Abstract: In this paper the modeling and analysis of Space
Vector Pulse Width Modulation (SVPWM) based Dynamic Voltage
Restorer (DVR) using PSCAD/EMTDC software will be presented in
details. The simulation includes full modeling of the SVPWM
technique used to control the DVR inverter. A test power system
composed of three phase voltage source, sag generator, DVR and
three phase resistive load is used to demonstrate restoration capability
of the DVR. The simulation results of the presented DVR proved
excellent voltage sag mitigation to protect sensitive loads.
Abstract: Distance protection of transmission lines including advanced flexible AC transmission system (FACTS) devices has been a very challenging task. FACTS devices of interest in this paper are static synchronous series compensators (SSSC) and unified power flow controller (UPFC). In this paper, a new algorithm is proposed to detect and classify the fault and identify the fault position in a transmission line with respect to a FACTS device placed in the midpoint of the transmission line. Discrete wavelet transformation and wavelet entropy calculations are used to analyze during fault current and voltage signals of the compensated transmission line. The proposed algorithm is very simple and accurate in fault detection and classification. A variety of fault cases and simulation results are introduced to show the effectiveness of such algorithm.
Abstract: Type 2 diabetes mellitus (T2DM) is a complex
metabolic disorder that characterized by the presence of high glucose
in blood that cause from insulin resistance and insufficiency due to
deterioration β-cell Langerhans functions. T2DM is commonly
caused by the combination of inherited genetic variations as well as
our own lifestyle. Metallothionein (MT) is a known cysteine-rich
protein responsible in helping zinc homeostasis which is important in
insulin signaling and secretion as well as protection our body from
reactive oxygen species (ROS). MT scavenged ROS and free
radicals in our body happen to be one of the reasons of T2DM and its
complications. The objective of this study was to investigate the
association of MT1A and MT2A polymorphisms between T2DM and
control subjects among Malay populations. This study involved 150
T2DM and 120 Healthy individuals of Malay ethnic with mixed
genders. The genomic DNA was extracted from buccal cells and
amplified for MT1A and MT2A loci; the 347bp and 238bp banding
patterns were respectively produced by mean of the Polymerase
Chain Reaction (PCR). The PCR products were digested with Mlucl
and Tsp451 restriction enzymes respectively and producing
fragments lengths of (158/189/347bp) and (103/135/238bp)
respectively. The ANOVA test was conducted and it shown that there
was a significant difference between diabetic and control subjects for
age, BMI, WHR, SBP, FPG, HBA1C, LDL, TG, TC and family
history with (P0.05). The genotype
frequency for AA, AG and GG of MT1A polymorphisms was 72.7%,
22.7% and 4.7% in cases and 15%, 55% and 30% in control
respectively. As for MT2A, genotype frequency of GG, GC and CC
was 42.7%, 27.3% and 30% in case and 5%, 40% and 55% for
control respectively. Both polymorphisms show significant difference
between two investigated groups with (P=0.000). The Post hoc test
was conducted and shows a significant difference between the
genotypes within each polymorphism (P=0. 000). The MT1A and
MT2A polymorphisms were believed to be the reliable molecular
markers to distinguish the T2DM subjects from healthy individuals in
Malay populations.
Abstract: This paper is concerned with the study of mineralogy
and engineering characteristics of soil materials derived from the
eastern part of Nile Delta. The clay minerals of the studied soil by
using X- ray diffraction are mainly illite (average 72.6 %) and
kaolinite (average 2.6 %), expandable portion in illite-smectite mixed
layer (average 7 %). Smectite is more abundant in fluviatile clays,
whereas kaolinite is more abundant in lagoonal clays. On the other
hand, illite and illite-smectite are more abundant in marine clays. The
geotechnical results show that the soil under study consists mainly of
about 0.3 % gravel, 5 % sand, 51.5 % silt and 42.2 % clay in average.
The average shrinkage limit attains 11 % whereas the average value
of the plasticity index is 23.4 %. The free swelling ranges from 40 %
to 75 % and has a value of 55 % giving an indication about the
inadequacy of such soil under foundations.
From a construction point of view, the soil under investigation
poses many problems even under light foundations due to the
swelling and shrinkage. Such swelling and shrinkage is due to the
high content of soil materials in the expandable clay minerals of illite
and smectite. Based on the results of the present and earlier studies,
trial application of soil stabilisation is recommended.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: Estimation of stormwater pollutants is a pre-requisite
for the protection and improvement of the aquatic environment and
for appropriate management options. The usual practice for the
stormwater quality prediction is performed through water quality
modeling. However, the accuracy of the prediction by the models
depends on the proper estimation of model parameters. This paper
presents the estimation of model parameters for a catchment water
quality model developed for the continuous simulation of stormwater
pollutants from a catchment to the catchment outlet. The model is
capable of simulating the accumulation and transportation of the
stormwater pollutants; suspended solids (SS), total nitrogen (TN) and
total phosphorus (TP) from a particular catchment. Rainfall and water
quality data were collected for the Hotham Creek Catchment (HTCC),
Gold Coast, Australia. Runoff calculations from the developed model
were compared with the calculated discharges from the widely used
hydrological models, WBNM and DRAINS. Based on the measured
water quality data, model water quality parameters were calibrated
for the above-mentioned catchment. The calibrated parameters are
expected to be helpful for the best management practices (BMPs)
of the region. Sensitivity analyses of the estimated parameters were
performed to assess the impacts of the model parameters on overall
model estimations of runoff water quality.
Abstract: In order to protect original data, watermarking is first consideration direction for digital information copyright. In addition, to achieve high quality image, the algorithm maybe can not run on embedded system because the computation is very complexity. However, almost nowadays algorithms need to build on consumer production because integrator circuit has a huge progress and cheap price. In this paper, we propose a novel algorithm which efficient inserts watermarking on digital image and very easy to implement on digital signal processor. In further, we select a general and cheap digital signal processor which is made by analog device company to fit consumer application. The experimental results show that the image quality by watermarking insertion can achieve 46 dB can be accepted in human vision and can real-time execute on digital signal processor.
Abstract: Shipping comb is mounted on Head Stack Assembly
(HSA) to prevent collision of the heads, maintain the gap between
suspensions and protect HSA tips from unintentional contact
damaged in the manufacturing process. Failure analysis of shipping
comb in hard disk drive production processes is proposed .Field
observations were performed to determine the fatal areas on shipping
comb and their failure fraction. Root cause failure analysis (RCFA) is
applied to specify the failure causes subjected to various loading
conditions. For reliability improvement, failure mode and effects
analysis (FMEA) procedure to evaluate the risk priority is performed.
Consequently, the more suitable information design criterions were
obtained.
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.
Abstract: Hazardous Material transportation by road is coupled
with inherent risk of accidents causing loss of lives, grievous injuries,
property losses and environmental damages. The most common type
of hazmat road accident happens to be the releases (78%) of
hazardous substances, followed by fires (28%), explosions (14%) and
vapour/ gas clouds (6 %.).
The paper is discussing initially the probable 'Impact Zones'
likely to be caused by one flammable (LPG) and one toxic (ethylene
oxide) chemicals being transported through a sizable segment of a
State Highway connecting three notified Industrial zones in Surat
district in Western India housing 26 MAH industrial units. Three
'hotspots' were identified along the highway segment depending on
the particular chemical traffic and the population distribution within
500 meters on either sides. The thermal radiation and explosion
overpressure have been calculated for LPG / Ethylene Oxide BLEVE
scenarios along with toxic release scenario for ethylene oxide.
Besides, the dispersion calculations for ethylene oxide toxic release
have been made for each 'hotspot' location and the impact zones
have been mapped for the LOC concentrations. Subsequently, the
maximum Initial Isolation and the protective zones were calculated
based on ERPG-3 and ERPG-2 values of ethylene oxide respectively
which are estimated taking the worst case scenario under worst
weather conditions. The data analysis will be helpful to the local
administration in capacity building with respect to rescue /
evacuation and medical preparedness and quantitative inputs to
augment the District Offsite Emergency Plan document.
Abstract: Warranty is a powerful marketing tool for the
manufacturer and a good protection for both the manufacturer and the
customer. However, warranty always involves additional costs to the
manufacturer, which depend on product reliability characteristics and
warranty parameters. This paper presents an approach to optimisation
of warranty parameters for known product failure distribution to
reduce the warranty costs to the manufacturer while retaining the
promotional function of the warranty. Combination free replacement
and pro-rata warranty policy is chosen as a model and the length of
free replacement period and pro-rata policy period are varied, as well
as the coefficients that define the pro-rata cost function. Multiparametric
warranty optimisation is done by using genetic algorithm.
Obtained results are guideline for the manufacturer to choose the
warranty policy that minimises the costs and maximises the profit.
Abstract: Background: Widespread use of chemotherapeutic
drugs in the treatment of cancer has lead to higher health hazards
among employee who handle and administer such drugs, so nurses
should know how to protect themselves, their patients and their work
environment against toxic effects of chemotherapy. Aim of this study
was carried out to examine the effect of chemotherapy safety protocol
for oncology nurses on their protective measure practices. Design: A
quasi experimental research design was utilized. Setting: The study
was carried out in oncology department of Menoufia university
hospital and Tanta oncology treatment center. Sample: A
convenience sample of forty five nurses in Tanta oncology treatment
center and eighteen nurses in Menoufiya oncology department.
Tools: 1. an interviewing questionnaire that covering sociodemographic
data, assessment of unit and nurses' knowledge about
chemotherapy. II: Obeservational check list to assess nurses' actual
practices of handling and adminestration of chemotherapy. A base
line data were assessed before implementing Chemotherapy Safety
protocol, then Chemotherapy Safety protocol was implemented, and
after 2 monthes they were assessed again. Results: reveled that 88.9%
of study group I and 55.6% of study group II improved to good total
knowledge scores after educating on the safety protocol, also 95.6%
of study group I and 88.9% of study group II had good total practice
score after educating on the safety protocol. Moreover less than half
of group I (44.4%) reported that heavy workload is the most barriers
for them, while the majority of group II (94.4%) had many barriers
for adhering to the safety protocol such as they didn’t know the
protocol, the heavy work load and inadequate equipment.
Conclusions: Safety protocol for Oncology Nurses seemed to have
positive effect on improving nurses' knowledge and practice.
Recommendation: chemotherapy safety protocol should be instituted
for all oncology nurses who are working in any oncology unit and/ or
center to enhance compliance, and this protocol should be done at
frequent intervals.
Abstract: Overcurrent (OC) relays are the major protection
devices in a distribution system. The operating time of the OC relays
are to be coordinated properly to avoid the mal-operation of the
backup relays. The OC relay time coordination in ring fed
distribution networks is a highly constrained optimization problem
which can be stated as a linear programming problem (LPP). The
purpose is to find an optimum relay setting to minimize the time of
operation of relays and at the same time, to keep the relays properly
coordinated to avoid the mal-operation of relays.
This paper presents two phase simplex method for optimum time
coordination of OC relays. The method is based on the simplex
algorithm which is used to find optimum solution of LPP. The
method introduces artificial variables to get an initial basic feasible
solution (IBFS). Artificial variables are removed using iterative
process of first phase which minimizes the auxiliary objective
function. The second phase minimizes the original objective function
and gives the optimum time coordination of OC relays.
Abstract: Antimicrobial resistant is becoming a major factor in
virtually all hospital acquired infection may soon untreatable is a
serious public health problem. These concerns have led to major
research effort to discover alternative strategies for the treatment of
bacterial infection. Nanobiotehnology is an upcoming and fast
developing field with potential application for human welfare. An
important area of nanotechnology for development of reliable and
environmental friendly process for synthesis of nanoscale particles
through biological systems In the present studies are reported on the
use of fungal strain Aspergillus species for the extracellular synthesis
of bionanoparticles from 1 mM silver nitrate (AgNO3) solution. The
report would be focused on the synthesis of metallic bionanoparticles
of silver using a reduction of aqueous Ag+ ion with the
culture supernatants of Microorganisms. The bio-reduction of the
Ag+ ions in the solution would be monitored in the aqueous
component and the spectrum of the solution would measure through
UV-visible spectrophotometer The bionanoscale particles were
further characterized by Atomic Force Microscopy (AFM), Fourier
Transform Infrared Spectroscopy (FTIR) and Thin layer
chromatography. The synthesized bionanoscale particle showed a
maximum absorption at 385 nm in the visible region. Atomic Force
Microscopy investigation of silver bionanoparticles identified that
they ranged in the size of 250 nm - 680 nm; the work analyzed the
antimicrobial efficacy of the silver bionanoparticles against various
multi drug resistant clinical isolates. The present Study would be
emphasizing on the applicability to synthesize the metallic
nanostructures and to understand the biochemical and molecular
mechanism of nanoparticles formation by the cell filtrate in order to
achieve better control over size and polydispersity of the
nanoparticles. This would help to develop nanomedicine against
various multi drug resistant human pathogens.
Abstract: The paradigm of mobile agent provides a promising technology for the development of distributed and open applications. However, one of the main obstacles to widespread adoption of the mobile agent paradigm seems to be security. This paper treats the security of the mobile agent against malicious host attacks. It describes generic mobile agent protection architecture. The proposed approach is based on the dynamic adaptability and adopts the reflexivity as a model of conception and implantation. In order to protect it against behaviour analysis attempts, the suggested approach supplies the mobile agent with a flexibility faculty allowing it to present an unexpected behaviour. Furthermore, some classical protective mechanisms are used to reinforce the level of security.
Abstract: Falls are the primary cause of accidents in people over
the age of 65, and frequently lead to serious injuries. Since the early
detection of falls is an important step to alert and protect the aging
population, a variety of research on detecting falls was carried out
including the use of accelerators, gyroscopes and tilt sensors. In
exiting studies, falls were detected using an accelerometer with
errors. In this study, the proposed method for detecting falls was to
use two accelerometers to reject wrong falls detection. As falls are
accompanied by the acceleration of gravity and rotational motion, the
falls in this study were detected by using the z-axial acceleration
differences between two sites. The falls were detected by calculating
the difference between the analyses of accelerometers placed on two
different positions on the chest of the subject. The parameters of the
maximum difference of accelerations (diff_Z) and the integration of
accelerations in a defined region (Sum_diff_Z) were used to form the
fall detection algorithm. The falls and the activities of daily living
(ADL) could be distinguished by using the proposed parameters
without errors in spite of the impact and the change in the positions
of the accelerometers. By comparing each of the axial accelerations,
the directions of falls and the condition of the subject afterwards
could be determined.In this study, by using two accelerometers
without errors attached to two sites to detect falls, the usefulness of
the proposed fall detection algorithm parameters, diff_Z and
Sum_diff_Z, were confirmed.
Abstract: The study describes chitosan membrane platform
modified with nanostructure pattern which using nanotechnology to
fabricate. The cell-substrate interaction between neuro-2a neuroblasts
cell lines and chitosan membrane (flat, nanostructure and
nanostructure pattern types) was investigated. The adhered
morphology of neuro-2a cells depends on the topography of chitosan
surface. We have found that neuro-2a showed different morphogenesis
when cells adhered on flat and nanostructure chitosan membrane. The
cell projected area of neuro-2a on flat chitosan membrane is larger
than on nanostructure chitosan membrane. In addition, neuro-2a cells
preferred to adhere on flat chitosan surface region than on
nanostructure chitosan membrane to immobilize and differentiation.
The experiment suggests surface topography can be used as a critical
mechanism to isolate group of neuro-2a to a particular rectangle area
on chitosan membrane. Our finding will provide a platform to take
patch clamp to record electrophysiological behavior about neurons in
vitro in the future.
Abstract: Construction of tunnels is connected with high
uncertainty in the field of costs, construction period, safety and
impact on surroundings. Risk management became therefore a
common part of tunnel projects, especially after a set of fatal
collapses occurred in 1990's. Such collapses are caused usually by
combination of factors that can be divided into three main groups, i.e.
unfavourable geological conditions, failures in the design and
planning or failures in the execution.
This paper suggests a procedure enabling quantification of the
excavation risk related to extraordinary accidents using FTA and
ETA tools. It will elaborate on a common process of risk analysis and
enable the transfer of information and experience between particular
tunnel construction projects. Further, it gives a guide for designers,
management and other participants, how to deal with risk of such
accidents and how to make qualified decisions based on a
probabilistic approach.
Abstract: In this paper we introduce three watermarking methods that can be used to count the number of times that a user has played some content. The proposed methods are tested with audio content in our experimental system using the most common signal processing attacks. The test results show that the watermarking methods used enable the watermark to be extracted under the most common attacks with a low bit error rate.
Abstract: The volume of biosolids produced in Malaysia
nowadays had increased proportionally to its population size. The end
products from the waste treatments were mounting, thus inevitable
that in the end the environment will be surrounded by the waste. This
study was conducted to investigate the suitability of biosolids to be
reused as fertilizer for non-food crop. By varying the concentration of
biosolids applied onto the soil, growth of five ornamental plant
samples were tested for eight consecutive weeks. The results show
that the pH of the soil after the addition of biosolids ranges from 6.45
to 6.56 which is suitable for the plant growth. The soil samples that
contains biosolid also show higher amount of macronutrients (N, P,
K) and the heavy metals content are significantly increased in the
plant however it does not exceed the guidelines drawn by the
Environmental Protection Agency. It is also proven that there was
only small significant different in the performance of plant growth
between biosolids and commercial fertilizer. It can be seen that
biosolids was able to perform just as well as commercial fertilizer.