Abstract: Among many agro- based cottage industries in India
sericulture has been promoted as an agro-based, labor intensive, rural
oriented cottage industry, providing gainful employment mainly to
the weaker and marginalized section of the society specially tribal.
Sericulture occupies the place of pride in the rural economy can be
practiced even with very low land holding, low gestation, high
returns make sericulture an ideal program, requiring little capital
investment. In 2010-2011 the employment in sericulture sector was
72.5 lakh persons. The involvement of landless rural people in tasar
sericulture is because they understood its potential for rural and tribal
upliftment. This article demonstrates that certain developmental
initiatives have been playing an important role in the socio-economic
progress of tribal masses in Raigarh district and explains the
increased returns from sericulture as a result of development
programs. The study concludes with some suggestions to improve the
long term feasibility of sericulture.
Abstract: Accurate evaluation of damping ratios involving soilstructure interaction (SSI) effects is the prerequisite for seismic design of in-situ buildings. This study proposes a combined approach to identify damping ratios of SSI systems based on ambient excitation technique. The proposed approach is illustrated with main test process, sampling principle and algorithm steps through an engineering example, as along with its feasibility and validity. The proposed approach is employed for damping ratio identification of 82 buildings in Xi-an, China. Based on the experimental data, the variation range and tendency of damping ratios of these SSI systems, along with the preliminary influence factor, are shown and discussed. In addition, a fitting curve indicates the relation between the damping ratio and fundamental natural period of SSI system.
Abstract: K-Modes is an extension of K-Means clustering algorithm, developed to cluster the categorical data, where the mean is replaced by the mode. The similarity measure proposed by Huang is the simple matching or mismatching measure. Weight of attribute values contribute much in clustering; thus in this paper we propose a new weighted dissimilarity measure for K-Modes, based on the ratio of frequency of attribute values in the cluster and in the data set. The new weighted measure is experimented with the data sets obtained from the UCI data repository. The results are compared with K-Modes and K-representative, which show that the new measure generates clusters with high purity.
Abstract: The purpose of this study was to explore the
demographic differences of international tourists according to three
main factors, including the value of time, shopping behavior and
shopping motivation. The Chatuchak Weekend Market is known as
one of the biggest weekend markets in the world. Too little academic
studies had been conducted in this area of weekend market, despite its
growth and continuous development. In general, both domestic
visitors and international tourists are attracted to the perception of
cheap and bargaining prices the weekend market. However, systematic
research study can provide reliable understanding of the perception of
the visitors.
This study focused on the group of international tourists who visited
the market and aimed to provide better insights based on the
differences in their demographic factors. Findings indicated that
several differences in value of time, shopping behavior, and shopping
motivation were identified by gender, income and age. Research
implications and directions for further studies were discussed.
Abstract: The survey and classification of the different security
attacks in structured peer-to-peer (P2P) overlay networks can be
useful to computer system designers, programmers, administrators,
and users. In this paper, we attempt to provide a taxonomy of
structured P2P overlay networks security attacks. We have specially
focused on the way these attacks can arise at each level of the
network. Moreover, we observed that most of the existing systems
such as Content Addressable Network (CAN), Chord, Pastry,
Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability
which lead to disrupt and corrupt their functioning. We hope that our
survey constitutes a good help for who-s working on this area of
research.
Abstract: Infrared focal plane arrays (IRFPA) sensors, due to
their high sensitivity, high frame frequency and simple structure, have
become the most prominently used detectors in military applications.
However, they suffer from a common problem called the fixed pattern
noise (FPN), which severely degrades image quality and limits the
infrared imaging applications. Therefore, it is necessary to perform
non-uniformity correction (NUC) on IR image. The algorithms of
non-uniformity correction are classified into two main categories, the
calibration-based and scene-based algorithms. There exist some
shortcomings in both algorithms, hence a novel non-uniformity
correction algorithm based on non-linear fit is proposed, which
combines the advantages of the two algorithms. Experimental results
show that the proposed algorithm acquires a good effect of NUC with
a lower non-uniformity ratio.
Abstract: An experiment was conducted under controlled
conditions to study the effect of water extract of leaves, shoots and
roots of either Sisymbrium irio L. =SISIR and/or Descurainia
sophia (L.) Schur =DESSO on the germination and primary growth
of wheat. A split-split plot experiment in CRD with three
replications was used. The main plots were the type of weed: i.e.
SISIR and DESSO and the sub-plots were type of organ: i.e. leaf,
stem and root and, the sub-sub plots were concentration of the
water extract of each organ of the weeds: i.e. 0, 2, 4 and 8 % w/v.
The plant materials were cut in 2-3 cm pieces and then were
ground in a blender. The crushed materials were weighed
according to experimental protocol and the final volume was
reached to 100 ml in distilled water in dark bottles. All bottles were
put on a shaker for 24 hours. The solutions were filtered by muslin
cloth. Whatman paper, 9 cm in diameter, were put in petri dishes
and twenty seeds of wheat were put on it and 5 ml distilled water
or water extract of weeds were added to each petri dish. All petri
dishes were put in constant temperature of 15 0C incubator.
The results showed that the SISIR water extract had a greater
inhibitory effects on germination and primary growth of wheat
than those of DESSO water extract. The water extracts of the
leaves of both weeds had the greatest inhibitory effects on
germination and primary growth of wheat, compared to those of
stems and roots. Increasing the concentration of water extract of
leaves, stems and roots of both weeds up to 8 % caused the greatest
inhibitory effects to wheat and reduced the germination rate and
primary growth of it linearly.
Abstract: The paper presents a set of guidelines for analysis of industrial embedded distributed systems and introduces a mathematical model derived from these guidelines. In this study, the author examines a set of modern communication technologies that are or possibly can be used to build communication links between the subsystems of a distributed embedded system. An investigation of these guidelines results in a algorithm for analysis of specific use cases of target technologies. A goal of the paper acts as an important base for ongoing research on comparison of communication technologies. The author describes the principles of the model and presents results of the test calculations. Practical implementation of target technologies and empirical experiment data are based on a practical experience during the design and test of specific distributed systems in Latvian market.
Abstract: Object-oriented simulation is considered one of the most sophisticated techniques that has been widely used in planning, designing, executing and maintaining construction projects. This technique enables the modeler to focus on objects which is extremely important for thorough understanding of a system. Thus, identifying an object is an essential point of building a successful simulation model. In a maintenance process an object is a maintenance work order (MWO). This study demonstrates a maintenance simulation model for the building maintenance division of Saudi Consolidated Electric Company (SCECO) in Dammam, Saudi Arabia. The model focused on both types of maintenance processes namely: (1) preventive maintenance (PM) and (2) corrective maintenance (CM). It is apparent from the findings that object-oriented simulation is a good diagnostic and experimental tool. This is because problems, limitations, bottlenecks and so forth are easily identified. These features are very difficult to obtain when using other tools.
Abstract: The main purpose of the research is to investigate the computer experiences and computer attitudes of prospective class teachers. The research also investigated the differences between computer attitudes and computer experiences, computer competencies and the influence of genders. Ninety prospective class teachers participated in the research. Computer Attitude Scale- Marmara (CAS-M), and a questionnaire, about their computer experiences, and opinions toward the use of computers in the classroom setting, were administrated. The major findings are as follows: (1) 62% of prospective class teachers have computer at home; (2) 50% of the computer owners have computers less than three years; (3) No significant differences were found between computer attitudes and gender; (4) Differences were found between general computer attitudes and computer liking attitudes of prospective class teachers based on their computer competencies in favor of more competent ones.
Abstract: In cryptography, confusion and diffusion are very
important to get confidentiality and privacy of message in block
ciphers and stream ciphers. There are two types of network to provide
confusion and diffusion properties of message in block ciphers. They
are Substitution- Permutation network (S-P network), and Feistel
network. NLFS (Non-Linear feedback stream cipher) is a fast and
secure stream cipher for software application. NLFS have two modes
basic mode that is synchronous mode and self synchronous mode.
Real random numbers are non-deterministic. R-box (random box)
based on the dynamic properties and it performs the stochastic
transformation of data that can be used effectively meet the
challenges of information is protected from international destructive
impacts. In this paper, a new implementation of stochastic
transformation will be proposed.
Abstract: A spatial analysis of a large 20th century urban settlement (town/city) easily presents the celebrated central Business District (CBD). Theories of Urban Land Economics have easily justified and attempted to explain the existence of such a district activity area within the cityscape. This work examines the gradual emergence and development of the CBD in Lafia Town, Nigeria over 20 years and the attended urban problems caused by its emergence. Personal knowledge and observation of land use change are the main sources of data for the work, with unstructured interview with residents. The result are that the absence of a co-ordinate land use plan for the town, multi-nuclei nature, and regional location of surrounding towns have affected the growth pattern, hence the CBD. Traffic congestion, dispersed CBD land uses are some of the urban planning problems. The work concludes by advocating for integrating CBD uses.
Abstract: For the past couple of decades Weak signal detection
is of crucial importance in various engineering and scientific
applications. It finds its application in areas like Wireless
communication, Radars, Aerospace engineering, Control systems and
many of those. Usually weak signal detection requires phase sensitive
detector and demodulation module to detect and analyze the signal.
This article gives you a preamble to intrusion detection system which
can effectively detect a weak signal from a multiplexed signal. By
carefully inspecting and analyzing the respective signal, this
system can successfully indicate any peripheral intrusion. Intrusion
detection system (IDS) is a comprehensive and easy approach
towards detecting and analyzing any signal that is weakened and
garbled due to low signal to noise ratio (SNR). This approach
finds significant importance in applications like peripheral security
systems.
Abstract: Due to the fact that in the new century customers tend
to express globally increasing demands, networks of interconnected
businesses have been established in societies and the management of
such networks seems to be a major key through gaining competitive
advantages. Supply chain management encompasses such managerial
activities. Within a supply chain, a critical role is played by quality.
QFD is a widely-utilized tool which serves the purpose of not only
bringing quality to the ultimate provision of products or service
packages required by the end customer or the retailer, but it can also
initiate us into a satisfactory relationship with our initial customer;
that is the wholesaler. However, the wholesalers- cooperation is
considerably based on the capabilities that are heavily dependent on
their locations and existing circumstances. Therefore, it is undeniable
that for all companies each wholesaler possesses a specific
importance ratio which can heavily influence the figures calculated in
the House of Quality in QFD. Moreover, due to the competitiveness
of the marketplace today, it-s been widely recognized that
consumers- expression of demands has been highly volatile in
periods of production. Apparently, such instability and proneness to
change has been very tangibly noticed and taking it into account
during the analysis of HOQ is widely influential and doubtlessly
required. For a more reliable outcome in such matters, this article
demonstrates the application viability of Analytic Network Process
for considering the wholesalers- reputation and simultaneously
introduces a mortality coefficient for the reliability and stability of
the consumers- expressed demands in course of time. Following to
this, the paper provides further elaboration on the relevant
contributory factors and approaches through the calculation of such
coefficients. In the end, the article concludes that an empirical
application is needed to achieve broader validity.
Abstract: The Canadian aerospace industry faces many
challenges. One of them is the difficulty in estimating costs. In
particular, the design effort required in a project impacts resource
requirements and lead-time, and consequently the final cost. This
paper presents the findings of a case study conducted for recognized
global leader in the design and manufacturing of aircraft engines. The
study models parametric cost estimation relationships to estimate the
design effort of integrated blade-rotor low-pressure compressor fans.
Several effort drivers are selected to model the relationship.
Comparative analyses of three types of models are conducted. The
model with the best accuracy and significance in design estimation is
retained.
Abstract: Computer technology and the Internet have made a
breakthrough in the existence of data communication. This has
opened a whole new way of implementing steganography to ensure
secure data transfer. Steganography is the fine art of hiding the
information. Hiding the message in the carrier file enables the
deniability of the existence of any message at all. This paper designs
a stego machine to develop a steganographic application to hide data
containing text in a computer video file and to retrieve the hidden
information. This can be designed by embedding text file in a video
file in such away that the video does not loose its functionality using
Least Significant Bit (LSB) modification method. This method
applies imperceptible modifications. This proposed method strives
for high security to an eavesdropper-s inability to detect hidden
information.
Abstract: For micro-gyroscopes, the angular rate detection components have to oscillate forwards and backwards alternatively. An innovative design of micro-electromagnetic drive module is proposed to make a Π-type disc reciprocally and efficiently rotate within a certain of angular interval. Twelve Electromagnetic poles enclosing the thin disc are designed to provide the magnetic drive power. Isotropic etching technique is employed to fabricate the high-aspect-ratio trench, so that the contact angle of wire against trench can be increased and the potential defect of cavities and pores within the wire can be prevented. On the other hand, a Π-type thin disc is designed to conduct the pitch motion as an angular excitation, in addition to spinning, is exerted on the gyroscope. The efficacy of the micro-magnetic drive module is verified by the commercial software, Ansoft Maxewll. In comparison with the conventional planar windings in micro-scale systems, the magnetic drive force is increased by 150%.
Abstract: This paper is an exploration of the conceptual
confusion between E-learning and M-learning particularly in Africa.
Section I provides a background to the development of E-learning
and M-learning. Section II focuses on the conceptual analysis as it
applies to Africa. It is with an investigative and expansive mind that
this paper is elaborated to respond to a profound question of the
suitability of the concepts in a particular era in Africa. The aim of this
paper is therefore to shed light on which concept best suits the unique
situation of Africa in the era of cloud computing.
Abstract: The paper describes the carbonate microfacies identified in the Sinjar Formation (Late Paleocene–Early Eocene) cropping out in Qara Dagh Mountain, near Sulekan Village approximately 20km south–west of Sulaimani (Iraq). One section (62m thick) has been measured in the field and closely sampled to undertake detailed microfaciesal and micropalaeontological studies to determine the formation-s age and environment of deposition. A samples were collected illustrating all the lithological changes along the section. The limestone in the studied area is hard and extremely rich in large foraminifers (soritids, rotaliids, nummulites, miliolids) and green algae (dasycladales). The investigation of the thin sections allowed us to identify the carbonate microfacies (18 types and subtypes) and the micropaleontological association (foraminifers and green algae), to determine the age of formation and to reconstruct the paleoenvironment of deposition (fore-reef, reef, back-reef). Based on the field observations and the studied thin sections, we determined three Units of a carbonate platform (I, II and III) from the base to the top of the section: Unit I with coralgal associations, Unit II is dominated by larger foraminifers and haracterized by the absence of coralgal associations, while Unit III is dominated by small foraminifers (mostly miliolids), peloids and green algae. It is partially dolomitized.
Abstract: The area of Project Risk Management (PRM) has
been extensively researched, and the utilization of various tools and
techniques for managing risk in several industries has been
sufficiently reported. Formal and systematic PRM practices have
been made available for the construction industry. Based on such
body of knowledge, this paper tries to find out the global picture of
PRM practices and approaches with the help of a survey to look into
the usage of PRM techniques and diffusion of software tools, their
level of maturity, and their usefulness in the construction sector.
Results show that, despite existing techniques and tools, their usage is
limited: software tools are used only by a minority of respondents
and their cost is one of the largest hurdles in adoption. Finally, the
paper provides some important guidelines for future research
regarding quantitative risk analysis techniques and suggestions for
PRM software tools development and improvement.