Abstract: The purpose of this article is to analyze the
degree of concentration in the banking market in EU member
states as well as to determine the impact of the length of EU
membership on the degree of concentration. In that sense
several analysis were conducted, specifically, panel analysis,
calculation of correlation coefficient and regression analysis of
the impact of the length of EU membership on the degree of
concentration. Panel analysis was conducted to determine
whether there is a similar trend of concentration in three
groups of countries - countries with a low, moderate and high
level of concentration. The conducted panel analysis showed
that in EU countries with a moderate level of concentration,
the level of concentration decreases. The calculation of
correlation showed that, to some extent, with other influential
factors, the length of EU membership negatively affects the
market concentration of the banking market. Using the
regression analysis for investigation of the influence of the
length of EU membership on the level of concentration in the
banking sector in a particular country, the results reveal that
there is a negative effect of the length in EU membership on
market concentration, although it is not significantly influential
variable.
Abstract: In this paper a way of hiding text message (Steganography) in the gray image has been presented. In this method tried to find binary value of each character of text message and then in the next stage, tried to find dark places of gray image (black) by converting the original image to binary image for labeling each object of image by considering on 8 connectivity. Then these images have been converted to RGB image in order to find dark places. Because in this way each sequence of gray color turns into RGB color and dark level of grey image is found by this way if the Gary image is very light the histogram must be changed manually to find just dark places. In the final stage each 8 pixels of dark places has been considered as a byte and binary value of each character has been put in low bit of each byte that was created manually by dark places pixels for increasing security of the main way of steganography (LSB).
Abstract: In this paper, we consider a multi user multiple input
multiple output (MU-MIMO) based cooperative reporting system for
cognitive radio network. In the reporting network, the secondary
users forward the primary user data to the common fusion center
(FC). The FC is equipped with linear equalizers and an energy
detector to make the decision about the spectrum. The primary user
data are considered to be a digital video broadcasting - terrestrial
(DVB-T) signal. The sensing channel and the reporting channel are
assumed to be an additive white Gaussian noise and an independent
identically distributed Raleigh fading respectively. We analyzed the
detection probability of MU-MIMO system with linear equalizers and
arrived at the closed form expression for average detection
probability. Also the system performance is investigated under
various MIMO scenarios through Monte Carlo simulations.
Abstract: Heat transfer from two cam shape cylinder in tandem
arrangement had been studied numerically.
The distance between the centers of cylinders (L) is allowed to
vary to change the longitudinal pitch ratio (L/Deq). The equivalent
diameter of the cylinder (Deq) is 27.6 mm and longitudinal pitch ratio
varies in range 2
Abstract: Our Medicine-oriented research is based on a medical
data set of real patients. It is a security problem to share
patient private data with peoples other than clinician or hospital
staff. We have to remove person identification information
from medical data. The medical data without private data
are available after a de-identification process for any research
purposes. In this paper, we introduce an universal automatic
rule-based de-identification application to do all this stuff on an
heterogeneous medical data. A patient private identification is
replaced by an unique identification number, even in burnedin
annotation in pixel data. The identical identification is used
for all patient medical data, so it keeps relationships in a data.
Hospital can take an advantage of a research feedback based
on results.
Abstract: The concept of e-Learning is now emerging in Sub Saharan African countries like Tanzania. Due to economic constraints and other social and cultural factors faced by these countries, the use of Information and Communication Technology (ICT) is increasing at a very low pace. The digital divide threat has propelled the Government of Tanzania to put in place the national ICT Policy in 2003 which defines the direction of all ICT activities nationally. Among the main focused areas is the use of ICT in education, since for the development of any country, there is a need of creating knowledge based society. This paper discusses the initiatives made so far to introduce the use of ICT tools to some secondary schools using open source software in e-content development to facilitate a self-learning environment
Abstract: Current mode circuits like current conveyors are
getting significant attention in current analog ICs design due to their
higher band-width, greater linearity, larger dynamic range, simpler
circuitry, lower power consumption and less chip area. The second
generation current controlled conveyor (CCCII) has the advantage of
electronic adjustability over the CCII i.e. in CCCII; adjustment of the
X-terminal intrinsic resistance via a bias current is possible. The
presented approach is based on the CMOS implementation of second
generation positive (CCCII+), negative (CCCII-) and dual Output
Current Controlled Conveyor (DOCCCII) and its application as
Universal filter. All the circuits have been designed and simulated
using 65nm CMOS technology model parameters on Cadence
Virtuoso / Spectre using 1V supply voltage. Various simulations have
been carried out to verify the linearity between output and input
ports, range of operation frequency, etc. The outcomes show good
agreement between expected and experimental results.
Abstract: This research is to design and implement a new kind
of agitators called differential agitator. The Differential Agitator is an
electro- mechanic set consists of two shafts. The first shaft is the
bearing axis while the second shaft is the axis of the quartet upper
bearing impellers group and the triple lower group which are called
as agitating group. The agitating group is located inside a cylindrical
container equipped especially to contain square directors for the
liquid entrance and square directors called fixing group for the liquid
exit. The fixing group is installed containing the agitating group
inside any tank whether from upper or lower position. The agitating
process occurs through the agitating group bearing causing a lower
pressure over the upper group leading to withdrawing the liquid from
the square directors of the liquid entering and consequently the liquid
moves to the denser place under the quartet upper group. Then, the
liquid moves to the so high pressure area under the agitating group
causing the liquid to exit from the square directors in the bottom of
the container. For improving efficiency, parametric study and shape
optimization has been carried out. A numerical analysis,
manufacturing and laboratory experiments were conducted to design
and implement the differential agitator. Knowing the material
prosperities and the loading conditions, the FEM using ANSYS11
was used to get the optimum design of the geometrical parameters of
the differential agitator elements while the experimental test was
performed to validate the advantages of the differential agitators to
give a high agitation performance of lime in the water as an example.
In addition, the experimental work has been done to express the
internal container shape in the agitation efficiency. The study ended
up with conclusions to maximize agitator performance and optimize
the geometrical parameters to be used for manufacturing the
differential agitator
Abstract: Children and adolescents developing in the worlds of today are facing a getting array of new and old challenges. School counselling is improving rapidly in contemporary education systems around the world. It can be said that counselling system in Turkey was newly borning. In this study, “Family of the Blood" activity is improved with respect to compherensive guidance school program. The sample included 22 adolescents who were high school students. The activity was carried out in 4 sessions, each of which lasted 45 minutes. In the first session, students- personal-social needs were determined. In the second session, in order to warm up, the students were asked three questions consisting of the constructional aspect. In the third session, the counselor and the teacher shared the results of students- responses obtained in the previous session. In the fourth session, the tables formed by students were presented in the classroom. In order to evaluate the activity, three questions were asked of the teacher and counselor. According to the results, the lesson aims of curriculum and counselling aims of curriculum were attained. In the light of literature, the results were discussed and some suggestions were made. It is taken into consideration that the activitiy was beneficial in many respects, similar studies should be carried out in the near future.
Abstract: A linear feedback shift register (LFSR) is proposed which targets to reduce the power consumption from within. It reduces the power consumption during testing of a Circuit Under Test (CUT) at two stages. At first stage,
Control Logic (CL) makes the clocks of the switching units
of the register inactive for a time period when output from
them is going to be same as previous one and thus reducing
unnecessary switching of the flip-flops. And at second stage,
the LFSR reorders the test vectors by interchanging the bit
with its next and closest neighbor bit. It keeps fault coverage
capacity of the vectors unchanged but reduces the Total Hamming Distance (THD) so that there is reduction in power
while shifting operation.
Abstract: In this article, a formal specification and verification of the Rabin public-key scheme in a formal proof system is presented. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. A major objective of this article is the presentation of the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Moreover, we explicate a (computer-proven) formalization of correctness as well as a computer verification of security properties using a straight-forward computation model in Isabelle/HOL. The analysis uses a given database to prove formal properties of our implemented functions with computer support. The main task in designing a practical formalization of correctness as well as efficient computer proofs of security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as efficient formal proofs. Consequently, we get reliable proofs with a minimal error rate augmenting the used database, what provides a formal basis for more computer proof constructions in this area.
Abstract: Thisresearch paper is dedicated to an actual issue in Latvia and in the whole European Union – development of the secondary materials management. The goal of this paper is to research the development of the secondary materials management in Latvia as a result to point out its main positive aspects and problems. In this research paper the author regards following issues: significance of the secondary materials management, current situation of the waste generation and utilization in Latvia comparing with other EU Member States, main problems and positive aspects of the secondary materials management in Latvia. The research author concludes that in last ten years a great work is done to develop the secondary materials market. Nevertheless following improvements are necessary: implementation of the packaging deposit system, development of the separate waste collection, increasing of the recycling capacity.
Abstract: In inspection and workpiece localization, sampling point data is an important issue. Since the devices for sampling only sample discrete points, not the completely surface, sampling size and location of the points will be taken into consideration. In this paper a method is presented for determining the sampled points size and location for achieving efficient sampling. Firstly, uncertainty analysis of the localization parameters is investigated. A localization uncertainty model is developed to predict the uncertainty of the localization process. Using this model the minimum size of the sampled points is predicted. Secondly, based on the algebra theory an eigenvalue-optimal optimization is proposed. Then a freeform surface is used in the simulation. The proposed optimization is implemented. The simulation result shows its effectivity.
Abstract: The main objective of this study was to determine if a
minimal increase in road light level (luminance) could lead to
improved driving performance among older adults. Older, middleaged
and younger adults were tested in a driving simulator following
vision and cognitive screening. Comparisons were made for the
performance of simulated night driving under two road light
conditions (0.6 and 2.5 cd/m2). At each light level, the effects of self
reported night driving avoidance were examined along with the
vision/cognitive performance. It was found that increasing road light
level from 0.6 cd/m2 to 2.5 cd/m2 resulted in improved recognition of
signage on straight highway segments. The improvement depends on
different driver-related factors such as vision and cognitive abilities,
and confidence. On curved road sections, the results showed that
driver-s performance worsened. It is concluded that while increasing
road lighting may be helpful to older adults especially for sign
recognition, it may also result in increased driving confidence and
thus reduced attention in some driving situations.
Abstract: This paper provides an exergy analysis of the multistage refrigeration cycle used for C2+ recovery plant. The behavior of an industrial refrigeration cycle with refrigerant propane has been investigated by the exergy method. A computational model based on the exergy analysis is presented for the investigation of the effects of the valves on the exergy losses, the second law of efficiency, and the coefficient of performance (COP) of a vapor compression refrigeration cycle. The equations of exergy destruction and exergetic efficiency for the main cycle components such as evaporators, condensers, compressors, and expansion valves are developed. The relations for the total exergy destruction in the cycle and the cycle exergetic efficiency are obtained. An ethane recovery unit with its refrigeration cycle has been simulated to prepare the exergy analysis. Using a typical actual work input value; the exergetic efficiency of the refrigeration cycle is determined to be 39.90% indicating a great potential for improvements. The simulation results reveal that the exergetic efficiencies of the heat exchanger and expansion sections get the lowest rank among the other compartments of refrigeration cycle. Refrigeration calculations have been carried out through the analysis of T–S and P–H diagrams where coefficient of performance (COP) was obtained as 1.85. The novelty of this article includes the effect and sensitivity analysis of molar flow, pressure drops and temperature on the exergy efficiency and coefficient of performance of the cycle.
Abstract: Ciprofloxacin (CIP) and Carbamazepine (CBZ), nonbiodegradable pharmaceutical residues, were become emerging pollutants in several aquatic environments. The objectives of this research were to study the possibility to recover these pharmaceuticals residues from pharmaceutical wastewater by increasing the selective adsorption on synthesized functionalized porous silicate, comparing with powdered activated carbon (PAC). Hexagonal mesoporous silicate (HMS), functionalized HMSs (3- aminopropyltriethoxy, 3- mercaptopropyltrimethoxy and noctyldimethyl) were synthesized and characterized physico-chemical characteristics. Obtained adsorption kinetics and isotherms showed that 3-mercaptopropyltrimethoxy functional groups grafted on HMS provided highest CIP and CBZ adsorption capacities; however, it was still lower than that of PAC. The kinetic results were compatible with pseudo-second order. The hydrophobicity and hydrogen bonding might play a key role on the adsorption. Furthermore, the capacities were affected by varying pH values due to the strength of hydrogen bonding between targeted compounds and adsorbents. Electrostatic interaction might not affect the adsorption capacities.
Abstract: In this paper, we introduce a novel platform
encryption method, which modify its keys and random number
generators step by step during encryption algorithms. According to
complexity of the proposed algorithm, it was safer than any other
method.
Abstract: This paper is taken into consideration the problem of cryptanalysis of stream ciphers. There is some attempts need to improve the existing attacks on stream cipher and to make an attempt to distinguish the portions of cipher text obtained by the encryption of plain text in which some parts of the text are random and the rest are non-random. This paper presents a tutorial introduction to symmetric cryptography. The basic information theoretic and computational properties of classic and modern cryptographic systems are presented, followed by an examination of the application of cryptography to the security of VoIP system in computer networks using LFSR algorithm. The implementation program will be developed Java 2. LFSR algorithm is appropriate for the encryption and decryption of online streaming data, e.g. VoIP (voice chatting over IP). This paper is implemented the encryption module of speech signals to cipher text and decryption module of cipher text to speech signals.
Abstract: We summarize information that facilitates choosing an ontology language for knowledge intensive applications. This paper is a short version of the ontology language state-of-the-art and evolution analysis carried out for choosing an ontology language in the IST Esperonto project. At first, we analyze changes and evolution that took place in the filed of Semantic Web languages during the last years, in particular, around the ontology languages of the RDF/S and OWL family. Second, we present current trends in development of Semantic Web languages, in particular, rule support extensions for Semantic Web languages and emerging ontology languages such as WSMO languages.
Abstract: A novel algorithm for construct a seamless video mosaic of the entire panorama continuously by automatically analyzing and managing feature points, including management of quantity and quality, from the sequence is presented. Since a video contains significant redundancy, so that not all consecutive video images are required to create a mosaic. Only some key images need to be selected. Meanwhile, feature-based methods for mosaicing rely on correction of feature points? correspondence deeply, and if the key images have large frame interval, the mosaic will often be interrupted by the scarcity of corresponding feature points. A unique character of the method is its ability to handle all the problems above in video mosaicing. Experiments have been performed under various conditions, the results show that our method could achieve fast and accurate video mosaic construction. Keywords?video mosaic, feature points management, homography estimation.