Abstract: As the Internet technology has developed rapidly, the
number of identities (IDs) managed by each individual person has
increased and various ID management technologies have been
developed to assist users. However, most of these technologies are
vulnerable to the existing hacking methods such as phishing attacks
and key-logging. If the administrator-s password is exposed, an
attacker can access the entire contents of the stolen user-s data files in
other devices. To solve these problems, we propose here a new ID
management scheme based on a Single Password Protocol. The paper
presents the details of the new scheme as well as a formal analysis of
the method using BAN Logic.
Abstract: In rotating machinery one of the critical components
that is prone to premature failure is the rolling bearing.
Consequently, early warning of an imminent bearing failure is much
critical to the safety and reliability of any high speed rotating
machines. This study is concerned with the application of Recurrence
Quantification Analysis (RQA) in fault detection of rolling element
bearings in rotating machinery. Based on the results from this study it
is reported that the RQA variable, percent determinism, is sensitive
to the type of fault investigated and therefore can provide useful
information on bearing damage in rolling element bearings.
Abstract: Internal combustion engines rejects 30-40% of the
energy supplied by fuel to the environment through exhaust gas. thus, there is a possibility for further significant improvement of efficiency with the utilization of exhaust gas energy and its conversion to mechanical energy or electrical energy. The Thermo-Electric
Generator (TEG) will be located in the exhaust system and will make use of an energy flow between the warmer exhaust gas and the external environment. Predict to th optimum position of temperature
distribution and the performance of TEG through numerical analysis.
The experimental results obtained show that the power output significantly increases with the temperature difference between cold
and hot sides of a thermoelectric generator.
Abstract: Crawling movement as a motive mode seen in nature
of some animals such as snakes possesses a specific syntactic and
dynamic analysis. Serpentine robot designed by inspiration from
nature and snake-s crawling motion, is regarded as a crawling robot.
In this paper, a serpentine robot with spiral motion model will be
analyzed. The purpose of this analysis is to calculate the vertical and
tangential forces along snake-s body and to determine the parameters
affecting on these forces. Two types of serpentine robots have been
designed in order to examine the achieved relations explained below.
Abstract: The availability of broadband internet and increased
access to computers has been instrumental in the rise of internet
literacy in Malaysia. This development has led to the adoption of
online shopping by many Malaysians. On another note, the
Government has supported the development and production of local
herbal products. This has resulted in an increase in the production and
diversity of products by SMEs. The purpose of this study is to
evaluate the influence of the Malaysian demographic factors and
selected attitudinal characteristics in relation to the online purchasing
of herbal products. In total, 1054 internet users were interviewed
online and Chi-square analysis was used to determine the relationship
between demographic variables and different aspects of online
shopping for herbal products. The overall results show that the
demographic variables such as age, gender, education level, income
and ethnicity were significant when considering the online shopping
antecedents of trust, quality of herbal products, perceived risks and
perceived benefits.
Abstract: Although the STL (stereo lithography) file format is
widely used as a de facto industry standard in the rapid prototyping
industry due to its simplicity and ability to tessellation of almost all
surfaces, but there are always some defects and shortcoming in their
usage, which many of them are difficult to correct manually. In
processing the complex models, size of the file and its defects grow
extremely, therefore, correcting STL files become difficult. In this
paper through optimizing the exiting algorithms, size of the files and
memory usage of computers to process them will be reduced. In spite
of type and extent of the errors in STL files, the tail-to-head
searching method and analysis of the nearest distance between tails
and heads techniques were used. As a result STL models sliced
rapidly, and fully closed contours produced effectively and errorless.
Abstract: This study presents a systematic analysis of wetted region due to cooling of aluminum plate by water spray impingement with respect to different water flow rates, spray nozzle heights, and subcooling. Unlike jet impingement, the wetting is not commenced upon spray impingement and there is a delay in wetness of hot test surface. After initiation, the wetting (black zone) progresses gradually to cover all test plate and provides efficient cooling in nucleate boiling regime. Generally, spray cooling is found function of spray flow rate, spray-to-surface distance and water subcooling. Wetting delay is decreasing by increasing of spray flow rate until spray impact area is not become bigger that test surface. Otherwise, higher spray flow rate is not practically accelerated start of wetting. Very fast wetting due to spray cooling can be obtained by dense spray (high floe rate) discharged from adjacent nozzle to the test surface. Highly subcooling water spray also triggers earlier wetting of hot aluminum plate.
Abstract: This work aims to explore the factors that have an incidence in reading comprehension process, with different type of texts. In a recent study with 2nd, 3rd and 4th grade children, it was observed that reading comprehension of narrative texts was better than comprehension of expository texts. Nevertheless it seems that not only the type of text but also other textual factors would account for comprehension depending on the cognitive processing demands posed by the text. In order to explore this assumption, three narrative and three expository texts were elaborated with different degree of complexity. A group of 40 fourth grade Spanish-speaking children took part in the study. Children were asked to read the texts and answer orally three literal and three inferential questions for each text. The quantitative and qualitative analysis of children responses showed that children had difficulties in both, narrative and expository texts. The problem was to answer those questions that involved establishing complex relationships among information units that were present in the text or that should be activated from children’s previous knowledge to make an inference. Considering the data analysis, it could be concluded that there is some interaction between the type of text and the cognitive processing load of a specific text.
Abstract: In this research, Forming Limit Diagrams for supertension
sheet metals which are using in automobile industry have
been obtained. The exerted strains to sheet metals have been
measured with four different methods and the errors of each method
have also been represented. These methods have been compared with
together and the most efficient and economic way of extracting of the
exerted strains to sheet metals has been introduced. In this paper total
error and uncertainty of FLD extraction procedures have been
derived. Determination of the measurement uncertainty in extracting
of FLD has a great importance in design and analysis of the sheet
metal forming process.
Abstract: A total of twenty tensile biopsies were collected from
children undergoing tonsillectomy from teaching hospital ENT
department and Kurdistan private hospital in sulaimani city. All
biopsies were homogenized and cultured; the obtained bacterial
isolates were purified and identified by biochemical tests and VITEK
2 compact system. Among the twenty studied samples, only one
Pseudomonas putida with probability of 99% was isolated.
Antimicrobial susceptibility was carried out by disk diffusion
method, Pseudomonas putida showed resistance to all antibiotics
used except vancomycin. The isolate further subjected to PCR and
DNA sequence analysis of blaVIM gene using different set of primers
for different regions of VIM gene. The results were found to be PCR
positive for the blaVIM gene. To determine the sequence of blaVIM
gene, DNA sequencing performed. Sequence alignment of blaVIM
gene with previously recorded blaVIM gene in NCBI- database showed
that P. putida isolate have different blaVIM gene.
Abstract: Recent financial international scandals around the world have led to a number of investigations into the effectiveness of corporate governance practices and audit quality. Although evidence of corporate governance practices and audit quality exists from developed economies, very scanty studies have been conducted in Egypt where corporate governance is just evolving. Therefore, this study provides evidence on the effectiveness of corporate governance practices and audit quality from a developing country. The data for analysis are gathered from the top 50 most active companies in the Egyptian Stock Exchange, covering the three year period 2007-2009. Logistic regression was used in investigating the questions that were raised in the study. Findings from the study show that board independence; CEO duality and audit committees significantly have relationship with audit quality. The results also, indicate that institutional investor and managerial ownership have no significantly relationship with audit quality. Evidence also exist that size of the company; complexity and business leverage are important factors in audit quality for companies quoted on the Egypt Stock Exchange.
Abstract: Encryption protects communication partners from
disclosure of their secret messages but cannot prevent traffic analysis
and the leakage of information about “who communicates with
whom". In the presence of collaborating adversaries, this linkability
of actions can danger anonymity. However, reliably providing
anonymity is crucial in many applications. Especially in contextaware
mobile business, where mobile users equipped with PDAs
request and receive services from service providers, providing
anonymous communication is mission-critical and challenging at the
same time. Firstly, the limited performance of mobile devices does
not allow for heavy use of expensive public-key operations which are
commonly used in anonymity protocols. Moreover, the demands for
security depend on the application (e.g., mobile dating vs. pizza
delivery service), but different users (e.g., a celebrity vs. a normal
person) may even require different security levels for the same
application. Considering both hardware limitations of mobile devices
and different sensitivity of users, we propose an anonymity
framework that is dynamically configurable according to user and
application preferences. Our framework is based on Chaum-s mixnet.
We explain the proposed framework, its configuration
parameters for the dynamic behavior and the algorithm to enforce
dynamic anonymity.
Abstract: This paper presents a simple approach for load
flow analysis of a radial distribution network. The proposed
approach utilizes forward and backward sweep algorithm
based on Kirchoff-s current law (KCL) and Kirchoff-s voltage
law (KVL) for evaluating the node voltages iteratively. In this
approach, computation of branch current depends only on the
current injected at the neighbouring node and the current in
the adjacent branch. This approach starts from the end nodes
of sub lateral line, lateral line and main line and moves
towards the root node during branch current computation. The
node voltage evaluation begins from the root node and moves
towards the nodes located at the far end of the main, lateral
and sub lateral lines. The proposed approach has been tested
using four radial distribution systems of different size and
configuration and found to be computationally efficient.
Abstract: Pearson-s correlation coefficient and sequential path
analysis has been used for determining the interrelationship among
yield, yield components, soil minerals and aroma of Khao Dawk Mali
(KDML) 105 rice grown in the area of Tungkularonghai in Roi-Et
province, located in the northeast of Thailand. Pearson-s correlation
coefficient in this study showed that the number of panicles was the
only factor that had positive significant (0.790**) effect on grain
yield. Sequential path analysis revealed that the number of panicles
followed by the number of fertile spikelets and 100-grain weight
were the first-order factors which had positive direct effects on grain
yield. Whereas, other factors analyzed had indirect effects
influencing grain yield. This study also indicated that no significant
relationship was found between the aroma level and any of the
factors analyzed.
Abstract: In this paper, an Arabic letter recognition system based on Artificial Neural Networks (ANNs) and statistical analysis for feature extraction is presented. The ANN is trained using the Least Mean Squares (LMS) algorithm. In the proposed system, each typed Arabic letter is represented by a matrix of binary numbers that are used as input to a simple feature extraction system whose output, in addition to the input matrix, are fed to an ANN. Simulation results are provided and show that the proposed system always produces a lower Mean Squared Error (MSE) and higher success rates than the current ANN solutions.
Abstract: carrot is one of the important root vegetable crops,
and it is highly nutritious as it contains appreciable amount of
vitamins, minerals and β-carotene. The major objective of current
research was to evaluate the chemical composition of carrot variety
'Nante' hybrids in general and to select the best samples for fresh-cut
salad production. The research was accomplished on fresh in Latvia
cultivated carrots harvested in Zemgale region in the first part of
October, 2011 and immediately used for experiments. Late-bearing
variety 'Nante' hybrid carrots were used for analysis:
'Nante/Berlikum', 'Nante/Maestro', 'Nante/Forto', 'Nante/Bolero'
and 'Nante/Champion'. The quality parameters as moisture, soluble
solid, firmness, b-carotene, carotenoid, color, polyphenols, total
phenolic compounds and total antioxidant capacity were analyzed
using standard methods. For fresh-cut salad production as more
applicable could be recommended hybrids 'Nante/Forto' and
'Nante/Berlikum' - mainly because it-s higher nutritive value, as
higher total phenolic compounds, polyphenols and pronounced
antioxidant capacity.
Abstract: The present work is a numerical simulation of
nanofluids flow in a double pipe heat exchanger provided with
porous baffles. The hot nanofluid flows in the inner cylinder, whereas
the cold nanofluid circulates in the annular gap. The Darcy-
Brinkman-Forchheimer model is adopted to describe the flow in the
porous regions, and the governing equations with the appropriate
boundary conditions are solved by the finite volume method. The
results reveal that the addition of metallic nanoparticles enhances the
rate of heat transfer in comparison to conventional fluids but this
augmentation is accompanied by an increase in pressure drop. The
highest heat exchanger performances are obtained when
nanoparticles are added only to the cold fluid.
Abstract: Methods of contemporary mathematical physics such
as chaos theory are useful for analyzing and understanding the
behavior of complex biological and physiological systems. The three
dimensional model of HIV/AIDS is the basis of active research since
it provides a complete characterization of disease dynamics and the
interaction of HIV-1 with the immune system. In this work, the
behavior of the HIV system is analyzed using the three dimensional
HIV model and a chaotic measure known as the Hurst exponent.
Results demonstrate that Hurst exponents of CD4, CD8 cells and
viral load vary nonlinearly with respect to variations in system
parameters. Further, it was observed that the three dimensional HIV
model can accommodate both persistent (H>0.5) and anti-persistent
(H
Abstract: Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). However, the scheme is vulnerable to privileged insider attack at their proposed registration phase and to forgery attack at their proposed authentication phase. In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual authentication between the user and the remote server. Therefore, this paper points out that the Jia et al. scheme is vulnerable to the above three attacks.
Abstract: The paper evaluates several hundred one-day-ahead
VaR forecasting models in the time period between the years 2004
and 2009 on data from six world stock indices - DJI, GSPC, IXIC,
FTSE, GDAXI and N225. The models model mean using the ARMA
processes with up to two lags and variance with one of GARCH,
EGARCH or TARCH processes with up to two lags. The models are
estimated on the data from the in-sample period and their forecasting
accuracy is evaluated on the out-of-sample data, which are more
volatile. The main aim of the paper is to test whether a model
estimated on data with lower volatility can be used in periods with
higher volatility. The evaluation is based on the conditional coverage
test and is performed on each stock index separately. The primary
result of the paper is that the volatility is best modelled using a
GARCH process and that an ARMA process pattern cannot be found
in analyzed time series.