Abstract: This paper analysed the food security situation among
Nigerian rural farmers. Data collected on 202 rural farmers from
Benue State were analysed using descriptive and inferential statistics.
The study revealed that majority of the respondents (60.83%) had
medium dietary diversity. Furthermore, household daily calorie
requirement for the food secure households was 10,723 and the
household daily calorie consumption was 12,598, with a surplus
index of 0.04. The food security index was 1.16. The Household
daily per capita calorie consumption was 3,221.2. For the food
insecure households, the household daily calorie requirement was
20,213 and the household daily calorie consumption was 17,393. The
shortfall index was 0.14. The food security index was 0.88. The
Household daily per capita calorie consumption was 2,432.8. The
most commonly used coping strategies during food stress included
intercropping (99.2%), reliance on less preferred food (98.1%),
limiting portion size at meal times (85.8%) and crop diversification
(70.8%).
Abstract: The aim of the study was to follow changes of powervelocity
relationship in female volleyball players during an annual
training cycle. The study was conducted on eleven female volleyball
players: age 21.6±1.7 years, body height 177.9±4.7 cm, body mass
71.3±6.6 kg and training experience 8.6±3.3 years. Power–velocity
relationship was determined from five maximal 10-second
cycloergometer efforts with external loads equal: 2.5, 5.0, 7.5, 10.0
and 12.5% of body weight (BW) before (I) and after (II) the
preparatory period, after the first (III) and second (IV) competitive
season. The maximal power output increased from 9.30±0.85 W•kg–1
(I) to 9.50±0.96 W•kg–1 (II), 9.77±0.96 W•kg–1 (III) and 9.95±1.13
W•kg–1 (IV, p
Abstract: This paper presents a protocol aiming at proving that an encryption system contains structural weaknesses without disclosing any information on those weaknesses. A verifier can check in a polynomial time that a given property of the cipher system output has been effectively realized. This property has been chosen by the prover in such a way that it cannot been achieved by known attacks or exhaustive search but only if the prover indeed knows some undisclosed weaknesses that may effectively endanger the cryptosystem security. This protocol has been denoted zero-knowledge-like proof of cryptanalysis. In this paper, we apply this protocol to the Bluetooth core encryption algorithm E0, used in many mobile environments and thus we suggest that its security can seriously be put into question.
Abstract: The present work presents a method of calculating the
ductility of rectangular sections of beams considering nonlinear
behavior of concrete and steel. This calculation procedure allows us
to trace the curvature of the section according to the bending
moment, and consequently deduce ductility. It also allowed us to
study the various parameters that affect the value of the ductility. A
comparison of the effect of maximum rates of tension steel, adopted
by the codes, ACI [1], EC8 [2] and RPA [3] on the value of the
ductility was made. It was concluded that the maximum rate of steels
permitted by the ACI [1] codes and RPA [3] are almost similar in
their effect on the ductility and too high. Therefore, the ductility
mobilized in case of an earthquake is low, the inverse of code EC8
[2]. Recommendations have been made in this direction.
Abstract: Biomimicry has many potential benefits as many
technologies found in nature are superior to their man-made
counterparts. As technological device components approach the micro
and nanoscale, surface properties such as surface adhesion and friction
may need to be taken into account. Lowering surface adhesion by
manipulating chemistry alone might no longer be sufficient for such
components and thus physical manipulation may be required.
Adhesion reduction is only one of the many surface functions
displayed by micro/nano-structured cuticles of insects. Here, we
present a mini review of our understanding of insect cuticle structures
and the relationship between the structure dimensions and the
corresponding functional mechanisms. It may be possible to introduce
additional properties to material surfaces (indeed multi-functional
properties) based on the design of natural surfaces.
Abstract: Cognitive models allow predicting some aspects of utility
and usability of human machine interfaces (HMI), and simulating
the interaction with these interfaces. The action of predicting is based
on a task analysis, which investigates what a user is required to do
in terms of actions and cognitive processes to achieve a task. Task
analysis facilitates the understanding of the system-s functionalities.
Cognitive models are part of the analytical approaches, that do not
associate the users during the development process of the interface.
This article presents a study about the evaluation of a human
machine interaction with a contextual assistant-s interface using ACTR
and GOMS cognitive models. The present work shows how these
techniques may be applied in the evaluation of HMI, design and
research by emphasizing firstly the task analysis and secondly the
time execution of the task. In order to validate and support our
results, an experimental study of user performance is conducted at
the DOMUS laboratory, during the interaction with the contextual
assistant-s interface. The results of our models show that the GOMS
and ACT-R models give good and excellent predictions respectively
of users performance at the task level, as well as the object level.
Therefore, the simulated results are very close to the results obtained
in the experimental study.
Abstract: Free convection effects and heat transfer due to a pulsating point heat source embedded in an infinite, fluid saturated, porous dusty medium are studied analytically. Both velocity and temperature fields are discussed in the form of series expansions in the Rayleigh number, for both the fluid and particle phases based on the mean heat generation rate from source and on the permeability of the porous dusty medium. This study is carried out by assuming the Rayleigh number small and the validity of Darcy-s law. Analytical expressions for both phases are obtained for second order mean in both velocity and temperature fields and evolution of different wave patterns are observed in the fluctuating part. It has been observed that, at the vicinity of the origin, the second order mean flow is influenced only by relaxation time of dust particles and not by dust concentration.
Abstract: A challenging problem in radar signal processing is to
achieve reliable target detection in the presence of interferences. In
this paper, we propose a novel algorithm for automatic censoring of
radar interfering targets in log-normal clutter. The proposed
algorithm, termed the forward automatic censored cell averaging
detector (F-ACCAD), consists of two steps: removing the corrupted
reference cells (censoring) and the actual detection. Both steps are
performed dynamically by using a suitable set of ranked cells to
estimate the unknown background level and set the adaptive
thresholds accordingly. The F-ACCAD algorithm does not require
any prior information about the clutter parameters nor does it require
the number of interfering targets. The effectiveness of the F-ACCAD
algorithm is assessed by computing, using Monte Carlo simulations,
the probability of censoring and the probability of detection in
different background environments.
Abstract: Security issue and the importance of the function of
police to provide practical and psychological contexts in the
community has been the main topics among researchers , police and
security circles and this subject require to review and analysis
mechanisms within the police and its interaction with other parts of
the system for providing community safety. This paper examine
national and social security in the Internet.
Abstract: With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, we analyze the Advanced Encryption Standard (AES), and we add a key stream generator (A5/1, W7) to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm.
Abstract: Cell phone forensics to acquire and analyze data in the
cellular phone is nowadays being used in a national investigation
organization and a private company. In order to collect cellular phone
flash memory data, we have two methods. Firstly, it is a logical
method which acquires files and directories from the file system of the
cell phone flash memory. Secondly, we can get all data from bit-by-bit
copy of entire physical memory using a low level access method. In
this paper, we describe a forensic tool to acquire cell phone flash
memory data using a logical level approach. By our tool, we can get
EFS file system and peek memory data with an arbitrary region from
Korea CDMA cell phone.
Abstract: The lifelong learning is a crucial element in the
modernization of European education and training systems. The most
important actors in the development process of the lifelong learning
are the trainers, whose professional characteristics need new
competences and skills in the current labour market. The main
objective of this paper is to establish an importance ranking of the
new competences, capabilities and skills that the lifelong learning
Spanish trainers must possess nowadays. A wide study of secondary
sources has allowed the design of a questionnaire that organizes the
trainer-s skills and competences. The e-Delphi method is used for
realizing a creative, individual and anonymous evaluation by experts
on the importance ranking that presents the criteria, sub-criteria and
indicators of the e-Delphi questionnaire. Twenty Spanish experts in
the lifelong learning have participated in two rounds of the e-
DELPHI method. In the first round, the analysis of the experts-
evaluation has allowed to establish the ranking of the most
importance criteria, sub-criteria and indicators and to eliminate the
least valued. The minimum level necessary to reach the consensus
among experts has been achieved in the second round.
Abstract: Timetabling problems are often hard and timeconsuming
to solve. Most of the methods of solving them concern
only one problem instance or class. This paper describes a universal
method for solving large, highly constrained timetabling problems
from different domains. The solution is based on evolutionary
algorithm-s framework and operates on two levels – first-level
evolutionary algorithm tries to find a solution basing on given set of
operating parameters, second-level algorithm is used to establish
those parameters. Tabu search is employed to speed up the solution
finding process on first level. The method has been used to solve
three different timetabling problems with promising results.
Abstract: Human activity is a major concern in a wide variety of
applications, such as video surveillance, human computer interface
and face image database management. Detecting and recognizing
faces is a crucial step in these applications. Furthermore, major
advancements and initiatives in security applications in the past years
have propelled face recognition technology into the spotlight. The
performance of existing face recognition systems declines significantly
if the resolution of the face image falls below a certain level.
This is especially critical in surveillance imagery where often, due to
many reasons, only low-resolution video of faces is available. If these
low-resolution images are passed to a face recognition system, the
performance is usually unacceptable. Hence, resolution plays a key
role in face recognition systems. In this paper we introduce a new
low resolution face recognition system based on mixture of expert
neural networks. In order to produce the low resolution input images
we down-sampled the 48 × 48 ORL images to 12 × 12 ones using
the nearest neighbor interpolation method and after that applying
the bicubic interpolation method yields enhanced images which is
given to the Principal Component Analysis feature extractor system.
Comparison with some of the most related methods indicates that
the proposed novel model yields excellent recognition rate in low
resolution face recognition that is the recognition rate of 100% for
the training set and 96.5% for the test set.
Abstract: In the urban traffic network, the intersections are the
“bottleneck point" of road network capacity. And the arterials are the
main body in road network and the key factor which guarantees the
normal operation of the city-s social and economic activities. The
rapid increase in vehicles leads to seriously traffic jam and cause the
increment of vehicles- delay. Most cities of our country are
traditional single control system, which cannot meet the need for the
city traffic any longer. In this paper, Synchro6.0 as a platform to
minimize the intersection delay, optimizesingle signal cycle and split
for Zhonghua Street in Handan City. Meanwhile, linear control
system uses to optimize the phase for the t arterial road in this
system. Comparing before and after use the control, capacities and
service levels of this road and the adjacent road have improved
significantly.
Abstract: Analysis of the elastic scattering of protons on 6,7Li
nuclei has been done in the framework of the optical model at the
beam energies up to 50 MeV. Differential cross sections for the 6,7Li +
p scattering were measured over the proton laboratory–energy range
from 400 to 1050 keV. The elastic scattering of 6,7Li+p data at
different proton incident energies have been analyzed using singlefolding
model. In each case the real potential obtained from the
folding model was supplemented by a phenomenological imaginary
potential, and during the fitting process the real potential was
normalized and the imaginary potential optimized. Normalization
factor NR is calculated in the range between 0.70 and 0.84.
Abstract: Banishing hunger from the face of earth has been
frequently expressed in various international, national and regional
level conferences since 1974. Providing food security has become
important issue across the world particularly in developing countries.
In a developing country like India, where growth rate of population is
more than that of the food grains production, food security is a
question of great concern. According to the International Food Policy
Research Institute's Global Hunger Index, 2011, India ranks 67 of the
81 countries of the world with the worst food security status. After
Green Revolution, India became a food surplus country. Its
production has increased from 74.23 million tonnes in 1966-67 to
257.44 million tonnes in 2011-12. But after achieving selfsufficiency
in food during last three decades, the country is now
facing new challenges due to increasing population, climate change,
stagnation in farm productivity. Therefore, the main objective of the
present paper is to examine the food security situation at national
level in the country and further to explain the paradox of food
insecurity in a food surplus state of India i.e in Punjab at micro level.
In order to achieve the said objectives, secondary data collected from
the Ministry of Agriculture and the Agriculture department of Punjab
State was analyzed. The result of the study showed that despite
having surplus food production the country is still facing food
insecurity problem at micro level. Within the Kandi belt of Punjab
state, the area adjacent to plains is food secure while the area along
the hills falls in food insecure zone.
The present paper is divided into following three sections (i)
Introduction, (ii) Analysis of food security situation at national level
as well as micro level (Kandi belt of Punjab State) (iii) Concluding
Observations
Abstract: A dent is a gross distortion of the pipe cross-section.
Dent depth is defined as the maximum reduction in the diameter of
the pipe compared to the original diameter. Pipeline dent finite
element (FE) simulation and theoretical analysis are conducted in this
paper to develop an understanding of the geometric characteristics
and strain distribution in the pressurized dented pipe. Based on the
results, the magnitude of the denting force increases significantly
with increasing the internal pressure, and the maximum
circumferential and longitudinal strains increase by increasing the
internal pressure and the dent depth. The results can be used for
characterizing dents and ranking their risks to the integrity of a
pipeline.
Abstract: This research paper presents some methods to assess the performance of Wigner Ville Distribution for Time-Frequency representation of non-stationary signals, in comparison with the other representations like STFT, Spectrogram etc. The simultaneous timefrequency resolution of WVD is one of the important properties which makes it preferable for analysis and detection of linear FM and transient signals. There are two algorithms proposed here to assess the resolution and to compare the performance of signal detection. First method is based on the measurement of area under timefrequency plot; in case of a linear FM signal analysis. A second method is based on the instantaneous power calculation and is used in case of transient, non-stationary signals. The implementation is explained briefly for both methods with suitable diagrams. The accuracy of the measurements is validated to show the better performance of WVD representation in comparison with STFT and Spectrograms.
Abstract: Cross sections of As radionuclides in the interaction of natGe with 14-30 MeV protons have been deduced by off-line y-ray spectroscopy to find optimal reaction channels leading to radiotracers for positron emission tomography. The experimental results were compared with the previous results and those estimated by the compound nucleus reaction model.