Abstract: We study the anomalous WWγ and WWZ couplings by
calculating total cross sections of two processes at the LHeC with
electron beam energy Ee=140 GeV and the proton beam energy Ep=7
TeV, and at the FCC-ep collider with the polarized electron beam
energy Ee=80 GeV and the proton beam energy Ep=50 TeV. At the
LHeC with electron beam polarization, we obtain the results for the
difference of upper and lower bounds as (0.975, 0.118) and (0.285,
0.009) for the anomalous (Δκγ, λγ) and (Δκz, λz) couplings,
respectively. As for FCC-ep collider, these bounds are obtained as
(1.101, 0.065) and (0.320, 0.002) at an integrated luminosity of
Lint=100 fb^-1.
Abstract: In this work, we propose and analyze a model of
Phytoplankton-Zooplankton interaction with harvesting considering
that some species are exploited commercially for food. Criteria for
local stability, instability and global stability are derived and some
threshold harvesting levels are explored to maintain the population
at an appropriate equilibrium level even if the species are exploited
continuously.Further,biological and bionomic equilibria of the system
are obtained and an optimal harvesting policy is also analysed using
the Pantryagin’s Maximum Principle.Finally analytical findings are
also supported by some numerical simulations.
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.
Abstract: Now-a-days autonomous mobile robots have found
applications in diverse fields. An autonomous robot system must be
able to behave in an intelligent manner to deal with complex and
changing environment. This work proposes the performance of path
planning and navigation of autonomous mobile robot using
Gravitational Search Algorithm (GSA), Simulated Annealing (SA)
and Particle Swarm optimization (PSO) based intelligent controllers
in an unstructured environment. The approach not only finds a valid
collision free path but also optimal one. The main aim of the work is
to minimize the length of the path and duration of travel from a
starting point to a target while moving in an unknown environment
with obstacles without collision. Finally, a comparison is made
between the three controllers, it is found that the path length and time
duration made by the robot using GSA is better than SA and PSO
based controllers for the same work.
Abstract: Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. In this work the authors propose a new image based steganographic method for hiding information within the complex bit planes of the image. After slicing into bit planes the cover image is analyzed to extract the most complex planes in decreasing order based on their bit plane complexity. The complexity function next determines the complex noisy blocks of the chosen bit plane and finally pixel mapping method (PMM) has been used to embed secret bits into those regions of the bit plane. The novel approach of using pixel mapping method (PMM) in bit plane domain adaptively embeds data on most complex regions of image, provides high embedding capacity, better imperceptibility and resistance to steganalysis attack.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: This study presents an attempt to evaluate the
antioxidant potential and antimicrobial activity of methanolic extract,
and essential oils prepared from the leaves of sage (Salvia officinalis
L.). The content of polyphenol in the methanolic extracts from the
leaves of Salvia officinalis was determined spectrophotometrically,
calculated as gallic acid and catechin equivalent. The essential oils
and methanol extract were also subjected to screenings for the
evaluation of their antioxidant activities using 2, 2-diphenyl-1-
picrylhydrazyl (DPPH) test. While the plant essential oils showed
only weak antioxidant activities, its methanol extract was
considerably active in DPPH (IC50 = 37.29 μg/ml) test. Appreciable
total polyphenol content (31.25 mg/g) was also detected for the plant
methanol extract as gallic acid equivalent in the Folin–Ciocalteu test.
The plant was also screened for its antimicrobial activity and good to
moderate inhibitions were recorded for its essential oils, and
methanol extracts against most of the tested microorganisms.
The present investigation revealed that this plant had rich source
of antioxidant properties. It is for this reason that sage has found
increasing application in food formulations.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: The growth in the volume of text data such as books
and articles in libraries for centuries has imposed to establish
effective mechanisms to locate them. Early techniques such as
abstraction, indexing and the use of classification categories have
marked the birth of a new field of research called "Information
Retrieval". Information Retrieval (IR) can be defined as the task of
defining models and systems whose purpose is to facilitate access to
a set of documents in electronic form (corpus) to allow a user to find
the relevant ones for him, that is to say, the contents which matches
with the information needs of the user.
Most of the models of information retrieval use a specific data
structure to index a corpus which is called "inverted file" or "reverse
index".
This inverted file collects information on all terms over the corpus
documents specifying the identifiers of documents that contain the
term in question, the frequency of each term in the documents of the
corpus, the positions of the occurrences of the word...
In this paper we use an oriented object database (db4o) instead of
the inverted file, that is to say, instead to search a term in the inverted
file, we will search it in the db4o database.
The purpose of this work is to make a comparative study to see if
the oriented object databases may be competing for the inverse index
in terms of access speed and resource consumption using a large
volume of data.
Abstract: In this paper, the dynamic characteristics of a threelobe
journal bearing lubricated with micropolar fluids are determined
by the linear stability theory. Lubricating oil containing additives and
contaminants is modelled as micropolar fluid. The modified
Reynolds equation is obtained using the micropolar lubrication theory
.The finite difference technique has been used to determine the
solution of the modified Reynolds equation. The dynamic
characteristics in terms of stiffness, damping coefficients, the critical
mass and whirl ratio are determined for various values of size of
material characteristic length and the coupling number. The
computed results show that the three-lobe bearing lubricated with
micropolar fluid exhibits better stability compared with that
lubricated with Newtonian fluid. According to the results obtained,
the effect of the parameter micropolar fluid is remarkable on the
dynamic characteristics and stability of the three-lobe bearing.
Abstract: The study is devoted to define the optimal conditions
for the nitriding of pure iron at atmospheric pressure by using NH3-
Ar-C3H8 gas mixtures. After studying the mechanisms of phase
formation and mass transfer at the gas-solid interface, a mathematical
model is developed in order to predict the nitrogen transfer rate in the
solid, the ε-carbonitride layer growth rate and the nitrogen and
carbon concentration profiles. In order to validate the model and to
show its possibilities, it is compared with thermogravimetric
experiments, analyses and metallurgical observations (X-ray
diffraction, optical microscopy and electron microprobe analysis).
Results obtained allow us to demonstrate the sound correlation
between the experimental results and the theoretical predictions.
Abstract: Many of the ever-growing elderly population require
exercise, such as running, for health management. One important
element of a runner’s training is the choice of shoes for exercise; shoes
are important because they provide the interface between the feet and
road. When we purchase shoes, we may instinctively choose a pair
after trying on many different pairs of shoes. Selecting the shoes
instinctively may work, but it does not guarantee a suitable fit for
running activities. Therefore, if we could select suitable shoes for each
runner from the viewpoint of brain activities, it would be helpful for
validating shoe selection. In this paper, we describe how brain
activities show different characteristics during particular task,
corresponding to different properties of shoes. Using five subjects, we
performed a verification experiment, applying weight, softness, and
flexibility as shoe properties. In order to affect the shoe property’s
differences to the brain, subjects run for 10 min. Before and after
running, subjects conducted a paced auditory serial addition task
(PASAT) as the particular task; and the subjects’ brain activities
during the PASAT are evaluated based on oxyhemoglobin and
deoxyhemoglobin relative concentration changes, measured by
near-infrared spectroscopy (NIRS). When the brain works actively,
oxihemoglobin and deoxyhemoglobin concentration drastically
changes; therefore, we calculate the maximum values of concentration
changes. In order to normalize relative concentration changes after
running, the maximum value are divided by before running maximum
value as evaluation parameters. The classification of the groups of
shoes is expressed on a self-organizing map (SOM). As a result,
deoxyhemoglobin can make clusters for two of the three types of
shoes.
Abstract: Reburning is a useful technology in reducing nitric
oxide through injection of a secondary hydrocarbon fuel. In this paper,
an experimental study has been conducted to evaluate the effect of fuel
lean reburning on NOx/CO reduction in LNG flame. Experiments
were performed in flames stabilized by a co-flow swirl burner, which
was mounted at the bottom of the furnace. Tests were conducted using
LNG gas as the reburn fuel as well as the main fuel. The effects of
reburn fuel fraction and injection manner of the reburn fuel were
studied when the fuel lean reburning system was applied. The paper
reports data on flue gas emissions and temperature distribution in the
furnace for a wide range of experimental conditions. At steady state,
temperature distribution and emission formation in the furnace have
been measured and compared. This paper makes clear that in order to
decrease both NOx and CO concentrations in the exhaust when the
pulsated fuel lean reburning system was adapted, it is important that
the control of some factors such as frequency and duty ratio. Also it
shows the fuel lean reburning is also effective method to reduce NOx
as much as reburning.
Abstract: The effect of a 3-dimensional (3D) blade on the turbine
characteristics of Wells turbine for wave energy conversion has been
investigated experimentally by model testing under steady flow
conditions in this study, in order to improve the peak efficiency and
stall characteristics. The aim of use of 3D blade is to prevent flow
separation on the suction surface near the tip. The chord length is
constant with radius and the blade profile changes gradually from the
mean radius to tip. The proposed blade profiles in the study are
NACA0015 from the hub to mean radius and NACA0025 at the tip.
The performances of Wells turbine with 3D blades has been compared
with those of the original Wells turbine, i.e., the turbine with
2-dimensional (2D) blades. As a result, it was concluded that although
the peak efficiency of Wells turbine can be improved by the use of the
proposed 3D blade, its blade does not overcome the weakness of
stalling.
Abstract: Carbon nanotube is one of the most attractive materials
for the potential applications of nanotechnology due to its excellent
mechanical, thermal, electrical and optical properties. In this paper we
report a supercapacitor made of nickel foil electrodes, coated with
multiwall carbon nanotubes (MWCNTs) thin film using
electrophoretic deposition (EPD) method. Chemical vapor deposition
method was used for the growth of MWCNTs and ethanol was used as
a hydrocarbon source. High graphitic multiwall carbon nanotube was
found at 750oC analyzing by Raman spectroscopy. We observed the
electrochemical performance of supercapacitor by cyclic
voltammetry. The electrodes of supercapacitor fabricated from
MWCNTs exhibit considerably small equivalent series resistance
(ESR), and a high specific power density. Electrophoretic deposition
is an easy method in fabricating MWCNT electrodes for high
performance supercapacitor.
Abstract: This paper investigates the joint effect of the
interconnected (n,k)-star network topology and Multi-Agent
automated control on restoration and reconfiguration of power
systems. With the increasing trend in development in Multi-Agent
control technologies applied to power system reconfiguration
in presence of faulty components or nodes. Fault tolerance is
becoming an important challenge in the design processes of the
distributed power system topology. Since the reconfiguration of a
power system is performed by agent communication, the (n,k)-star
interconnected network topology is studied and modeled in this
paper to optimize the process of power reconfiguration. In this paper,
we discuss the recently proposed (n,k)-star topology and examine its
properties and advantages as compared to the traditional multi-bus
power topologies. We design and simulate the topology model for
distributed power system test cases. A related lemma based on the
fault tolerance and conditional diagnosability properties is presented
and proved both theoretically and practically. The conclusion is
reached that (n,k)-star topology model has measurable advantages
compared to standard bus power systems while exhibiting fault
tolerance properties in power restoration, as well as showing
efficiency when applied to power system route discovery.
Abstract: This paper reports a structured literature review of the
application of Health Information Technology in developing
countries, defined as the World Bank categories Low-income
countries, Lower-middle-income, and Upper-middle-income
countries. The aim was to identify and classify the various
applications of health information technology to assess its current
state in developing countries and explore potential areas of research.
We offer specific analysis and application of HIT in Libya as one of
the developing countries. A structured literature review was
conducted using the following online databases: IEEE, Science
Direct, PubMed, and Google Scholar. Publication dates were set for
2000-2013. For the PubMed search, publications in English, French,
and Arabic were specified. Using a content analysis approach, 159
papers were analyzed and a total number of 26 factors were identified
that affect the adoption of health information technology. Of the 2681
retrieved articles, 159 met the inclusion criteria which were carefully
analyzed and classified. The implementation of health information
technology across developing countries is varied. Whilst it was
initially expected financial constraints would have severely limited
health information technology implementation, some developing
countries like India have nevertheless dominated the literature and
taken the lead in conducting scientific research. Comparing the
number of studies to the number of countries in each category, we
found that Low-income countries and Lower-middle-income had
more studies carried out than Upper-middle-income countries.
However, whilst IT has been used in various sectors of the economy,
the healthcare sector in developing countries is still failing to benefit
fully from the potential advantages that IT can offer.
Abstract: The investigation on wind turbine degradation was
carried out using the nacelle wind data. The three Vestas V80-2MW
wind turbines of Sungsan wind farm in Jeju Island, South Korea were
selected for this work. The SCADA data of the wind farm for five
years were analyzed to draw power curve of the turbines. It is assumed
that the wind distribution is the Rayleigh distribution to calculate the
normalized capacity factor based on the drawn power curve of the
three wind turbines for each year. The result showed that the reduction
of power output from the three wind turbines occurred every year and
the normalized capacity factor decreased to 0.12%/year on average.
Abstract: Enterprise Architecture (EA) is employed by
enterprises for providing integrated Information Systems (ISs) in
order to support alignment of their business and Information
Technology (IT). Evaluation of EA implementation can support
enterprise to reach intended goals. There are some problems in
current evaluation methods of EA implementation that lead to
ineffectiveness implementation of EA. This paper represents current
issues on evaluation of EA implementation. In this regard, we set the
framework in order to represent evaluation’s issues based on their
functionality and structure. The results of this research not only
increase the knowledge of evaluation, but also could be useful for
both academics and practitioners in order to realize the current
situation of evaluations.
Abstract: The inspection of underneath vehicle system has been
given significant attention by governments after the threat of
terrorism become more prevalent. New technologies such as mobile
robots and computer vision are led to have more secure environment.
This paper proposed that a mobile robot like Aria robot can be used
to search and inspect the bombs under parking a lot vehicle. This
robot is using fuzzy logic and subsumption algorithms to control the
robot that movies underneath the vehicle. An OpenCV library and
laser Hokuyo are added to Aria robot to complete the experiment for
under vehicle inspection. This experiment was conducted at the
indoor environment to demonstrate the efficiency of our methods to
search objects and control the robot movements under vehicle. We
got excellent results not only by controlling the robot movement but
also inspecting object by the robot camera at same time. This success
allowed us to know the requirement to construct a new cost effective
robot with more functionality.