Abstract: Post-disaster reconstruction projects offer
opportunities to facilitate physical, social and economic development
and to reduce future hazard vulnerability long after the disasters.
Sustainability of post-disaster reconstruction project conducted in the
villages of Dinar following the 1995 earthquake was investigated in
this paper. Officials of the Government who were involved in the
project were interviewed. Besides, two field surveys were done in 12
villages of Dinar in winter months of 2008. Beneficiaries were
interviewed and physical, socio-cultural and economic impacts of the
reconstruction were examined. The research revealed that the postdisaster
reconstruction project has negative aspects from the point
view of sustainability. The physical, socio-cultural and economic
factors were not considered during decision making process of the
project.
Abstract: The significance of environmental protection is wellknown in today's world. The execution of any program depends on sufficient knowledge and required familiarity with environment and its pollutants. Taking advantage of a systematic method, as a new science, in environmental planning can solve many problems. In this article, air pollution in Tehran and its relationship with health and population growth have been analyzed using dynamic systems. Firstly, by using casual loops, the relationship between the parameters effective on air pollution in Tehran were taken into consideration, then these casual loops were turned into flow diagrams [6], and finally, they were simulated using the software Vensim [16]in order to conclude what the effect of each parameter will be on air pollution in Tehran in the next 10 years, how changing of one or more parameters influences other parameters, and which parameter among all other parameters requires to be controlled more.
Abstract: This paper is concerned with calculating boiler
efficiency as one of the most important types of performance
measurements in any steam power plant. That has a key role in
determining the overall effectiveness of the whole system within the
power station. For this calculation, a Visual-Basic program was
developed, and a steam power plant known as El-Khmus power
plant, Libya was selected as a case study. The calculation of the
boiler efficiency was applied by using heating balance method. The
findings showed how the maximum heat energy which produced
from the boiler increases the boiler efficiency through increasing the
temperature of the feed water, and decreasing the exhaust
temperature along with humidity levels of the of fuel used within the
boiler.
Abstract: Descriptive statistics was performed with the aim to achieve research objective of to investigate lecturers- usage of the mobile technology for teaching. A representative sample of 20 lecturers from the Faculty of Industrial Art & Design Technology of Universiti Industri Selangor (UNISEL), Malaysia was selected as the respondents. The result attested that lecturers fully accept the concept of mobility in learning and game play is appealing concept to support classroom learning. Subsequently, analogous experience on small size of keypad, screen resolution, and navigation could be the major problematic factors to students and affect their mobile learning process. Recommendation for future research is also presented.
Abstract: The purpose of this study is to reveal the principles, which have the highest impact on determining the Strategic Quality Management (SQM) implementation perceptions of managers. In order to accomplish this goal, first of all, a factor analysis is conducted on the attitudes of managers at 80 large-scale firms in Turkey for SQM principles. Secondly, utilizing t tests and discriminant analysis, the most effective items are determined. The results show that “process improvement" and “assessment of competitiveness" are the management principles, which have the highest impact on determining the SQM implementation perceptions of Turkish managers.
Abstract: The performance of ground to deep space optical
communication systems is degraded by distortion of the beam as it
propagates through the turbulent atmosphere. Turbulence causes
fluctuations in the intensity of the received signal which ultimately
affects the acquisition time required to acquire and locate the spaceborne
target using narrow laser beam. In this paper, performance of
free-space optical (FSO) communication system in atmospheric
turbulence has been analyzed in terms of acquisition time for
coherent and non-coherent modulation schemes. Numerical results
presented in graphical and tabular forms show that the acquisition
time increases with the increase in turbulence level. This is true for
both schemes. The BPSK has lowest acquisition time among all
schemes. In non-coherent schemes, M-PPM performs better than the
other schemes. With the increase in M, acquisition time becomes
lower, but at the cost of increase in system complexity.
Abstract: Finding suitable non-supersingular elliptic curves for
pairing-based cryptosystems becomes an important issue for the
modern public-key cryptography after the proposition of id-based
encryption scheme and short signature scheme. In previous work
different algorithms have been proposed for finding such elliptic
curves when embedding degree k ∈ {3, 4, 6} and cofactor h ∈ {1, 2, 3,
4, 5}. In this paper a new method is presented to find more
non-supersingular elliptic curves for pairing-based cryptosystems with
general embedding degree k and large values of cofactor h. In
addition, some effective parameters of these non-supersingular elliptic
curves are provided in this paper.
Abstract: Evapotranspiration (ET) is a major component of the hydrologic cycle and its accurate estimation is essential for hydrological studies. In past, various estimation methods have been developed for different climatological data, and the accuracy of these methods varies with climatic conditions. Reference crop evapotranspiration (ET0) is a key variable in procedures established for estimating evapotranspiration rates of agricultural crops. Values of ET0 are used with crop coefficients for many aspects of irrigation and water resources planning and management. Numerous methods are used for estimating ET0. As per internationally accepted procedures outlined in the United Nations Food and Agriculture Organization-s Irrigation and Drainage Paper No. 56(FAO-56), use of Penman-Monteith equation is recommended for computing ET0 from ground based climatological observations. In the present study, seven methods have been selected for performance evaluation. User friendly software has been developed using programming language visual basic. The visual basic has ability to create graphical environment using less coding. For given data availability the developed software estimates reference evapotranspiration for any given area and period for which data is available. The accuracy of the software has been checked by the examples given in FAO-56.The developed software is a user friendly tool for estimating ET0 under different data availability and climatic conditions.
Abstract: Power line channel is proposed as an alternative for broadband data transmission especially in developing countries like Tanzania [1]. However the channel is affected by stochastic attenuation and deep notches which can lead to the limitation of channel capacity and achievable data rate. Various studies have characterized the channel without giving exactly the maximum performance and limitation in data transfer rate may be this is due to complexity of channel modeling being used. In this paper the channel performance of medium voltage, low voltage and indoor power line channel is presented. In the investigations orthogonal frequency division multiplexing (OFDM) with phase shift keying (PSK) as carrier modulation schemes is considered, for indoor, medium and low voltage channels with typical ten branches and also Golay coding is applied for medium voltage channel. From channels, frequency response deep notches are observed in various frequencies which can lead to reduce the achievable data rate. However, is observed that data rate up to 240Mbps is realized for a signal to noise ratio of about 50dB for indoor and low voltage channels, however for medium voltage a typical link with ten branches is affected by strong multipath and coding is required for feasible broadband data transfer.
Abstract: FAQ system can make user find answer to the problem that puzzles them. But now the research on Chinese FAQ system is still on the theoretical stage. This paper presents an approach to semantic inference for FAQ mining. To enhance the efficiency, a small pool of the candidate question-answering pairs retrieved from the system for the follow-up work according to the concept of the agriculture domain extracted from user input .Input queries or questions are converted into four parts, the question word segment (QWS), the verb segment (VS), the concept of agricultural areas segment (CS), the auxiliary segment (AS). A semantic matching method is presented to estimate the similarity between the semantic segments of the query and the questions in the pool of the candidate. A thesaurus constructed from the HowNet, a Chinese knowledge base, is adopted for word similarity measure in the matcher. The questions are classified into eleven intension categories using predefined question stemming keywords. For FAQ mining, given a query, the question part and answer part in an FAQ question-answer pair is matched with the input query, respectively. Finally, the probabilities estimated from these two parts are integrated and used to choose the most likely answer for the input query. These approaches are experimented on an agriculture FAQ system. Experimental results indicate that the proposed approach outperformed the FAQ-Finder system in agriculture FAQ retrieval.
Abstract: Nowadays, keyless entry systems are widely adopted
for vehicle immobilizer systems due to both advantages of security and
convenience. Keyless entry systems could overcome brute-force key
guessing attack, statistics attack and masquerade attack, however,
they can't prevent from thieves stealing behavior. In this paper, we
proposed a new architecture try to improve the existent flaws. The
integration of the keyless entry system and the fingerprint
identification technology is more suitable to implement on the
portable transponder to achieve higher security needs. We also adopt
and modify AES security protocol for life expectancy and security of
the portable transponder. In addition, the identification of a driver's
fingerprint makes the service of automatic reinstatement of a driver's
preferences become possible. Our design can satisfy not only the three
kinds of previous illegal attacks, but also the stealing situation.
Furthermore, many practical factors, such as costs, life expectancy and
performance, have been well considered in the design of portable
transponder.
Abstract: The most important property of the Gene Ontology is
the terms. These control vocabularies are defined to provide
consistent descriptions of gene products that are shareable and
computationally accessible by humans, software agent, or other
machine-readable meta-data. Each term is associated with
information such as definition, synonyms, database references, amino
acid sequences, and relationships to other terms. This information has
made the Gene Ontology broadly applied in microarray and
proteomic analysis. However, the process of searching the terms is
still carried out using traditional approach which is based on keyword
matching. The weaknesses of this approach are: ignoring semantic
relationships between terms, and highly depending on a specialist to
find similar terms. Therefore, this study combines semantic similarity
measure and genetic algorithm to perform a better retrieval process
for searching semantically similar terms. The semantic similarity
measure is used to compute similitude strength between two terms.
Then, the genetic algorithm is employed to perform batch retrievals
and to handle the situation of the large search space of the Gene
Ontology graph. The computational results are presented to show the
effectiveness of the proposed algorithm.
Abstract: Electronic banking must be secure and easy to use and
many banks heavily advertise an apparent of 100% secure system
which is contestable in many points. In this work, an alternative
approach to the design of e-banking system, through a new solution
for user authentication and security with digital certificate called
LumaCert is introduced. The certificate applies new algorithm for
asymmetric encryption by utilizing two mathematical operators
called Pentors and UltraPentors. The public and private key in this
algorithm represent a quadruple of parameters which are directly
dependent from the above mentioned operators. The strength of the
algorithm resides in the inability to find the respective Pentor and
UltraPentor operator from the mentioned parameters.
Abstract: Hypericum perforatum L. is a member of the Hypericaceae (Guttiferae) family and commonly known as St. John’s wort. There is a growing interest in this medicinal plant because of the constituents of this genus. A number of species have been shown to possess various biological activities such as antiviral, wound healing, analgesic, hepatoprotective, antimicrobial and antioxidant activities and also have therapeutic effects on burns, bruises, swelling, anxiety and mild to moderate depression.
In this study, the aerial parts of Hypericum perforatum L. are extracted and the main and effective constituents are determined. The analysis of the extracts was performed by GC-MS and LC-MS. As a next step, it is aimed to investigate the usage of the main constituents of the medicinal plant.
Abstract: Urban planning, in particular on protected landscape
areas, demands an increasing role of public participation within the
frame of the efficiency of sustainable planning process. The
development of urban planning actions in Protected Landscape areas,
as Sintra-Cascais Natural Park, should perform a methodological
process that is structured over distinct sequential stages, providing
the development of a continuous, interactive, integrated and
participative planning. From the start of Malveira da Serra and Janes
Plan process, several public participation actions were promoted, in
order to involve the local agents, stakeholders and the population in
the decision of specific local key issues and define the appropriate
priorities within the goals and strategies previously settled. As a
result, public participation encouraged an innovative process that
guarantees the efficiency of sustainable urban planning and promotes
a sustainable new way of living in community.
Abstract: The persistent nature of perfluorochemicals (PFCs) has attracted global concern in recent years. Perfluorooctanesulfonate (PFOS) and perfluorooctanoate (PFOA) are the most commonly found PFC compounds, and thus their fate and transport play key roles in PFC distribution in the natural environment. The kinetic behavior of PFOS or PFOA on boehmite consists of a fast adsorption process followed by a slow adsorption process which may be attributed to the slow transport of PFOS or PFOA into the boehmite pore surface. The adsorption isotherms estimated the maximum adsorption capacities of PFOS and PFOA on boehmite as 0.877 μg/m2 and 0.633 μg/m2, with the difference primarily due to their different functional groups. The increase of solution pH led to a moderate decrease of PFOS and PFOA adsorption, owing to the increase of ligand exchange reactions and the decrease of electrostatic interactions. The presence of NaCl in solution demonstrated negative effects for PFOS and PFOA adsorption on boehmite surfaces, with potential mechanisms being electrical double layer compression, competitive adsorption of chloride.
Abstract: Together with the industrialization, women began to
be included in business life by peeling off of the tasks given them by
society and they have become a factor of production creating value in
economic and social sense. Thus, women have taken place in the
labor market, majority of which has been formed by men. In this
study, the experiences of women entrepreneurs, who succeed in
business activities, will be analyzed. By the study, current state of the
women entrepreneurs in the labor market of Turkey will be put down,
as a result of interferences obtained from the shared experiences of
women entrepreneurs. Findings obtained at the end of the study are
thought to light the way of future studies for increasing women
entrepreneurship.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created
Abstract: Chinese Idioms are a type of traditional Chinese idiomatic
expressions with specific meanings and stereotypes structure
which are widely used in classical Chinese and are still common in
vernacular written and spoken Chinese today. Currently, Chinese
Idioms are retrieved in glossary with key character or key word in
morphology or pronunciation index that can not meet the need of
searching semantically. OCIRS is proposed to search the desired
idiom in the case of users only knowing its meaning without any key
character or key word. The user-s request in a sentence or phrase will
be grammatically analyzed in advance by word segmentation, key
word extraction and semantic similarity computation, thus can be
mapped to the idiom domain ontology which is constructed to provide
ample semantic relations and to facilitate description logics-based
reasoning for idiom retrieval. The experimental evaluation shows that
OCIRS realizes the function of searching idioms via semantics, obtaining
preliminary achievement as requested by the users.
Abstract: this paper presents an auto-regressive network called the Auto-Regressive Multi-Context Recurrent Neural Network (ARMCRN), which forecasts the daily peak load for two large power plant systems. The auto-regressive network is a combination of both recurrent and non-recurrent networks. Weather component variables are the key elements in forecasting because any change in these variables affects the demand of energy load. So the AR-MCRN is used to learn the relationship between past, previous, and future exogenous and endogenous variables. Experimental results show that using the change in weather components and the change that occurred in past load as inputs to the AR-MCRN, rather than the basic weather parameters and past load itself as inputs to the same network, produce higher accuracy of predicted load. Experimental results also show that using exogenous and endogenous variables as inputs is better than using only the exogenous variables as inputs to the network.