Abstract: Vortices can develop in intakes of turbojet and turbo
fan aero engines during high power operation in the vicinity of solid
surfaces. These vortices can cause catastrophic damage to the engine.
The factors determining the formation of the vortex include both
geometric dimensions as well as flow parameters. It was shown that
the threshold at which the vortex forms or disappears is also
dependent on the initial flow condition (i.e. whether a vortex forms
after stabilised non vortex flow or vice-versa). A computational fluid
dynamics study was conducted to determine the difference in
thresholds between the two conditions. This is the first reported
numerical investigation of the “memory effect". The numerical
results reproduce the phenomenon reported in previous experimental
studies and additional factors, which had not been previously studied,
were investigated. They are the rate at which ambient velocity
changes and the initial value of ambient velocity. The former was
found to cause a shift in the threshold but not the later. It was also
found that the varying condition thresholds are not symmetrical about
the neutral threshold. The vortex to no vortex threshold lie slightly
further away from the neutral threshold compared to the no vortex to
vortex threshold. The results suggests that experimental investigation
of vortex formation threshold performed either in vortex to no vortex
conditions, or vice versa, solely may introduce mis-predictions
greater than 10%.
Abstract: Software Reusability is primary attribute of software
quality. There are metrics for identifying the quality of reusable
components but the function that makes use of these metrics to find
reusability of software components is still not clear. These metrics if
identified in the design phase or even in the coding phase can help us
to reduce the rework by improving quality of reuse of the component
and hence improve the productivity due to probabilistic increase in
the reuse level. In this paper, we have devised the framework of
metrics that uses McCabe-s Cyclometric Complexity Measure for
Complexity measurement, Regularity Metric, Halstead Software
Science Indicator for Volume indication, Reuse Frequency metric
and Coupling Metric values of the software component as input
attributes and calculated reusability of the software component. Here,
comparative analysis of the fuzzy, Neuro-fuzzy and Fuzzy-GA
approaches is performed to evaluate the reusability of software
components and Fuzzy-GA results outperform the other used
approaches. The developed reusability model has produced high
precision results as expected by the human experts.
Abstract: L-asparaginase was extracted from pathogenic
Escherichia coli which was isolated from urinary tract infection
patients. L-asparaginase was purified 96-fold by ultrafiltration, ion
exchange and gel filtration giving 39.19% yield with final specific
activity of 178.57 IU/mg. L-asparaginase showed 138,356±1,000
Dalton molecular weight with 31024±100 Dalton molecular mass.
Kinetic properties of enzyme resulting 1.25×10-5 mM Km and
2.5×10-3 M/min Vmax. L-asparaginase showed a maximum activity
at pH 7.5 when incubated at 37 ºC for 30 min and illustrated its full
activity (100%) after 15 min incubation at 20-37 ºC, while 70% of its
activity was lost when incubated at 60 ºC. L-asparaginase showed
cytotoxicity to U937 cell line with IC50 0.5±0.19 IU/ml, and
selectivity index (SI=7.6) about 8 time higher selectivity over the
lymphocyte cells. Therefore, the local pathogenic E. coli strains may
be used as a source of high yield of L-asparaginase to produce anti
cancer agent with high selectivity.
Abstract: Vehicular Ad-hoc Network (VANET) is taking more
attention in automotive industry due to the safety concern of human
lives on roads. Security is one of the safety aspects in VANET. To be
secure, network availability must be obtained at all times since
availability of the network is critically needed when a node sends any
life critical information to other nodes. However, it can be expected
that security attacks are likely to increase in the coming future due to
more and more wireless applications being developed and deployed
onto the well-known expose nature of the wireless medium. In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has
been developed and some possible solutions to overcome the attacks
have been discussed.
Abstract: The Genetic Algorithm (GA) is one of the most important methods used to solve many combinatorial optimization problems. Therefore, many researchers have tried to improve the GA by using different methods and operations in order to find the optimal solution within reasonable time. This paper proposes an improved GA (IGA), where the new crossover operation, population reformulates operation, multi mutation operation, partial local optimal mutation operation, and rearrangement operation are used to solve the Traveling Salesman Problem. The proposed IGA was then compared with three GAs, which use different crossover operations and mutations. The results of this comparison show that the IGA can achieve better results for the solutions in a faster time.
Abstract: Information systems practitioners are frequently
required to master new technology, often without the aid of formal
training. They require the skill to manage their own learning and,
when this skill is developed in their formal training, their adaptability
to new technology may be improved. Self- directed learning is the
ability of the learner to manage his or her own learning experience
with some guidance from a facilitator. Self-directed learning skills
are best improved when practiced. This paper reflects on a critical
social research project to improve the self-directed learning skills of
fourth year Information Systems students. Critical social research
differs from other research paradigms in that the researcher is viewed
as the agent of change to achieve the desired outcome in the problem
situation.
Abstract: This paper has, as its point of departure, the foundational
axiomatic theory of E. De Giorgi (1996, Scuola Normale
Superiore di Pisa, Preprints di Matematica 26, 1), based on two
primitive notions of quality and relation. With the introduction of
a unary relation, we develop a system totally based on the sole
primitive notion of relation. Such a modification enables a definition
of the concept of dynamic unary relation. In this way we construct a
simple language capable to express other well known theories such
as Robinson-s arithmetic or a piece of a theory of concatenation. A
key role in this system plays an abstract relation designated by “( )",
which can be interpreted in different ways, but in this paper we will
focus on the case when we can perform computations and obtain
results.
Abstract: A vertical SOI-based MOSFET with trench body
structure operated as 1T DRAM cell at various temperatures has been
studied and investigated. Different operation temperatures are
assigned for the device for its performance comparison, thus the
thermal stability is carefully evaluated for the future memory device
applications. Based on the simulation, the vertical SOI-based
MOSFET with trench body structure demonstrates the electrical
characteristics properly and possess conspicuous kink effect at
various operation temperatures. Transient characteristics were also
performed to prove that its programming window values and
retention time behaviors are acceptable when the new 1T DRAM cell
is operated at high operation temperature.
Abstract: Artificial neural networks (ANN) have the ability to model input-output relationships from processing raw data. This characteristic makes them invaluable in industry domains where such knowledge is scarce at best. In the recent decades, in order to overcome the black-box characteristic of ANNs, researchers have attempted to extract the knowledge embedded within ANNs in the form of rules that can be used in inference systems. This paper presents a new technique that is able to extract a small set of rules from a two-layer ANN. The extracted rules yield high classification accuracy when implemented within a fuzzy inference system. The technique targets industry domains that possess less complex problems for which no expert knowledge exists and for which a simpler solution is preferred to a complex one. The proposed technique is more efficient, simple, and applicable than most of the previously proposed techniques.
Abstract: This paper provides an overview of auction theory literature. We present a general review on literature of various auctions and focus ourselves specifically on an English auction. We are interested in modelling bidder's behavior in an English auction environment. And hence, we present an overview of the New Zealand wool auction followed by a model that would describe a bidder's decision making behavior from the New Zealand wool auction. The mathematical assumptions in an English auction environment are demonstrated from the perspective of the New Zealand wool auction.
Abstract: Automotive suspension system is important part of car
comfort and safety. In this article automotive active suspension with
linear motor as actuator is designed using H-infinity control. This
paper is focused on comparison of different controller designed for
quart, half or full-car model (and always used for “full" car). Special
attention is placed on energy demand of the whole system. Each
controller configuration is simulated and then verified on the
hydraulic quarter car test bed.
Abstract: In Content-Based Image Retrieval systems it is
important to use an efficient indexing technique in order to perform
and accelerate the search in huge databases. The used indexing
technique should also support the high dimensions of image features.
In this paper we present the hierarchical index NOHIS-tree (Non
Overlapping Hierarchical Index Structure) when we scale up to very
large databases. We also present a study of the influence of clustering
on search time. The performance test results show that NOHIS-tree
performs better than SR-tree. Tests also show that NOHIS-tree keeps
its performances in high dimensional spaces. We include the
performance test that try to determine the number of clusters in
NOHIS-tree to have the best search time.
Abstract: The optimal extraction condition of dried
Echinocactus grusonii powder was studied. The three independent
variables are raw material drying temperature, extraction
temperature, and extraction time. The dependent variables are both
yield percentage of crude extract and total phenolic quantification as
gallic acid equivalent in crude extract. The experimental design was
based on central composite design. Highest yield percentage of crude
extract could get from extraction condition at raw material drying
temperature at 60°C, extraction temperature at 15°C, and extraction
time for 25 min °C. Moreover, the crude extract with highest phenolic
occurred by extraction condition of raw material drying temperature
at 60°C, extraction temperature at 35 °C, and extraction lasting 25
min.
Abstract: This paper studies the effect of time delay on stability
of mutualism population model with limited resources for both
species. First, the stability of the model without time delay is
analyzed. The model is then improved by considering a time delay in
the mechanism of the growth rate of the population. We analyze the
effect of time delay on the stability of the stable equilibrium point.
Result showed that the time delay can induce instability of the stable
equilibrium point, bifurcation and stability switches.
Abstract: Antioxidants contribute to endogenous photoprotection
and are important for the maintenance of skin health. The study was carried out to compare the skin hydration and transepidermal
water loss (TEWL) effects of a stable cosmetic preparation
containing flavonoids, following two applications a day over a period
of tenth week. The skin trans-epidermal water loss and skin hydration
effect was measured at the beginning and up to the end of study period of ten weeks. Any effect produced was measured by Corneometer and TEWA meter (Non-invasive probe).
Two formulations were developed for this study design. Formulation one the control formulation in which no apple juice
extract( Flavonoids) was incorporated while second one was the active formulation in which the apple juice extract (3%) containing
flavonoids was incorporated into water in oil emulsion using Abil EM 90 as an emulsifier. Stable formulations (control and Active)
were applied on human cheeks (n = 12) for a study period of 10 weeks. Result of each volunteer of skin hydration and TEWL was
measured by corneometer and TEWA meter. By using ANOVA and Paired sample t test as a statistical evaluation, result of both base and
formulation were compared. Statistical significant results (p≤0.05)
were observed regarding skin hydration and TEWL when two creams, control and Formulation were compared. It showed that
desired formulation (Active) may have interesting application as an
active moisturizing cream on healthy skin.
Abstract: The equilibrium process of plasma nitrogen species by
chemical kinetic reactions along various pressures is successfully
investigated. The equilibrium process is required in industrial
application to obtain the stable condition when heating up the
material for having homogenous reaction. Nitrogen species densities
is modeled by a continuity equation and extended Arrhenius form.
These equations are used to integrate the change of density over the
time. The integration is to acquire density and the reaction rate of
each reaction where temperature and time dependence are imposed.
A comparison is made with global model within pressure range of 1-
100mTorr and the temperature of electron is set to be higher than
other nitrogen species. The results shows that the chemical kinetic
model only agrees for high pressure because of no power imposed;
while the global model considers the external power along the
pressure range then the electron and nitrogen species give highly
quantity densities by factor of 3 to 5.
Abstract: The new institutional Economics helps generalization
and expansion of new classic by adding the institution theories to
Economic. It is clear that the appropriate institution is among the
factors that lead to success in Economic programs.
If the institutional are appropriate, the society will save the source
and when we make use of time to apply the program, there will be
welfare and average revenue product will also increase. In Economy,
one should not expect the real manifestation of Economic programs
only with a model for estimating and predicting rather institutions of
the same purpose and along with production are needed to form the
process of growth and development costs.
In this research, the institution role in transaction costs, financial
markets, distribution of revenue and capital and its influence on the
process of growth and development are investigated so that
handicaps and problems of Iran Economic Institutions can be
recognized. In other words, incapability, non productivity and
ambiguity of the institution in Iran Economic are some of the factors
that handicap Economic growth and development. For example, Iran
government as an important institution while having 20 ministries,83
organizations and 60 years of programming could not go along the
growth and development but why?
Abstract: Offset mismatch, gain mismatch, and time-skew error between time-interleaved channels limit the performance of time-interleaved analog-to-digital converters (TIADC). This paper focused on the time-skew error. A new technique for calibrating time-skew error in M-channels TIADC is described, and simulation results are also presented.
Abstract: It is well-known that in wireless local area networks,
authenticating nodes by their MAC addresses is not secure since it is
very easy for an attacker to learn one of the authorized addresses and
change his MAC address accordingly. In this paper, in order to
prevent MAC address spoofing attacks, we propose to use
dynamically changing MAC addresses and make each address usable
for only one session. The scheme we propose does not require any
change in 802.11 protocols and incurs only a small performance
overhead. One of the nice features of our new scheme is that no third
party can link different communication sessions of the same user by
monitoring MAC addresses therefore our scheme is preferable also
with respect to user privacy.
Abstract: Current proposals for E-passport or ID-Card is similar to a regular passport with the addition of tiny contactless integrated circuit (computer chip) inserted in the back cover, which will act as a secure storage device of the same data visually displayed on the photo page of the passport. In addition, it will include a digital photograph that will enable biometric comparison, through the use of facial recognition technology at international borders. Moreover, the e-passport will have a new interface, incorporating additional antifraud and security features. However, its problems are reliability, security and privacy. Privacy is a serious issue since there is no encryption between the readers and the E-passport. However, security issues such as authentication, data protection and control techniques cannot be embedded in one process. In this paper, design and prototype implementation of an improved E-passport reader is presented. The passport holder is authenticated online by using GSM network. The GSM network is the main interface between identification center and the e-passport reader. The communication data is protected between server and e-passport reader by using AES to encrypt data for protection will transferring through GSM network. Performance measurements indicate a 19% improvement in encryption cycles versus previously reported results.