Abstract: A new, combinatorial model for analyzing and inter-
preting an electrocardiogram (ECG) is presented. An application of
the model is QRS peak detection. This is demonstrated with an
online algorithm, which is shown to be space as well as time efficient.
Experimental results on the MIT-BIH Arrhythmia database show that
this novel approach is promising. Further uses for this approach are
discussed, such as taking advantage of its small memory requirements
and interpreting large amounts of pre-recorded ECG data.
Abstract: Group key management is an important functional
building block for any secure multicast architecture.
Thereby, it has been extensively studied in the literature.
In this paper we present relevant group key management
protocols. Then, we compare them against some pertinent
performance criteria.
Abstract: In this paper, fabrication and study of electronic properties of Au/methyl-red/Ag surface type Schottky diode by current-voltage (I-V) method has been reported. The I-V characteristics of the Schottky diode showed the good rectifying behavior. The values of ideality factor n and barrier height b of Au/methyl-red/Ag Schottky diode were calculated from the semi-log I-V characteristics and by using the Cheung functions. From semi-log current-voltage characteristics the values of n and b were found 1.93 and 0.254 eV, respectively, while by using Cheung functions their values were calculated 1.89 and 0.26 eV, respectively. The effect of series resistance was also analyzed by Cheung functions. The series resistance RS values were determined from dV/d(lnI)–I and H(I)–I graphs and were found to be 1.1 k and 1.3 k, respectively.
Abstract: In this paper the development of a software to
encrypt messages with asymmetric cryptography is presented. In
particular, is used the RSA (Rivest, Shamir and Adleman) algorithm
to encrypt alphanumeric information. The software allows to
generate different public keys from two prime numbers provided by
the user, the user must then select a public-key to generate the
corresponding private-key. To encrypt the information, the user must
provide the public-key of the recipient as well as the message to be
encrypted. The generated ciphertext can be sent through an insecure
channel, so that would be very difficult to be interpreted by an
intruder or attacker. At the end of the communication, the recipient
can decrypt the original message if provide his/her public-key and
his/her corresponding private-key.
Abstract: The demand of hydrocarbons has increased the
construction of pipelines and the protection of the physical and
mechanical integrity of the already existing infrastructure. Corrosion
is the main reason of failures in the pipeline and it is mostly produced
by acid (HCOOCH3). In this basis, a CFD code was used, in order to
study the corrosion of internal wall of hydrocarbons pipeline. In this
situation, the corrosion phenomenon shows a growing deposit, which
causes defect damages (welding or fabrication) at diverse positions
along the pipeline. The solution of the pipeline corrosion is based on
the diminution of the Naphthenic acid.
Abstract: In this paper, a novel corner detection method is
presented to stably extract geometrically important corners.
Intensity-based corner detectors such as the Harris corner can detect
corners in noisy environments but has inaccurate corner position and
misses the corners of obtuse angles. Edge-based corner detectors such
as Curvature Scale Space can detect structural corners but show
unstable corner detection due to incomplete edge detection in noisy
environments. The proposed image-based direct curvature estimation
can overcome limitations in both inaccurate structural corner detection
of the Harris corner detector (intensity-based) and the unstable corner
detection of Curvature Scale Space caused by incomplete edge
detection. Various experimental results validate the robustness of the
proposed method.
Abstract: Relevant agricultural information disseminator
(extension agent) ratio of 1:3500 farm families which become a
menace to agricultural production capacity in developing countries
necessitate this study. Out of 4 zones in the state, 24 extension agents
in each zone, 4 extension agents using cell phones and 120 farmers
using cell phone and 120 other farmers not using cell phone were
purposively selected to give 240 farmers that participated in the
research. Data were collected using interview guide and analysized
using frequency, percentage and t-test.. Frequency of contact with
agricultural information centers revealed that cell phone user farmers
had greater means score of X 41.43 contact as against the low mean
X19.32 contact recorded by farmers receiving agricultural
information from extension agents not using cell phone and their
production was statistically significant at P < 0.05. Usage of cell
phone increase extension agent contact and increase farmers-
production capacity.
Abstract: Optimal design of structure has a main role in reduction of material usage which leads to deduction in the final cost of construction projects. Evolutionary approaches are found to be more successful techniques for solving size and shape structural optimization problem since it uses a stochastic random search instead of a gradient search. By reviewing the recent literature works the problem found was the optimization of weight. A new meta-heuristic algorithm called as Cuckoo Search (CS) Algorithm has used for the optimization of the total weight of the truss structures. This paper has used set of 10 bars and 25 bars trusses for the testing purpose. The main objective of this work is to reduce the number of iterations, weight and the total time consumption. In order to demonstrate the effectiveness of the present method, minimum weight design of truss structures is performed and the results of the CS are compared with other algorithms.
Abstract: A key aspect of the design of any software system is
its architecture. An architecture description provides a formal model
of the architecture in terms of components and connectors and how
they are composed together. COSA (Component-Object based
Software Structures), is based on object-oriented modeling and
component-based modeling. The model improves the reusability by
increasing extensibility, evolvability, and compositionality of the
software systems. This paper presents the COSA modelling tool
which help architects the possibility to verify the structural coherence
of a given system and to validate its semantics with COSA approach.
Abstract: The effects of commercial or bovine yeasts on the
performance and blood variables of broiler chickens intoxicated with
aflatoxin were investigated in broilers. Four hundred eighty broilers
(Arbor Acres; 3-wk-old) were randomly assigned to 4 groups. Each
group (120 broiler chickens) was further randomly divided into 6
replicates of 20 chickens. The treatments were control diet without
additives (treatment 1), 250 ppb AFB1 (treatment 2), commercial
yeast, Saccharomyces cerevisiae, (CY 2.5 x 107 CFU/g) + 250 ppb
AFB1 (treatment 3) and bovine yeast, Saccharomyces cerevisiae,
(BY 2.5 x 107 CFU/g + 250 ppb AFB1 (treatment 4). Complete
randomized design (CRD) was used in the experiment. Feed
consumption and body weight were recorded at every five-day
period. On day 42, carcass compositions were determined from 30
birds per treatment. While chicks were sacrificed, 3-4 ml blood
sample was taken and stored frozen at (-20°C) for serum chemical
analysis to determine effects of consumption of diets on blood
chemistry (total protein, albumin, glucose, urea, cholesterol and
triglycerides). There were no significant differences in ADFI among
the treatments(P>0.05). However, BWG, FCR and mortality were
highly significantly different (P
Abstract: Human Resource (HR) applications can be used to
provide fair and consistent decisions, and to improve the
effectiveness of decision making processes. Besides that, among
the challenge for HR professionals is to manage organization
talents, especially to ensure the right person for the right job at the
right time. For that reason, in this article, we attempt to describe
the potential to implement one of the talent management tasks i.e.
identifying existing talent by predicting their performance as one of
HR application for talent management. This study suggests the
potential HR system architecture for talent forecasting by using
past experience knowledge known as Knowledge Discovery in
Database (KDD) or Data Mining. This article consists of three
main parts; the first part deals with the overview of HR
applications, the prediction techniques and application, the general
view of Data mining and the basic concept of talent management
in HRM. The second part is to understand the use of Data Mining
technique in order to solve one of the talent management tasks, and
the third part is to propose the potential HR system architecture for
talent forecasting.
Abstract: The main objective of this paper is to estimate the cost of road traffic accidents in Egypt. The Human Capital (HC) approach, specifically the Gross-Loss-of-Output methodology, is adopted for estimation. Moreover, cost values obtained by previous national literature are updated using the inflation rates. The results indicate an estimated cost of road traffic accidents in Egypt of approximately 10 billion Egyptian Pounds (about $US 1.8 billion) for the year 2008. In addition, it is expected that this cost will rise in 2009 to 11.8 billion Egyptian Pounds (about $US 2.1 billion).
Abstract: A multiphase harmonic load flow algorithm is developed based on backward/forward sweep to examine the effects of various factors on the neutral to earth voltage (NEV), including unsymmetrical system configuration, load unbalance and harmonic injection. The proposed algorithm composes fundamental frequency and harmonic frequencies power flows. The algorithm and the associated models are tested on IEEE 13 bus system. The magnitude of NEV is investigated under various conditions of the number of grounding rods per feeder lengths, the grounding rods resistance and the grounding resistance of the in feeding source. Additionally, the harmonic injection of nonlinear loads has been considered and its influences on NEV under different conditions are shown.
Abstract: In this paper the problems associated with immunity
of embedded systems used in Motor-Drive systems are investigated
and appropriate solutions are presented. Integration of VSD motor
systems (Integral Motor) while partially reducing some of these
effects, adds to immunity problem of their embedded systems. Fail
safe operation of an Integral Motor in arduous industrial
environments is considered. In this paper an integral motor with a
unique design is proposed to overcome critical issues such as heat,
vibration and electromagnetic interference which are damaging to
sensitive electronics without requirement of any additional cooling
system. Advantages of the proposed Integral motor are compactness
of combo motor and drive system with no external cabling/wiring.
This motor provides a perfect shielding for least amount of radiated
emission. It has an inbuilt filter for EMC compliance and has been
designed to provide lower EMC noise for immunity of the internal
electronics as well as the other neighbouring systems.
Abstract: SIP (Session Initiation Protocol), using HTML based
call control messaging which is quite simple and efficient, is being
replaced for VoIP networks recently. As for authentication and
authorization purposes there are many approaches and considerations
for securing SIP to eliminate forgery on the integrity of SIP
messages. On the other hand Elliptic Curve Cryptography has
significant advantages like smaller key sizes, faster computations on
behalf of other Public Key Cryptography (PKC) systems that obtain
data transmission more secure and efficient. In this work a new
approach is proposed for secure SIP authentication by using a public
key exchange mechanism using ECC. Total execution times and
memory requirements of proposed scheme have been improved in
comparison with non-elliptic approaches by adopting elliptic-based
key exchange mechanism.
Abstract: Despite extensive study on wireless sensor network
security, defending internal attacks and finding abnormal behaviour
of the sensor are still difficult and unsolved task. The conventional
cryptographic technique does not give the robust security or detection
process to save the network from internal attacker that cause by
abnormal behavior. The insider attacker or abnormally behaved
sensor identificationand location detection framework using false
massage detection and Time difference of Arrival (TDoA) is
presented in this paper. It has been shown that the new framework
can efficiently identify and detect the insider attacker location so that
the attacker can be reprogrammed or subside from the network to
save from internal attack.
Abstract: The paper shows some ability to manage two-phase
flows arising from the use of unsteady effects. In one case, we
consider the condition of fragmentation of the interface between the
two components leads to the intensification of mixing. The problem
is solved when the temporal and linear scale are small for the
appearance of the developed mixing layer. Showing that exist such
conditions for unsteady flow velocity at the surface of the channel,
which will lead to the creation and fragmentation of vortices at Re
numbers of order unity. Also showing that the Re is not a criterion of
similarity for this type of flows, but we can introduce a criterion that
depends on both the Re, and the frequency splitting of the vortices. It
turned out that feature of this situation is that streamlines behave
stable, and if we analyze the behavior of the interface between the
components it satisfies all the properties of unstable flows. The other
problem we consider the behavior of solid impurities in the extensive
system of channels. Simulated unsteady periodic flow modeled
breaths. Consider the behavior of the particles along the trajectories.
It is shown that, depending on the mass and diameter of the particles,
they can be collected in a caustic on the channel walls, stop in a
certain place or fly back. Of interest is the distribution of particle
velocity in frequency. It turned out that by choosing a behavior of the
velocity field of the carrier gas can affect the trajectory of individual
particles including force them to fly back.
Abstract: Binder drainage test is widely used to set an upper
limit to the design binder content of porous asphalt. However, the
presence of high amount of fine particles in the drained binder may
affect the accuracy of the test result. This paper presents a study to
characterize the composition and particle size distribution of fine
particles accumulated in the drained binder. Fine aggregates and filler
in the drained binder were extracted using a suitable solvent. Then,
wet and dry sieve analysis was carried out to identify the actual
composition of the extracted fine aggregates and filler. From the
results, almost half of the drained binder consisted of fine aggregates
and this significantly affects the accuracy of the design binder content
of porous asphalt mix. This simple finding highlights the importance
of taking into account the presence of fine aggregates in the
calculation of drained binder.
Abstract: The objective of this research was to study the factors
related to the satisfaction of consumers who purchased a Toyota
SUV Fortuner. This paper was a survey data which collected 400
samples from 65 car dealerships. The survey was conducted mainly
in Bangkok, Thailand. The statistics utilized in this paper included
percentage, mean, standard deviation and Pearson Product-Moment.
The findings revealed that the majority of respondent were male with
an undergraduate degree, married and live together. The average
income of the respondents was between 20,001 - 30,000 baht. Most
of them worked for private companies. Most of them had a family
with the average of 4 members. The hypotheses testing revealed that
the factors of marketing mix in terms of product (ability, gas
mileage, and safety) were related to overall satisfaction at the
medium level. However, the findings also revealed that the factors of
marketing mix in terms of product (image), price, and promotion, and
service center were related to the overall satisfaction at the low level.
Abstract: Service innovations are central concerns in fast
changing environment. Due to the fitness in customer demands and
advances in information technologies (IT) in service management, an
expanded conceptualization of e-service innovation is required.
Specially, innovation practices have become increasingly more
challenging, driving managers to employ a different open innovation
model to maintain competitive advantages. At the same time, firms
need to interact with external and internal customers in innovative
environments, like the open innovation networks, to co-create values.
Based on these issues, an important conceptual framework of e-service
innovation is developed. This paper aims to examine the contributing
factors on e-service innovation and firm performance, including
financial and non-financial aspects. The study concludes by showing
how e-service innovation will play a significant role in growing the
overall values of the firm. The discussion and conclusion will lead to a
stronger understanding of e-service innovation and co-creating values
with customers within open innovation networks.