Abstract: It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.
Abstract: Nowadays, cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime. It also provides an optimized and secured access to the resources and gives more security for the data which is stored in the platform. However, some companies do not trust Cloud providers, they think that providers can access and modify some confidential data such as bank accounts. Many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, but, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some operations on the data before sending them to the provider Cloud in the objective to make them unreadable. The principal idea is to allow user how it can protect his data with his own methods. In this paper, we are going to demonstrate our approach and prove that is more efficient in term of execution time than some existing methods. This work aims at enhancing the quality of service of providers and ensuring the trust of the customers.
Abstract: High resolution images are always desired as they contain the more information and they can better represent the original data. So, to convert the low resolution image into high resolution interpolation is done. The quality of such high resolution image depends on the interpolation function and is assessed in terms of sharpness of image. This paper focuses on Wavelet based Interpolation Techniques in which an input image is divided into subbands. Each subband is processed separately and finally combined the processed subbandsto get the super resolution image.
Abstract: This paper reviews the model-based qualitative and
quantitative Operations Management research in the context of
Construction Supply Chain Management (CSCM). Construction
industry has been traditionally blamed for low productivity, cost and
time overruns, waste, high fragmentation and adversarial
relationships. The construction industry has been slower than other
industries to employ the Supply Chain Management (SCM) concept
and develop models that support the decision-making and planning.
However the last decade there is a distinct shift from a project-based
to a supply-based approach of construction management. CSCM
comes up as a new promising management tool of construction
operations and improves the performance of construction projects in
terms of cost, time and quality. Modeling the Construction Supply
Chain (CSC) offers the means to reap the benefits of SCM, make
informed decisions and gain competitive advantage. Different
modeling approaches and methodologies have been applied in the
multi-disciplinary and heterogeneous research field of CSCM. The
literature review reveals that a considerable percentage of the CSC
modeling research accommodates conceptual or process models
which present general management frameworks and do not relate to
acknowledged soft Operations Research methods. We particularly
focus on the model-based quantitative research and categorize the
CSCM models depending on their scope, objectives, modeling
approach, solution methods and software used. Although over the last
few years there has been clearly an increase of research papers on
quantitative CSC models, we identify that the relevant literature is
very fragmented with limited applications of simulation,
mathematical programming and simulation-based optimization. Most
applications are project-specific or study only parts of the supply
system. Thus, some complex interdependencies within construction
are neglected and the implementation of the integrated supply chain
management is hindered. We conclude this paper by giving future
research directions and emphasizing the need to develop optimization
models for integrated CSCM. We stress that CSC modeling needs a
multi-dimensional, system-wide and long-term perspective. Finally,
prior applications of SCM to other industries have to be taken into
account in order to model CSCs, but not without translating the
generic concepts to the context of construction industry.
Abstract: In present study, it was aimed to determine potential
agricultural lands (PALs) in Gokceada (Imroz) Island of Canakkale
province, Turkey. Seven-band Landsat 8 OLI images acquired on
July 12 and August 13, 2013, and their 14-band combination image
were used to identify current Land Use Land Cover (LULC) status.
Principal Component Analysis (PCA) was applied to three Landsat
datasets in order to reduce the correlation between the bands. A total
of six Original and PCA images were classified using supervised
classification method to obtain the LULC maps including 6 main
classes (“Forest”, “Agriculture”, “Water Surface”, “Residential Area-
Bare Soil”, “Reforestation” and “Other”). Accuracy assessment was
performed by checking the accuracy of 120 randomized points for
each LULC maps. The best overall accuracy and Kappa statistic
values (90.83%, 0.8791% respectively) were found for PCA images
which were generated from 14-bands combined images called 3-
B/JA.
Digital Elevation Model (DEM) with 15 m spatial resolution
(ASTER) was used to consider topographical characteristics. Soil
properties were obtained by digitizing 1:25000 scaled soil maps of
Rural Services Directorate General. Potential Agricultural Lands
(PALs) were determined using Geographic information Systems
(GIS). Procedure was applied considering that “Other” class of
LULC map may be used for agricultural purposes in the future
properties. Overlaying analysis was conducted using Slope (S), Land
Use Capability Class (LUCC), Other Soil Properties (OSP) and Land
Use Capability Sub-Class (SUBC) properties.
A total of 901.62 ha areas within “Other” class (15798.2 ha) of
LULC map were determined as PALs. These lands were ranked as
“Very Suitable”, “Suitable”, “Moderate Suitable” and “Low
Suitable”. It was determined that the 8.03 ha were classified as “Very
Suitable” while 18.59 ha as suitable and 11.44 ha as “Moderate
Suitable” for PALs. In addition, 756.56 ha were found to be “Low
Suitable”. The results obtained from this preliminary study can serve
as basis for further studies.
Abstract: In recent years, there has been a decline in physical
activity among adults. Motivation has been shown to be a crucial
factor in maintaining physical activity. The purpose of this study was
to whether PA motives measured by the Physical Activity and
Leisure Motivation Scale PALMS predicted the actual amount of PA
at a later time to provide evidence for the construct validity of the
PALMS. A quantitative, cross-sectional descriptive research design
was employed. The Demographic Form, PALMS, and International
Physical Activity Questionnaire Short form (IPAQ-S) questionnaires
were used to assess motives and amount for physical activity in
adults on two occasions. A sample of 489 male undergraduate
students aged 18 to 25 years (mean ±SD; 22.30±8.13 years) took part
in the study. Participants were divided into three types of activities,
namely exercise, racquet sport, and team sports and female
participants only took part in one type of activity, namely team
sports. After 14 weeks, all 489 undergraduate students who had filled
in the initial questionnaire (Occasion 1) received the questionnaire
via email (Occasion 2). Of the 489 students, 378 males emailed back
the completed questionnaire. The results showed that not only were
pertinent sub-scales of PALMS positively related to amount of
physical activity, but separate regression analyses showed the
positive predictive effect of PALMS motives for amount of physical
activity for each type of physical activity among participants. This
study supported the construct validity of the PALMS by showing that
the motives measured by PALMS did predict amount of PA. This
information can be obtained to match people with specific sport or
activity which in turn could potentially promote longer adherence to
the specific activity.
Abstract: Boiling process is characterized by the rapid
formation of vapour bubbles at the solid–liquid interface (nucleate
boiling) with pre-existing vapour or gas pockets. Computational fluid
dynamics (CFD) is an important tool to study bubble dynamics. In
the present study, CFD simulation has been carried out to determine
the bubble detachment diameter and its terminal velocity. Volume of
fluid method is used to model the bubble and the surrounding by
solving single set of momentum equations and tracking the volume
fraction of each of the fluids throughout the domain. In the
simulation, bubble is generated by allowing water-vapour to enter a
cylinder filled with liquid water through an inlet at the bottom. After
the bubble is fully formed, the bubble detaches from the surface and
rises up during which the bubble accelerates due to the net balance
between buoyancy force and viscous drag. Finally when these forces
exactly balance each other, it attains a constant terminal velocity. The
bubble detachment diameter and the terminal velocity of the bubble
are captured by the monitor function provided in FLUENT. The
detachment diameter and the terminal velocity obtained are compared
with the established results based on the shape of the bubble. A good
agreement is obtained between the results obtained from simulation
and the equations in comparison with the established results.
Abstract: The main objective of this article is to examine the
impact of interest rates on investments in Poland in the context of
financial crisis. The paper also investigates the dependence of bank
loans to enterprises on interbank market rates. The article studies the
impact of interbank market rate on the level of investments in Poland.
Besides, this article focuses on the research of the correlation
between the level of corporate loans and the amount of investments
in Poland in order to determine the indirect impact of central bank
interest rates through the transmission mechanism of monetary policy
on the real economy. To achieve the objective we have used
econometric and statistical research methods like: econometric model
and Pearson correlation coefficient.
This analysis suggests that the central bank reference rate
inversely proportionally affects the level of investments in Poland
and this dependence is moderate. This is also important issue because
it is related to preparing of Poland to accession to euro area. The
research is important from both theoretical and empirical points of
view. The formulated conclusions and recommendations determine
the practical significance of the paper which may be used in the
decision making process of monetary and economic authorities of the
country.
Abstract: We investigate experimentally and theoretically the
dynamics of a capacitive resonator under mixed frequency excitation
of two AC harmonic signals. The resonator is composed of a proof
mass suspended by two cantilever beams. Experimental
measurements are conducted using a laser Doppler Vibrometer to
reveal the interesting dynamics of the system when subjected to twosource
excitation. A nonlinear single-degree-of-freedom model is
used for the theoretical investigation. The results reveal combination
resonances of additive and subtractive type, which are shown to be
promising to increase the bandwidth of the resonator near primary
resonance frequency. Our results also demonstrate the ability to shift
the combination resonances to much lower or much higher frequency
ranges. We also demonstrate the dynamic pull-in instability under
mixed frequency excitation.
Abstract: This paper focuses on a critical component of the
situational awareness (SA), the control of autonomous vertical flight
for vectored thrust aerial vehicle (VTAV). With the SA strategy, we
proposed a neural network motion control procedure to address the
dynamics variation and performance requirement difference of flight
trajectory for a VTAV. This control strategy with using of NARMAL2
neurocontroller for chosen model of VTAV has been verified by
simulation of take-off and forward maneuvers using software
package Simulink and demonstrated good performance for fast
stabilization of motors, consequently, fast SA with economy in
energy can be asserted during search-and-rescue operations.
Abstract: To construct the lumped spring-mass model
considering the occupants for the offset frontal crash, the SISAME
software and the NHTSA test data were used. The data on 56 kph 40%
offset frontal vehicle to deformable barrier crash test of a MY2007
Mazda 6 4-door sedan were obtained from NHTSA test database. The
overall behaviors of B-pillar and engine of simulation models agreed
very well with the test data. The trends of accelerations at the driver
and passenger head were similar but big differences in peak values.
The differences of peak values caused the large errors of the HIC36
and 3 ms chest g’s. To predict well the behaviors of dummies, the
spring-mass model for the offset frontal crash needs to be improved.
Abstract: Model transformation, as a pivotal aspect of Modeldriven
engineering, attracts more and more attentions both from
researchers and practitioners. Many domains (enterprise engineering,
software engineering, knowledge engineering, etc.) use model
transformation principles and practices to serve to their domain
specific problems; furthermore, model transformation could also be
used to fulfill the gap between different domains: by sharing and
exchanging knowledge. Since model transformation has been widely
used, there comes new requirement on it: effectively and efficiently
define the transformation process and reduce manual effort that
involved in. This paper presents an automatic model transformation
methodology based on semantic and syntactic comparisons, and
focuses particularly on granularity issue that existed in transformation
process. Comparing to the traditional model transformation
methodologies, this methodology serves to a general purpose: crossdomain
methodology. Semantic and syntactic checking
measurements are combined into a refined transformation process,
which solves the granularity issue. Moreover, semantic and syntactic
comparisons are supported by software tool; manual effort is replaced
in this way.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: This paper presents a computational study of steady
state three dimensional very high turbulent flow and heat transfer
characteristics in a constant temperature-surfaced circular duct fitted
with 900 hemispherical inline baffles. The computations are based on
realizable k-ɛ model with standard wall function considering the
finite volume method, and the SIMPLE algorithm has been
implemented. Computational Study are carried out for Reynolds
number, Re ranging from 80000 to 120000, Prandtl Number, Pr of
0.73, Pitch Ratios, PR of 1,2,3,4,5 based on the hydraulic diameter of
the channel, hydrodynamic entry length, thermal entry length and the
test section. Ansys Fluent 15.0 software has been used to solve the
flow field. Study reveals that circular pipe having baffles has a higher
Nusselt number and friction factor compared to the smooth circular
pipe without baffles. Maximum Nusselt number and friction factor
are obtained for the PR=5 and PR=1 respectively. Nusselt number
increases while pitch ratio increases in the range of study; however,
friction factor also decreases up to PR 3 and after which it becomes
almost constant up to PR 5. Thermal enhancement factor increases
with increasing pitch ratio but with slightly decreasing Reynolds
number in the range of study and becomes almost constant at higher
Reynolds number. The computational results reveal that optimum
thermal enhancement factor of 900 inline hemispherical baffle is
about 1.23 for pitch ratio 5 at Reynolds number 120000.It also shows
that the optimum pitch ratio for which the baffles can be installed in
such very high turbulent flows should be 5. Results show that pitch
ratio and Reynolds number play an important role on both fluid flow
and heat transfer characteristics.
Abstract: Experts, enterprises and operators expect that the
bandwidth request will increase up to rates of 100 to 1,000 Mbps
within several years. Therefore the most important question is which
technology shall satisfy the future consumer broadband demands.
Currently the consensus is, that the fiber technology has the best
technical characteristics to achieve such the high bandwidth rates.
But fiber technology is so far very cost-intensive and resource
consuming. To avoid these investments, operators are concentrating
to upgrade the existing copper and hybrid fiber coax infrastructures.
This work presents a comparison of the copper and fiber
technologies including an overview about the current German
broadband market. Both technologies are reviewed in the terms of
demand, willingness to pay and economic efficiency in connection
with the technical characteristics.
Abstract: By the evolvement in technology, the way of
expressing opinions switched direction to the digital world. The
domain of politics, as one of the hottest topics of opinion mining
research, merged together with the behavior analysis for affiliation
determination in texts, which constitutes the subject of this paper.
This study aims to classify the text in news/blogs either as
Republican or Democrat with the minimum number of features. As
an initial set, 68 features which 64 were constituted by Linguistic
Inquiry and Word Count (LIWC) features were tested against 14
benchmark classification algorithms. In the later experiments, the
dimensions of the feature vector reduced based on the 7 feature
selection algorithms. The results show that the “Decision Tree”,
“Rule Induction” and “M5 Rule” classifiers when used with “SVM”
and “IGR” feature selection algorithms performed the best up to
82.5% accuracy on a given dataset. Further tests on a single feature
and the linguistic based feature sets showed the similar results. The
feature “Function”, as an aggregate feature of the linguistic category,
was found as the most differentiating feature among the 68 features
with the accuracy of 81% in classifying articles either as Republican
or Democrat.
Abstract: A pilot field study was conducted at the Jagjeetpur
Municipal Sewage treatment plant situated in the Haridwar town in
Uttarakhand state, India. The objectives of the present study were to
study the effect of treated wastewater on the production of various
paddy varieties (Sharbati, PR-114, PB-1, Menaka, PB1121 and PB
1509) and the emission of GHG gases (CO2, CH4 and N2O) as
compared to the same varieties grown in the control plots irrigated
with fresh water. Of late, the concept of water footprint assessment
has emerged, which explains enumeration of various types of water
footprints of an agricultural entity from its production to processing
stages. Paddy, the most water demanding staple crop of Uttarakhand
state, displayed a high green water footprint value of 2474.12 m3/
Ton. Most of the wastewater irrigated varieties displayed up to 6%
increase in production, except Menaka and PB-1121, which showed a
reduction in production (6% and 3% respectively), due to pest and
insect infestation. The treated wastewater was observed to be rich in
Nitrogen (55.94 mg/ml Nitrate), Phosphorus (54.24 mg/ml) and
Potassium (9.78 mg/ml), thus rejuvenating the soil quality and not
requiring any external nutritional supplements. A Percentage increase
of GHG gases of irrigation with treated municipal wastewater as
compared to control plots was observed as 0.4% - 8.6% (CH4), 1.1%
- 9.2% (CO2), and 0.07% - 5.8% (N2O). The variety, Sharbati,
displayed maximum production (5.5 ton/ha) and emerged as the most
resistant variety against pests and insects. The emission values of
CH4, CO2 and N2O were 729.31 mg/m2/d, 322.10 mg/m2/d and
400.21 mg/m2/d in water stagnant condition.
This study highlighted a successful possibility of reuse of
wastewater for non-potable purposes offering the potential for
exploiting this resource that can replace or reduce the existing use of
fresh water sources in agriculture sector.
Abstract: Submerged arc welding is a very complex process. It
is a very efficient and high performance welding process. In this
present study an attempt have been done to reduce the welding
distortion by increased amount of oxide flux through TiO2 in
submerged arc welding process. Care has been taken to avoid the
excessiveness of the adding agent for attainment of significant
results. Data Envelopment Analysis (DEA) based BAT algorithm is
used for the parametric optimization purpose in which DEA is used
to convert multi response parameters into a single response
parameter. The present study also helps to know the effectiveness of
the addition of TiO2 in active flux during submerged arc welding
process.
Abstract: Experimental economics is subject to criticism with
regards to frequently discussed the trade-off between internal and
external validity requirements, which seems to be critically flawed.
This paper evaluates incompatibility of trade-off condition and
condition of internal validity as a prerequisite for external validity. In
addition, it outlines the imprecise concept of artificiality, which is
found to be rather improving the external validity and seems to
strengthen the illusory status of external versus internal validity
tension. Internal validity is further analyzed with regards to Duhem-
Quine problem, where unpredictability argument is significantly
weakened trough application of inductivism within the illustrative
hypothetical-deductive model. Our discussion partially weakens
critical arguments related to the robustness of results in experimental
economics, if the perfectly controlled experimental environment is
secured.
Abstract: Any signal transmitted over a channel is corrupted by noise and interference. A host of channel coding techniques has been proposed to alleviate the effect of such noise and interference. Among these Turbo codes are recommended, because of increased capacity at higher transmission rates and superior performance over convolutional codes. The multimedia elements which are associated with ample amount of data are best protected by Turbo codes. Turbo decoder employs Maximum A-posteriori Probability (MAP) and Soft Output Viterbi Decoding (SOVA) algorithms. Conventional Turbo coded systems employ Equal Error Protection (EEP) in which the protection of all the data in an information message is uniform. Some applications involve Unequal Error Protection (UEP) in which the level of protection is higher for important information bits than that of other bits. In this work, enhancement to the traditional Log MAP decoding algorithm is being done by using optimized scaling factors for both the decoders. The error correcting performance in presence of UEP in Additive White Gaussian Noise channel (AWGN) and Rayleigh fading are analyzed for the transmission of image with Discrete Cosine Transform (DCT) as source coding technique. This paper compares the performance of log MAP, Modified log MAP (MlogMAP) and Enhanced log MAP (ElogMAP) algorithms used for image transmission. The MlogMAP algorithm is found to be best for lower Eb/N0 values but for higher Eb/N0 ElogMAP performs better with optimized scaling factors. The performance comparison of AWGN with fading channel indicates the robustness of the proposed algorithm. According to the performance of three different message classes, class3 would be more protected than other two classes. From the performance analysis, it is observed that ElogMAP algorithm with UEP is best for transmission of an image compared to Log MAP and MlogMAP decoding algorithms.