegate some of the load to some other
lower level inner nodes .... and so on. It is the responsibility of the
parent super nodes to coordinate the delegation process and deliver
the results back to the user.
MWPS uses a simple behavior-based scheduler that takes into
consideration the current load and previous behavior of processing
nodes. Nodes that fulfill their contracts within the expected time get a
high degree of trust. Nodes that fail to satisfy their contract get a
lower degree of trust.
MWPS is based on the .NET framework and provides the minimal
level of security expected in distributed processing environments.
Users and processing nodes are fully authenticated. Communications
and messages between nodes are very secure. The system has been
implemented using C#.
MWPS may be used by any group of people or companies to
establish a parallel processing or grid environment.
Abstract: In this paper, we evaluate the choice of suitable
quantization characteristics for both the decoder messages and the
received samples in Low Density Parity Check (LDPC) coded
systems using M-QAM (Quadrature Amplitude Modulation)
schemes. The analysis involves the demapper block that provides
initial likelihood values for the decoder, by relating its quantization
strategy of the decoder. A mapping strategy refers to the grouping of
bits within a codeword, where each m-bit group is used to select a
2m-ary signal in accordance with the signal labels. Further we
evaluate the system with mapping strategies like Consecutive-Bit
(CB) and Bit-Reliability (BR). A new demapper version, based on
approximate expressions, is also presented to yield a low complexity
hardware implementation.
Abstract: Multiparty voice over IP (MVoIP) systems allows a group of people to freely communicate each other via the internet, which have many applications such as online gaming, teleconferencing, online stock trading etc. Peertalk is a peer to peer multiparty voice over IP system (MVoIP) which is more feasible than existing approaches such as p2p overlay multicast and coupled distributed processing. Since the stream mixing and distribution are done by the peers, it is vulnerable to major security threats like nodes misbehavior, eavesdropping, Sybil attacks, Denial of Service (DoS), call tampering, Man in the Middle attacks etc. To thwart the security threats, a security framework called PEERTS (PEEred Reputed Trustworthy System for peertalk) is implemented so that efficient and secure communication can be carried out between peers.
Abstract: The distance protection mainly the impedance relay which is considered as the main protection for transmission lines can be subjected to impedance measurement error which is, mainly, due to the fault resistance and to the power fluctuation. Thus, the impedance relay may not operate for a short circuit at the far end of the protected line (case of the under reach) or operates for a fault beyond its protected zone (case of overreach). In this paper, an approach to fault detection by a distance protection, which distinguishes between the faulty conditions and the effect of overload operation mode, has been developed. This approach is based on the symmetrical components; mainly the negative sequence, and it is taking into account both the effect of fault resistance and the overload situation which both have an effect upon the reliability of the protection in terms of dependability for the former and security for the latter.
Abstract: Presently and in line with the United Nations (EPA),
human thinking system has shifted towards clean fuels so as to
maintain a cleaner environment and to save our planet earth.
One of the most successful studies in order to achieve new
energies includes the use of animal wastes and their organic residues,
and the result of these researches has been represented in the form of
very simple and cheap methods called biogas technology. Biogas
technology has developed a lot in the recent decades; its reason is the
high cost of fossil fuels and the greater attention of countries to the
environmental pollutions due to the consumption of this kind of
fuels.
IRAN is ready for the optimized application of renewable
energies, having much enriched resources of this kind of energies; so
a special place could be considered for it when making programs.
The purpose of biogas technology is the recovery of energy and
finally the protection of the environment, which is much appropriate
for the third world farmers with respect to their technical abilities and
economic potentials. Studies show that the production and
consumption of biogas is appropriate and economic in IRAN,
because of the high amount of waste in the agriculture sector, the
significant amount of animal and human excrement production, the
great volume of garbage produced and the most important the
specific social, climatic and agricultural conditions in IRAN, in order
to proceed towards the reduction of pollution due to the use of fossil
fuels.
Abstract: An important goal of parboiling is a decrease of rice broken percentage and at the beginning Selected paddy of variety of rice Tarom and soaked at three different temperatures 45 Cº, 65 Cº and 80 Cº orderly for 5 hours, 4 hours and 1.5 hours to moisture of 40 % and then in steaming stage to operate these action two steaming methods are selected steaming under pressure condition and steaming in atmosphere pressure and In the first method after exerting air, the steam pressure is increase to 1 Kg/Cm2 which is done in two different duration times of 2.5 and 5 minutes and in second method used of three times of 5,10 and 15 minutes and dry to 8% moisture and decreases of rice broken percentage at best condition in variety of Tarom of 37.2 % to 7.3 % and increases yield percentage at best condition in variety of Tarom of 69.4 % to 75.93 % and bran percentage decreased in variety of Tarom of 9.53 % to 2.2-3.2 % and this issue cause increases yield percentage in rice and use of This method is very significant for our country because broken percentage of rice in our country is 23-33 %.