Abstract: This paper describes an experimental, theoretical
model and numerical study of concentrated vortex flow past a sphere
in a hydraulic check valve. The phenomenon of the rotation of the
ball around the axis of the device through which liquid flows has
been found. That is, due to the rotation of the sphere in the check
valve vibration is caused. We observe the rotation of the sphere
around the longitudinal axis of the check valve. This rotation is
induced by a vortex shedding from the sphere. We will discuss
computational simulation and experimental investigations of this
strong sphere rotation. The frequency of the sphere vibration and
interaction with the check valve wall has been measured as a function
of the wide range Reynolds Number. The validity of the
computational simulation and of the assumptions on which it is based
has been proved experimentally. This study demonstrates the
possibility to control the vibrations in a hydraulic system and proves
to be very effective suppression of the self-excited vibration.
Abstract: In recent years, the number of natural disasters in the world has occurred frequently. After a strong earthquake occurs, multiple disasters due to tsunami, strong aftershocks or heavy snow can possible to occur. To prevent a secondary disaster and to save a life, the quick inspection of the damaged building is necessary. This paper investigated on a possibility of post earthquake quick inspection of damaged building by ordinary people which used the European Macro- Seismic Scale 1998 (EMS-98).
Abstract: The implementations of green roof have been widely
used in the developed countries such as Germany, United Kingdom,
United States and Canada. Green roof have many benefits such as
aesthetic and economic value, ecological gain which are optimization
of storm water management, urban heat island mitigation and energy
conservation. In term of pollution, green roof can control the air and
noise pollution in urban cities. The application of green roof in
Malaysian building has been studied with the previous work of green
roof either in Malaysia or other Asian region as like Indonesia,
Singapore, Thailand, Taiwan and several other countries that have
similar climate and environment as in Malaysia. These technologies
of adapting green roof have been compared to the Green Building
Index (GBI) of Malaysian buildings. The study has concentrated on
the technical aspect of green roof system having focused on i) waste
& recyclable materials ii) types of plants and method of planting and
iii) green roof as tool to reduce storm water runoff. The finding of
these areas will be compared to the suitability in achieving good
practice of the GBI in Malaysia. Results show that most of the
method are based on the countries own climate and environment.
This suggests that the method of using green roof must adhere to the
tropical climate of Malaysia. Suggestion of this research will be
viewed in term of the sustainability of the green roof. Further
research can be developed to implement the best method and
application in Malaysian climate especially in urban cities and
township.
Abstract: A seismic isolation pad produced by utilizing the scrap
tire rubber which contains interleaved steel reinforcing cords has been
proposed. The steel cords are expected to function similar to the steel
plates used in conventional laminated rubber bearings. The scrap tire
rubber pad (STRP) isolator is intended to be used in low rise
residential buildings of highly seismic areas of the developing
countries. Experimental investigation was conducted on unbonded
STRP isolators, and test results provided useful information including
stiffness, damping values and an eventual instability of the isolation
unit. Finite element analysis (FE analysis) of STRP isolator was
carried out on properly bonded samples. These types of isolators
provide positive incremental force resisting capacity up to shear strain
level of 155%. This paper briefly discusses the force deformation
behavior of bonded STRP isolators including stability of the isolation
unit.
Abstract: In the current age, retrieval of relevant information
from massive amount of data is a challenging job. Over the years,
precise and relevant retrieval of information has attained high
significance. There is a growing need in the market to build systems,
which can retrieve multimedia information that precisely meets the
user's current needs. In this paper, we have introduced a framework
for refining query results before showing it to the user, using ambient
intelligence, user profile, group profile, user location, time, day, user
device type and extracted features. A prototypic tool was also
developed to demonstrate the efficiency of the proposed approach.
Abstract: Composting is the process in which municipal solid
waste (MSW) and other organic waste materials such as biosolids
and manures are decomposed through the action of bacteria and other
microorganisms into a stable granular material which, applied to
land, as soil conditioner. Microorganisms, especially those that are
able to degrade polymeric organic material have a key role in speed
up this process. The aim of this study has been established to
isolation of microorganisms with high ability to production
extracellular enzymes for degradation of natural polymers that are
exists in MSW for decreasing time of degradation phase. Our
experimental study for isolation designed in two phases: in first
phase we isolated degrading microorganism with selected media that
consist a special natural polymer such as cellulose, starch, lipids and
etc as sole source of carbon. In second phase we selected
microorganism that had high degrading enzyme production with
enzymatic assay for seed production. However, our findings in pilot
scale have indicated that usage of this microbial consortium had high
efficiency for decreasing degradation phase.
Abstract: Multicast transmissions allow an host (the source) to send only one flow bound for a group of hosts (the receivers). Any equipment eager to belong to the group may explicitly register itself to that group via its multicast router. This router will be given the responsibility to convey all information relating to the group to all registered hosts. However in an environment in which the final receiver or the source frequently moves, the multicast flows need particular treatment. This constitutes one of the multicast transmissions problems around which several proposals were made in the Mobile IPv6 case in general. In this article, we describe the problems involved in this IPv6 multicast mobility and the existing proposals for their resolution. Then architecture will be proposed aiming to satisfy and optimize these transmissions in the specific case of a mobile multicast receiver in NC-HMIPv6 environment.
Abstract: Two indica varieties, IR36 and ‘Suweon 258’ (“S”)
are middle-heading in southern Japan. 36U, also middle-heading, is
an isogenic line of IR36 carrying Ur1 (Undulate rachis-1) gene.
However, late-heading plants segregated in the F2 population from
the F1 of S × 36U, and so did in the following generations. The
concerning lateness gene is designated as Ex. From the F8 generation,
isogenic-line pair of early-heading and late-heading lines, denoted by
“E” (ex/ex) and “L” (Ex/Ex), were developed. Genetic analyses of
heading time were conducted, using F1s and F2s among L, E, S and
36U. The following inferences were drawn from the experimental
results: 1) L, and both of E and 36U harbor Ex and ex, respectively;
2) Besides Ex, S harbors an inhibitor gene to it, i.e. I-Ex which is a
novel finding of the present study. 3) Ex is a dominant allele at the
E1 locus.
Abstract: This paper presents a formalisation of the different existing code mutation techniques (polymorphism and metamorphism) by means of formal grammars. While very few theoretical results are known about the detection complexity of viral mutation techniques, we exhaustively address this critical issue by considering the Chomsky classification of formal grammars. This enables us to determine which family of code mutation techniques are likely to be detected or on the contrary are bound to remain undetected. As an illustration we then present, on a formal basis, a proof-of-concept metamorphic mutation engine denoted PB MOT, whose detection has been proven to be undecidable.
Abstract: all of religions free towards society in Kazakhstan. Considering that Islam is more widespread religion in the region, Islamic industry is developing sector of Economy. There are some new sectors of Halal (Islamic) industry, which have importance for state developing on the whole. One of the youngest sectors of Halal industry is Islamic tourism, which became an object of disputes and led to dilemma, such as Islamic tourism is a result of a Religious revival and Islamic tourism is a new trend of Tourism. The paper was written under the research project “Islam in modern Kazakhstan: the nature and outcome of the religious revival".
Abstract: The daily increase of organic waste materials resulting
from different activities in the country is one of the main factors for
the pollution of environment. Today, with regard to the low level of
the output of using traditional methods, the high cost of disposal
waste materials and environmental pollutions, the use of modern
methods such as anaerobic digestion for the production of biogas has
been prevailing. The collected biogas from the process of anaerobic
digestion, as a renewable energy source similar to natural gas but
with a less methane and heating value is usable. Today, with the help
of technologies of filtration and proper preparation, access to biogas
with features fully similar to natural gas has become possible. At
present biogas is one of the main sources of supplying electrical and
thermal energy and also an appropriate option to be used in four
stroke engine, diesel engine, sterling engine, gas turbine, gas micro
turbine and fuel cell to produce electricity. The use of biogas for
different reasons which returns to socio-economic and environmental
advantages has been noticed in CHP for the production of energy in
the world. The production of biogas from the technology of anaerobic
digestion and its application in CHP power plants in Iran can not only
supply part of the energy demands in the country, but it can
materialize moving in line with the sustainable development. In this
article, the necessity of the development of CHP plants with biogas
fuels in the country will be dealt based on studies performed from the
economic, environmental and social aspects. Also to prove the
importance of the establishment of these kinds of power plants from
the economic point of view, necessary calculations has been done as
a case study for a CHP power plant with a biogas fuel.
Abstract: Knowledge sharing enables the information or
knowledge to be transmitted from one source to another. This paper
demonstrates the needs of having the online book catalogue which
can be used to facilitate disseminating information on textbook used
in the university. This project is aimed to give access to the students
and lecturers to the list of books in the bookstore and at the same
time to allow book reviewing without having to visit the bookstore
physically. Research is carried out according to the boundaries which
accounts to current process of new book purchasing, current system
used by the bookstore and current process the lecturers go through
for reviewing textbooks. The questionnaire is used to gather the
requirements and it is distributed to 100 students and 40 lecturers.
This project has enabled the improvement of a manual process to be
carried out automatically, through a web based platform. It is shown
based on the user acceptance survey carried out that target groups
found that this web service is feasible to be implemented in
Universiti Teknologi PETRONAS (UTP), and they have shown
positive signs of interest in utilizing it in the future.
Abstract: In this paper, we propose a texture feature-based
language identification using wavelet-domain BDIP (block difference
of inverse probabilities) and BVLC (block variance of local
correlation coefficients) features and FFT (fast Fourier transform)
feature. In the proposed method, wavelet subbands are first obtained
by wavelet transform from a test image and denoised by Donoho-s
soft-thresholding. BDIP and BVLC operators are next applied to the
wavelet subbands. FFT blocks are also obtained by 2D (twodimensional)
FFT from the blocks into which the test image is
partitioned. Some significant FFT coefficients in each block are
selected and magnitude operator is applied to them. Moments for each
subband of BDIP and BVLC and for each magnitude of significant
FFT coefficients are then computed and fused into a feature vector. In
classification, a stabilized Bayesian classifier, which adopts variance
thresholding, searches the training feature vector most similar to the
test feature vector. Experimental results show that the proposed
method with the three operations yields excellent language
identification even with rather low feature dimension.
Abstract: Nanomaterials have attracted considerable attention
during the last two decades, due to their unusual electrical, mechanical
and other physical properties as compared with their bulky
counterparts. The mechanical properties of nanostructured materials
show strong size dependency, which has been explained within the
framework of continuum mechanics by including the effects of surface
stress. The size-dependent deformations of two-dimensional
nanosized structures with surface effects are investigated in the paper
by the finite element method. Truss element is used to evaluate the
contribution of surface stress to the total potential energy and the
Gurtin and Murdoch surface stress model is implemented with
ANSYS through its user programmable features. The proposed
approach is used to investigate size-dependent stress concentration
around a nanosized circular hole and the size-dependent effective
moduli of nanoporous materials. Numerical results are compared with
available analytical results to validate the proposed modeling
approach.
Abstract: Software crisis refers to the situation in which the developers are not able to complete the projects within time and budget constraints and moreover these overscheduled and over budget projects are of low quality as well. Several methodologies have been adopted form time to time to overcome this situation and now in the focus is component based software engineering. In this approach, emphasis is on reuse of already existing software artifacts. But the results can not be achieved just by preaching the principles; they need to be practiced as well. This paper highlights some of the very basic elements of this approach, which has to be in place to get the desired goals of high quality, low cost with shorter time-to-market software products.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: According to conjugate gradient algorithm, a new consensus protocol algorithm of discrete-time multi-agent systems is presented, which can achieve finite-time consensus. Finally, a numerical example is given to illustrate our theoretical result.
Abstract: The world is moving rapidly toward the deployment
of information and communication systems. Nowadays, computing
systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important activity in
development process of computing systems, specially in developing
systems such as banking, military and e-business systems. For
developing every system, a process model which includes a process,
methods and tools is chosen. The Rational Unified Process (RUP) is
one of the most popular and complete process models which is used
by developers in recent years. This process model should be extended to be used in developing secure software systems. In this
paper, the Requirement Discipline of RUP is extended to improve RUP for developing secure software systems. These proposed extensions are adding and integrating a number of Activities, Roles,
and Artifacts to RUP in order to capture, document and model threats
and security requirements of system. These extensions introduce a
group of clear and stepwise activities to developers. By following these activities, developers assure that security requirements are
captured and modeled. These models are used in design, implementation and test activitie
Abstract: The need of high frame-rate imaging has been triggered by the new applications of ultrasound imaging to transient elastography and real-time 3D ultrasound. Using plane wave excitation (PWE) is one of the methods to achieve very high frame-rate imaging since an image can be formed with a single insonification. However, due to the lack of transmit focusing, the image quality with PWE is lower compared with those using conventional focused transmission. To solve this problem, we propose a filter-retrieved transmit focusing (FRF) technique combined with cross-correlation weighting (FRF+CC weighting) for high frame-rate imaging with PWE. A restrospective focusing filter is designed to simultaneously minimize the predefined sidelobe energy associated with single PWE and the filter energy related to the signal-to-noise-ratio (SNR). This filter attempts to maintain the mainlobe signals and to reduce the sidelobe ones, which gives similar mainlobe signals and different sidelobes between the original PWE and the FRF baseband data. Normalized cross-correlation coefficient at zero lag is calculated to quantify the degree of similarity at each imaging point and used as a weighting matrix to the FRF baseband data to further suppress sidelobes, thus improving the filter-retrieved focusing quality.
Abstract: This paper studies a vital issue in wireless
communications, which is the transmission of images over Wireless
Personal Area Networks (WPANs) through the Bluetooth network. It
presents a simple method to improve the efficiency of error control
code of old Bluetooth versions over mobile WPANs through
Interleaved Error Control Code (IECC) technique. The encoded
packets are interleaved by simple block interleaver. Also, the paper
presents a chaotic interleaving scheme as a tool against bursts of
errors which depends on the chaotic Baker map. Also, the paper
proposes using the chaotic interleaver instead of traditional block
interleaver with Forward Error Control (FEC) scheme. A comparison
study between the proposed and standard techniques for image
transmission over a correlated fading channel is presented.
Simulation results reveal the superiority of the proposed chaotic
interleaving scheme to other schemes. Also, the superiority of FEC
with proposed chaotic interleaver to the conventional interleavers
with enhancing the security level with chaotic interleaving packetby-
packet basis.