Abstract: This study was conducted to investigate the optimum
levels of glutamine (Gln) supplementation in broiler diets. A total of
32 one-day-old male chicks with initial body weight 41.5 g were
segregated into 4 groups (8 chicks per group) and subsequently
distributed to individual cages. Feed and water were provided ad
libitum for 21 days. Four dietary treatments were as follows: control
and supplemented Gln at 1, 2 and 3%, respectively. The results found
that the addition Gln had no negative effects on dry matter, organic
matter, ash digestibility or nitrogen retention. Birds fed with 1% Gln
had significantly higher villi wide and villi height : crypt depth ratio
in duodenum than the control chicks and 2 and 3% Gln chicks. It is
suggested that the addition of Gln at 1% indicated a beneficial effect
on improving small intestinal morphology, in addition Gln may
stimulate immune organ development of broiler chickens.
Abstract: This is a conceptual paper on the application of open
innovation in three case examples of Apple, Nintendo, and Nokia.
Utilizing key concepts from research into managerial and
organizational cognition, we describe how each company overcame
barriers to utilizing open innovation strategy in R&D and
commercialization projects. We identify three levels of barriers:
cognitive, behavioral, and institutional, and describe the companies
balanced between internal and external resources to launch products
that were instrumental in companies reinventing themselves in
mature markets.
Abstract: Short message integrated distributed monitoring systems (SM-DMS) are growing rapidly in wireless communication applications in various areas, such as electromagnetic field (EMF) management, wastewater monitoring, and air pollution supervision, etc. However, delay in short messages often makes the data embedded in SM-DMS transmit unreliably. Moreover, there are few regulations dealing with this problem in SMS transmission protocols. In this study, based on the analysis of the command and data requirements in the SM-DMS, we developed a processing model for the control center to solve the delay problem in data transmission. Three components of the model: the data transmission protocol, the receiving buffer pool method, and the timer mechanism were described in detail. Discussions on adjusting the threshold parameter in the timer mechanism were presented for the adaptive performance during the runtime of the SM-DMS. This model optimized the data transmission reliability in SM-DMS, and provided a supplement to the data transmission reliability protocols at the application level.
Abstract: To investigate the applicability of the EDR-2 film for
clinical radiation dosimetry, percentage depth-doses, profiles and
distributions in open and dynamically wedged fields were measured
using film and compared with data from a Treatment Planning
system.The validity of the EDR2 film to measure dose in a plane
parallel to the beam was tested by irradiating 10 cm×10 cm and 4
cm×4 cm fields from a Siemens, primus linac with a 6MV beam and
a source-to-surface distance of 100 cm. The film was placed
Horizontally between solid water phantom blocks and marked
with pin holes at a depth of 10 cm from the incident beam surface.
The film measurement results, in absolute dose, were compared with
ion chamber measurements using a Welhoffer scanning water tank
system and Treatment Planning system. Our results indicate a
maximum underestimate of calculated dose of 8 % with Treatment
Planning system.
Abstract: Many electronic voting systems, classified mainly as homomorphic cryptography based, mix-net based and blind signature based, appear after the eighties when zero knowledge proofs were introduced. The common ground for all these three systems is that none of them works without real time cryptologic calculations that should be held on a server. As far as known, the agent-based approach has not been used in a secure electronic voting system. In this study, an agent-based electronic voting schema, which does not contain real time calculations on the server side, is proposed. Conventional cryptologic methods are used in the proposed schema and some of the requirements of an electronic voting system are constructed within the schema. The schema seems quite secure if the used cryptologic methods and agents are secure. In this paper, proposed schema will be explained and compared with already known electronic voting systems.
Abstract: Particulate reinforced metal matrix composites
(MMCs) are potential materials for various applications due to their
advantageous of physical and mechanical properties. This paper
presents a study on the performance of stir cast Al2O3 SiC reinforced
metal matrix composite materials. The results indicate that the
composite materials exhibit improved physical and mechanical
properties, such as, low coefficient of thermal expansion, high
ultimate tensile strength, high impact strength, and hardness. It has
been found that with the increase of weight percentage of
reinforcement particles in the aluminium metal matrix, the new
material exhibits lower wear rate against abrasive wearing. Being
extremely lighter than the conventional gray cast iron material, the
Al-Al2O3 and Al-SiC composites could be potential green materials
for applications in the automobile industry, for instance, in making
car disc brake rotors.
Abstract: In a pilot plant scale of a fluidized bed reactor, a
reduction reaction of sodium sulfate by natural gas has been
investigated. Natural gas is applied in this study as a reductant. Feed
density, feed mass flow rate, natural gas and air flow rate
(independent parameters)and temperature of bed and CO
concentration in inlet and outlet of reactor (dependent parameters)
were monitored and recorded at steady state. The residence time was
adjusted close to value of traditional reaction [1]. An artificial neural
network (ANN) was established to study dependency of yield and
carbon gradient on operating parameters. Resultant 97% accuracy of
applied ANN is a good prove that natural gas can be used as a
reducing agent. Predicted ANN model for relation between other
sources carbon gradient (accuracy 74%) indicates there is not a
meaningful relation between other sources carbon variation and
reduction process which means carbon in granule does not have
significant effect on the reaction yield.
Abstract: Game theory could be used to analyze the conflicted
issues in the field of information hiding. In this paper, 2-phase game
can be used to build the embedder-attacker system to analyze the
limits of hiding capacity of embedding algorithms: the embedder
minimizes the expected damage and the attacker maximizes it. In the
system, the embedder first consumes its resource to build embedded
units (EU) and insert the secret information into EU. Then the attacker
distributes its resource evenly to the attacked EU. The expected
equilibrium damage, which is maximum damage in value from the
point of view of the attacker and minimum from the embedder against
the attacker, is evaluated by the case when the attacker attacks a
subset from all the EU. Furthermore, the optimal equilibrium capacity
of hiding information is calculated through the optimal number of EU
with the embedded secret information. Finally, illustrative examples
of the optimal equilibrium capacity are presented.
Abstract: This paper describes the pipeline architecture of
high-speed modified Booth multipliers. The proposed multiplier
circuits are based on the modified Booth algorithm and the pipeline
technique which are the most widely used to accelerate the
multiplication speed. In order to implement the optimally pipelined
multipliers, many kinds of experiments have been conducted. The
speed of the multipliers is greatly improved by properly deciding the
number of pipeline stages and the positions for the pipeline registers to
be inserted. We described the proposed modified Booth multiplier
circuits in Verilog HDL and synthesized the gate-level circuits using
0.13um standard cell library. The resultant multiplier circuits show
better performance than others. Since the proposed multipliers operate
at GHz ranges, they can be used in the systems requiring very high
performance.
Abstract: Tourism researchers have recently focused on repeat visitation as a part of destination loyalty. Different models have also considered satisfaction as the main determinant of revisit intention, while findings in many studies show it as a continuous issue. This conceptual paper attempts at evaluating recent empirical studies on satisfaction and revisit intention. Based on limitations and gaps in recent studies, the current paper suggests a new model that would be more comprehensive than those in previous studies. The new model offers new relationships between antecedents (destination image, perceived value, specific novelty seeking, and distance to destination) and both of satisfaction and revisit intention. Revisit intention in turn is suggested to be measured in a temporal approach.
Abstract: This paper presents the results of corrosion fatigue
crack growth behaviour of a Ni-Cr-Mn steel commonly used in
marine applications. The effect of mechanical variables such as
frequency and load ratio on fatigue crack growth rate at various
stages has been studied using compact tension (C(T)) specimens
along the rolling direction of steel plate under 3.5% saturated NaCl
aqueous environment. The significance of crack closure on corrosion
fatigue, and the validity of Elber-s empirical linear crack closure
model with the ASTM compliance offset method have been
examined.
Fatigue crack growth rate is higher and threshold stress intensities
are lower in aqueous environment compared to the lab air conditions.
It is also observed that the crack growth rate increases at lower
frequencies. The higher stress ratio promotes the crack growth. The
effect of oxidization and corrosion pit formation is very less as the
stress ratio is increased. It is observed that as stress ratios are
increased, the Elber-s crack closure model agrees well with the crack
closure estimated by the ASTM compliance offset method for tests
conducted at 5Hz frequency compared to tests conducted at 1Hz in
corrosive environment.
Abstract: This paper aims to describe how student satisfaction is
measured for work-based learners as these are non-traditional
learners, conducting academic learning in the workplace, typically
their curricula have a high degree of negotiation, and whose
motivations are directly related to their employers- needs, as well as
their own career ambitions. We argue that while increasing WBL
participation, and use of SSD are both accepted as being of strategic
importance to the HE agenda, the use of WBL SSD is rarely
examined, and lessons can be learned from the comparison of SSD
from a range of WBL programmes, and increased visibility of this
type of data will provide insight into ways to improve and develop
this type of delivery. The key themes that emerged from the analysis
of the interview data were: learners profiles and needs, employers
drivers, academic staff drivers, organizational approach, tools for
collecting data and visibility of findings. The paper concludes with
observations on best practice in the collection, analysis and use of
WBL SSD, thus offering recommendations for both academic
managers and practitioners.
Abstract: Authentication plays a vital role in many secure
systems. Most of these systems require user to log in with his or her
secret password or pass phrase before entering it. This is to ensure all
the valuables information is kept confidential guaranteeing also its
integrity and availability. However, to achieve this goal, users are
required to memorize high entropy passwords or pass phrases.
Unfortunately, this sometimes causes difficulty for user to remember
meaningless strings of data. This paper presents a new scheme which
assigns a weight to each personal question given to the user in
revealing the encrypted secrets or password. Concentration of this
scheme is to offer fault tolerance to users by allowing them to forget
the specific password to a subset of questions and still recover the
secret and achieve successful authentication. Comparison on level of
security for weight-based and weightless secret recovery scheme is
also discussed. The paper concludes with the few areas that requires
more investigation in this research.
Abstract: Public housing is a vital factor in community
development. Successful city, housing and eco system regeneration
design is essential in providing positive community development.
This concerns work places, nice dwellings, providing premises for
child care, care of the elderly, providing qualitative premises for
different kinds of commercial service, providing a nice built
environment and housing areas and not the least activating tenants.
The public housing companies give value to society by stimulating
people, renovating socially and economically sustainable as well as
being partners to local business and authorities. By their activities the
housing companies contribute to sustainable local and regional
growth and the identity and reputation of cities. A Social, Economic
and Ecological Reputation Effect (SEERE) model for actions to
promote housing and community reputation is presented. The model
emphasizes regenerative actions to restore natural eco systems as part
of housing renewal strategies and to strengthen municipality
reputation.
Abstract: In this paper, a Gaussian multiple input multiple output multiple eavesdropper (MIMOME) channel is considered where a transmitter communicates to a receiver in the presence of an eavesdropper. We present a technique for determining the secrecy capacity of the multiple input multiple output (MIMO) channel under Gaussian noise. We transform the degraded MIMOME channel into multiple single input multiple output (SIMO) Gaussian wire-tap channels and then use scalar approach to convert it into two equivalent multiple input single output (MISO) channels. The secrecy capacity model is then developed for the condition where the channel state information (CSI) for main channel only is known to the transmitter. The results show that the secret communication is possible when the eavesdropper channel noise is greater than a cutoff noise level. The outage probability is also analyzed of secrecy capacity is also analyzed. The effect of fading and outage probability is also analyzed.
Abstract: Segmentation of a color image composed of different
kinds of regions can be a hard problem, namely to compute for an
exact texture fields. The decision of the optimum number of
segmentation areas in an image when it contains similar and/or un
stationary texture fields. A novel neighborhood-based segmentation
approach is proposed. A genetic algorithm is used in the proposed
segment-pass optimization process. In this pass, an energy function,
which is defined based on Markov Random Fields, is minimized. In
this paper we use an adaptive threshold estimation method for image
thresholding in the wavelet domain based on the generalized
Gaussian distribution (GGD) modeling of sub band coefficients. This
method called Normal Shrink is computationally more efficient and
adaptive because the parameters required for estimating the threshold
depend on sub band data energy that used in the pre-stage of
segmentation. A quad tree is employed to implement the multi
resolution framework, which enables the use of different strategies at
different resolution levels, and hence, the computation can be
accelerated. The experimental results using the proposed
segmentation approach are very encouraging.
Abstract: increased competition and increased costs of
designing made it important for the firms to identify the right
products and the right methods for manufacturing the products. Firms
should focus on customers and identify customer demands directly to
design the right products. Several management methods and
techniques that are currently available improve one or more functions
or processes in an industry and do not take the complete product life
cycle into consideration. On the other hand target costing is a method
/ philosophy that takes financial, manufacturing and customer aspects
into consideration during designing phase and helps firms in making
product design decisions to increase the profit / value of the
company. It uses various techniques to identify customer demands, to
decrease costs of manufacturing and finally to achieve strategic goals.
Target Costing forms an integral part of total product design /
redesign based on strategic plans.
Abstract: Internet access is a vital part of the modern world and an important tool in the education of our children. It is present in schools, homes and even shopping malls. Mastering the use of the internet is likely to be an important skill for those entering the job markets of the future. An internet user can be anyone he or she wants to be in an online chat room, or play thrilling and challenging games against other players from all corners of the globe. It seems at present time (or near future) for many people relationships in the real world may be neglected as those in the virtual world increase in importance. Internet is provided a fast mode of transportation caused freedom from family bonds and mixing with different cultures and new communities. This research is an attempt to study effect of Internet on Social capital. For this purpose a survey technique on the sample size amounted 168 students of Payame Noor University of Kermanshah city in country of Iran were considered. Degree of social capital is moderate. With the help of the Multi-variable Regression, variables of Iranian message attractive, Interest to internet with effect of positive and variable Creating a cordial atmosphere with negative effect be significant.
Abstract: The efficient use of available licensed spectrum is
becoming more and more critical with increasing demand and usage
of the radio spectrum. This paper shows how the use of spectrum as
well as dynamic spectrum management can be effectively managed
and spectrum allocation schemes in the wireless communication
systems be implemented and used, in future. This paper would be an
attempt towards better utilization of the spectrum. This research will
focus on the decision-making process mainly, with an
assumption that the radio environment has already been sensed and
the QoS requirements for the application have been specified either
by the sensed radio environment or by the secondary user itself. We
identify and study the characteristic parameters of Cognitive Radio
and use Genetic Algorithm for spectrum allocation. Performance
evaluation is done using MATLAB toolboxes.
Abstract: The binary phase-only filter digital watermarking
embeds the phase information of the discrete Fourier transform of the
image into the corresponding magnitudes for better image authentication.
The paper proposed an approach of how to implement watermark
embedding by quantizing the magnitude, with discussing how to
regulate the quantization steps based on the frequencies of the magnitude
coefficients of the embedded watermark, and how to embed the
watermark at low frequency quantization. The theoretical analysis and
simulation results show that algorithm flexibility, security, watermark
imperceptibility and detection performance of the binary phase-only
filter digital watermarking can be effectively improved with quantization
based watermark embedding, and the robustness against JPEG
compression will also be increased to some extent.