Abstract: This experiment was performed with the purpose of
investigating effect of additional blend of probiotics Saccharomyces
cerevisiae and Lactobacillus acidophilus on plasma fatty acid profiles
particularly conjugated linoleic acid (CLA) in growing goats fed corn
silage, and selected the optimal levels of the probiotics for further study.
Twenty-four growing crossbred (Thai native x Anglo-Nubian) goats that
weighed (14.2 ± 2.3) kg, aged about 6 months, were purchased and
allocated to 4 treatments according to Randomized Complete Block
Design (RCBD) with 6 goats in each treatment. The blocks were made by
weight into heavy, medium, and light goats and each of the treatments
contained two goats from each of the blocks. In the mean time, ruminal
average pH unaffected, but the NH3-N and also plasma urea nitrogen
(p0.05) were raised, but propionic
proportion (p0.05) were reduced in
concurrent with raise of acetic proportion and resultantly C2:C3 ratio
(p>0.05). On plasma fatty acid profiles, total saturated fatty acids
(p>0.05) was increased, and contrasted with decrease of C15:0
(p0.05), and C18-C22 polyunsaturated fatty acids
(p
Abstract: The Ministry of Defense (MoD) spends hundreds of
millions of dollars on software to support its infrastructure, operate
its weapons and provide command, control, communications,
computing, intelligence, surveillance, and reconnaissance (C4ISR)
functions. These and other all new advanced systems have a common
critical component is information technology. Defense and
Aerospace environment is continuously striving to keep up with
increasingly sophisticated Information Technology (IT) in order to
remain effective in today-s dynamic and unpredictable threat
environment. This makes it one of the largest and fastest growing
expenses of Defense. Hundreds of millions of dollars spent a year on
IT projects. But, too many of those millions are wasted on costly
mistakes. Systems that do not work properly, new components that
are not compatible with old once, trendily new applications that do
not really satisfy defense needs or lost though poorly managed
contracts.
This paper investigates and compiles the effective strategies that
aim to end exasperation with low returns and high cost of
Information Technology Acquisition for defense; it tries to show how
to maximize value while reducing time and expenditure.
Abstract: Quasigroups are algebraic structures closely related to
Latin squares which have many different applications. The
construction of block cipher is based on quasigroup string
transformation. This article describes a block cipher based
Quasigroup of order 256, suitable for fast software encryption of
messages written down in universal ASCII code. The novelty of this
cipher lies on the fact that every time the cipher is invoked a new set
of two randomly generated quasigroups are used which in turn is
used to create a pair of quasigroup of dual operations. The
cryptographic strength of the block cipher is examined by calculation
of the xor-distribution tables. In this approach some algebraic
operations allows quasigroups of huge order to be used without any
requisite to be stored.
Abstract: This paper describes an experience of research,
development and innovation applied in Industrial Naval at (Science
and Technology Corporation for the Development of Shipbuilding
Industry, Naval in Colombia (COTECMAR) particularly through
processes of research, innovation and technological development,
based on theoretical models related to organizational knowledge
management, technology management and management of human
talent and integration of technology platforms. It seeks ways to
facilitate the initial establishment of environments rich in
information, knowledge and content-supported collaborative
strategies on dynamic processes missionary, seeking further
development in the context of research, development and innovation
of the Naval Engineering in Colombia, making it a distinct basis for
the generation of knowledge assets from COTECMAR.
The integration of information and communication technologies,
supported on emerging technologies (mobile technologies, wireless,
digital content via PDA, and content delivery services on the Web 2.0
and Web 3.0) as a view of the strategic thrusts in any organization
facilitates the redefinition of processes for managing information and
knowledge, enabling the redesign of workflows, the adaptation of
new forms of organization - preferably in networking and support the
creation of symbolic-inside-knowledge promotes the development of
new skills, knowledge and attitudes of the knowledge worker
Abstract: Alumina matrix composites with addition of hexagonal boron nitride (hBN), acting as solid lubricant, were produced. Main purpose of solid lubricants is to dispose the necessity of using cooling lubricants in machining process. Hot pressing was used as a consolidating process for Al2O3-x%wt.hBN (x=1/ 2,5/ 5 /7,5 /10) composites. Properties of sinters such as relative density, hardness, Young-s modulus and fracture toughness were examined. Obtained samples characterize by high relative density. Hardness and fracture toughness values allow the use of alumina – hBN composites for machining steels even in hardened condition. However it was observed that high weight content of hBN can negatively influence the mechanical properties of composites.
Abstract: Next Generation Wireless Network (NGWN) is
expected to be a heterogeneous network which integrates all different
Radio Access Technologies (RATs) through a common platform. A
major challenge is how to allocate users to the most suitable RAT for
them. An optimized solution can lead to maximize the efficient use
of radio resources, achieve better performance for service providers
and provide Quality of Service (QoS) with low costs to users.
Currently, Radio Resource Management (RRM) is implemented
efficiently for the RAT that it was developed. However, it is not
suitable for a heterogeneous network. Common RRM (CRRM) was
proposed to manage radio resource utilization in the heterogeneous
network. This paper presents a user level Markov model for a three
co-located RAT networks. The load-balancing based and service
based CRRM algorithms have been studied using the presented
Markov model. A comparison for the performance of load-balancing
based and service based CRRM algorithms is studied in terms of
traffic distribution, new call blocking probability, vertical handover
(VHO) call dropping probability and throughput.
Abstract: Methods of clustering which were developed in the
data mining theory can be successfully applied to the investigation of
different kinds of dependencies between the conditions of
environment and human activities. It is known, that environmental
parameters such as temperature, relative humidity, atmospheric
pressure and illumination have significant effects on the human
mental performance. To investigate these parameters effect, data
mining technique of clustering using entropy and Information Gain
Ratio (IGR) K(Y/X) = (H(X)–H(Y/X))/H(Y) is used, where
H(Y)=-ΣPi ln(Pi). This technique allows adjusting the boundaries of
clusters. It is shown that the information gain ratio (IGR) grows
monotonically and simultaneously with degree of connectivity
between two variables. This approach has some preferences if
compared, for example, with correlation analysis due to relatively
smaller sensitivity to shape of functional dependencies. Variant of an
algorithm to implement the proposed method with some analysis of
above problem of environmental effects is also presented. It was
shown that proposed method converges with finite number of steps.
Abstract: To define or predict incipient motion in an alluvial
channel, most of the investigators use a standard or modified form of
Shields- diagram. Shields- diagram does give a process to determine
the incipient motion parameters but an iterative one. To design
properly (without iteration), one should have another equation for
resistance. Absence of a universal resistance equation also magnifies
the difficulties in defining the model. Neural network technique,
which is particularly useful in modeling a complex processes, is
presented as a tool complimentary to modeling incipient motion.
Present work develops a neural network model employing the RBF
network to predict the average velocity u and water depth y based on
the experimental data on incipient condition. Based on the model,
design curves have been presented for the field application.
Abstract: The high world interest given to the researches concerning the study of moderately halophilic solvent-tolerant bacteria isolated from marine polluted environments is due to their high biotechnological potential, and also to the perspective of their application in different remediation technologies. Using enrichment procedures, I isolated two moderately halophilic Gram-negative bacterial strains from seawater sample, which are tolerant to organic solvents. Cell tolerance, adhesion and cells viability of Aeromonas salmonicida IBBCt2 and Pseudomonas aeruginosa IBBCt3 in the presence of organic solvents depends not only on its physicochemical properties and its concentration, but also on the specific response of the cells, and the cellular response is not the same for these bacterial strains. n-hexane, n-heptane, propylbenzene, with log POW between 3.69 and 4.39, were less toxic for Aeromonas salmonicida IBBCt2 and Pseudomonas aeruginosa IBBCt3, compared with toluene, styrene, xylene isomers and ethylbenzene, with log POW between 2.64 and 3.17. The results indicated that Aeromonas salmonicida IBBCt2 is more susceptible to organic solvents than Pseudomonas aeruginosa IBBCt3. The mechanisms underlying solvent tolerance (e.g., the existance of the efflux pumps) in Aeromonas salmonicida IBBCt2 and Pseudomonas aeruginosa IBBCt3 it was also studied.
Abstract: In this paper, an erosion-based model for abrasive
waterjet (AWJ) turning process is presented. By using modified
Hashish erosion model, the volume of material removed by impacting
of abrasive particles to surface of the rotating cylindrical specimen is
estimated and radius reduction at each rotation is calculated.
Different to previous works, the proposed model considers the
continuous change in local impact angle due to change in workpiece
diameter, axial traverse rate of the jet, the abrasive particle roundness
and density. The accuracy of the proposed model is examined by
experimental tests under various traverse rates. The final diameters
estimated by the proposed model are in good accordance with
experiments.
Abstract: Technological innovation capability (TIC) is
defined as a comprehensive set of characteristics of a firm that
facilities and supports its technological innovation strategies.
An audit to evaluate the TICs of a firm may trigger
improvement in its future practices. Such an audit can be used
by the firm for self assessment or third-party independent
assessment to identify problems of its capability status. This
paper attempts to develop such an auditing framework that
can help to determine the subtle links between innovation
capabilities and business performance; and to enable the
auditor to determine whether good practice is in place. The
seven TICs in this study include learning, R&D, resources
allocation, manufacturing, marketing, organization and
strategic planning capabilities. Empirical data was acquired
through a survey study of 200 manufacturing firms in the
Hong Kong/Pearl River Delta (HK/PRD) region. Structural
equation modelling was employed to examine the
relationships among TICs and various performance indicators:
sales performance, innovation performance, product
performance, and sales growth. The results revealed that
different TICs have different impacts on different
performance measures. Organization capability was found to
have the most influential impact. Hong Kong manufacturers
are now facing the challenge of high-mix-low-volume
customer orders. In order to cope with this change, good
capability in organizing different activities among various
departments is critical to the success of a company.
Abstract: Municipal solid waste (MSW) comprises of a wide
range of heterogeneous materials generated by individual, household
or organization and may include food waste, garden wastes, papers,
textiles, rubbers, plastics, glass, ceramics, metals, wood wastes,
construction wastes but it is not limited to the above mentioned
fractions. The most common Municipal Solid Waste pretreatment
method in use is thermal pretreatment (incineration) and Mechanical
Biological pretreatment. This paper presents an overview of these
two pretreatment methods describing their benefits and laboratory
scale reactors that simulate landfill conditions were constructed in
order to compare emissions in terms of biogas production and
leachate contamination between untreated Municipal Solid Waste and
Mechanical Biological Pretreated waste. The findings of this study
showed that Mechanical Biological pretreatment of waste reduces the
emission level of waste and the benefit over the landfilling of
untreated waste is significant.
Abstract: The current of professional bicycle pedal-s
manufacturing model mostly used casting, forging, die-casting
processing methods, so the paper used 7075 aluminum alloy which is
to produce the bicycle parts most commonly, and employs the
rigid-plastic finite element (FE) DEFORMTM 3D software to simulate
and to analyze the professional bicycle pedal design. First we use Solid
works 2010 3D graphics software to design the professional bicycle
pedal of the mold and appearance, then import finite element (FE)
DEFORMTM 3D software for analysis. The paper used rigid-plastic
model analytical methods, and assuming mode to be rigid body. A
series of simulation analyses in which the variables depend on
different temperature of forging billet, friction factors, forging speed,
mold temperature are reveal to effective stress, effective strain, damage
and die radial load distribution for forging bicycle pedal. The analysis
results hope to provide professional bicycle pedal forming mold
references to identified whether suit with the finite element results for
high-strength design suitability of aluminum alloy.
Abstract: Experiments have been carried out at the Latvia
University of Agriculture Department of Food Technology. The aim
of this work was to assess the effect of sous vide packaging during
the storage time of salad with meat in mayonnaise at different storage
temperature. Samples were evaluated at 0, 1, 3, 7, 10, 15, 18, 25, 29,
42, and 52 storage days at the storage temperature of +4±0.5 ºC and
+10±0.5 ºC. Experimentally the quality of the salad with meat in
mayonnaise was characterized by measuring colour, pH and
microbiological properties. The sous vide packaging was effective in
protecting the product from physical, chemical, and microbial quality
degradation. The sous vide packaging significantly reduces microbial
growth at storage temperature of +4±0.5 ºC and +10±0.5 ºC.
Moreover, it is possible to extend the product shelf life to 52 days
even when stored at +10±0.5 ºC.
Abstract: The present study was provided to examine the
vortical structures generated by two inclined impinging jets with
experimental and numerical investigations. The jets are issuing with a
pitch angle α=40° into a confined quiescent fluid. The experimental
investigation on flow patterns was visualized by using olive particles
injected into the jets illuminated by Nd:Yag laser light to reveal the
finer details of the confined jets interaction. It was observed that two
counter-rotating vortex pairs (CVPs) were generated in the near
region. A numerical investigation was also performed. First, the
numerical results were validates against the experimental results and
then the numerical model was used to study the effect of section ratio
on the evolution of the CVPs. Our results show promising agreement
with experimental data, and indicate that our model has the potential
to produce useful and accurate data regarding the evolution of CVPs.
Abstract: The lack of any centralized infrastructure in mobile ad
hoc networks (MANET) is one of the greatest security concerns in
the deployment of wireless networks. Thus communication in
MANET functions properly only if the participating nodes cooperate
in routing without any malicious intention. However, some of the
nodes may be malicious in their behavior, by indulging in flooding
attacks on their neighbors. Some others may act malicious by
launching active security attacks like denial of service. This paper
addresses few related works done on trust evaluation and
establishment in ad hoc networks. Related works on flooding attack
prevention are reviewed. A new trust approach based on the extent of
friendship between the nodes is proposed which makes the nodes to
co-operate and prevent flooding attacks in an ad hoc environment.
The performance of the trust algorithm is tested in an ad hoc network
implementing the Ad hoc On-demand Distance Vector (AODV)
protocol.
Abstract: In this paper, multi-processors job shop scheduling problems are solved by a heuristic algorithm based on the hybrid of priority dispatching rules according to an ant colony optimization algorithm. The objective function is to minimize the makespan, i.e. total completion time, in which a simultanous presence of various kinds of ferons is allowed. By using the suitable hybrid of priority dispatching rules, the process of finding the best solution will be improved. Ant colony optimization algorithm, not only promote the ability of this proposed algorithm, but also decreases the total working time because of decreasing in setup times and modifying the working production line. Thus, the similar work has the same production lines. Other advantage of this algorithm is that the similar machines (not the same) can be considered. So, these machines are able to process a job with different processing and setup times. According to this capability and from this algorithm evaluation point of view, a number of test problems are solved and the associated results are analyzed. The results show a significant decrease in throughput time. It also shows that, this algorithm is able to recognize the bottleneck machine and to schedule jobs in an efficient way.
Abstract: In this paper we discuss on the security module for the
car appliances to prevent stealing and illegal use on other cars. We
proposed an open structure including authentication and encryption by
embed a security module in each to protect car appliances. Illegal
moving and use a car appliance with the security module without
permission will lead the appliance to useless. This paper also presents
the component identification and deal with relevant procedures. It is at
low cost to recover from destroys by the burglar. Expect this paper to
offer the new business opportunity to the automotive and technology
industry.
Abstract: Economic Load Dispatch (ELD) is a method of determining
the most efficient, low-cost and reliable operation of a power
system by dispatching available electricity generation resources to
supply load on the system. The primary objective of economic
dispatch is to minimize total cost of generation while honoring
operational constraints of available generation resources. In this paper
an intelligent water drop (IWD) algorithm has been proposed to
solve ELD problem with an objective of minimizing the total cost of
generation. Intelligent water drop algorithm is a swarm-based natureinspired
optimization algorithm, which has been inspired from natural
rivers. A natural river often finds good paths among lots of possible
paths in its ways from source to destination and finally find almost
optimal path to their destination. These ideas are embedded into
the proposed algorithm for solving economic load dispatch problem.
The main advantage of the proposed technique is easy is implement
and capable of finding feasible near global optimal solution with
less computational effort. In order to illustrate the effectiveness of
the proposed method, it has been tested on 6-unit and 20-unit test
systems with incremental fuel cost functions taking into account the
valve point-point loading effects. Numerical results shows that the
proposed method has good convergence property and better in quality
of solution than other algorithms reported in recent literature.
Abstract: Natural outdoor scene classification is active and
promising research area around the globe. In this study, the
classification is carried out in two phases. In the first phase, the
features are extracted from the images by wavelet decomposition
method and stored in a database as feature vectors. In the second
phase, the neural classifiers such as back-propagation neural network
(BPNN) and resilient back-propagation neural network (RPNN) are
employed for the classification of scenes. Four hundred color images
are considered from MIT database of two classes as forest and street.
A comparative study has been carried out on the performance of the
two neural classifiers BPNN and RPNN on the increasing number of
test samples. RPNN showed better classification results compared to
BPNN on the large test samples.