Abstract: The rangelands, as one of the largest dynamic biomes
in the world, have very capabilities. Regulation of greenhouse gases
in the Earth's atmosphere, particularly carbon dioxide as the main
these gases, is one of these cases. The attention to rangeland, as
cheep and reachable resources to sequestrate the carbon dioxide,
increases after the Industrial Revolution. Rangelands comprise the
large parts of Iran as a steppic area. Rudshur (Saveh), as area index of
steppic area, was selected under three sites include long-term
exclosure, medium-term exclosure, and grazable area in order to the
capable of carbon dioxide’s sequestration of dominated species.
Canopy cover’s percentage of two dominated species (Artemisia
sieberi Besser & Stipa barbata Desf) was determined via establishing
of random 1 square meter plot. The sampling of above and below
ground biomass style was obtained by complete random. After
determination of ash percentage in the laboratory; conversion ratio of
plant biomass to organic carbon was calculated by ignition method.
Results of the paired t-test showed that the amount of carbon
sequestration in above ground and underground biomass of Artemisia
sieberi Besser & Stipa barbata Desf is different in three regions. It,
of course, hasn’t any difference between under and surface ground’s
biomass of Artemisia sieberi Besser in long-term exclosure. The
independent t-test results indicate differences between underground
biomass corresponding each other in the studied sites. Carbon
sequestration in the Stipa barbata Desf was totally more than
Artemisia sieberi Besser. Altogether, the average sequestration of the
long-term exclosure was 5.842gr/m², the medium-term exclosure was
4.115gr/m², and grazable area was 5.975gr/m² so that there isn’t
valuable statistical difference in term of total amount of carbon
sequestration to three sites.
Abstract: With the advent of social web initiatives, some argued
that these new emerging tools might be useful in tacit knowledge
sharing through providing interactive and collaborative technologies.
However, there is still a poverty of literature to understand how and
what might be the contributions of social media in facilitating tacit
knowledge sharing. Therefore, this paper is intended to theoretically
investigate and map social media concepts and characteristics with
tacit knowledge creation and sharing requirements. By conducting a
systematic literature review, five major requirements found that need
to be present in an environment that involves tacit knowledge
sharing. These requirements have been analyzed against social media
concepts and characteristics to see how they map together. The
results showed that social media have abilities to comply some of the
main requirements of tacit knowledge sharing. The relationships have
been illustrated in a conceptual framework, suggesting further
empirical studies to acknowledge findings of this study.
Abstract: In this article we explore the application of a formal
proof system to verification problems in cryptography. Cryptographic
properties concerning correctness or security of some cryptographic
algorithms are of great interest. Beside some basic lemmata, we
explore an implementation of a complex function that is used in
cryptography. More precisely, we describe formal properties of this
implementation that we computer prove. We describe formalized
probability distributions (σ-algebras, probability spaces and conditional
probabilities). These are given in the formal language of the
formal proof system Isabelle/HOL. Moreover, we computer prove
Bayes- Formula. Besides, we describe an application of the presented
formalized probability distributions to cryptography. Furthermore,
this article shows that computer proofs of complex cryptographic
functions are possible by presenting an implementation of the Miller-
Rabin primality test that admits formal verification. Our achievements
are a step towards computer verification of cryptographic primitives.
They describe a basis for computer verification in cryptography.
Computer verification can be applied to further problems in cryptographic
research, if the corresponding basic mathematical knowledge
is available in a database.
Abstract: The main aim of this work is to establish the
capabilities of new green buildings to ascertain off-grid electricity
generation based on the integration of wind turbines in the
conceptual model of a rotating tower [2] in Dubai. An in depth
performance analysis of the WinWind 3.0MW [3] wind turbine is
performed. Data based on the Dubai Meteorological Services is
collected and analyzed in conjunction with the performance analysis
of this wind turbine. The mathematical model is compared with
Computational Fluid Dynamics (CFD) results based on a conceptual
rotating tower design model. The comparison results are further
validated and verified for accuracy by conducting experiments on a
scaled prototype of the tower design. The study concluded that
integrating wind turbines inside a rotating tower can generate enough
electricity to meet the required power consumption of the building,
which equates to a wind farm containing 9 horizontal axis wind
turbines located at an approximate area of 3,237,485 m2 [14].
Abstract: Current advancements in nanotechnology are dependent on the capabilities that can enable nano-scientists to extend their eyes and hands into the nano-world. For this purpose, a haptics (devices capable of recreating tactile or force sensations) based system for AFM (Atomic Force Microscope) is proposed. The system enables the nano-scientists to touch and feel the sample surfaces, viewed through AFM, in order to provide them with better understanding of the physical properties of the surface, such as roughness, stiffness and shape of molecular architecture. At this stage, the proposed work uses of ine images produced using AFM and perform image analysis to create virtual surfaces suitable for haptics force analysis. The research work is in the process of extension from of ine to online process where interaction will be done directly on the material surface for realistic analysis.
Abstract: In the context of computer numerical control (CNC) and computer aided manufacturing (CAM), the capabilities of programming languages such as symbolic and intuitive programming, program portability and geometrical portfolio have special importance. They allow to save time and to avoid errors during part programming and permit code re-usage. Our updated literature review indicates that the current state of art presents voids in parametric programming, program portability and programming flexibility. In response to this situation, this article presents a compiler implementation for EGCL (Extended G-code Language), a new, enriched CNC programming language which allows the use of descriptive variable names, geometrical functions and flow-control statements (if-then-else, while). Our compiler produces low-level generic, elementary ISO-compliant Gcode, thus allowing for flexibility in the choice of the executing CNC machine and in portability. Our results show that readable variable names and flow control statements allow a simplified and intuitive part programming and permit re-usage of the programs. Future work includes allowing the programmer to define own functions in terms of EGCL, in contrast to the current status of having them as library built-in functions.
Abstract: This paper studies ruin probabilities in two discrete-time
risk models with premiums, claims and rates of interest modelled by
three autoregressive moving average processes. Generalized Lundberg
inequalities for ruin probabilities are derived by using recursive
technique. A numerical example is given to illustrate the applications
of these probability inequalities.
Abstract: In this paper, the action research driven design of a
context relevant, developmental peer review of teaching model, its
implementation strategy and its impact at an Australian university is
presented. PRO-Teaching realizes an innovative process that
triangulates contemporaneous teaching quality data from a range of
stakeholders including students, discipline academics, learning and
teaching expert academics, and teacher reflection to create reliable
evidence of teaching quality. Data collected over multiple classroom
observations allows objective reporting on development differentials
in constructive alignment, peer, and student evaluations. Further
innovation is realized in the application of this highly structured
developmental process to provide summative evidence of sufficient
validity to support claims for professional advancement and learning
and teaching awards. Design decision points and contextual triggers
are described within the operating domain. Academics and
developers seeking to introduce structured peer review of teaching
into their organization will find this paper a useful reference.
Abstract: Our research aims at helping the tutor on line to
evaluate the student-s cognitive processes. The student is a learner in
French as a Second Language who studies an on-line socio-cognitive
scenario in written communication. In our method, these cognitive
processes are defined. For that, the language abilities and learning
tasks are associated to cognitive operation. Moreover, the found
cognitive processes are named with specific terms. The result was to
create an instrumental pattern to question the learner about the
cognitive processes used to build an item of written comprehension.
Our research follows the principles of the third historical generation
of studies on the cognitive activity of the text comprehension. The
strength of our instrumental pattern stands in the precision and the
logical articulation of the questions to the learner. However, the
learner-s answers can still be subjective but the precision of the
instrument restricts it.
Abstract: Carbon nanotubes (CNTs) possess unique structural,
mechanical, thermal and electronic properties, and have been
proposed to be used for applications in many fields. However, to
reach the full potential of the CNTs, many problems still need to be
solved, including the development of an easy and effective
purification procedure, since synthesized CNTs contain impurities,
such as amorphous carbon, carbon nanoparticles and metal particles.
Different purification methods yield different CNT characteristics
and may be suitable for the production of different types of CNTs. In
this study, the effect of different purification chemicals on carbon
nanotube quality was investigated. CNTs were firstly synthesized by
chemical vapor deposition (CVD) of acetylene (C2H2) on a
magnesium oxide (MgO) powder impregnated with an iron nitrate
(Fe(NO3)3·9H2O) solution. The synthesis parameters were selected
as: the synthesis temperature of 800°C, the iron content in the
precursor of 5% and the synthesis time of 30 min. The liquid phase
oxidation method was applied for the purification of the synthesized
CNT materials. Three different acid chemicals (HNO3, H2SO4, and
HCl) were used in the removal of the metal catalysts from the
synthesized CNT material to investigate the possible effects of each
acid solution to the purification step. Purification experiments were
carried out at two different temperatures (75 and 120 °C), two
different acid concentrations (3 and 6 M) and for three different time
intervals (6, 8 and 15 h). A 30% H2O2 : 3M HCl (1:1 v%) solution
was also used in the purification step to remove both the metal
catalysts and the amorphous carbon. The purifications using this
solution were performed at the temperature of 75°C for 8 hours.
Purification efficiencies at different conditions were evaluated by
thermogravimetric analysis. Thermal and electrical properties of
CNTs were also determined. It was found that the obtained electrical
conductivity values for the carbon nanotubes were typical for organic
semiconductor materials and thermal stabilities were changed
depending on the purification chemicals.
Abstract: Walking and sit to stand are activities carried out by
all the people many times during the day, but physical disabilities due
to age and diseases create needs of assistive devices to help elderly
people during their daily life. This study aims to study the different
types and mechanisms of the assistive devices. We will analyze the
limitations and the challenges faced by the researchers in this field.
We will introduce the Assistive Device developed at the Egypt-Japan
University of Science and Technology, named E-JUST Assistive
Device (EJAD). EJAD will be a low cost intelligent assistive device
to help elders in walking and sit-to-stand activities.
Abstract: Static analysis of source code is used for auditing web
applications to detect the vulnerabilities. In this paper, we propose a
new algorithm to analyze the PHP source code for detecting LFI and
RFI potential vulnerabilities. In our approach, we first define some
patterns for finding some functions which have potential to be abused
because of unhandled user inputs. More precisely, we use regular
expression as a fast and simple method to define some patterns for
detection of vulnerabilities. As inclusion functions could be also used
in a safe way, there could occur many false positives (FP). The first
cause of these FP-s could be that the function does not use a usersupplied
variable as an argument. So, we extract a list of usersupplied
variables to be used for detecting vulnerable lines of code.
On the other side, as vulnerability could spread among the variables
like by multi-level assignment, we also try to extract the hidden usersupplied
variables. We use the resulted list to decrease the false
positives of our method. Finally, as there exist some ways to prevent
the vulnerability of inclusion functions, we define also some patterns
to detect them and decrease our false positives.
Abstract: The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
Abstract: The paper studies implications between knowledge spillovers and technological innovation capability in the following three aspects: firstly, the paper debates on the effect of knowledge spillover on some perspectives of technological innovation ability; secondly, it discusses how different roles of knowledge spillover affect the technological innovation capability; finally, the paper creates the model of the factors of knowledge spillovers influencing to technological innovation capability. It concludes that knowledge spillovers affect all the main aspects of technological innovation ultimately to impact of technological innovation capabilities.
Abstract: Collateralized Debt Obligations are not as widely used
nowadays as they were before 2007 Subprime crisis. Nonetheless
there remains an enthralling challenge to optimize cash flows
associated with synthetic CDOs. A Gaussian-based model is used
here in which default correlation and unconditional probabilities of
default are highlighted. Then numerous simulations are performed
based on this model for different scenarios in order to evaluate the
associated cash flows given a specific number of defaults at different
periods of time. Cash flows are not solely calculated on a single
bought or sold tranche but rather on a combination of bought and
sold tranches. With some assumptions, the simplex algorithm gives
a way to find the maximum cash flow according to correlation of
defaults and maturities. The used Gaussian model is not realistic in
crisis situations. Besides present system does not handle buying or
selling a portion of a tranche but only the whole tranche. However the
work provides the investor with relevant elements on how to know
what and when to buy and sell.
Abstract: Semiconductor detector arrays are widely used in
high-temperature plasma diagnostics. They have a fast response,
which allows observation of many processes and instabilities in
tokamaks. In this paper, there are reviewed several diagnostics based
on semiconductor arrays as cameras, AXUV photodiodes (referred
often as fast “bolometers") and detectors of both soft X-rays and
visible light installed on the COMPASS tokamak recently. Fresh
results from both spring and summer campaigns in 2012 are
introduced. Examples of the utilization of the detectors are shown on
the plasma shape determination, fast calculation of the radiation
center, two-dimensional plasma radiation tomography in different
spectral ranges, observation of impurity inflow, and also on
investigation of MHD activity in the COMPASS tokamak discharges.
Abstract: In this paper we have proposed a novel dynamic least cost multicast routing protocol using hybrid genetic algorithm for IP networks. Our protocol finds the multicast tree with minimum cost subject to delay, degree, and bandwidth constraints. The proposed protocol has the following features: i. Heuristic local search function has been devised and embedded with normal genetic operation to increase the speed and to get the optimized tree, ii. It is efficient to handle the dynamic situation arises due to either change in the multicast group membership or node / link failure, iii. Two different crossover and mutation probabilities have been used for maintaining the diversity of solution and quick convergence. The simulation results have shown that our proposed protocol generates dynamic multicast tree with lower cost. Results have also shown that the proposed algorithm has better convergence rate, better dynamic request success rate and less execution time than other existing algorithms. Effects of degree and delay constraints have also been analyzed for the multicast tree interns of search success rate.
Abstract: The paper considers a single-server queue with fixedsize
batch Poisson arrivals and exponential service times, a model
that is useful for a buffer that accepts messages arriving as fixed size
batches of packets and releases them one packet at time. Transient
performance measures for queues have long been recognized as
being complementary to the steady-state analysis. The focus of the
paper is on the use of the functions that arise in the analysis of the
transient behaviour of the queuing system. The paper exploits
practical modelling to obtain a solution to the integral equation
encountered in the analysis. Results obtained indicate that under
heavy load conditions, there is significant disparity in the statistics
between the transient and steady state values.
Abstract: We propose that Virtual Learning Environments (VLEs) should be designed by taking into account the characteristics, the special needs and the specific operating rules of the academic institutions in which they are employed. In this context, we describe a VLE module that extends the support of the organization and delivery of course material by including administration activities related to the various stages of teaching. These include the co-ordination, collaboration and monitoring of the course material development process and institution-specific course material delivery modes. Our specialized module, which enhances VLE capabilities by Helping Educators and Learners through a Laboratory Assistance System, is willing to assist the Greek tertiary technological sector, which includes Technological Educational Institutes (T.E.I.).
Abstract: Supply chain networks are frequently hit by
unplanned events which lead to disruptions and cause operational and
financial consequences. It is neither possible to avoid disruption risk
entirely, nor are network members able to prepare for every possible
disruptive event. Therefore a continuity planning should be set up
which supports effective operational responses in supply chain
networks in times of emergencies. In this research network related
degrees of freedom which determine the options for responsive
actions are derived from interview data. The findings are further
embedded into a common risk management process. The paper
provides support for researchers and practitioners to identify the
network related options for responsive actions and to determine the
need for improving the reaction capabilities.