Dignity and Suffering: Reading of Human Rights in Untouchable by Anand

Cultural stories are political. They register cultural phenomena and their relations with the world and society in term of their existence, function, characteristics by using different context. This paper will provide a new way of rethinking which will help us to rethink the relationship between fiction and politics. It discusses the theme of human rights and it shows the relevance between art and politics by studying the civil society through a literary framework. Reasons to establish a relationship between fiction and politics are the relevant themes and universal issues among the two disciplines. Both disciplines are sets of views and ideas formulated by the human mind to explain political or cultural phenomenon. Other reasons are the complexity and depth of the author-s vision, and the need to explain the violations of human rights in a more active structure which can relate to emotional and social existence.

Exploring Value of Time, Shopping Behavior and Shopping Motivation of International Tourists in the Chatuchak Weekend Market

The purpose of this study was to explore the demographic differences of international tourists according to three main factors, including the value of time, shopping behavior and shopping motivation. The Chatuchak Weekend Market is known as one of the biggest weekend markets in the world. Too little academic studies had been conducted in this area of weekend market, despite its growth and continuous development. In general, both domestic visitors and international tourists are attracted to the perception of cheap and bargaining prices the weekend market. However, systematic research study can provide reliable understanding of the perception of the visitors. This study focused on the group of international tourists who visited the market and aimed to provide better insights based on the differences in their demographic factors. Findings indicated that several differences in value of time, shopping behavior, and shopping motivation were identified by gender, income and age. Research implications and directions for further studies were discussed.

Allelopathic Effects of Sisymbrium irio L. and Descurainia sophia (L.) Schur on the Germination of Wheat (Triticum aestivum L.)

An experiment was conducted under controlled conditions to study the effect of water extract of leaves, shoots and roots of either Sisymbrium irio L. =SISIR and/or Descurainia sophia (L.) Schur =DESSO on the germination and primary growth of wheat. A split-split plot experiment in CRD with three replications was used. The main plots were the type of weed: i.e. SISIR and DESSO and the sub-plots were type of organ: i.e. leaf, stem and root and, the sub-sub plots were concentration of the water extract of each organ of the weeds: i.e. 0, 2, 4 and 8 % w/v. The plant materials were cut in 2-3 cm pieces and then were ground in a blender. The crushed materials were weighed according to experimental protocol and the final volume was reached to 100 ml in distilled water in dark bottles. All bottles were put on a shaker for 24 hours. The solutions were filtered by muslin cloth. Whatman paper, 9 cm in diameter, were put in petri dishes and twenty seeds of wheat were put on it and 5 ml distilled water or water extract of weeds were added to each petri dish. All petri dishes were put in constant temperature of 15 0C incubator. The results showed that the SISIR water extract had a greater inhibitory effects on germination and primary growth of wheat than those of DESSO water extract. The water extracts of the leaves of both weeds had the greatest inhibitory effects on germination and primary growth of wheat, compared to those of stems and roots. Increasing the concentration of water extract of leaves, stems and roots of both weeds up to 8 % caused the greatest inhibitory effects to wheat and reduced the germination rate and primary growth of it linearly.

A Symbol by Symbol Clustering Based Blind Equalizer

A new blind symbol by symbol equalizer is proposed. The operation of the proposed equalizer is based on the geometric properties of the two dimensional data constellation. An unsupervised clustering technique is used to locate the clusters formed by the received data. The symmetric properties of the clusters labels are subsequently utilized in order to label the clusters. Following this step, the received data are compared to clusters and decisions are made on a symbol by symbol basis, by assigning to each data the label of the nearest cluster. The operation of the equalizer is investigated both in linear and nonlinear channels. The performance of the proposed equalizer is compared to the performance of a CMAbased blind equalizer.

Determination of Alkaline Protease Production In Serratia Marcescens Sp7 Using Agro Wastes As Substrate Medium, Optimization Of Production Parameters And Purification Of The Enzyme

The enzyme alkaline protease production was determined under solid state fermentation using the soil bacteria Serratia marcescens sp7. The maximum production was obtained from wheat bran medium than ground nut shell and chemically defined medium. The physiological fermentation factors such as pH of the medium (pH 8), Temperature (40oC) and incubation time (48 hrs) played a vital role in alkaline protease production in all the above. 100Mm NaCl has given better resolution during elution of the enzymes. The enzyme production was found to be associated with growth of the bacterial culture.

A Refined Application of QFD in SCM, A New Approach

Due to the fact that in the new century customers tend to express globally increasing demands, networks of interconnected businesses have been established in societies and the management of such networks seems to be a major key through gaining competitive advantages. Supply chain management encompasses such managerial activities. Within a supply chain, a critical role is played by quality. QFD is a widely-utilized tool which serves the purpose of not only bringing quality to the ultimate provision of products or service packages required by the end customer or the retailer, but it can also initiate us into a satisfactory relationship with our initial customer; that is the wholesaler. However, the wholesalers- cooperation is considerably based on the capabilities that are heavily dependent on their locations and existing circumstances. Therefore, it is undeniable that for all companies each wholesaler possesses a specific importance ratio which can heavily influence the figures calculated in the House of Quality in QFD. Moreover, due to the competitiveness of the marketplace today, it-s been widely recognized that consumers- expression of demands has been highly volatile in periods of production. Apparently, such instability and proneness to change has been very tangibly noticed and taking it into account during the analysis of HOQ is widely influential and doubtlessly required. For a more reliable outcome in such matters, this article demonstrates the application viability of Analytic Network Process for considering the wholesalers- reputation and simultaneously introduces a mortality coefficient for the reliability and stability of the consumers- expressed demands in course of time. Following to this, the paper provides further elaboration on the relevant contributory factors and approaches through the calculation of such coefficients. In the end, the article concludes that an empirical application is needed to achieve broader validity.

An Event Based Approach to Extract the Run Time Execution Path of BPEL Process for Monitoring QoS in the Cloud

Due to the dynamic nature of the Cloud, continuous monitoring of QoS requirements is necessary to manage the Cloud computing environment. The process of QoS monitoring and SLA violation detection consists of: collecting low and high level information pertinent to the service, analyzing the collected information, and taking corrective actions when SLA violations are detected. In this paper, we detail the architecture and the implementation of the first step of this process. More specifically, we propose an event-based approach to obtain run time information of services developed as BPEL processes. By catching particular events (i.e., the low level information), our approach recognizes the run-time execution path of a monitored service and uses the BPEL execution patterns to compute QoS of the composite service (i.e., the high level information).

Gonadotoxic and Cytotoxic Effect of Induced obesity via Monosodium Glutamate on Mus musculus Testis Cytoarchitecture and Sperm Parameter

Impaired fertility may be the result of indirect consumption of anti-fertility agents through food. Monosodium glutamate (MSG) has been widely used as food additive, flavour enhancer and included in vaccines. This study focuses in determining the gonadotoxic and cytotoxic effect of MSG on selected sperm parameters such as sperm viability, sperm membrane integrity and testes cytoarchitecture of male mice via histological examination to determine its effect on spermatogenesis. Twenty-four Mus musculus were randomly divided into 4 groups and given intraperitoneal injections (IP) daily for 14 days of different MSG concentrations at 250, 500 and 1000mg/kg MSG to body weight to induce obesity. Saline was given to control group. Mice were sacrificed and analysis revealed abnormalities in values for sperm parameters and damages to testes cytoarchitecture of male mice. The results recorded decreased viability (p0.05) with degenerative structures in seminiferous tubule of testes. The results indicated various implications of MSG on male mice reproductive system which has consequences in fertility potential.

Stego Machine – Video Steganography using Modified LSB Algorithm

Computer technology and the Internet have made a breakthrough in the existence of data communication. This has opened a whole new way of implementing steganography to ensure secure data transfer. Steganography is the fine art of hiding the information. Hiding the message in the carrier file enables the deniability of the existence of any message at all. This paper designs a stego machine to develop a steganographic application to hide data containing text in a computer video file and to retrieve the hidden information. This can be designed by embedding text file in a video file in such away that the video does not loose its functionality using Least Significant Bit (LSB) modification method. This method applies imperceptible modifications. This proposed method strives for high security to an eavesdropper-s inability to detect hidden information.

Pseudo-Homogeneous Kinetic of Dilute-Acid Hydrolysis of Rice Huskfor Ethanol Production: Effect of Sugar Degradation

Rice husk is a lignocellulosic source that can be converted to ethanol. Three hundreds grams of rice husk was mixed with 1 L of 0.18 N sulfuric acid solutions then was heated in an autoclave. The reaction was expected to be at constant temperature (isothermal), but before that temperature was achieved, reaction has occurred. The first liquid sample was taken at temperature of 140 0C and repeated every 5 minute interval. So the data obtained are in the regions of non-isothermal and isothermal. It was observed that the degradation has significant effects on the ethanol production. The kinetic constants can be expressed by Arrhenius equation with the frequency factors for hydrolysis and sugar degradation of 1.58 x 105 min-1 and 2.29 x 108 L/mole-min, respectively, while the activation energies are 64,350 J/mole and 76,571 J/mole. The highest ethanol concentration from fermentation is 1.13% v/v, attained at 220 0C.

E-learning and m-learning: Africa-s Search for a Suitable Concept in the Era of Cloud Computing?

This paper is an exploration of the conceptual confusion between E-learning and M-learning particularly in Africa. Section I provides a background to the development of E-learning and M-learning. Section II focuses on the conceptual analysis as it applies to Africa. It is with an investigative and expansive mind that this paper is elaborated to respond to a profound question of the suitability of the concepts in a particular era in Africa. The aim of this paper is therefore to shed light on which concept best suits the unique situation of Africa in the era of cloud computing.

Carbonate Microfacies Analysis of Sinjar Formation from Qara Dagh Mountains, South–West of Sulaimani City, Kurdistan Region, Iraq

The paper describes the carbonate microfacies identified in the Sinjar Formation (Late Paleocene–Early Eocene) cropping out in Qara Dagh Mountain, near Sulekan Village approximately 20km south–west of Sulaimani (Iraq). One section (62m thick) has been measured in the field and closely sampled to undertake detailed microfaciesal and micropalaeontological studies to determine the formation-s age and environment of deposition. A samples were collected illustrating all the lithological changes along the section. The limestone in the studied area is hard and extremely rich in large foraminifers (soritids, rotaliids, nummulites, miliolids) and green algae (dasycladales). The investigation of the thin sections allowed us to identify the carbonate microfacies (18 types and subtypes) and the micropaleontological association (foraminifers and green algae), to determine the age of formation and to reconstruct the paleoenvironment of deposition (fore-reef, reef, back-reef). Based on the field observations and the studied thin sections, we determined three Units of a carbonate platform (I, II and III) from the base to the top of the section: Unit I with coralgal associations, Unit II is dominated by larger foraminifers and haracterized by the absence of coralgal associations, while Unit III is dominated by small foraminifers (mostly miliolids), peloids and green algae. It is partially dolomitized.

Spatial Planning as an Approach to Achieve Sustainable Development in Historic Cities

Sustainable development is a concept which was originated in Burtland commission in 1978. Although this concept was born with environmental aspects, it is penetrated in all areas rapidly, turning into a dominate view of planning. Concentrating on future generation issue, especially when talking about heritage has a long story. Each approach with all of its characteristics illustrates differences in planning, hence planning always reflects the dominate idea of its age. This paper studies sustainable development in planning for historical cities with the aim of finding ways to deal with heritage in planning for historical cities in Iran. Through this, it will be illustrated how challenges between sustainable concept and heritage could be concluded in planning. Consequently, the paper will emphasize on: Sustainable development in city planning Trends regarding heritage Challenges due to planning for historical cities in Iran For the first two issues, documentary method regarding the sustainable development and heritage literature is considered. As the next step focusing on Iranian historical cities require considering the urban planning and management structure and identifying the main challenges related to heritage, so analyzing challenges regarding heritage is considered. As the result it would be illustrated that key issue in such planning is active conservation to improve and use the potential of heritage while it's continues conservation is guaranteed. By emphasizing on the planning system in Iran it will be obvious that some reforms are needed in this system and its way of relating with heritage. The main weakness in planning for historical cities in Iran is the lack of independent city management. Without this factor achieving active conservation as the main factor of sustainable development would not be possible.

Novel and Different Definitions for Fuzzy Union and Intersection Operations

This paper presents three new methodologies for the basic operations, which aim at finding new ways of computing union (maximum) and intersection (minimum) membership values by taking into effect the entire membership values in a fuzzy set. The new methodologies are conceptually simple and easy from the application point of view and are illustrated with a variety of problems such as Cartesian product of two fuzzy sets, max –min composition of two fuzzy sets in different product spaces and an application of an inverted pendulum to determine the impact of the new methodologies. The results clearly indicate a difference based on the nature of the fuzzy sets under consideration and hence will be highly useful in quite a few applications where different values have significant impact on the behavior of the system.

A Survey on Usage and Diffusion of Project Risk Management Techniques and Software Tools in the Construction Industry

The area of Project Risk Management (PRM) has been extensively researched, and the utilization of various tools and techniques for managing risk in several industries has been sufficiently reported. Formal and systematic PRM practices have been made available for the construction industry. Based on such body of knowledge, this paper tries to find out the global picture of PRM practices and approaches with the help of a survey to look into the usage of PRM techniques and diffusion of software tools, their level of maturity, and their usefulness in the construction sector. Results show that, despite existing techniques and tools, their usage is limited: software tools are used only by a minority of respondents and their cost is one of the largest hurdles in adoption. Finally, the paper provides some important guidelines for future research regarding quantitative risk analysis techniques and suggestions for PRM software tools development and improvement.

Zeros of Bargmann Analytic Representation in the Complex Plane

The paper contains an investigation of zeros Of Bargmann analytic representation. A brief introduction to Harmonic oscillator formalism is given. The Bargmann analytic representation has been studied. The zeros of Bargmann analytic function are considered. The Q or Husimi functions are introduced. The The Bargmann functions and the Husimi functions have the same zeros. The Bargmann functions f(z) have exactly q zeros. The evolution time of the zeros μn are discussed. Various examples have been given.

Application of RP Technology with Polycarbonate Material for Wind Tunnel Model Fabrication

Traditionally, wind tunnel models are made of metal and are very expensive. In these years, everyone is looking for ways to do more with less. Under the right test conditions, a rapid prototype part could be tested in a wind tunnel. Using rapid prototype manufacturing techniques and materials in this way significantly reduces time and cost of production of wind tunnel models. This study was done of fused deposition modeling (FDM) and their ability to make components for wind tunnel models in a timely and cost effective manner. This paper discusses the application of wind tunnel model configuration constructed using FDM for transonic wind tunnel testing. A study was undertaken comparing a rapid prototyping model constructed of FDM Technologies using polycarbonate to that of a standard machined steel model. Testing covered the Mach range of Mach 0.3 to Mach 0.75 at an angle-ofattack range of - 2° to +12°. Results from this study show relatively good agreement between the two models and rapid prototyping Method reduces time and cost of production of wind tunnel models. It can be concluded from this study that wind tunnel models constructed using rapid prototyping method and materials can be used in wind tunnel testing for initial baseline aerodynamic database development.

Performance Evaluation of Popular Hash Functions

This paper describes the results of an extensive study and comparison of popular hash functions SHA-1, SHA-256, RIPEMD-160 and RIPEMD-320 with JERIM-320, a 320-bit hash function. The compression functions of hash functions like SHA-1 and SHA-256 are designed using serial successive iteration whereas those like RIPEMD-160 and RIPEMD-320 are designed using two parallel lines of message processing. JERIM-320 uses four parallel lines of message processing resulting in higher level of security than other hash functions at comparable speed and memory requirement. The performance evaluation of these methods has been done by using practical implementation and also by using step computation methods. JERIM-320 proves to be secure and ensures the integrity of messages at a higher degree. The focus of this work is to establish JERIM-320 as an alternative of the present day hash functions for the fast growing internet applications.

Content and Resources based Mobile and Wireless Video Transcoding

Delivering streaming video over wireless is an important component of many interactive multimedia applications running on personal wireless handset devices. Such personal devices have to be inexpensive, compact, and lightweight. But wireless channels have a high channel bit error rate and limited bandwidth. Delay variation of packets due to network congestion and the high bit error rate greatly degrades the quality of video at the handheld device. Therefore, mobile access to multimedia contents requires video transcoding functionality at the edge of the mobile network for interworking with heterogeneous networks and services. Therefore, to guarantee quality of service (QoS) delivered to the mobile user, a robust and efficient transcoding scheme should be deployed in mobile multimedia transporting network. Hence, this paper examines the challenges and limitations that the video transcoding schemes in mobile multimedia transporting network face. Then handheld resources, network conditions and content based mobile and wireless video transcoding is proposed to provide high QoS applications. Exceptional performance is demonstrated in the experiment results. These experiments were designed to verify and prove the robustness of the proposed approach. Extensive experiments have been conducted, and the results of various video clips with different bit rate and frame rate have been provided.