Abstract: Distance visualization of large datasets often takes the direction of remote viewing and zooming techniques of stored static images. However, the continuous increase in the size of datasets and visualization operation causes insufficient performance with traditional desktop computers. Additionally, the visualization techniques such as Isosurface depend on the available resources of the running machine and the size of datasets. Moreover, the continuous demand for powerful computing powers and continuous increase in the size of datasets results an urgent need for a grid computing infrastructure. However, some issues arise in current grid such as resources availability at the client machines which are not sufficient enough to process large datasets. On top of that, different output devices and different network bandwidth between the visualization pipeline components often result output suitable for one machine and not suitable for another. In this paper we investigate how the grid services could be used to support remote visualization of large datasets and to break the constraint of physical co-location of the resources by applying the grid computing technologies. We show our grid enabled architecture to visualize large medical datasets (circa 5 million polygons) for remote interactive visualization on modest resources clients.
Abstract: One of the main consequences of the ubiquitous usage of Internet as a means to conduct business has been the progressive internationalization of contracts created to support such transactions. As electronic commerce becomes International commerce, the reality is that commercial disputes will occur creating such questions as: "In which country do I bring proceedings?" and "Which law is to be applied to solve disputes?" The decentralized and global structure of the Internet and its decentralized operation have given e-commerce a transnational element that affects two questions essential to any transaction: applicable law and jurisdiction in the event of dispute. The sharing of applicable law and jurisdiction among States in respect of international transactions traditionally has been based on the use of contact factors generally of a territorial nature (the place where real estate is located, customary residence, principal establishment, place of shipping goods). The characteristics of the Internet as a new space sometimes make it difficult to apply these rules, and may make them inoperative or lead to results that are surprising or totally foreign to the contracting parties and other elements and circumstances of the case.
Abstract: Yield and Crop Water Productivity are crucial issues
in sustainable agriculture, especially in high-demand resource crops such as sweet corn. This study was conducted to investigate
agronomic responses such as plant growth, yield and soil parameters (EC and Nitrate accumulation) to several deficit irrigation treatments
(100, 75, 50, 25 and 0% of ETm) applied during vegetative growth
stage, rainfed treatment was also tested.
The finding of this research indicates that under deficit irrigation
during vegetative growth stage applying 75% of ETm lead to increasing of 19.4% in terms of fresh ear yield, 9.4% in terms of dry grain yield, 10.5% in terms of number of ears per plant, 11.5% for
the 1000 grains weight and 19% in terms of crop water productivity compared with fully irrigated treatment. While those parameters in
addition to root, shoot and plant height has been affected by deficit
irrigation during vegetative growth stage when increasing water stress degree more than 50% of ETm.
Abstract: This paper focuses on PSS/E modeling of wind farms
of Doubly-fed Induction Generator (DFIG) type and their impact on
issues of power system operation. Since Wind Turbine Generators
(WTG) don-t have the same characteristics as synchronous
generators, the appropriate modeling of wind farms is essential for
transmission system operators to analyze the best options of
transmission grid reinforcements as well as to evaluate the wind
power impact on reliability and security of supply. With the high
excepted penetration of wind power into the power system a
simultaneous loss of Wind Farm generation will put at risk power
system security and reliability. Therefore, the main wind grid code
requirements concern the fault ride through capability and frequency
operation range of wind turbines. In case of grid faults wind turbines
have to supply a definite reactive power depending on the
instantaneous voltage and to return quickly to normal operation.
Abstract: The purpose of this paper is to conceptualize a futureoriented
human work environment and organizational activity in
deep mines that entails a vision of good and safe workplace. Futureoriented
technological challenges and mental images required for
modern work organization design were appraised. It is argued that an
intelligent-deep-mine covering the entire value chain, including
environmental issues and with work organization that supports good
working and social conditions towards increased human productivity
could be designed. With such intelligent system and work
organization in place, the mining industry could be seen as a place
where cooperation, skills development and gender equality are key
components. By this perspective, both the youth and women might
view mining activity as an attractive job and the work environment
as a safe, and this could go a long way in breaking the unequal
gender balance that exists in most mines today.
Abstract: A research project dealing with the phytoremediation
of a soil polluted by some heavy metals is currently running. The
case study is represented by a mining area in Hamedan province in
the central west part of Iran. The potential of phytoextraction and
phytostabilization of plants was evaluated considering the
concentration of heavy metals in the plant tissues and also the
bioconcentration factor (BCF) and the translocation factor (TF). Also
the several established criteria were applied to define
hyperaccumulator plants in the studied area. Results showed that
none of the collected plant species were suitable for phytoextraction
of Cu, Zn, Fe and Mn, but among the plants, Euphorbia macroclada
was the most efficient in phytostabilization of Cu and Fe, while,
Ziziphora clinopodioides, Cousinia sp. and Chenopodium botrys
were the most suitable for phytostabilization of Zn and Chondrila
juncea and Stipa barbata had the potential for phytostabilization of
Mn. Using the most common criterion, Euphorbia macroclada and
Verbascum speciosum were Fe hyperaccumulator plants. Present
study showed that native plant species growing on contaminated sites
may have the potential for phytoremediation.
Abstract: One of the key research issues in wireless sensor networks (WSNs) is how to efficiently deploy sensors to cover an area. In this paper, we present a Fishnet Based Dispatch Scheme (FiBDS) with energy aware mobility and interest based sensing angle. We propose two algorithms, one is FiBDS centralized algorithm and another is FiBDS distributed algorithm. The centralized algorithm is designed specifically for the non-time critical applications, commonly known as non real-time applications while the distributed algorithm is designed specifically for the time critical applications, commonly known as real-time applications. The proposed dispatch scheme works in a phase-selection manner. In this in each phase a specific constraint is dealt with according to the specified priority and then moved onto the next phase and at the end of each only the best suited nodes for the phase are chosen. Simulation results are presented to verify their effectiveness.
Abstract: METIS is the Multi Element Telescope for Imaging
and Spectroscopy, a Coronagraph aboard the European Space
Agency-s Solar Orbiter Mission aimed at the observation of the solar
corona via both VIS and UV/EUV narrow-band imaging and spectroscopy. METIS, with its multi-wavelength capabilities, will
study in detail the physical processes responsible for the corona heating and the origin and properties of the slow and fast solar wind.
METIS electronics will collect and process scientific data thanks to its detectors proximity electronics, the digital front-end subsystem
electronics and the MPPU, the Main Power and Processing Unit,
hosting a space-qualified processor, memories and some rad-hard
FPGAs acting as digital controllers.This paper reports on the overall
METIS electronics architecture and data processing capabilities
conceived to address all the scientific issues as a trade-off solution between requirements and allocated resources, just before the
Preliminary Design Review as an ESA milestone in April 2012.
Abstract: Segmentation is an important step in medical image
analysis and classification for radiological evaluation or computer
aided diagnosis. The CAD (Computer Aided Diagnosis ) of lung CT
generally first segment the area of interest (lung) and then analyze
the separately obtained area for nodule detection in order to
diagnosis the disease. For normal lung, segmentation can be
performed by making use of excellent contrast between air and
surrounding tissues. However this approach fails when lung is
affected by high density pathology. Dense pathologies are present in
approximately a fifth of clinical scans, and for computer analysis
such as detection and quantification of abnormal areas it is vital that
the entire and perfectly lung part of the image is provided and no
part, as present in the original image be eradicated. In this paper we
have proposed a lung segmentation technique which accurately
segment the lung parenchyma from lung CT Scan images. The
algorithm was tested against the 25 datasets of different patients
received from Ackron Univeristy, USA and AGA Khan Medical
University, Karachi, Pakistan.
Abstract: This paper examines the issues, the dangers and the
saving graces of life in a transparent global community where there is
truly “no place to hide". In recent years, social networks and online
groups have transformed issues of privacy and the ways in which we
perceive and interact with others. The idea of reputation is critical to
this dynamic. The discussion begins with a brief etymological history
of the concept of reputation and moves to an exploration of how and
why online communication changes our basic nature, our various
selves and the Bakhtin idea of the polyphonic nature of truth. The
discussion considers the damaging effects of bullying and gossip,
both of which constitute an assault on reputation and the latter of
which is not limited to the lifetime of the person. It concludes with
guidelines and specific recommendations.
Abstract: Until recently, energy security and climate change
were considered separate issues to be dealt with by policymakers.
The two issues are now converging, challenging the security and
climate communities to develop a better understanding of how to deal
with both issues simultaneously. Although Egypt is not a major
contributor to the world's total GHG emissions, it is particularly
vulnerable to the potential effects of global climate change such as
rising sea levels and changed patterns of rainfall in the Nile Basin.
Climate change is a major threat to sustainable growth and
development in Egypt, and the achievement of the Millennium
Development Goals. Egypt-s capacity to respond to the challenges of
climate instability will be expanded by improving overall resilience,
integrating climate change goals into sustainable development
strategies, increasing the use of modern energy systems with reduced
carbon intensity, and strengthening international initiatives. This
study seeks to establish a framework for considering the complex and
evolving links between energy security and climate change,
applicable to Egypt.
Abstract: Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: The new status generated by technological advancements and changes in the global economy raises important issues on how communities and organisations need to innovate upon their traditional processes in order to adapt to the challenges of the Knowledge Society. The DialogoS+ European project aims to study the role of and promote social dialogue in the banking sector, strengthen the link between old and new members and make social dialogue at the European level a force for innovation and change, also given the context of the international crisis emerging in 2008- 2009. Under the scope of DialogoS+, this paper describes how the community of Europe-s banking sector trade unions attempted to adapt to the challenges of the Knowledge Society by exploiting the benefits of new channels of communication, learning, knowledge generation and diffusion focusing on the concept of roadmapping. Important dimensions of social dialogue such as collective bargaining and working conditions are addressed.
Abstract: In parallel, broadcasting has changed rapidly with the
changing of the world at the same area. Broadcasting is also
influenced and reshaped in terms of the emergence of new
communication technologies. These developments have resulted a lot
of economic and social consequences. The most important
consequences of these results are those of the powers of the
governments to control over the means of communication and control
mechanisms related to the descriptions of the new issues. For this
purpose, autonomous and independent regulatory bodies have been
established by the state. One of these regulatory bodies is the Radio
and Television Supreme Council, which to be established in 1994,
with the Code no 3984. Today’s Radio and Television Supreme
Council which is responsible for the regulation of the radio and
television broadcasts all across Turkey has an important and effective
position as autonomous and independent regulatory body. The Radio
and Television Supreme Council acts as being a remarkable organizer
for a sensitive area of radio and television broadcasting on one hand,
and the area of democratic, liberal and keep in mind the concept of
the public interest by putting certain principles for the functioning of
the Board control, in the context of media policy as one of the central
organs, on the other hand.
In this study, the role of the Radio and Television Supreme
Council is examined in accordance with the Code no 3894 in order to
control over the communication and control mechanisms as well as
the examination of the changes in the duties of the Code No. 6112,
dated 2011.
Abstract: The IEEE 802.11e which is an enhanced version of the 802.11 WLAN standards incorporates the Quality of Service (QoS) which makes it a better choice for multimedia and real time applications. In this paper we study various aspects concerned with 802.11e standard. Further, the analysis results for this standard are compared with the legacy 802.11 standard. Simulation results show that IEEE 802.11e out performs legacy IEEE 802.11 in terms of quality of service due to its flow differentiated channel allocation and better queue management architecture. We also propose a method to improve the unfair allocation of bandwidth for downlink and uplink channels by varying the medium access priority level.
Abstract: Global Software Development (GSD) projects are
passing through different boundaries of a company, country and even
in other continents where time zone differs between both sites.
Beside many benefits of such development, research declared plenty
of negative impacts on these GSD projects. It is important to
understand problems which may lie during the execution of GSD
project with different time zones. This research project discussed and
provided different issues related to time delays in GSD projects. In
this paper, authors investigated some of the time delay factors which
usually lie in GSD projects with different time zones. This
investigation is done through systematic review of literature.
Furthermore, the practices to overcome these delay factors which
have already been reported in literature and GSD organizations are
also explored through literature survey and case studies.
Abstract: We have defined two suites of metrics, which cover
static and dynamic aspects of component assembly. The static
metrics measure complexity and criticality of component assembly,
wherein complexity is measured using Component Packing Density
and Component Interaction Density metrics. Further, four criticality
conditions namely, Link, Bridge, Inheritance and Size criticalities
have been identified and quantified. The complexity and criticality
metrics are combined to form a Triangular Metric, which can be used
to classify the type and nature of applications. Dynamic metrics are
collected during the runtime of a complete application. Dynamic
metrics are useful to identify super-component and to evaluate the
degree of utilisation of various components. In this paper both static
and dynamic metrics are evaluated using Weyuker-s set of properties.
The result shows that the metrics provide a valid means to measure
issues in component assembly. We relate our metrics suite with
McCall-s Quality Model and illustrate their impact on product
quality and to the management of component-based product
development.
Abstract: Faced with social and health system capacity
constraints and rising and changing demand for welfare services,
governments and welfare providers are increasingly relying on
innovation to help support and enhance services. However, the
evidence reported by several studies indicates that the realization of
that potential is not an easy task. Innovations can be deemed
inherently complex to implement and operate, because many of them
involve a combination of technological and organizational renewal
within an environment featuring a diversity of stakeholders. Many
public welfare service innovations are markedly systemic in their
nature, which means that they emerge from, and must address, the
complex interplay between political, administrative, technological,
institutional and legal issues. This paper suggests that stakeholders
dealing with systemic innovation in welfare services must deal with
ambiguous and incomplete information in circumstances of
uncertainty. Employing a literature review methodology and case
study, this paper identifies, categorizes and discusses different
aspects of the uncertainty of systemic innovation in public welfare
services, and argues that uncertainty can be classified into eight
categories: technological uncertainty, market uncertainty,
regulatory/institutional uncertainty, social/political uncertainty,
acceptance/legitimacy uncertainty, managerial uncertainty, timing
uncertainty and consequence uncertainty.
Abstract: Quality of Service (QoS) Routing aims to find path between source and destination satisfying the QoS requirements which efficiently using the network resources and underlying routing algorithm and to fmd low-cost paths that satisfy given QoS constraints. One of the key issues in providing end-to-end QoS guarantees in packet networks is determining feasible path that satisfies a number of QoS constraints. We present a Optimized Multi- Constrained Routing (OMCR) algorithm for the computation of constrained paths for QoS routing in computer networks. OMCR applies distance vector to construct a shortest path for each destination with reference to a given optimization metric, from which a set of feasible paths are derived at each node. OMCR is able to fmd feasible paths as well as optimize the utilization of network resources. OMCR operates with the hop-by-hop, connectionless routing model in IP Internet and does not create any loops while fmding the feasible paths. Nodes running OMCR not necessarily maintaining global view of network state such as topology, resource information and routing updates are sent only to neighboring nodes whereas its counterpart link-state routing method depend on complete network state for constrained path computation and that incurs excessive communication overhead.