Abstract: Until recently, energy security and climate change
were considered separate issues to be dealt with by policymakers.
The two issues are now converging, challenging the security and
climate communities to develop a better understanding of how to deal
with both issues simultaneously. Although Egypt is not a major
contributor to the world's total GHG emissions, it is particularly
vulnerable to the potential effects of global climate change such as
rising sea levels and changed patterns of rainfall in the Nile Basin.
Climate change is a major threat to sustainable growth and
development in Egypt, and the achievement of the Millennium
Development Goals. Egypt-s capacity to respond to the challenges of
climate instability will be expanded by improving overall resilience,
integrating climate change goals into sustainable development
strategies, increasing the use of modern energy systems with reduced
carbon intensity, and strengthening international initiatives. This
study seeks to establish a framework for considering the complex and
evolving links between energy security and climate change,
applicable to Egypt.
Abstract: This paper proposes a new algebraic scheme to design a PID controller for higher order linear time invariant continuous systems. Modified PSO (MPSO) based model order formulation techniques have applied to obtain the effective formulated second order system. A controller is tuned to meet the desired performance specification by using pole-zero cancellation method. Proposed PID controller is attached with both higher order system and formulated second order system. The closed loop response is observed for stabilization process and compared with general PSO based formulated second order system. The proposed method is illustrated through numerical example from literature.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: The optimal bisection width of r-dimensional N×
· · ·× N grid is known to be Nr-1 when N is even, but when
N is odd, only approximate values are available. This paper
shows that the exact bisection width of grid is Nr
-1
N-1 when N is odd.
Abstract: In this paper our aim is to explore the construction of schoolgirl femininities, drawing on the results of an ethnographic study conducted in a high school in Ankara, Turkey. In this case study which tries to explore the complexities of gender discourses, we were initially motivated by the questions that have been put forward by critical and feminist literature on education which emphasize the necessarily conflicting and partial nature of both reproduction and resistance and the importance of gendered power relations in the school context. Drawing on this paradigm our research tries to address to a more specific question: how are multiple schoolgirl femininities constructed within the context of gendered school culture, and especially in relation to hegemonic masculinity? Our study reveals that the general framework of multiple femininities is engendered by a tension between two inter-related positions. The first one is different strategies of accommodation and resistance to the gender-related problems of education. The second one is the school experience of girls which is conditioned by their differential position vis-à-vis the masculine resistance culture that is dominant in the school.
Abstract: The present energy situation and the concerns
about global warming has stimulated active research interest
in non-petroleum, carbon free compounds and non-polluting
fuels, particularly for transportation, power generation, and
agricultural sectors. Environmental concerns and limited
amount of petroleum fuels have caused interests in the
development of alternative fuels for internal combustion (IC)
engines. The petroleum crude reserves however, are declining
and consumption of transport fuels particularly in the
developing countries is increasing at high rates. Severe
shortage of liquid fuels derived from petroleum may be faced
in the second half of this century. Recently more and more
stringent environmental regulations being enacted in the USA
and Europe have led to the research and development
activities on clean alternative fuels. Among the gaseous fuels
hydrogen is considered to be one of the clean alternative fuel.
Hydrogen is an interesting candidate for future internal
combustion engine based power trains. In this experimental
investigation, the performance and combustion analysis were
carried out on a direct injection (DI) diesel engine using
hydrogen with diesel following the TMI(Time Manifold
Injection) technique at different injection timings of 10
degree,45 degree and 80 degree ATDC using an electronic
control unit (ECU) and injection durations were controlled.
Further, the tests have been carried out at a constant speed of
1500rpm at different load conditions and it can be observed
that brake thermal efficiency increases with increase in load
conditions with a maximum gain of 15% at full load
conditions during all injection strategies of hydrogen. It was
also observed that with the increase in hydrogen energy share
BSEC started reducing and it reduced to a maximum of 9% as
compared to baseline diesel at 10deg ATDC injection during
maximum injection proving the exceptional combustion
properties of hydrogen.
Abstract: The new status generated by technological advancements and changes in the global economy raises important issues on how communities and organisations need to innovate upon their traditional processes in order to adapt to the challenges of the Knowledge Society. The DialogoS+ European project aims to study the role of and promote social dialogue in the banking sector, strengthen the link between old and new members and make social dialogue at the European level a force for innovation and change, also given the context of the international crisis emerging in 2008- 2009. Under the scope of DialogoS+, this paper describes how the community of Europe-s banking sector trade unions attempted to adapt to the challenges of the Knowledge Society by exploiting the benefits of new channels of communication, learning, knowledge generation and diffusion focusing on the concept of roadmapping. Important dimensions of social dialogue such as collective bargaining and working conditions are addressed.
Abstract: In this paper, we argue the security protocols of
ZigBee wireless sensor network in MAC layer. AES 128-bit
encryption algorithm in CCM* mode is secure transferred data;
however, AES-s secret key will be break within nearest future.
Efficient public key algorithm, ECC has been mixed with AES to
rescue the ZigBee wireless sensor from cipher text and replay attack.
Also, the proposed protocol can parallelize the integrity function to
increase system performance.
Abstract: Mobile devices, which are progressively surrounded
in our everyday life, have created a new paradigm where they
interconnect, interact and collaborate with each other. This network
can be used for flexible and secure coordinated sharing. On the other
hand Grid computing provides dependable, consistent, pervasive, and
inexpensive access to high-end computational capabilities. In this
paper, efforts are made to map the concepts of Grid on Ad-Hoc
networks because both exhibit similar kind of characteristics like
Scalability, Dynamism and Heterogeneity. In this context we
propose “Mobile Ad-Hoc Services Grid – MASGRID".
Abstract: Losses reduction initiatives in distribution systems
have been activated due to the increasing cost of supplying
electricity, the shortage in fuel with ever-increasing cost to produce
more power, and the global warming concerns. These initiatives have
been introduced to the utilities in shape of incentives and penalties.
Recently, the electricity distribution companies in Oman have been
incentivized to reduce the distribution technical and non-technical
losses with an equal annual reduction rate for 6 years. In this paper,
different techniques for losses reduction in Mazoon Electricity
Company (MZEC) are addressed. In this company, high numbers of
substation and feeders were found to be non-compliant with the
Distribution System Security Standard (DSSS). Therefore, 33
projects have been suggested to bring non-complying 29 substations
and 28 feeders to meet the planed criteria and to comply with the
DSSS. The largest part of MZEC-s network (South Batinah region)
was modeled by ETAP software package. The model has been
extended to implement the proposed projects and to examine their
effects on losses reduction. Simulation results have shown that the
implementation of these projects leads to a significant improvement
in voltage profile, and reduction in the active and the reactive power
losses. Finally, the economical analysis has revealed that the
implementation of the proposed projects in MZEC leads to an annual
saving of about US$ 5 million.
Abstract: Many researchers are working on information hiding
techniques using different ideas and areas to hide their secrete data.
This paper introduces a robust technique of hiding secret data in
image based on LSB insertion and RSA encryption technique. The
key of the proposed technique is to encrypt the secret data. Then the
encrypted data will be converted into a bit stream and divided it into
number of segments. However, the cover image will also be divided
into the same number of segments. Each segment of data will be
compared with each segment of image to find the best match
segment, in order to create a new random sequence of segments to be
inserted then in a cover image. Experimental results show that the
proposed technique has a high security level and produced better
stego-image quality.
Abstract: This paper mainly studies the analyses of parameters
in the intersection collision avoidance (ICA) system based on the radar
sensors. The parameters include the positioning errors, the repeat
period of the radar sensor, the conditions of potential collisions of two
cross-path vehicles, etc. The analyses of the parameters can provide
the requirements, limitations, or specifications of this ICA system. In
these analyses, the positioning errors will be increased as the measured
vehicle approach the intersection. In addition, it is not necessary to
implement the radar sensor in higher position since the positioning
sensitivities become serious as the height of the radar sensor increases.
A concept of the safety buffer distances for front and rear of the
measured vehicle is also proposed. The conditions for potential
collisions of two cross-path vehicles are also presented to facilitate the
computation algorithm.
Abstract: The effect of wood vinegar, entomopathogenic
nematodes ((Steinernema thailandensis n. sp.) and fermented organic
substances from four plants such as: Derris elliptica Roxb, Stemona
tuberosa Lour, Tinospora crispa Mier and Azadirachta indica J. were
tested on the five varieties of sweetpotato with potential for
bioethanol production ie. Taiwan, China, PROC No.65-16, Phichit
166-5, and Phichit 129-6. The experimental plots were located at
Faculty of Agriculture, Natural Resources and Environment,
Naresuan University, Phitsanulok, Thailand. The aim of this study
was to compare the efficiency of the five treatments for growth, yield
and insect infestation on the five varieties of sweetpotato. Treatment
with entomopathogenic nematodes gave the highest average weight
of sweetpotato tubers (1.3 kg/tuber), followed by wood vinegar,
fermented organic substances and mixed treatment with yields of
0.88, 0.46 and 0.43 kg/tuber, respectively. Also the
entomopathogenic nematode treatment gave significantly higher
average width and length of sweet potato (9.82 cm and 9.45 cm,
respectively). Additionally, the entomopathogenic nematode
provided the best control of insect infestation on sweetpotato leaves
and tubers. Comparison among the varieties of sweetpotato, PROC
NO.65-16 showed the highest weight and length. However, Phichit
129-6 gave significantly higher weight of 0.94 kg/tuber. Lastly, the
lowest sweet potato weevil infestation on leaves and tubers occurred
on Taiwan and Phichit 129-6.
Abstract: Article presents the geometry and structure
reconstruction procedure of the aircraft model for flatter research
(based on the I22-IRYDA aircraft). For reconstruction the Reverse
Engineering techniques and advanced surface modeling CAD tools
are used. Authors discuss all stages of data acquisition process,
computation and analysis of measured data. For acquisition the three
dimensional structured light scanner was used. In the further sections,
details of reconstruction process are present. Geometry
reconstruction procedure transform measured input data (points
cloud) into the three dimensional parametric computer model
(NURBS solid model) which is compatible with CAD systems.
Parallel to the geometry of the aircraft, the internal structure
(structural model) are extracted and modeled. In last chapter the
evaluation of obtained models are discussed.
Abstract: A gold coated copper rotating electrode was used to
eliminate surface oxidation effect. This study examined the effect of
electrode rotation on the ozone generation process and showed that an
ozonizer with an electrode rotating system might be a possible way to
increase ozone-synthesis efficiency. Two new phenomena appeared
during experiments with the rotating electrode. First was that ozone
concentration increased to about two times higher than that of the case
with no rotation. Second, input power and discharge area were found
to increase with the rotation speed. Both ozone concentration and
ozone production efficiency improved in the case of rotating electrode
compared to the case with a non-rotating electrode. One possible
reason for this was the increase in discharge length of
micro-discharges during electrode rotation. The rotating electrode
decreased onset voltage, while reactor capacitance increased with
rotation. Use of a rotating-type electrode allowed earlier observation
of the ozone zero phenomena compared with a non-rotating electrode
because, during rotation, the entire electrode surface was functional,
allowing nitrogen on the electrode surface to be evenly consumed.
Nitrogen demand increased with increasing rotation s
Abstract: Advancement in Artificial Intelligence has lead to the
developments of various “smart" devices. Character recognition
device is one of such smart devices that acquire partial human
intelligence with the ability to capture and recognize various
characters in different languages. Firstly multiscale neural training
with modifications in the input training vectors is adopted in this
paper to acquire its advantage in training higher resolution character
images. Secondly selective thresholding using minimum distance
technique is proposed to be used to increase the level of accuracy of
character recognition. A simulator program (a GUI) is designed in
such a way that the characters can be located on any spot on the
blank paper in which the characters are written. The results show that
such methods with moderate level of training epochs can produce
accuracies of at least 85% and more for handwritten upper case
English characters and numerals.
Abstract: With the exponential growth of networked system and
application such as eCommerce, the demand for effective internet
security is increasing. Cryptology is the science and study of systems
for secret communication. It consists of two complementary fields of
study: cryptography and cryptanalysis. The application of genetic
algorithms in the cryptanalysis of knapsack ciphers is suggested by
Spillman [7]. In order to improve the efficiency of genetic algorithm
attack on knapsack cipher, the previously published attack was
enhanced and re-implemented with variation of initial assumptions
and results are compared with Spillman results. The experimental
result of research indicates that the efficiency of genetic algorithm
attack on knapsack cipher can be improved with variation of initial
assumption.
Abstract: Fisheries management all around the world is
hampered by the lack, or poor quality, of critical data on fish
resources and fishing operations. The main reasons for the chronic
inability to collect good quality data during fishing operations is the
culture of secrecy common among fishers and the lack of modern
data gathering technology onboard most fishing vessels. In response,
OLRAC-SPS, a South African company, developed fisheries datalogging
software (eLog in short) and named it Olrac. The Olrac eLog
solution is capable of collecting, analysing, plotting, mapping,
reporting, tracing and transmitting all data related to fishing
operations. Olrac can be used by skippers, fleet/company managers,
offshore mariculture farmers, scientists, observers, compliance
inspectors and fisheries management authorities. The authors believe
that using eLog onboard fishing vessels has the potential to
revolutionise the entire process of data collection and reporting
during fishing operations and, if properly deployed and utilised,
could transform the entire commercial fleet to a provider of good
quality data and forever change the way fish resources are managed.
In addition it will make it possible to trace catches back to the actual
individual fishing operation, to improve fishing efficiency and to
dramatically improve control of fishing operations and enforcement
of fishing regulations.
Abstract: In this paper we discuss the effect of unbounded particle interaction operator on particle growth and we study how this can address the choice of appropriate time steps of the numerical simulation. We provide also rigorous mathematical proofs showing that large particles become dominating with increasing time while small particles contribute negligibly. Second, we discuss the efficiency of the algorithm by performing numerical simulations tests and by comparing the simulated solutions with some known analytic solutions to the Smoluchowski equation.
Abstract: A new digital watermarking technique for images that
are sensitive to blocking artifacts is presented. Experimental results
show that the proposed MDCT based approach produces highly
imperceptible watermarked images and is robust to attacks such as
compression, noise, filtering and geometric transformations. The
proposed MDCT watermarking technique is applied to fingerprints
for ensuring security. The face image and demographic text data of
an individual are used as multiple watermarks. An AFIS system was
used to quantitatively evaluate the matching performance of the
MDCT-based watermarked fingerprint. The high fingerprint
matching scores show that the MDCT approach is resilient to
blocking artifacts. The quality of the extracted face and extracted text
images was computed using two human visual system metrics and
the results show that the image quality was high.