Abstract: Broccoli has been widely recognized as a wealthy
vegetable which contains multiple nutrients with potent anti-cancer
properties. Lamb’s lettuce has been used as food for many centuries
but only recently became commercially available and literature is
therefore exiguous concerning these vegetables. The aim of this work
was to evaluate the influence of the extraction conditions on the yield
of phenolic compounds and the corresponding antioxidant capacity of
broccoli and lamb’s lettuce. The results indicate that lamb’s lettuce,
compared to broccoli, contains simultaneously a large amount of total
polyphenols as well as high antioxidant activity. It is clearly
demonstrated that extraction solvent significantly influences the
antioxidant activity. Methanol is the solvent that can globally
maximize the antioxidant extraction yield. The results presented
herein prove lamb’s lettuce as a very interesting source of
polyphenols, and thus a potential health-promoting food.
Abstract: A virtualized and virtual approach is presented on
academically preparing students to successfully engage at a strategic
perspective to understand those concerns and measures that are both
structured and not structured in the area of cyber security and
information assurance. The Master of Science in Cyber Security and
Information Assurance (MSCSIA) is a professional degree for those
who endeavor through technical and managerial measures to ensure
the security, confidentiality, integrity, authenticity, control,
availability and utility of the world-s computing and information
systems infrastructure. The National University Cyber Security and
Information Assurance program is offered as a Master-s degree. The
emphasis of the MSCSIA program uniquely includes hands-on
academic instruction using virtual computers. This past year, 2011,
the NU facility has become fully operational using system
architecture to provide a Virtual Education Laboratory (VEL)
accessible to both onsite and online students. The first student cohort
completed their MSCSIA training this past March 2, 2012 after
fulfilling 12 courses, for a total of 54 units of college credits. The
rapid pace scheduling of one course per month is immensely
challenging, perpetually changing, and virtually multifaceted. This
paper analyses these descriptive terms in consideration of those
globalization penetration breaches as present in today-s world of
cyber security. In addition, we present current NU practices to
mitigate risks.
Abstract: This paper presents a comparison between two Pulse
Width Modulation (PWM) algorithms applied to a three-level Neutral
Point Clamped (NPC) Voltage Source Inverter (VSI). The first
algorithm applied is the triangular-sinusoidal strategy; the second is
the Space Vector Pulse Width Modulation (SVPWM) strategy. In the
first part, we present a topology of three-level NCP VSI. After that,
we develop the two PWM strategies to control this converter. At the
end the experimental results are presented.
Abstract: For scores of years now, several microfinance
organizations, non governmental organizations and other welfare
organizations have, with a view to aiding the progress of
communities rooted in poverty have been focusing on creating
microentrepreneurs, besides taking several other measures. In recent
times, business corporations have joined forces to combat poverty by
taking up microenterprise development. Hindustan Unilever Limited
(HUL), the Indian subsidiary of Unilever Limited exemplifies this
through its Project Shakti. The company through the Project creates
rural women entrepreneurs by making them direct to home sales
distributors of its products in villages that have thus far been ignored
by multinational corporations. The members participating in Project
Shakti are largely self help group members. The paper focuses on
assessing the impact made by the company on the members engaged
in Project Shakti. The analysis involves use of quantitative methods
to study the effect of Project Shakti on those self help group
members engaged in Project Shakti and those not engaged with
Project Shakti. Path analysis has been used to study the impact made
on those members engaged in Project Shakti. Significant differences
were observed on fronts of entrepreneurial development, economic
empowerment and social empowerment between members associated
with Project Shakti and those not associated with Project Shakti.
Path analysis demonstrated that involvement in Project Shakti led to
entrepreneurial development resulting in economic empowerment
that in turn led to social empowerment and that these three elements
independently induced a feeling of privilege in the women for being
associated with the Project.
Abstract: The paper deals with an analysis of visibility records collected from 210 European airports to obtain a realistic estimation of the availability of Free Space Optical (FSO) data links. Commercially available optical links usually operate in the 850nm waveband. Thus the influence of the atmosphere on the optical beam and on the visible light is similar. Long-term visibility records represent an invaluable source of data for the estimation of the quality of service of FSO links. The model used characterizes both the statistical properties of fade depths and the statistical properties of individual fade durations. Results are presented for Italy, France, and Germany.
Abstract: Particulate reinforced metal matrix composites
(MMCs) are potential materials for various applications due to their
advantageous of physical and mechanical properties. This paper
presents a study on the performance of stir cast Al2O3 SiC reinforced
metal matrix composite materials. The results indicate that the
composite materials exhibit improved physical and mechanical
properties, such as, low coefficient of thermal expansion, high
ultimate tensile strength, high impact strength, and hardness. It has
been found that with the increase of weight percentage of
reinforcement particles in the aluminium metal matrix, the new
material exhibits lower wear rate against abrasive wearing. Being
extremely lighter than the conventional gray cast iron material, the
Al-Al2O3 and Al-SiC composites could be potential green materials
for applications in the automobile industry, for instance, in making
car disc brake rotors.
Abstract: This paper presents an efficient algorithm for
optimization of radial distribution systems by a network
reconfiguration to balance feeder loads and eliminate overload
conditions. The system load-balancing index is used to determine the
loading conditions of the system and maximum system loading
capacity. The index value has to be minimum in the optimal network
reconfiguration of load balancing. A method based on Tabu search
algorithm, The Tabu search algorithm is employed to search for the
optimal network reconfiguration. The basic idea behind the search is
a move from a current solution to its neighborhood by effectively
utilizing a memory to provide an efficient search for optimality. It
presents low computational effort and is able to find good quality
configurations. Simulation results for a radial 69-bus system with
distributed generations and capacitors placement. The study results
show that the optimal on/off patterns of the switches can be identified
to give the best network reconfiguration involving balancing of
feeder loads while respecting all the constraints.
Abstract: Game theory could be used to analyze the conflicted
issues in the field of information hiding. In this paper, 2-phase game
can be used to build the embedder-attacker system to analyze the
limits of hiding capacity of embedding algorithms: the embedder
minimizes the expected damage and the attacker maximizes it. In the
system, the embedder first consumes its resource to build embedded
units (EU) and insert the secret information into EU. Then the attacker
distributes its resource evenly to the attacked EU. The expected
equilibrium damage, which is maximum damage in value from the
point of view of the attacker and minimum from the embedder against
the attacker, is evaluated by the case when the attacker attacks a
subset from all the EU. Furthermore, the optimal equilibrium capacity
of hiding information is calculated through the optimal number of EU
with the embedded secret information. Finally, illustrative examples
of the optimal equilibrium capacity are presented.
Abstract: This paper presents the results of corrosion fatigue
crack growth behaviour of a Ni-Cr-Mn steel commonly used in
marine applications. The effect of mechanical variables such as
frequency and load ratio on fatigue crack growth rate at various
stages has been studied using compact tension (C(T)) specimens
along the rolling direction of steel plate under 3.5% saturated NaCl
aqueous environment. The significance of crack closure on corrosion
fatigue, and the validity of Elber-s empirical linear crack closure
model with the ASTM compliance offset method have been
examined.
Fatigue crack growth rate is higher and threshold stress intensities
are lower in aqueous environment compared to the lab air conditions.
It is also observed that the crack growth rate increases at lower
frequencies. The higher stress ratio promotes the crack growth. The
effect of oxidization and corrosion pit formation is very less as the
stress ratio is increased. It is observed that as stress ratios are
increased, the Elber-s crack closure model agrees well with the crack
closure estimated by the ASTM compliance offset method for tests
conducted at 5Hz frequency compared to tests conducted at 1Hz in
corrosive environment.
Abstract: In this study, the reduction of Cr(VI) by use of scrap
iron, a cheap and locally available industrial waste, was investigated
in continuous system. The greater scrap iron efficiency observed for
the first two sections of the column filling indicate that most of the
reduction process was carried out in the bottom half of the column
filling. This was ascribed to a constant decrease of Cr(VI)
concentration inside the filling, as the water front passes from the
bottom to the top end of the column. While the bottom section of the
column filling was heavily passivated with secondary mineral phases,
the top section was less affected by the passivation process; therefore
the column filling would likely ensure the reduction of Cr(VI) for
time periods longer than 216 hours. The experimental results indicate
that fixed beds columns packed with scrap iron could be successfully
used for the first step of Cr(VI) polluted wastewater treatment.
However, the mass of scrap iron filling should be carefully estimated
since it significantly affects the Cr(VI) reduction efficiency.
Abstract: A numerical simulation of vortex-induced vibration of
a 2-dimensional elastic circular cylinder with two degree of freedom
under the uniform flow is calculated when Reynolds is 200.
2-dimensional incompressible Navier-Stokes equations are solved
with the space-time finite element method, the equation of the cylinder
motion is solved with the new explicit integral method and the mesh
renew is achieved by the spring moving mesh technology. Considering
vortex-induced vibration with the low reduced damping parameter, the
variety trends of the lift coefficient, the drag coefficient, the
displacement of cylinder are analyzed under different oscillating
frequencies of cylinder. The phenomena of locked-in, beat and
phases-witch were captured successfully. The evolution of vortex
shedding from the cylinder with time is discussed. There are very
similar trends in characteristics between the results of the one degree
of freedom cylinder model and that of the two degree of freedom
cylinder model. The streamwise vibrations have a certain effect on the
lateral vibrations and their characteristics.
Abstract: In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input multiple output (SIMO) Gaussian wire-tap channels and then use scalar approach to convert it into two equivalent multiple input single output (MISO) channels. The secrecy capacity model is then developed for the condition where the channel state information (CSI) for main channel only is known to the transmitter. The results show that the secret communication is possible when the eavesdropper channel noise is greater than a cutoff noise level. The outage probability is also analyzed of secrecy capacity is also analyzed. The effect of fading and outage probability is also analyzed.
Abstract: Segmentation of a color image composed of different
kinds of regions can be a hard problem, namely to compute for an
exact texture fields. The decision of the optimum number of
segmentation areas in an image when it contains similar and/or un
stationary texture fields. A novel neighborhood-based segmentation
approach is proposed. A genetic algorithm is used in the proposed
segment-pass optimization process. In this pass, an energy function,
which is defined based on Markov Random Fields, is minimized. In
this paper we use an adaptive threshold estimation method for image
thresholding in the wavelet domain based on the generalized
Gaussian distribution (GGD) modeling of sub band coefficients. This
method called Normal Shrink is computationally more efficient and
adaptive because the parameters required for estimating the threshold
depend on sub band data energy that used in the pre-stage of
segmentation. A quad tree is employed to implement the multi
resolution framework, which enables the use of different strategies at
different resolution levels, and hence, the computation can be
accelerated. The experimental results using the proposed
segmentation approach are very encouraging.
Abstract: WiMAX and Wi-Fi are considered as the promising
broadband access solutions for wireless MAN’s and LANs,
respectively. In the recent works WiMAX is considered suitable as a
backhaul service to connect multiple dispersed Wi-Fi ‘hotspots’.
Hence a new integrated WiMAX/Wi-Fi architecture has been
proposed in literatures. In this paper the performance of an integrated
WiMAX/Wi-Fi network has been investigated by streaming a video
conference application. The difference in performance between the
two protocols is compared with respect to video conferencing. The
Heterogeneous network was simulated in the OPNET simulator.
Abstract: In this note, we consider a family of iterative formula for computing the weighted Minskowski inverses AM,N in Minskowski space, and give two kinds of iterations and the necessary and sufficient conditions of the convergence of iterations.
Abstract: With the rapid advanced of technology, the industrial processes become increasingly demanding, from the point of view, power quality and controllability. The advent of multi levels inverters responds partially to these requirements. But actually, the new generation of multi-cells inverters permits to reach more performances, since, it offers more voltage levels. The disadvantage in the increase of voltage levels by the number of cells in cascades is on account of series igbts synchronisation loss, from where, a limitation of cells in cascade to 4. Regarding to these constraints, a new topology is proposed in this paper, which increases the voltage levels of the three-cell inverter from 4 to 8; with the same number of igbts, and using less stored energy in the flaying capacitors. The details of operation and modelling of this new inverter structure are also presented, then tested thanks to a three phase induction motor. KeywordsFlaying capacitors, Multi-cells inverter, pwm, switchers, modelling.
Abstract: Small and Medium Sized Enterprises (SMEs) play an important role in many economies. In New Zealand, for example, 97% of all manufacturing companies employ less than 100 staff, and generate the predominant part of this industry sector-s economic output. Manufacturing SMEs as a group also have a significant impact on the environment. This situation is similar in many developed economies, including the European Union. Sustainable economic development therefore needs to strongly consider the role of manufacturing SMEs, who generally find it challenging to move towards more environmentally friendly business practices. This paper presents a systems thinking approach to modelling and understanding the factors which have an influence on the successful uptake of environmental practices in small and medium sized manufacturing companies. It presents a number of causal loop diagrams which have been developed based on primary action research, and a thorough understanding of the literature in this area. The systems thinking model provides the basis for further development of a strategic framework for the successful uptake of environmental innovation in manufacturing SMEs.
Abstract: A model based fault detection and diagnosis
technique for DC motor is proposed in this paper. Fault detection
using Kalman filter and its different variants are compared. Only
incipient faults are considered for the study. The Kalman Filter
iterations and all the related computations required for fault detection
and fault confirmation are presented. A second order linear state
space model of DC motor is used for this work. A comparative
assessment of the estimates computed from four different observers
and their relative performance is evaluated.
Abstract: In this paper we propose a new approach to constructing the Delaunay Triangulation and the optimum algorithm for the case of multidimensional spaces (d ≥ 2). Analysing the modern state, it is possible to draw a conclusion, that the ideas for the existing effective algorithms developed for the case of d ≥ 2 are not simple to generalize on a multidimensional case, without the loss of efficiency. We offer for the solving this problem an effective algorithm that satisfies all the given requirements. But theoretical complexity of the problem it is impossible to improve as the Worst - Case Optimality for algorithms of solving such a problem is proved.
Abstract: Access Management is the proactive management of
vehicular access points to land parcels adjacent to all manner of
roadways. Good access management promotes safe and efficient use
of the transportation network. This study attempts to utilize archived
data from the University Technology of Malaysia on-campus area to
assess the accuracy with which access management display some
benefits. Results show that usage of access management reduces
delay and fewer crashes. Clustered development can improve
walking, cycling and transit travel, reduce parking requirements and
improve emergency responses. Effective Access Management
planning can also reduce total roadway facility costs by reducing the
number of driveways and intersections. At the end after presenting
recommendations some of the travel impact, and benefits that
can be derived if these suggestions are implemented have
been summarized with the related comments.