Abstract: Flood management is one of the important fields in
urban storm water management. Floods are influenced by the
increase of huge storm event, or improper planning of the area. This study mainly provides the flood protection in four stages; planning,
flood event, responses and evaluation. However it is most effective then flood protection is considered in planning/design and
evaluation stages since both stages represent the land development of the area. Structural adjustments are often more reliable than nonstructural
adjustments in providing flood protection, however
structural adjustments are constrained by numerous factors such as
political constraints and cost. Therefore it is important to balance
both adjustments with the situation. The technical decisions provided
will have to be approved by the higher-ups who have the power to
decide on the final solution. Costs however, are the biggest factor in
determining the final decision. Therefore this study recommends
flood protection system should have been integrated and enforces
more in the early stages (planning and design) as part of the storm
water management plan. Factors influencing the technical decisions
provided should be reduced as low as possible to avoid a reduction in
the expected performance of the proposed adjustments.
Abstract: Corrosion of metallic water pipelines buried below
ground surface is a function of the nature of the surrounding soil and
groundwater. This gives the importance of knowing the physical and
chemical characteristics of the pipe-s surrounding environment. The
corrosion of externally – unprotected metallic water pipelines,
specially ductile iron pipes, in localities with aggressive soil
conditions is becoming a significant problem. Anticorrosive
protection for metallic water pipelines, their fittings and accessories
is very important, because they may be attached by corrosion with
time. The tendency of a metallic substrate to corrode is a function of
the surface characteristics of the metal and of the metal/protective
film interface, the physical, electrical and electrochemical properties
of the film, and the nature of the environment in which the pipelines
system is placed. In this work the authors have looked at corrosion
problems of water pipelines and their control. The corrosive
properties of groundwater and soil environments are reviewed, and
parameters affecting corrosion are discussed. The purpose of this
work is to provide guidelines for materials selection in water and soil
environments, and how the water pipelines can be protected against
metallic corrosion.
Abstract: 'Secure routing in Mobile Ad hoc networks' and
'Internet connectivity to Mobile Ad hoc networks' have been dealt
separately in the past research. This paper proposes a light weight
solution for secure routing in integrated Mobile Ad hoc Network
(MANET)-Internet. The proposed framework ensures mutual
authentication of Mobile Node (MN), Foreign Agent (FA) and Home
Agent (HA) to avoid various attacks on global connectivity and
employs light weight hop-by-hop authentication and end-to-end
integrity to protect the network from most of the potential security
attacks. The framework also uses dynamic security monitoring
mechanism to monitor the misbehavior of internal nodes. Security
and performance analysis show that our proposed framework
achieves good security while keeping the overhead and latency
minimal.
Abstract: Huge losses in apple production are caused by pathogens that cannot be seen shortly after harvest. After-harvest thermotherapy treatments can considerably improve control of storage diseases on apples and become an alternative to chemical pesticides. In the years 2010-2012 carried out research in this area. Apples of 'Topaz' cultivar were harvested at optimal maturity time for long storage and subject to water bath treatment at 45, 50, 52, 55°C for 60, 120, 180 and 240 seconds. The control was untreated fruits. After 12 and 24 weeks and during so called simulated trade turnover the fruits were checked for their condition and the originators of diseases were determined by using the standard phytopathological methods. The most common originator of 'Topaz' apple infection during storage were the fungi of genus Gloeosporium. In this paper it was proven that for effective protection of 'Topaz' apples against diseases, thermotherapy by using water treatments at temperature range of 50-52°C is quite sufficient.
Abstract: The manufacturing transmission line tower parts has
being generated hazardous waste which is required proper disposal
of waste for protection of land pollution. Manufacturing Process in
the manufacturing of steel angle, plates, pipes, channels are passes
through conventional, semi automatic and CNC machines for
cutting, marking, punching, drilling, notching, bending operations.
All fabricated material Coated with thin layer of Zinc in Galvanizing
plant where molten zinc is used for coating. Prior to Galvanizing,
chemical like 33% concentrated HCl Acid, ammonium chloride and
d-oil being used for pretreatment of iron. The bath of water with
sodium dichromate is used for cooling and protection of the
galvanized steel. For the heating purpose the furnace oil burners are
used. These above process the Zinc dross, Zinc ash, ETP sludge and
waste pickled acid generated as hazardous waste. The RPG has
made captive secured land fill site, since 1997 since then it was
using for disposal of hazardous waste after completion of SLF
(Secured land fill) site. The RPG has raised height from ground
level then now it is being used for disposal of waste as he designed
the SLF after in creasing height of from GL it is functional without
leach ate or adverse impacts in the environment.
Abstract: The Chichiawan stream in the Wulin catchment in
Taiwan is the natural habitat of Formosan landlocked salmon. Human
and agriculture activities gradually worsen water quality and impact
the fish habitat negatively. To protect and manage Formosan
landlocked salmon habitat, it is important to understand a variety
land-uses affect on the watershed responses to storms. This study
discusses watershed responses to the dry-day before a storm event and
a variety of land-uses in the Wulin catchment. Under the land-use
planning in the Wulin catchment, the peak flows during typhoon
events do not have noticeable difference. However, the nutrient
exports can be highly reduced under the strategies of restraining
agriculture activities. Due to the higher affinity of P for soil than that
of N, the exports of TN from overall Wuling catchment were much
greater than Ortho-P. Agriculture mainly centralized in subbasin A,
which is the important source of nutrients in nonpoint source discharge.
The subbasin A supplied about 26% of the TN and 32% of the Ortho-P
discharge in 2004, despite the fact it only covers 19% area of the
Wuling catchment. The subbasin analysis displayed that the
agricultural subbasin A exports higher nutrients per unit area than
other forest subbasins. Additionally, the agricultural subbasin A
contributed a higher percentage to total Ortho-P exports compares to
TN. The results of subbasin analysis might imply the transport of
Ortho-P was similar to the particulate matter which was mainly
influenced by the runoff and affected by the desorption from soil
particles while the TN (dominated as nitrate-N) was mainly influenced
by base-flow.
Abstract: In power systems, protective relays must filter their
inputs to remove undesirable quantities and retain signal quantities of
interest. This job must be performed accurate and fast. A new
method for filtering the undesirable components such as DC and
harmonic components associated with the fundamental system
signals. The method is s based on a dynamic filtering algorithm. The
filtering algorithm has many advantages over some other classical
methods. It can be used as dynamic on-line filter without the need of
parameters readjusting as in the case of classic filters. The proposed
filter is tested using different signals. Effects of number of samples
and sampling window size are discussed. Results obtained are
presented and discussed to show the algorithm capabilities.
Abstract: Information and communication service providers
(ICSP) that are significant in size and provide Internet-based services
take administrative, technical, and physical protection measures via
the information security check service (ISCS). These protection
measures are the minimum action necessary to secure the stability and
continuity of the information and communication services (ICS) that
they provide. Thus, information assets are essential to providing ICS,
and deciding the relative importance of target assets for protection is a
critical procedure. The risk analysis model designed to decide the
relative importance of information assets, which is described in this
study, evaluates information assets from many angles, in order to
choose which ones should be given priority when it comes to
protection. Many-sided risk analysis (MSRS) grades the importance of
information assets, based on evaluation of major security check items,
evaluation of the dependency on the information and communication
facility (ICF) and influence on potential incidents, and evaluation of
major items according to their service classification, in order to
identify the ISCS target. MSRS could be an efficient risk analysis
model to help ICSPs to identify their core information assets and take
information protection measures first, so that stability of the ICS can
be ensured.
Abstract: The advances in multimedia and networking technologies
have created opportunities for Internet pirates, who can easily
copy multimedia contents and illegally distribute them on the Internet,
thus violating the legal rights of content owners. This paper describes
how a simple and well-known watermarking procedure based on a
spread spectrum method and a watermark recovery by correlation can
be improved to effectively and adaptively protect MPEG-2 videos
distributed on the Internet. In fact, the procedure, in its simplest
form, is vulnerable to a variety of attacks. However, its security
and robustness have been increased, and its behavior has been
made adaptive with respect to the video terminals used to open
the videos and the network transactions carried out to deliver them
to buyers. In fact, such an adaptive behavior enables the proposed
procedure to efficiently embed watermarks, and this characteristic
makes the procedure well suited to be exploited in web contexts,
where watermarks usually generated from fingerprinting codes have
to be inserted into the distributed videos “on the fly", i.e. during the
purchase web transactions.
Abstract: Network exchange is now widely used. However, it still
cannot avoid the problems evolving from network exchange. For
example. A buyer may not receive the order even if he/she makes the
payment. For another example, the seller possibly get nothing even
when the merchandise is sent. Some studies about the fair exchange
have proposed protocols for the design of efficiency and exploited the
signature property to specify that two parties agree on the exchange.
The information about purchased item and price are disclosed in
this way. This paper proposes a new fair network payment protocol
with off-line trusted third party. The proposed protocol can protect
the buyers- purchase message from being traced. In addition, the
proposed protocol can meet the proposed requirements. The most
significant feature is Non-transfer property we achieved.
Abstract: The recent growth of using multimedia transmission
over wireless communication systems, have challenges to protect the
data from lost due to wireless channel effect. Images are corrupted
due to the noise and fading when transmitted over wireless channel,
in wireless channel the image is transmitted block by block, Due to
severe fading, entire image blocks can be damaged. The aim of this
paper comes out from need to enhance the digital images at the
wireless receiver side. Proposed Boundary Interpolation (BI)
Algorithm using wavelet, have been adapted here used to
reconstruction the lost block in the image at the receiver depend on
the correlation between the lost block and its neighbors. New
Proposed technique by using Boundary Interpolation (BI) Algorithm
using wavelet with Pixel interleaver has been implemented. Pixel
interleaver work on distribute the pixel to new pixel position of
original image before transmitting the image. The block lost through
wireless channel is only effects individual pixel. The lost pixels at the
receiver side can be recovered by using Boundary Interpolation (BI)
Algorithm using wavelet. The results showed that the New proposed
algorithm boundary interpolation (BI) using wavelet with pixel
interleaver is better in term of MSE and PSNR.
Abstract: A study has been carried out to determine the effect of
coating two commercial glass-ionomer cements in either petroleum
jelly or wax. After coating, specimens were stored in water for 24 or
168 hours, then the coating removed and the surface examined.
Coating in wax was found to increase the surface hardness
significantly compared with the uncoated control, whereas coating
the specimens in petroleum jelly led to only a slight increase in
surface hardness. Coating in wax led to no detectable ion release
after either 24 or 168 hours, though there was some ion release after
the coating had been removed and the specimens exposed to water
for a further 24 hours. This shows that soluble species remained in
these specimens. Overall, this study confirms the idea that immature
glass-ionomers should be protected from early exposure to moisture,
and that the protection offered by petroleum jelly is only modest.
Abstract: Bacterial magnetic nanoparticles have great useful potential in biotechnological and biomedical applications. In this study, a liquid growth medium was modified for cultivation a fastidious magnetotactic bacterium that has been isolated from Anzali
lagoon, Iran in our previous research. These modifications include
change in vitamin, mineral, carbon sources and etcetera. In our
experience, the serum bottles and designed air-tight laboratory bottles
were used to create microaerobic conditions in order to development
of a method for scale-up experiment. This information may serve as a
guide to green chemistry based biological protocols for the synthesis
of magnetic nanoparticles with control over the chemical
composition, morphology and size.
Abstract: Internet is largely composed of textual contents and a
huge volume of digital contents gets floated over the Internet daily.
The ease of information sharing and re-production has made it
difficult to preserve author-s copyright. Digital watermarking came
up as a solution for copyright protection of plain text problem after
1993. In this paper, we propose a zero text watermarking algorithm
based on occurrence frequency of non-vowel ASCII characters and
words for copyright protection of plain text. The embedding
algorithm makes use of frequency non-vowel ASCII characters and
words to generate a specialized author key. The extraction algorithm
uses this key to extract watermark, hence identify the original
copyright owner. Experimental results illustrate the effectiveness of
the proposed algorithm on text encountering meaning preserving
attacks performed by five independent attackers.
Abstract: One part of the total employee-s reward is apart from basic wages or salary, employee-s benefits and intangible elements also so called contingent (variable) pay. Contingent pay is connected to performance, contribution, capcompetency or skills of individual employees, and to team-s or company-wide performance or to combination of few of the mentioned possibilities. Main aim of this article is to define, based on available information, contingent pay, describe reasons for its implementation and arguments for and against this type of remuneration, but also bring information not only about its extent and level of utilization by organizations of the Czech Republic operating in the field of environmental protection, but also mention their practical experience with this type of remuneration.
Abstract: In the last decade digital watermarking procedures have
become increasingly applied to implement the copyright protection
of multimedia digital contents distributed on the Internet. To this
end, it is worth noting that a lot of watermarking procedures
for images and videos proposed in literature are based on spread
spectrum techniques. However, some scepticism about the robustness
and security of such watermarking procedures has arisen because
of some documented attacks which claim to render the inserted
watermarks undetectable. On the other hand, web content providers
wish to exploit watermarking procedures characterized by flexible and
efficient implementations and which can be easily integrated in their
existing web services frameworks or platforms. This paper presents
how a simple spread spectrum watermarking procedure for MPEG-2
videos can be modified to be exploited in web contexts. To this end,
the proposed procedure has been made secure and robust against some
well-known and dangerous attacks. Furthermore, its basic scheme
has been optimized by making the insertion procedure adaptive with
respect to the terminals used to open the videos and the network transactions
carried out to deliver them to buyers. Finally, two different
implementations of the procedure have been developed: the former
is a high performance parallel implementation, whereas the latter is
a portable Java and XML based implementation. Thus, the paper
demonstrates that a simple spread spectrum watermarking procedure,
with limited and appropriate modifications to the embedding scheme,
can still represent a valid alternative to many other well-known and
more recent watermarking procedures proposed in literature.
Abstract: In conventional seedling production, the seedlings are
being grown in the open field under natural conditions. Here they are
susceptible to sudden changes in climate were their quality and yield
is affected. Quality seedlings are essential for good growth and
performance of crops in main field; they serve as a foundation for the
economic returns to the farmer. Producing quality seedling demands
usage of hybrid seeds as they have the ability to result in better yield,
greater uniformity, improved color, disease resistance, and so forth.
Hybrid seed production poses major operational challenge and its
seed use efficiency plays an important role. Thus in order to
overcome the difficulties currently present in conventional seedling
production and to efficiently use hybrid seeds, ITC Limited Agri
Business Divisions - Sustainability Cell as conceptualized a novel
method of seedling production unit for farmers in West Godavari
District of Andhra Pradesh. The “Green House based Float Seedling"
methodology aims at a protected cultivation technique wherein the
micro climate surrounding the plant/seedling body is controlled
partially or fully as per the requirement of the species. This paper
reports on the techno economic evaluation of green house for
cultivation of float based seedling production with experimental
results that was attained from the pilot implementation in West
Godavari District, Rajahmundry region of India.
Abstract: The use of computer hardware and software in
education and training dates to the early 1940s, when American
researchers developed flight simulators which used analog computers
to generate simulated onboard instrument data.Computer software is
widely used to help engineers and undergraduate student solve their
problems quickly and more accurately. This paper presents the list of
computer software in geotechnical engineering.
Abstract: Protecting is the sources of drinking water is the first
barrier of contamination of drinking water. The Feitsui Reservoir
watershed of Taiwan supplies domestic water for around 5 million
people in the Taipei metropolitan area. Understanding the spatial
patterns of water quality trends in this watershed is an important
agenda for management authorities. This study examined 7 sites in the
watershed for water quality parameters regulated in the standard for
drinking water source. The non-parametric seasonal Mann-Kendall-s
test was used to determine significant trends for each parameter.
Significant trends of increasing pH occurred at the sampling station in
the uppermost stream watershed, and in total phosphorus at 4 sampling
stations in the middle and downstream watershed. Additionally, the
multi-scale land cover assessment and average land slope were used to
explore the influence on the water quality in the watershed. Regression
models for predicting water quality were also developed.
Abstract: With the advance of information technology in the
new era the applications of Internet to access data resources has
steadily increased and huge amount of data have become accessible
in various forms. Obviously, the network providers and agencies,
look after to prevent electronic attacks that may be harmful or may
be related to terrorist applications. Thus, these have facilitated the
authorities to under take a variety of methods to protect the special
regions from harmful data. One of the most important approaches is
to use firewall in the network facilities. The main objectives of
firewalls are to stop the transfer of suspicious packets in several
ways. However because of its blind packet stopping, high process
power requirements and expensive prices some of the providers are
reluctant to use the firewall. In this paper we proposed a method to
find a discriminate function to distinguish between usual packets and
harmful ones by the statistical processing on the network router logs.
By discriminating these data, an administrator may take an approach
action against the user. This method is very fast and can be used
simply in adjacent with the Internet routers.