Abstract: Rolling element bearings are widely used in industry,
especially where high load capacity is required. The diagnosis of
their conditions is essential matter for downtime reduction and saving
cost of maintenance. Therefore, an intensive analysis of frequency
spectrum of their faults must be carried out in order to determine the
main reason of the fault. This paper focus on a beating phenomena
observed in the waveform (time domain) of a cylindrical rolling
element bearing. The beating frequencies were not related to any
sources nearby the machine nor any other malfunctions (unbalance,
misalignment ...etc). More investigation on the spike energy and the
frequency spectrum indicated a problem with races of the bearing.
Multi-harmonics of the fundamental defects frequencies were
observed. Two of them were close to each other in magnitude those
were the source of the beating phenomena.
Abstract: In this paper, we propose an effective relay
communication for layered video transmission as an alternative to
make the most of limited resources in a wireless communication
network where loss often occurs. Relaying brings stable multimedia
services to end clients, compared to multiple description coding
(MDC). Also, retransmission of only parity data about one or more
video layer using channel coder to the end client of the relay device is
paramount to the robustness of the loss situation. Using these
methods in resource-constrained environments, such as real-time user
created content (UCC) with layered video transmission, can provide
high-quality services even in a poor communication environment.
Minimal services are also possible. The mathematical analysis shows
that the proposed method reduced the probability of GOP loss rate
compared to MDC and raptor code without relay. The GOP loss rate
is about zero, while MDC and raptor code without relay have a GOP
loss rate of 36% and 70% in case of 10% frame loss rate.
Abstract: In this era of globalization, the role of the State in all aspects of development is widely debated. Some scholars contend the 'demise' and diminishing role of the State whilst others claim that the State is still “de facto developmental". Clearly, it is vital to ascertain which of these two contentions are reflective of the role of the State as nations ascend their development trajectories. Based on the findings of this paper, the perception that the Malaysian State plays an active and committed role towards distributing equitable educational opportunities and enhancing employability of Malaysian PWDs is actually a myth and not reality. Thus, in order to fulfill the promise of Vision 2020 to transform Malaysia into a caring and socially-inclusive society; this paper calls for a more interventionist and committed role by the Malaysian State to translate the universal rights of education and employment opportunities for PWDs from mere policy rhetoric into inclusive realities.
Abstract: Medical applications are among the most impactful
areas of microrobotics. The ultimate goal of medical microrobots is
to reach currently inaccessible areas of the human body and carry out
a host of complex operations such as minimally invasive surgery
(MIS), highly localized drug delivery, and screening for diseases at
their very early stages. Miniature, safe and efficient propulsion
systems hold the key to maturing this technology but they pose
significant challenges. A new type of propulsion developed recently,
uses multi-flagella architecture inspired by the motility mechanism of
prokaryotic microorganisms. There is a lack of efficient methods for
designing this type of propulsion system. The goal of this paper is to
overcome the lack and this way, a numerical strategy is proposed to
design multi-flagella propulsion systems. The strategy is based on the
implementation of the regularized stokeslet and rotlet theory, RFT
theory and new approach of “local corrected velocity". The effects of
shape parameters and angular velocities of each flagellum on overall
flow field and on the robot net forces and moments are considered.
Then a multi-layer perceptron artificial neural network is designed
and employed to adjust the angular velocities of the motors for
propulsion control. The proposed method applied successfully on a
sample configuration and useful demonstrative results is obtained.
Abstract: Cylindrical concrete reservoirs are appropriate choice
for storing liquids as water, oil and etc. By using of the pre-cast
concrete reservoirs instead of the in-situ constructed reservoirs, the
speed and precision of the construction would considerably increase.
In this construction method, wall and roof panels would make in
factory with high quality materials and precise controlling. Then,
pre-cast wall and roof panels would carry out to the construction site
for assembling. This method has a few faults such as: the existing
weeks in connection of wall panels together and wall panels to
foundation. Therefore, these have to be resisted under applied loads
such as seismic load. One of the innovative methods which was
successfully applied for seismic retrofitting of numerous pre-cast
cylindrical water reservoirs in New Zealand, using of the high tensile
cables around the reservoirs and post-tensioning them. In this paper,
analytical modeling of wall and roof panels and post-tensioned
cables are carried out with finite element method and the effect of
height to diameter ratio, post-tensioning force value, liquid level in
reservoir, installing position of tendons on seismic response of
reservoirs are investigated.
Abstract: Probability-based identity disclosure risk
measurement may give the same overall risk for different
anonymization strategy of the same dataset. Some entities in the
anonymous dataset may have higher identification risks than the
others. Individuals are more concerned about higher risks than the
average and are more interested to know if they have a possibility of
being under higher risk. A notation of overall risk in the above
measurement method doesn-t indicate whether some of the involved
entities have higher identity disclosure risk than the others. In this
paper, we have introduced an identity disclosure risk measurement
method that not only implies overall risk, but also indicates whether
some of the members have higher risk than the others. The proposed
method quantifies the overall risk based on the individual risk values,
the percentage of the records that have a risk value higher than the
average and how larger the higher risk values are compared to the
average. We have analyzed the disclosure risks for different
disclosure control techniques applied to original microdata and
present the results.
Abstract: The performances of small and medium enterprises
have stagnated in the last two decades. This has mainly been due to
the emergence of HIV / Aids. The disease has had a detrimental
effect on the general economy of the country leading to morbidity
and mortality of the Kenyan workforce in their primary age. The
present study sought to establish the economic impact of HIV / Aids
on the micro-enterprise development in Obunga slum – Kisumu, in
terms of production loss, increasing labor related cost and to establish
possible strategies to address the impact of HIV / Aids on microenterprises.
The study was necessitated by the observation that most
micro-enterprises in the slum are facing severe economic and social
crisis due to the impact of HIV / Aids, they get depleted and close
down within a short time due to death of skilled and experience
workforce. The study was carried out between June 2008 and June
2009 in Obunga slum. Data was subjected to computer aided
statistical analysis that included descriptive statistic, chi-squared and
ANOVA techniques. Chi-squared analysis on the micro-enterprise
owners opinion on the impact of HIV / Aids on depletion of microenterprise
compared to other diseases indicated high levels of the
negative effects of the disease at significance levels of P
Abstract: This paper proposes an easy-to-use instruction hiding
method to protect software from malicious reverse engineering
attacks. Given a source program (original) to be protected, the
proposed method (1) takes its modified version (fake) as an input,
(2) differences in assembly code instructions between original and
fake are analyzed, and, (3) self-modification routines are introduced
so that fake instructions become correct (i.e., original instructions)
before they are executed and that they go back to fake ones after
they are executed. The proposed method can add a certain amount
of security to a program since the fake instructions in the resultant
program confuse attackers and it requires significant effort to discover
and remove all the fake instructions and self-modification routines.
Also, this method is easy to use (with little effort) because all a user
(who uses the proposed method) has to do is to prepare a fake source
code by modifying the original source code.
Abstract: Axisymmetric vibration of an infinite Pyrocomposite
circular hollow cylinder made of inner and outer pyroelectric layer of
6mm-class bonded together by a Linear Elastic Material with Voids
(LEMV) layer is studied. The exact frequency equation is obtained
for the traction free surfaces with continuity condition at the
interfaces. Numerical results in the form of data and dispersion
curves for the first and second mode of the axisymmetric vibration of
the cylinder BaTio3 / Adhesive / BaTio3 by taking the Adhesive layer
as an existing Carbon Fibre Reinforced Polymer (CFRP) are
compared with a hypothetical LEMV layer with and without voids
and as well with a pyroelectric hollow cylinder. The damping is
analyzed through the imaginary parts of the complex frequencies.
Abstract: The purposes of this research were 1) to study
consumer-based equity of luxury brands, 2) to study consumers-
purchase intention for luxury brands, 3) to study direct factors
affecting purchase intention towards luxury brands, and 4) to study
indirect factors affecting purchase intention towards luxury brands
through brand consciousness and brand equity to analyze information
by descriptive statistic and hierarchical stepwise regression analysis.
The findings revealed that the eight variables of the framework which
were: need for uniqueness, normative susceptibility, status
consumption, brand consciousness, brand awareness, perceived
quality, brand association, and brand loyalty affected the purchase
intention of the luxury brands (at the significance of 0.05). Brand
Loyalty had the strongest direct effect while status consumption had
the strongest indirect effect affecting the purchase intention towards
luxury brands. Brand consciousness and brand equity had the
mediators through the purchase intention of the luxury brands (at the
significance of 0.05).
Abstract: Ambiguities in effects of earthquake on various
structures in all earthquake codes would necessitate more study and
research concerning influential factors on dynamic behavior.
Previous studies which were done on different features in different
buildings play a major role in the type of response a structure makes
to lateral vibrations. Diagnosing each of these irregularities can help
structure designers in choosing appropriate setbacks for decreasing
possible damages. Therefore vertical setback is one of the irregularity
factors in the height of the building where can be seen in skyscrapers
and hotels. Previous researches reveal notable changes in the place of
these setbacks showing dynamic response of the structure.
Consequently analyzing 48 models of concrete frames for 3, 6 and 9
stories heights with three different bays in general shape of a surface
decline by height have been constructed in ETABS2000 software,
and then the shape effect of each and every one of these frames in
period scale has been discussed. The result of this study reveals that
not only mass, stiffness and height but also shape of the frame is
influential.
Abstract: This paper presents a novel method that allows an
agent host to delegate its signing power to an anonymous mobile
agent in such away that the mobile agent does not reveal any information about its host-s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service
provision. The solution introduces a verification server to verify the
signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The solution incorporates
three methods: Agent Signature Key Generation method, Agent
Signature Generation method, Agent Signature Verification method.
The most notable feature of the solution is that, in addition to allowing secure and anonymous signature delegation, it enables
tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed solution are analyzed, and the solution is compared with the most related work.
Abstract: Mobile payments have been deployed by businesses for more than a decade. Customers use mobile payments if they trust in this relatively new payment method, have a belief and confidence in, as well as reliance on its services and applications. Despite its potential, the current literature shows that there is lack of customer trust in B2C mobile payments, and a lack of studies that determine the factors that influence their trust in these payments; which make these factors yet to be understood, especially in the Middle East region. Thus, this study aims to explore the factors that influence customer trust in mobile payments. The empirical data for this explorative study was collected by establishing four focus group sessions in the UAE. The results indicate that the explored significant factors can be classified into five main groups: customer characteristics, environmental (social and cultural) influences, provider characteristics, mobile-device characteristics, and perceived risks.
Abstract: Wireless sensor networks is an emerging technology
that serves as environment monitors in many applications. Yet
these miniatures suffer from constrained resources in terms of
computation capabilities and energy resources. Limited energy
resource in these nodes demands an efficient consumption of that
resource either by developing the modules itself or by providing
an efficient communication protocols. This paper presents a
comprehensive summarization and a comparative study of the
available MAC protocols proposed for Wireless Sensor Networks
showing their capabilities and efficiency in terms of energy
consumption and delay guarantee.
Abstract: Because nodes are usually battery-powered, the energy
presents a very scarce resource in wireless sensor networks. For this
reason, the design of medium access control had to take energy
efficiency as one of its hottest concerns. Accordingly, in order to
improve the energy performance of MAC schemes in wireless sensor
networks, several ways can be followed. In fact, some researchers try
to limit idle listening while others focus on mitigating overhearing
(i.e. a node can hear a packet which is destined to another node)
or reducing the number of the used control packets. We, in this
paper, propose a new hybrid MAC protocol termed ELE-MAC
(i.e. Energy Latency Efficient MAC). The ELE-MAC major design
goals are energy and latency efficiencies. It adopts less control
packets than SMAC in order to preserve energy. We carried out ns-
2 simulations to evaluate the performance of the proposed protocol.
Thus, our simulation-s results prove the ELE-MAC energy efficiency.
Additionally, our solution performs statistically the same or better
latency characteristic compared to adaptive SMAC.
Abstract: Environmental responsibility includes improvement of environmental performance in order to reduce environmental impact. This paper gives a short review of some important environmental objectives, targets and actions that modern shipping company should follow.
Abstract: In this paper is to evaluate audio and speech quality
with the help of Digital Audio Watermarking Technique under the
different types of attacks (signal impairments) like Gaussian Noise,
Compression Error and Jittering Effect. Further attacks are
considered as Hostile Environment. Audio and Speech Quality
Evaluation is an important research topic. The traditional way for
speech quality evaluation is using subjective tests. They are reliable,
but very expensive, time consuming, and cannot be used in certain
applications such as online monitoring. Objective models, based on
human perception, were developed to predict the results of subjective
tests. The existing objective methods require either the original
speech or complicated computation model, which makes some
applications of quality evaluation impossible.
Abstract: From the importance of the conference and its
constructive role in the studies discussion, there must be a strong
organization that allows the exploitation of the discussions in opening
new horizons. The vast amount of information scattered across the
web, make it difficult to find experts, who can play a prominent role
in organizing conferences. In this paper we proposed a new approach
of extracting researchers- information from various Web resources
and correlating them in order to confirm their correctness. As a
validator of this approach, we propose a service that will be useful to
set up a conference. Its main objective is to find appropriate experts,
as well as the social events for a conference. For this application we
us Semantic Web technologies like RDF and ontology to represent
the confirmed information, which are linked to another ontology
(skills ontology) that are used to present and compute the expertise.
Abstract: While computers are known to facilitate lower levels of learning, such as rote memorization of facts, measurable through electronically administered and graded multiple-choice questions, yes/no, and true/false answers, the imparting and measurement of higher-level cognitive skills is more vexing. These require more open-ended delivery and answers, and may be more problematic in an entirely virtual environment, notwithstanding the advances in technologies such as wikis, blogs, discussion boards, etc. As with the integration of all technology, merit is based more on the instructional design of the course than on the technology employed in, and of, itself. With this in mind, this study examined the perceptions of online students in an introductory Computer Information Systems course regarding the fostering of various higher-order thinking and team-building skills as a result of the activities, resources and technologies (ART) used in the course.
Abstract: In order to study seed yield and seed yield
components in bean under reduced irrigation condition and
assessment drought tolerance of genotypes, 15 lines of White beans
were evaluated in two separate RCB design with 3 replications under
stress and non stress conditions. Analysis of variance showed that
there were significant differences among varieties in terms of traits
under study, indicating the existence of genetic variation among
varieties. The results indicate that drought stress reduced seed yield,
number of seed per plant, biological yield and number of pod in
White been. In non stress condition, yield was highly correlated with
the biological yield, whereas in stress condition it was highly
correlated with harvest index. Results of stepwise regression showed
that, selection can we done based on, biological yield, harvest index,
number of seed per pod, seed length, 100 seed weight. Result of path
analysis showed that the highest direct effect, being positive, was
related to biological yield in non stress and to harvest index in stress
conditions. Factor analysis were accomplished in stress and nonstress
condition a, there were 4 factors that explained more than 76
percent of total variations. We used several selection indices such as
Stress Susceptibility Index ( SSI ), Geometric Mean Productivity (
GMP ), Mean Productivity ( MP ), Stress Tolerance Index ( STI ) and
Tolerance Index ( TOL ) to study drought tolerance of genotypes, we
found that the best Stress Index for selection tolerance genotypes
were STI, GMP and MP were the greatest correlations between these
Indices and seed yield under stress and non stress conditions. In
classification of genotypes base on phenotypic characteristics, using
cluster analysis ( UPGMA ), all allels classified in 5 separate groups
in stress and non stress conditions.