Abstract: Increased energy demand and the concern about
environment friendly technology, renewable bio-fuels are better
alternative to petroleum products. In the present study linseed oil was
used as alternative source for diesel engine fuel and the results were
compared with baseline data of neat diesel. Performance parameters
such as brake thermal efficiency (BTE) and brake specific fuel
consumption (BSFC) and emissions parameters such as CO,
unburned hydro carbon (UBHC), NOx, CO2 and exhaust temperature
were compared. BTE of the engine was lower and BSFC was higher
when the engine was fueled with Linseed oil compared to diesel fuel.
Emission characteristics are better than diesel fuel. NOx formation by
using linseed oil during the experiment was lower than diesel fuel.
Linseed oil is non edible oil, so it can be used as an extender of diesel
fuel energy source for small and medium energy needs.
Abstract: Nowadays, keyless entry systems are widely adopted
for vehicle immobilizer systems due to both advantages of security and
convenience. Keyless entry systems could overcome brute-force key
guessing attack, statistics attack and masquerade attack, however,
they can't prevent from thieves stealing behavior. In this paper, we
proposed a new architecture try to improve the existent flaws. The
integration of the keyless entry system and the fingerprint
identification technology is more suitable to implement on the
portable transponder to achieve higher security needs. We also adopt
and modify AES security protocol for life expectancy and security of
the portable transponder. In addition, the identification of a driver's
fingerprint makes the service of automatic reinstatement of a driver's
preferences become possible. Our design can satisfy not only the three
kinds of previous illegal attacks, but also the stealing situation.
Furthermore, many practical factors, such as costs, life expectancy and
performance, have been well considered in the design of portable
transponder.
Abstract: In today-s world, the efficient utilization of wood
resources comes more and more to the mind of forest owners. It is a
very complex challenge to ensure an efficient harvest of the wood
resources. This is one of the scopes the project “Virtual Forest II"
addresses. Its core is a database with data about forests containing
approximately 260 million trees located in North Rhine-Westphalia
(NRW). Based on this data, tree growth simulations and wood
mobilization simulations can be conducted. This paper focuses on the
latter. It describes a discrete-event-simulation with an attached 3-D
real time visualization which simulates timber harvest using trees
from the database with different crop resources. This simulation can
be displayed in 3-D to show the progress of the wood crop. All the
data gathered during the simulation is presented as a detailed
summary afterwards. This summary includes cost-benefit
calculations and can be compared to those of previous runs to
optimize the financial outcome of the timber harvest by exchanging
crop resources or modifying their parameters.
Abstract: Although the Vietnamese catfish farming has grown
at very high rates in recent years, the industry has also faced many
problems affecting its sustainability. This paper studies the
perceptions of catfish farmers regarding risk and risk management
strategies in their production activities. Specifically, the study aims
to measure the consequences, likelihoods, and levels of risks as well
as the efficacy of risk management in Vietnamese catfish farming.
Data for the study were collected through a sample of 261 catfish
farmers in the Mekong Delta, Vietnam using a questionnaire survey
in 2008. Results show that, in general, price and production risks
were perceived as the most important risks. Farm management and
technical measures were perceived more effective than other kinds of
risk management strategies in risk reduction. Although price risks
were rated as important risks, price risk management strategies were
not perceived as important measures for risk mitigation. The results
of the study are discussed to provide implications for various
industry stakeholders, including policy makers, processors, advisors,
and developers of new risk management strategies.
Abstract: In today-s competitive market, most companies
develop manufacturing systems that can help in cost reduction and
maximum quality. Human issues are an important part of
manufacturing systems, yet most companies ignore their effects on
production performance. This paper aims to developing an integrated
workforce planning system that incorporates the human being.
Therefore, a multi-objective mixed integer nonlinear programming
model is developed to determine the amount of hiring, firing,
training, overtime for each worker type. This paper considers a
workforce planning model including human aspects such as skills,
training, workers- personalities, capacity, motivation, and learning
rates. This model helps to minimize the hiring, firing, training and
overtime costs, and maximize the workers- performance. The results
indicate that the workers- differences should be considered in
workforce scheduling to generate realistic plans with minimum costs.
This paper also investigates the effects of human learning rates on the
performance of the production systems.
Abstract: The present paper is a case study about exploitation of
Kheir Abad river (Khoozestan, Iran) water resources and the
problems caused by river sediments around the pumping stations.
The weak points and strong points of Boneh Basht pumping station
have been studied by experienced experts, work teams, and
consulting engineers and technical and executive solutions have been
suggested. Therefore, the suggestions of this article are based on the
performed studies and are proposed in order to evaluate the logical
solutions.
Rather complicated processes resulting from the interaction of
water flows and sediments observed at Boneh Basht pumping station
occur at other pumping stations in almost the same way. Therefore,
Boneh Basht pumping station can be selected as a sample (pilot) and
up-to-date theories and experiences can be applied to this station and
the results can be offered to other stations.
Abstract: The commercial white tyres are usually used for forklifts in food and medicine industries. Conventionally, silica is used as reinforcement in the tyres. However, the adhesion between silica particles and rubber is remarkably poor. To improve the problem of adhesion and hence enhance wear resistance, modification of silica surface is one of the solutions. In this work, the natural rubber compound blending with polyisoprene-coated silica prepared by admicellar polymerization technique was studied to compare with the natural rubber compound of unmodified silica. The surface characterization of modified silica was also examined by SEM, FTIR, and TGA. The results show that polyisoprene-coated silica/natural rubber compound gave better overall mechanical properties, especially wear resistance with the improvement of the adhesion between silica and natural rubber matrix that can be seen in the SEM micrograph.
Abstract: Peer-to-Peer (P2P) is a self-organizing resource sharing network with no centralized authority or infrastructure, which makes it unpredictable and vulnerable. In this paper, we propose architecture to make the peer-to-peer network more centralized, predictable, and safer to use by implementing trust and stopping free riding.
Abstract: In general, reports are a form of representing data in
such way that user gets the information he needs. They can be built in
various ways, from the simplest (“select from") to the most complex
ones (results derived from different sources/tables with complex
formulas applied). Furthermore, rules of calculations could be written
as a program hard code or built in the database to be used by dynamic
code. This paper will introduce two types of reports, defined in the
DB structure. The main goal is to manage calculations in optimal
way, keeping maintenance of reports as simple and smooth as
possible.
Abstract: The novelty proposed in this study is twofold and consists in the developing of a new color similarity metric based on the human visual system and a new color indexing based on a textual approach. The new color similarity metric proposed is based on the color perception of the human visual system. Consequently the results returned by the indexing system can fulfill as much as possibile the user expectations. We developed a web application to collect the users judgments about the similarities between colors, whose results are used to estimate the metric proposed in this study. In order to index the image's colors, we used a text indexing engine to facilitate the integration of visual features in a database of text documents. The textual signature is build by weighting the image's colors in according to their occurrence in the image. The use of a textual indexing engine, provide us a simple, fast and robust solution to index images. A typical usage of the system proposed in this study, is the development of applications whose data type is both visual and textual. In order to evaluate the proposed method we chose a price comparison engine as a case of study, collecting a series of commercial offers containing the textual description and the image representing a specific commercial offer.
Abstract: Cattle manure and mineral fertilizers are two source
of Nitrogen, which can affect the growth and quantity of potato. In
this research the effects of the use of cattle manure (5, 10, 15 and 20
ton ha-1), Nitrogen fertilizer (50, 100 and 150 kg N ha-1) and their
interaction on potato growth were evaluated during field
experiments in 2008 with the help of Randomized Complete Block
(RCB) with the factorial arrangement of three experimental
replications in Iran. At the 75 th day after emergence, dry weight of
Shoots, leaf area index (LAI) and plant height were recorded. Results
showed that, dry weight of Shoots, LAI and plant height increased
linearly and very significantly in response to the application of
manure and Nitrogen fertilizer. While the interaction between
manure and Nitrogen fertilizer just on the LAI and plant height was
significant, somehow the maximum amount of plant height( 73 cm)
was obtained by using 150 kg Nitrogen + 15 tons of manure per
hectare, and maximum LAI ( 5.36) was obtained by using 150 kg
Nitrogen + 20 tons of manure per hectare. Also in this experiment
maximum tuber yield (36.8 tons ha-1) was obtained by the utilization
of 150 kg Nitrogen per hectare + 20 tons manure.
Abstract: The international society focuses on the environment
protection and natural energy sources control for the global
cooperation against weather change and sustainable growth. The study
presents the overview of the water shortage status and the necessity of wastewater reuse facility in military facilities and for the possibility of
the introduction, compares the economics by means of cost-benefit
analysis. The military features such as the number of users of military barracks and the water use were surveyed by the design principles by
facility types, the application method of wastewater reuse facility was selected, the feed water, its application and the volume of reuse volume were defined and the expectation was estimated, confirming
the possibility of introducing a wastewater reuse possibility by means of cost-benefit analysis.
Abstract: Because road traffic accidents are a major source of death worldwide, attempts have been made to create Advanced Driver Assistance Systems (ADAS) able to detect vehicle, driver and
environmental conditions that are cues for possible potential accidents. This paper presents continued work on a novel Nonintrusive
Intelligent Driver Assistance and Safety System (Ni-DASS)
for assessing driver attention and hazard awareness. It uses two onboard
CCD cameras – one observing the road and the other observing
the driver-s face. The windscreen is divided into cells and analysis of
the driver-s eye-gaze patterns allows Ni-DASS to determine the windscreen cell the driver is focusing on using eye-gesture templates.
Intersecting the driver-s field of view through the observed
windscreen cell with subsections of the camera-s field of view containing a potential hazard allows Ni-DASS to estimate the
probability that the driver has actually observed the hazard. Results
have shown that the proposed technique is an accurate enough
measure of driver observation to be useful in ADAS systems.
Abstract: Most of researches for conventional simulations were
studied focusing on flocks with a single species. While there exist the
flocking behaviors with a single species in nature, the flocking
behaviors are frequently observed with multi-species. This paper
studies on the flocking simulation for heterogeneous agents. In order
to simulate the flocks for heterogeneous agents, the conventional
method uses the identifier of flock, while the proposed method defines
the feature vector of agent and uses the similarity between agents by
comparing with those feature vectors. Based on the similarity, the
paper proposed the attractive force and repulsive force and then
executed the simulation by applying two forces. The results of
simulation showed that flock formation with heterogeneous agents is
very natural in both cases. In addition, it showed that unlike the
existing method, the proposed method can not only control the density
of the flocks, but also be possible for two different groups of agents to
flock close to each other if they have a high similarity.
Abstract: Computational techniques derived from digital image processing are playing a significant role in the security and digital copyrights of multimedia and visual arts. This technology has the effect within the domain of computers. This research presents discrete M-band wavelet transform (MWT) and cosine transform (DCT) based watermarking algorithm by incorporating the principal component analysis (PCA). The proposed algorithm is expected to achieve higher perceptual transparency. Specifically, the developed watermarking scheme can successfully resist common signal processing, such as geometric distortions, and Gaussian noise. In addition, the proposed algorithm can be parameterized, thus resulting in more security. To meet these requirements, the image is transformed by a combination of MWT & DCT. In order to improve the security further, we randomize the watermark image to create three code books. During the watermark embedding, PCA is applied to the coefficients in approximation sub-band. Finally, first few component bands represent an excellent domain for inserting the watermark.
Abstract: Language Reforms and potential use of ICTs has been a focal area of Higher Education Commission of Pakistan. Efforts are being accelerated to incorporate fast expanding ICTs to bring qualitative improvement in language instruction in higher education. This paper explores how university teachers are benefitting from ICTs to make their English class effective and what type of problems they face in practicing ICTs during their lectures. An in-depth qualitative study was employed to understand why language teachers tend to use ICTs in their instruction and how they are practicing it. A sample of twenty teachers from five universities located in Islamabad, three from public sector and two from private sector, was selected on non-random (Snowball) sampling basis. An interview with 15 semi-structured items was used as research instruments to collect data. The findings reveal that business English teaching is facilitated and improved through the use of ICTs. The language teachers need special training regarding the practices and implementation of ICTs. It is recommended that initiatives might be taken to equip university language teachers with modern methodology incorporating ICTs as focal area and efforts might be made to remove barriers regarding the training of language teachers and proper usage of ICTs.
Abstract: In wireless and mobile communications, this progress
provides opportunities for introducing new standards and improving
existing services. Supporting multimedia traffic with wireless networks
quality of service (QoS). In this paper, a grey-fuzzy controller for radio
resource management (GF-RRM) is presented to maximize the number
of the served calls and QoS provision in wireless networks. In a
wireless network, the call arrival rate, the call duration and the
communication overhead between the base stations and the control
center are vague and uncertain. In this paper, we develop a method to
predict the cell load and to solve the RRM problem based on the
GF-RRM, and support the present facility has been built on the
application-level of the wireless networks. The GF-RRM exhibits the
better adaptability, fault-tolerant capability and performance than other
algorithms. Through simulations, we evaluate the blocking rate, update
overhead, and channel acquisition delay time of the proposed method.
The results demonstrate our algorithm has the lower blocking rate, less
updated overhead, and shorter channel acquisition delay.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created
Abstract: Based on the sources- smoothed rank profile (SRP) and modified minimum description length (MMDL) principle, a method for estimation of the source coherency structure (SCS) and the number of wideband sources is proposed in this paper. Instead of focusing, we first use a spatial smoothing technique to pre-process the array covariance matrix of each frequency for de-correlating the sources and then use smoothed rank profile to determine the SCS and the number of wideband sources. We demonstrate the availability of the method by numerical simulations.
Abstract: In this paper, we introduce an mobile agent framework
with proactive load balancing for ambient intelligence (AmI) environments.
One of the main obstacles of AmI is the scalability in
which the openness of AmI environment introduces dynamic resource
requirements on agencies. To mediate this scalability problem, our
framework proposes a load balancing module to proactively analyze
the resource consumption of network bandwidth and preferred agencies
to suggest the optimal communication method to its user. The
framework generally formulates an AmI environment that consists
of three main components: (1) mobile devices, (2) hosts or agencies,
and (3) directory service center (DSC). A preliminary implementation
was conducted with NetLogo and the experimental results show that
the proposed approach provides enhanced system performance by
minimizing the network utilization to provide users with responsive
services.