Abstract: The acidity of different raw Jordanian clays
containing zeolite, bentonite, red and white kaolinite and diatomite
was characterized by means of temperature programmed desorption
(TPD) of ammonia, conversion of 2-methyl-3-butyn-2-ol (MBOH),
FTIR and BET-measurements. FTIR spectra proved presence of
silanol and bridged hydroxyls on the clay surface. The number of
acidic sites was calculated from experimental TPD-profiles. We
observed the decrease of surface acidity correlates with the decrease
of Si/Al ratio except for diatomite. On the TPD-plot for zeolite two
maxima were registered due to different strength of surface acidic
sites. Values of MBOH conversion, product yields and selectivity
were calculated for the catalysis on Jordanian clays. We obtained that
all clay samples are able to convert MBOH into a major product
which is 3-methyl-3-buten-1-yne (MBYNE) catalyzed by acid
surface sites with the selectivity close to 70%. There was found a
correlation between MBOH conversion and acidity of clays
determined by TPD-NH3, i.e. the higher the acidity the higher the
conversion of MBOH. However, diatomite provided the lowest
conversion of MBOH as result of poor polarization of silanol groups.
Comparison of surface areas and conversions revealed the highest
density of active sites for red kaolinite and the lowest for zeolite and
diatomite.
Abstract: Nowadays, computer worms, viruses and Trojan horse
become popular, and they are collectively called malware. Those
malware just spoiled computers by deleting or rewriting important
files a decade ago. However, recent malware seems to be born to earn
money. Some of malware work for collecting personal information so
that malicious people can find secret information such as password for
online banking, evidence for a scandal or contact address which relates
with the target. Moreover, relation between money and malware
becomes more complex. Many kinds of malware bear bots to get
springboards. Meanwhile, for ordinary internet users,
countermeasures against malware come up against a blank wall.
Pattern matching becomes too much waste of computer resources,
since matching tools have to deal with a lot of patterns derived from
subspecies. Virus making tools can automatically bear subspecies of
malware. Moreover, metamorphic and polymorphic malware are no
longer special. Recently there appears malware checking sites that
check contents in place of users' PC. However, there appears a new
type of malicious sites that avoids check by malware checking sites. In
this paper, existing protocols and methods related with the web are
reconsidered in terms of protection from current attacks, and new
protocol and method are indicated for the purpose of security of the
web.
Abstract: The availability of water in adequate quantity and
quality is imperative for sustainable development. Worldwide,
significant imbalance exists with regards to sustainable development
particularly from a water and sanitation perspective. Water is a
critical component of public health, and failure to supply safe water
will place a heavy burden on the entire population. Although the 21st
century has witnessed wealth and advanced development, it has not
been realized everywhere. Billions of people are still striving to
access the most basic human needs which are food, shelter, safe
drinking water and adequate sanitation. The global picture conceals
various inequalities particularly with regards to sanitation coverage in
rural and urban areas. Currently, water scarcity and in particular
water governance is the main challenge which will cause a threat to
sustainable development goals. Within the context of water,
sanitation and health, sustainable development is a confusing concept
primarily when examined from the viewpoint of policy options for
developing countries. This perspective paper aims to summarize and
critically evaluate evidence of published studies in relation to water,
sanitation and health and to identify relevant solutions to reduce
public health impacts. Evidently, improving water and sanitation
services will result in significant and lasting gains in health and
economic development.
Abstract: Cu-mesoporous TiO2 is developed for removal acid
odor cooperated with ozone assistance and online- regeneration
system with/without UV irradiation (all weather) in study. The results
showed that Cu-mesoporous TiO2 present the desirable adsorption
efficiency of acid odor without UV irradiation, due to the larger
surface area, pore sizeand the additional absorption ability provided by
Cu. In the photocatalysis process, the material structure also benefits
Cu-mesoporous TiO2 to perform the more outstanding efficiency on
degrading acid odor. Cu also postponed the recombination of
electron-hole pairs excited from TiO2 to enhance photodegradation
ability. Cu-mesoporous TiO2 could gain the conspicuous increase on
photocatalysis ability from ozone assistance, but without any benefit
on adsorption. In addition, the online regeneration procedure could
process the used Cu-mesoporous TiO2 to reinstate the adsorption
ability and maintain the photodegradtion performance, depended on
scrubbing, desorping acid odor and reducing Cu to metal state.
Abstract: Practicum placements are an critical factor for student teachers on Education Programs. How can student teachers become professionals? This study was to investigate problems, weakness and obstacles of practicum placements and develop guidelines for partnership in the practicum placements. In response to this issue, a partnership concept was implemented for developing student teachers into professionals. Data were collected through questionnaires on attitude toward problems, weaknesses, and obstacles of practicum placements of student teachers in Rajabhat universities and included focus group interviews. The research revealed that learning management, classroom management, curriculum, assessment and evaluation, classroom action research, and teacher demeanor are the important factors affecting the professional development of Education Program student teachers. Learning management plan and classroom management concerning instructional design, teaching technique, instructional media, and student behavior management are another important aspects influencing the professional development for student teachers.
Abstract: The stilling basins are commonly used to dissipate the
energy and protect the downstream floor from erosion. The aim of
the present experimental work is to improve the roughened stilling
basin using T-shape roughness instead of the regular cubic one and
design this new shape. As a result of the present work the best
intensity and the best roughness length are identified. Also, it is
found that the T-shape roughness save materials and reduce the jump
length compared to the cubic one. Sensitivity analysis was performed
and it was noticed that the change in the length of jump is more
sensitive to the change in roughness length than the change in
intensity.
Abstract: Cryptography provides the secure manner of
information transmission over the insecure channel. It authenticates
messages based on the key but not on the user. It requires a lengthy
key to encrypt and decrypt the sending and receiving the messages,
respectively. But these keys can be guessed or cracked. Moreover,
Maintaining and sharing lengthy, random keys in enciphering and
deciphering process is the critical problem in the cryptography
system. A new approach is described for generating a crypto key,
which is acquired from a person-s iris pattern. In the biometric field,
template created by the biometric algorithm can only be
authenticated with the same person. Among the biometric templates,
iris features can efficiently be distinguished with individuals and
produces less false positives in the larger population. This type of iris
code distribution provides merely less intra-class variability that aids
the cryptosystem to confidently decrypt messages with an exact
matching of iris pattern. In this proposed approach, the iris features
are extracted using multi resolution wavelets. It produces 135-bit iris
codes from each subject and is used for encrypting/decrypting the
messages. The autocorrelators are used to recall original messages
from the partially corrupted data produced by the decryption process.
It intends to resolve the repudiation and key management problems.
Results were analyzed in both conventional iris cryptography system
(CIC) and non-repudiation iris cryptography system (NRIC). It
shows that this new approach provides considerably high
authentication in enciphering and deciphering processes.
Abstract: Rainfall data at fine resolution and knowledge of its
characteristics plays a major role in the efficient design and operation
of agricultural, telecommunication, runoff and erosion control as well
as water quality control systems. The paper is aimed to study the
statistical distribution of hourly rainfall depth for 12 representative
stations spread across Peninsular Malaysia. Hourly rainfall data of 10
to 22 years period were collected and its statistical characteristics
were estimated. Three probability distributions namely, Generalized
Pareto, Exponential and Gamma distributions were proposed to
model the hourly rainfall depth, and three goodness-of-fit tests,
namely, Kolmogorov-Sminov, Anderson-Darling and Chi-Squared
tests were used to evaluate their fitness. Result indicates that the east
cost of the Peninsular receives higher depth of rainfall as compared
to west coast. However, the rainfall frequency is found to be
irregular. Also result from the goodness-of-fit tests show that all the
three models fit the rainfall data at 1% level of significance.
However, Generalized Pareto fits better than Exponential and
Gamma distributions and is therefore recommended as the best fit.
Abstract: The large and small-scale shaking table tests, which
was conducted for investigating damage evolution of piles inside
liquefied soil, are numerically simulated and experimental verified by the3D nonlinear finite element analysis. Damage evolution of
elasto-plastic circular steel piles and reinforced concrete (RC) one with cracking and yield of reinforcement are focused on, and the failure patterns and residual damages are captured by the proposed constitutive models. The superstructure excitation behind quay wall is
reproduced as well.
Abstract: The convergence of heterogeneous wireless access technologies characterizes the 4G wireless networks. In such converged systems, the seamless and efficient handoff between
different access technologies (vertical handoff) is essential and remains a challenging problem. The heterogeneous co-existence of access technologies with largely different characteristics creates a decision problem of determining the “best" available network at
“best" time to reduce the unnecessary handoffs. This paper proposes a dynamic decision model to decide the “best" network at “best"
time moment to handoffs. The proposed dynamic decision model make the right vertical handoff decisions by determining the “best"
network at “best" time among available networks based on, dynamic
factors such as “Received Signal Strength(RSS)" of network and
“velocity" of mobile station simultaneously with static factors like Usage Expense, Link capacity(offered bandwidth) and power
consumption. This model not only meets the individual user needs but also improve the whole system performance by reducing the unnecessary handoffs.
Abstract: Experimental investigations were made on the instability of supercritical kerosene flowing in active cooling channels. Two approaches were used to control the pressure in the channel. One is the back-pressure valve while the other is the venturi. In both conditions, a kind of low-frequency oscillation of pressure and temperature is observed. And the oscillation periods are calculated. By comparison with the flow time, it is concluded that the instability occurred in active cooling channels is probably one kind of density wave instability. And its period has no relationship with the cooling channel geometry, nor the pressure, but only depends on the flow time of kerosene in active cooling channels. When the mass flow rate, density and pressure drop couple with each other, the density wave instability will appear.
Abstract: The purpose of this study was to elucidate the factors affecting antimicrobial effectiveness of essential oils against food spoilage and pathogenic bacteria. The minimum inhibition concentrations (MIC) of the essential oils, were determined by turbidimetric technique using Biocreen C, analyzer. The effects of pH ranging from 7.3 to 5.5 in absence and presence of essential oils and/or NaCl on the lag time and mean generation time of the bacteria at 370C, were carried out and results were determined showed that, combination of low pH and essential oil at 370C had additive effects against the test micro-organisms. The combination of 1.2 % (w/v) of NaCl and clove essential oil at 0.0325% (v/v) was effective against E. coli. The use of concentrations less than MIC in combination with low pH and or NaCl has the potential of being used as an alternative to “traditional food preservatives".
Abstract: This article presents the evolution and technological changes implemented on the full scale simulators developed by the Simulation Department of the Instituto de Investigaciones Eléctricas1 (Mexican Electric Research Institute) and located at different training centers around the Mexican territory, and allows US to know the last updates, basically from the input/output view point, of the current simulators at some facilities of the electrical sector as well as the compatible industry of the electrical manufactures and industries such as Comision Federal de Electricidad (CFE*, The utility Mexican company). Tendencies of these developments and impact within the operators- scope are also presented.
Abstract: Tumor classification is a key area of research in the
field of bioinformatics. Microarray technology is commonly used in
the study of disease diagnosis using gene expression levels. The
main drawback of gene expression data is that it contains thousands
of genes and a very few samples. Feature selection methods are used
to select the informative genes from the microarray. These methods
considerably improve the classification accuracy. In the proposed
method, Genetic Algorithm (GA) is used for effective feature
selection. Informative genes are identified based on the T-Statistics,
Signal-to-Noise Ratio (SNR) and F-Test values. The initial candidate
solutions of GA are obtained from top-m informative genes. The
classification accuracy of k-Nearest Neighbor (kNN) method is used
as the fitness function for GA. In this work, kNN and Support Vector
Machine (SVM) are used as the classifiers. The experimental results
show that the proposed work is suitable for effective feature
selection. With the help of the selected genes, GA-kNN method
achieves 100% accuracy in 4 datasets and GA-SVM method
achieves in 5 out of 10 datasets. The GA with kNN and SVM
methods are demonstrated to be an accurate method for microarray
based tumor classification.
Abstract: In Both developed and developing countries,
governments play a basic role in making policies, programs and
instruments which support the development of micro, small and
medium enterprises. One of the mechanisms employed to nurture
small firms for more than two decades is business incubation. One of
the mechanisms employed to nurture small firms for more than two
decades is technology business incubation. The main aim of this
research was to establish influencing factors in Technology Business
Incubator's effectiveness and their explanatory model. Therefore,
among 56 Technology Business Incubators in Iran, 32 active
incubators were selected and by stratified random sampling, 528
start-ups were chosen. The validity of research questionnaires
was determines by expert consensus, item analysis and factor
analysis; and their reliability calculated by Cronbach-s alpha.
Data analysis was then made through SPSS and LISREL soft wares.
Both organizational procedures and entrepreneurial behaviors were
the meaningful mediators. Organizational procedures with (P < .01, β
=0.45) was stronger mediator for the improvement of Technology
Business Incubator's effectiveness comparing to entrepreneurial
behavior with (P < .01, β =0.36).
Abstract: Without uncertainty by applying external loads on
beams, bending is created. The created bending in I-beams, puts one
of the flanges in tension and the other one in compression. With increasing of bending, compression flange buckled and beam in out
of its plane direction twisted, this twisting well-known as Lateral Torsional Buckling. Providing bending moment varieties along the
beam, the critical moment is greater than the case its under pure bending. In other words, the value of bending gradient coefficient is
always greater than unite. In this article by the use of " ANSYS 10.0" software near 80 3-D finite element models developed for the
propose of analyzing beams` lateral torsional buckling and surveying influence of slenderness on beams' bending gradient coefficient.
Results show that, presented Cb coefficient via AISC is not correct for some of beams and value of this coefficient is smaller than what proposed by AISC. Therefore instead of using a constant Cb for each
case of loading , a function with two criterion for calculation of Cb coefficient for some cases is proposed.
Abstract: The choice of studying economics instead of another subject should be motivated by the fact that economics training equips students with skills and knowledge that other disciplines do not provide. Which are these skills and knowledge, however, is not always very clear. This article clarifies such issue by first exploring the philosophical foundations and the defining features of the discipline, and then by investigating in which ways these are transferred to the students. In other words, we study what is meant by the 'economic way of thinking' that is passed on to the students.
Abstract: To achieve the desired specifications of gain and
phase margins for plants with time-delay that stabilized with FO-PID
controller a lead compensator is designed. At first the range of
controlled system stability based on stability boundary criteria is
determined. Using stability boundary locus method in frequency
domain the fractional order controller parameters are tuned and then
with drawing bode diagram in frequency domain accessing to desired
gain and phase margin are shown. Numerical examples are given to
illustrate the shapes of the stabilizing region and to show the design
procedure.
Abstract: We present a new numerical method for the computation of the steady-state solution of Markov chains. Theoretical analyses show that the proposed method, with a contraction factor α, converges to the one-dimensional null space of singular linear systems of the form Ax = 0. Numerical experiments are used to illustrate the effectiveness of the proposed method, with applications to a class of interesting models in the domain of tandem queueing networks.
Abstract: In this paper, the bio-mechanical analysis of human joints is carried out and the study is extended to the robot manipulator. This study will first focus on the kinematics of human arm which include the movement of each joint in shoulder, wrist, elbow and finger complexes. Those analyses are then extended to the design of a human robot manipulator. A simulator is built for Direct Kinematics and Inverse Kinematics of human arm. In the simulation of Direct Kinematics, the human joint angles can be inserted, while the position and orientation of each finger tips (end-effector) are shown. Inverse Kinematics does the reverse of the Direct Kinematics. Based on previous materials obtained from kinematics analysis, the human manipulator joints can be designed to follow prescribed position trajectories.