Abstract: e-Government is already in its second decade. Prerequisite for further development and adaptation to new realities is the optimal management of administrative information and knowledge production by those involved, i.e. the public sector, citizens and businesses. Nowadays, the amount of information displayed or distributed on the Internet has reached enormous dimensions, resulting in serious difficulties when extracting and managing knowledge. The semantic web is expected to play an important role in solving this problem and the technologies that support it. In this article, we address some relevant issues.
Abstract: This paper is based on a study conducted in 2006 to assess the impact of computer usage on health of National Institute for Medical Research (NIMR) staff. NIMR being a research Institute, most of its staff spend substantial part of their working time on computers. There was notion among NIMR staff on possible prolonged computer usage health hazards. Hence, a study was conducted to establish facts and possible mitigation measures. A total of 144 NIMR staff were involved in the study of whom 63.2% were males and 36.8% females aged between 20 and 59 years. All staff cadres were included in the sample. The functions performed by Institute staff using computers includes; data management, proposal development and report writing, research activities, secretarial duties, accounting and administrative duties, on-line information retrieval and online communication through e-mail services. The interviewed staff had been using computers for 1-8 hours a day and for a period ranging from 1 to 20 years. The study has indicated ergonomic hazards for a significant proportion of interviewees (63%) of various kinds ranging from backache to eyesight related problems. The authors highlighted major issues which are substantially applicable in preventing occurrences of computer related problems and they urged NIMR Management and/or the government of Tanzania opts to adapt their practicability.
Abstract: There has been a growing interest in the field of
bio-mimetic robots that resemble the shape of an insect or an aquatic
animal, among many others. One bio-mimetic robot serves the
purpose of exploring pipelines, spotting any troubled areas or
malfunctions and reporting its data. Moreover, the robot is able to
prepare for and react to any abnormal routes in the pipeline. In order
to move effectively inside a pipeline, the robot-s movement will
resemble that of a lizard. When situated in massive pipelines with
complex routes, the robot places fixed sensors in several important
spots in order to complete its monitoring. This monitoring task is to
prevent a major system failure by preemptively recognizing any minor
or partial malfunctions. Areas uncovered by fixed sensors are usually
impossible to provide real-time observation and examination, and thus
are dependant on periodical offline monitoring. This paper provides
the Monitoring System that is able to monitor the entire area of
pipelines–with and without fixed sensors–by using the bio-mimetic
robot.
Abstract: Phase locked loops for data links operating at 10 Gb/s
or faster are low phase noise devices designed to operate with a low
jitter reference clock. Characterization of their jitter transfer function
is difficult because the intrinsic noise of the device is comparable to
the random noise level in the reference clock signal. A linear model
is proposed to account for the intrinsic noise of a PLL. The intrinsic
noise data of a PLL for 10 Gb/s links is presented. The jitter transfer
function of a PLL in a test chip for 12.8 Gb/s data links was
determined in experiments using the 400 MHz reference clock as the
source of simultaneous excitations over a wide range of frequency.
The result shows that the PLL jitter transfer function can be
approximated by a second order linear model.
Abstract: In the traditional theory of non-uniform torsion the
axial displacement field is expressed as the product of the unit twist
angle and the warping function. The first one, variable along the
beam axis, is obtained by a global congruence condition; the second
one, instead, defined over the cross-section, is determined by solving
a Neumann problem associated to the Laplace equation, as well as for
the uniform torsion problem.
So, as in the classical theory the warping function doesn-t punctually
satisfy the first indefinite equilibrium equation, the principal aim of
this work is to develop a new theory for non-uniform torsion of
beams with axial symmetric cross-section, fully restrained on both
ends and loaded by a constant torque, that permits to punctually
satisfy the previous equation, by means of a trigonometric expansion
of the axial displacement and unit twist angle functions.
Furthermore, as the classical theory is generally applied with good
results to the global and local analysis of ship structures, two beams
having the first one an open profile, the second one a closed section,
have been analyzed, in order to compare the two theories.
Abstract: This paper presents an idea to improve the efficiency
of security checks in airports through the active tracking and
monitoring of passengers and staff using OFDM modulation
technique and Finger print authentication. The details of the
passenger are multiplexed using OFDM .To authenticate the
passenger, the fingerprint along with important identification
information is collected. The details of the passenger can be
transmitted after necessary modulation, and received using various
transceivers placed within the premises of the airport, and checked at
the appropriate check points, thereby increasing the efficiency of
checking. OFDM has been employed for spectral efficiency.
Abstract: In today-s competitive environment, the security concerns have grown tremendously. In the modern world, possession is known to be 9/10-ths of the law. Hence, it is imperative for one to be able to safeguard one-s property from worldly harms such as thefts, destruction of property, people with malicious intent etc. Due to the advent of technology in the modern world, the methodologies used by thieves and robbers for stealing have been improving exponentially. Therefore, it is necessary for the surveillance techniques to also improve with the changing world. With the improvement in mass media and various forms of communication, it is now possible to monitor and control the environment to the advantage of the owners of the property. The latest technologies used in the fight against thefts and destruction are the video surveillance and monitoring. By using the technologies, it is possible to monitor and capture every inch and second of the area in interest. However, so far the technologies used are passive in nature, i.e., the monitoring systems only help in detecting the crime but do not actively participate in stopping or curbing the crime while it takes place. Therefore, we have developed a methodology to detect the motion in a video stream environment and this is an idea to ensure that the monitoring systems not only actively participate in stopping the crime, but do so while the crime is taking place. Hence, a system is used to detect any motion in a live streaming video and once motion has been detected in the live stream, the software will activate a warning system and capture the live streaming video.
Abstract: In this paper we propose a framework for
multisensor intrusion detection called Fuzzy Agent-Based Intrusion
Detection System. A unique feature of this model is that the agent
uses data from multiple sensors and the fuzzy logic to process log
files. Use of this feature reduces the overhead in a distributed
intrusion detection system. We have developed an agent
communication architecture that provides a prototype
implementation. This paper discusses also the issues of combining
intelligent agent technology with the intrusion detection domain.
Abstract: The volume of biosolids produced in Malaysia
nowadays had increased proportionally to its population size. The end
products from the waste treatments were mounting, thus inevitable
that in the end the environment will be surrounded by the waste. This
study was conducted to investigate the suitability of biosolids to be
reused as fertilizer for non-food crop. By varying the concentration of
biosolids applied onto the soil, growth of five ornamental plant
samples were tested for eight consecutive weeks. The results show
that the pH of the soil after the addition of biosolids ranges from 6.45
to 6.56 which is suitable for the plant growth. The soil samples that
contains biosolid also show higher amount of macronutrients (N, P,
K) and the heavy metals content are significantly increased in the
plant however it does not exceed the guidelines drawn by the
Environmental Protection Agency. It is also proven that there was
only small significant different in the performance of plant growth
between biosolids and commercial fertilizer. It can be seen that
biosolids was able to perform just as well as commercial fertilizer.
Abstract: This study applies the sequential panel selection
method (SPSM) procedure proposed by Chortareas and Kapetanios
(2009) to investigate the time-series properties of energy
consumption in 50 US states from 1963 to 2009. SPSM involves the
classification of the entire panel into a group of stationary series and
a group of non-stationary series to identify how many and which
series in the panel are stationary processes. Empirical results obtained
through SPSM with the panel KSS unit root test developed by Ucar
and Omay (2009) combined with a Fourier function indicate that
energy consumption in all the 50 US states are stationary. The results
of this study have important policy implications for the 50 US states.
Abstract: This paper presents the exergy analysis of a
desalination unit using humidification-dehumidification process.
Here, this unit is considered as a thermal system with three main
components, which are the heating unit by using a solar collector, the
evaporator or the humidifier, and the condenser or the dehumidifier.
In these components the exergy is a measure of the quality or grade
of energy and it can be destroyed in them. According to the second
law of thermodynamics this destroyed part is due to irreversibilities
which must be determined to obtain the exergetic efficiency of the
system.
In the current paper a computer program has been developed using
visual basic to determine the exergy destruction and the exergetic
efficiencies of the components of the desalination unit at variable
operation conditions such as feed water temperature, outlet air
temperature, air to feed water mass ratio and salinity, in addition to
cooling water mass flow rate and inlet temperature, as well as
quantity of solar irradiance.
The results obtained indicate that the exergy efficiency of the
humidifier increases by increasing the mass ratio and decreasing the
outlet air temperature. In the other hand the exergy efficiency of the
condenser increases with the increase of this ratio and also with the
increase of the outlet air temperature.
Abstract: In this paper, experimental testing and numerical analysis were used to investigate the effect of tube thickness on the face bending for concrete filled hollow sections connected to other structural members using Extended Hollobolts. Six samples were tested experimentally by applying pull-out load on the bolts. These samples were designed to fail by column face bending. The main variable in all tests is the column face thickness. Finite element analyses were also performed using ABAQUS 6.11 to extend the experimental results and to quantify the effect of column face thickness. Results show that, the column face thickness has a clear impact on the connection strength and stiffness. However, the amount of improvement in the connection stiffness by changing the column face thickness from 5mm to 6.3mm seems to be higher than that when increasing it from 6.3mm to 8mm. The displacement at which the bolts start pulling-out from their holes increased with the use of thinner column face due to the high flexibility of the section. At the ultimate strength, the yielding of the column face propagated to the column corner and there was no yielding in its walls. After the ultimate resistance is reached, the propagation of the yielding was mainly in the column face with a miner yielding in the walls.
Abstract: In this paper, a wavelet-based neural network (WNN) classifier for recognizing EEG signals is implemented and tested under three sets EEG signals (healthy subjects, patients with epilepsy and patients with epileptic syndrome during the seizure). First, the Discrete Wavelet Transform (DWT) with the Multi-Resolution Analysis (MRA) is applied to decompose EEG signal at resolution levels of the components of the EEG signal (δ, θ, α, β and γ) and the Parseval-s theorem are employed to extract the percentage distribution of energy features of the EEG signal at different resolution levels. Second, the neural network (NN) classifies these extracted features to identify the EEGs type according to the percentage distribution of energy features. The performance of the proposed algorithm has been evaluated using in total 300 EEG signals. The results showed that the proposed classifier has the ability of recognizing and classifying EEG signals efficiently.
Abstract: Sediment formation and its transport along the river course is considered as important hydraulic consideration in river engineering. Their impact on the morphology of rivers on one hand and important considerations of which in the design and construction of the hydraulic structures on the other has attracted the attention of experts in arid and semi-arid regions. Under certain conditions where the momentum energy of the flow stream reaches a specific rate, the sediment materials start to be transported with the flow. This can usually be analyzed in two different categories of suspended and bed load materials. Sedimentation phenomenon along the waterways and the conveyance of vast volume of materials into the canal networks can potentially influence water abstraction in the intake structures. This can pose a serious threat to operational sustainability and water delivery performance in the canal networks. The situation is serious where ineffective watershed management (poor vegetation cover in the water basin) is the underlying cause of soil erosion which feeds the materials into the waterways that intern would necessitate comprehensive study. The present paper aims to present an analytical investigation of the sediment process in the waterways on one hand and estimation of the sediment load transport into the lined canals using the SHARC software on the other. For this reason, the paper focuses on the comparative analysis of the hydraulic behaviors of the Sabilli main canal that feeds the pumping station with that of the Western canal in the Greater Dezful region to identify effective factors in sedimentation and ways of mitigating their impact on water abstraction in the canal systems. The method involved use of observational data available in the Dezful Dastmashoon hydrometric station along a 6 km waterway of the Sabilli main canal using the SHARC software to estimate the suspended load concentration and bed load materials. Results showed the transport of a significant volume of sediment loads from the waterways into the canal system which is assumed to have arisen from the absence of stilling basin on one hand and the gravity flow on the other has caused serious challenges. This is contrary to what occurs in the Sabilli canal, where the design feature which incorporates a settling basin just before the pumping station is the major cause of reduced sediment load transport into the canal system.Results showed that modification of the present design features by constructing a settling basin just upstream of the western intake structure can considerably reduce the entry of sediment materials into the canal system. Not only this can result in the sustainability of the hydraulic structures but can also improve operational performance of water conveyance and distribution system, all of which are the pre-requisite to secure reliable and equitable water delivery regime for the command area.
Abstract: In this paper, we derive some algebraic identities on
right and left neighbors R(F) and L(F) of an indefinite binary
quadratic form F = F(x, y) = ax2 + bxy + cy2 of discriminant
Δ = b2 -4ac. We prove that the proper cycle of F can be given by
using its consecutive left neighbors. Also we construct a connection
between right and left neighbors of F.
Abstract: The paper presents an analysis of linkages and
structures of co-operation and their intensity like the potential for the
establishment of clusters in the Central and Eastern (Pannonian)
Croatian. Starting from the theoretical elaboration of the need for
entrepreneurs to organize through the cluster model and the terms of
their self-actualization, related to the importance of traditional values
in terms of benefits, social capital and assess where the company now
is, in order to prove the need to create their own identity in terms of
clustering. The institutional dimensions of social capital where the
public sector has the best role in creating the social structure of
clusters, and social dimensions of social capital in terms of trust,
cooperation and networking will be analyzed to what extent the trust
and coherency are present between companies in the Brod posavina
and Pozega slavonia County, expressed through the readiness of
inclusion in clusters in the NUTS II region - Central and Eastern
(Pannonian) Croatia, as a homogeneous economic entity, with
emphasis on limiting factors that stand in the way of greater
competitiveness.
Abstract: A wide spectrum of systems require reliable
personal recognition schemes to either confirm or determine the
identity of an individual person. This paper considers multimodal
biometric system and their applicability to access control,
authentication and security applications. Strategies for feature
extraction and sensor fusion are considered and contrasted. Issues
related to performance assessment, deployment and standardization
are discussed. Finally future directions of biometric systems
development are discussed.
Abstract: The present study was done primarily to address two major research gaps: firstly, development of an empirical measure of life meaningfulness for substance users and secondly, to determine the psychosocial determinants of life meaningfulness among the substance users. The study is classified into two phases: the first phase which dealt with development of Life Meaningfulness Scale and the second phase which examined the relationship between life meaningfulness and social support, abstinence self efficacy and depression. Both qualitative and quantitative approaches were used for framing items. A Principal Component Analysis yielded three components: Overall Goal Directedness, Striving for healthy lifestyle and Concern for loved ones which collectively accounted for 42.06% of the total variance. The scale and its subscales were also found to be highly reliable. Multiple regression analyses in the second phase of the study revealed that social support and abstinence self efficacy significantly predicted life meaningfulness among 48 recovering inmates of a de-addiction center while level of depression failed to predict life meaningfulness.
Abstract: Planning community has been long discussing emerging paradigms within the planning theory in the face of the changing conditions of the world order. The paradigm shift concept was introduced by Thomas Kuhn, in 1960, who claimed the necessity of shifting within scientific knowledge boundaries; and following him in 1970 Imre Loktas also gave priority to the emergence of multi-paradigm societies [24]. Multi-paradigm is changing our predetermined lifeworld through uncertainties. Those uncertainties are reflected in two sides, the first one is uncertainty as a concept of possibility and creativity in public sphere and the second one is uncertainty as a risk. Therefore, it is necessary to apply a resilience planning approach to be more dynamic in controlling uncertainties which have the potential to transfigure present time and space definitions. In this way, stability of system can be achieved. Uncertainty is not only an outcome of worldwide changes but also a place-specific issue, i.e. it changes from continent to continent, a country to country; a region to region. Therefore, applying strategic spatial planning with respect to resilience principle contributes to: control, grasp and internalize uncertainties through place-specific strategies. In today-s fast changing world, planning system should follow strategic spatial projects to control multi-paradigm societies with adaptability capacities. Here, we have selected two alternatives to demonstrate; these are; 1.Tehran (Iran) from the Middle East 2.Bath (United Kingdom) from Europe. The study elaborates uncertainties and particularities in their strategic spatial planning processes in a comparative manner. Through the comparison, the study aims at assessing place-specific priorities in strategic planning. The approach is to a two-way stream, where the case cities from the extreme end of the spectrum can learn from each other. The structure of this paper is to firstly compare semi-periphery (Tehran) and coreperiphery (Bath) cities, with the focus to reveal how they equip to face with uncertainties according to their geographical locations and local particularities. Secondly, the key message to address is “Each locality requires its own strategic planning approach to be resilient.--
Abstract: This paper proposes a copyright protection scheme for color images using secret sharing and wavelet transform. The scheme contains two phases: the share image generation phase and the watermark retrieval phase. In the generation phase, the proposed scheme first converts the image into the YCbCr color space and creates a special sampling plane from the color space. Next, the scheme extracts the features from the sampling plane using the discrete wavelet transform. Then, the scheme employs the features and the watermark to generate a principal share image. In the retrieval phase, an expanded watermark is first reconstructed using the features of the suspect image and the principal share image. Next, the scheme reduces the additional noise to obtain the recovered watermark, which is then verified against the original watermark to examine the copyright. The experimental results show that the proposed scheme can resist several attacks such as JPEG compression, blurring, sharpening, noise addition, and cropping. The accuracy rates are all higher than 97%.