Abstract: Non-isothermal stagnation-point flow with consideration of thermal radiation is studied numerically. A set of partial differential equations that governing the fluid flow and energy is converted into a set of ordinary differential equations which is solved by Runge-Kutta method with shooting algorithm. Dimensionless wall temperature gradient and temperature boundary layer thickness for different combinaton of values of Prandtl number Pr and radiation parameter NR are presented graphically. Analyses of results show that the presence of thermal radiation in the stagnation-point flow is to increase the temperature boundary layer thickness and decrease the dimensionless wall temperature gradient.
Abstract: A new and cost effective RP-HPLC method was
developed and validated for simultaneous analysis of non steroidal
anti inflammatory dugs Diclofenac sodium (DFS), Flurbiprofen
(FLP) and an opioid analgesic Tramadol (TMD) in advanced drug
delivery systems (Liposome and Microcapsules), marketed brands
and human plasma. Isocratic system was employed for the flow of
mobile phase consisting of 10 mM sodium dihydrogen phosphate
buffer and acetonitrile in molar ratio of 67: 33 with adjusted pH of
3.2. The stationary phase was hypersil ODS column (C18, 250×4.6
mm i.d., 5 μm) with controlled temperature of 30 C°. DFS in
liposomes, microcapsules and marketed drug products was
determined in range of 99.76-99.84%. FLP and TMD in
microcapsules and brands formulation were 99.78 - 99.94 % and
99.80 - 99.82 %, respectively. Single step liquid-liquid extraction
procedure using combination of acetonitrile and trichloroacetic acid
(TCA) as protein precipitating agent was employed. The detection
limits (at S/N ratio 3) of quality control solutions and plasma samples
were 10, 20, and 20 ng/ml for DFS, FLP and TMD, respectively.
The Assay was acceptable in linear dynamic range. All other
validation parameters were found in limits of FDA and ICH method
validation guidelines. The proposed method is sensitive, accurate and
precise and could be applicable for routine analysis in
pharmaceutical industry as well as in human plasma samples for
bioequivalence and pharmacokinetics studies.
Abstract: A graph G is fractional k-covered if for each edge e of
G, there exists a fractional k-factor h, such that h(e) = 1. If k = 2,
then a fractional k-covered graph is called a fractional 2-covered
graph. The binding number bind(G) is defined as follows,
bind(G) = min{|NG(X)|
|X|
: ├ÿ = X Ôèå V (G),NG(X) = V (G)}.
In this paper, it is proved that G is fractional 2-covered if δ(G) ≥ 4
and bind(G) > 5
3 .
Abstract: The radius-of-curvature (ROC) defines the degree of
curvature along the centerline of a roadway whereby a travelling
vehicle must follow. Roadway designs must encompass ROC in
mitigating the cost of earthwork associated with construction while
also allowing vehicles to travel at maximum allowable design speeds.
Thus, a road will tend to follow natural topography where possible,
but curvature must also be optimized to permit fast, but safe vehicle
speeds. The more severe the curvature of the road, the slower the
permissible vehicle speed. For route planning, whether for urban
settings, emergency operations, or even parcel delivery, ROC is a
necessary attribute of road arcs for computing travel time.
It is extremely rare for a geo-spatial database to contain ROC. This
paper will present a procedure and mathematical algorithm to
calculate and assign ROC to a segment pair and/or polyline.
Abstract: The Beshar River is one of the most important aquatic ecosystems in the upstream of the Karun watershed in south of Iran which is affected by point and non point pollutant sources . This study was done in order to evaluate the effects of pollutants activities on the water quality of the Beshar river and its aquatic ecosystems. This river is approximately 190 km in length and situated at the geographical positions of 51° 20´ to 51° 48´ E and 30° 18´ to 30° 52´ N it is one of the most important aquatic ecosystems of Kohkiloye and Boyerahmad province in south-west Iran. In this research project, five study stations were selected to examine water pollution in the Beshar River systems. Human activity is now one of the most important factors affecting on hydrology and water quality of the Beshar river. Humans use large amounts of resources to sustain various standards of living, although measures of sustainability are highly variable depending on how sustainability is defined. The Beshar river ecosystems are particularly sensitive and vulnerable to human activities. Therefore, to determine the impact of human activities on the Beshar River, the most important water quality parameters such as pH, dissolve oxygen (DO), Biological Oxygen Demand (BOD5), Total Dissolve Solids (TDS), Nitrates (NO3-N) and Phosphates (PO4) were estimated at the five stations. As the results show, the most important pollution index parameters such as BOD5, NO3 and PO4 increase and DO and pH decrease according to human activities (P
Abstract: The research was designed to examine the relationship
between the development of muscle fatigue and the effect it has on
sport performance, specifically during maximal voluntary
contraction. This kind of this investigation using simultaneous
electrophysiological and mechanical recordings, based on advanced
mathematical processing, allows us to get parameters, and indexes in
a short time, and finally, the mapping to use for the thorough
investigation of the muscle contraction force, respectively the
phenomenon of local muscle fatigue, both for athletes and other
subjects.
Abstract: Attack graph is an integral part of modeling the
overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine
what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at
the whole network, which makes the process of AGG complex and
non-scalable. In this paper, we propose a new approach which is
simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications
among all the atomic domains. Our approach simplifies the process
of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic
domains which makes the process of AGG scalable.
Abstract: This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.
Abstract: Paleoclimate was reconstructed by the clay mineral
assemblages of shale units of Pabdeh (Paleocene- Oligocene), Gurpi
(Upper Cretaceous), Kazhdumi (Albian-Cenomanian) and Gadvan
(Aptian-Neocomian) formations in the Bangestan anticline. To
compare with clay minerals assemblages in these formations,
selected samples also taken from available formations in drilled wells
in Ahvaz, Marun, Karanj, and Parsi oil fields. Collected samples
prepared using standard clay mineral methodology. They were
treated as normal, glycolated and heated oriented glass slides. Their
identification was made on X-Ray diffractographs. Illite % varies
from 8 to 36. Illite quantity increased from Pabdeh to Gurpi
Formation. This may be due to dominant dry climate. Kaolinite is in
range of 12-49%. Its variation style in different formations could be a
marker of climate changes from wet to dry which is supported by the
lithological changes. Chlorite (4-28%) can also be detected in those
samples without any kaolinite. Mixed layer minerals as the mixture
of illite-chlorite and illite-vermiculite-montmorillonite are varied
from 6 to 36%, decreased during Kazhdumi deposition from the base
to the top. This result may be according to decreasing of illite
leaching process. Vermiculite was also determined in very less
quantity and found in those units without kaolinite. Montmorillonite
varies from 8 to 43%, and its presence is due to terrestrial
depositional condition. Stratigraphical documents is also supported
this idea that clay mineral distribution is a function of the climate
changes. It seems, thus, the present results can be indicated a possible
procedure for ancient climate changes evaluation.
Abstract: The performance of ground to deep space optical
communication systems is degraded by distortion of the beam as it
propagates through the turbulent atmosphere. Turbulence causes
fluctuations in the intensity of the received signal which ultimately
affects the acquisition time required to acquire and locate the spaceborne
target using narrow laser beam. In this paper, performance of
free-space optical (FSO) communication system in atmospheric
turbulence has been analyzed in terms of acquisition time for
coherent and non-coherent modulation schemes. Numerical results
presented in graphical and tabular forms show that the acquisition
time increases with the increase in turbulence level. This is true for
both schemes. The BPSK has lowest acquisition time among all
schemes. In non-coherent schemes, M-PPM performs better than the
other schemes. With the increase in M, acquisition time becomes
lower, but at the cost of increase in system complexity.
Abstract: Finding suitable non-supersingular elliptic curves for
pairing-based cryptosystems becomes an important issue for the
modern public-key cryptography after the proposition of id-based
encryption scheme and short signature scheme. In previous work
different algorithms have been proposed for finding such elliptic
curves when embedding degree k ∈ {3, 4, 6} and cofactor h ∈ {1, 2, 3,
4, 5}. In this paper a new method is presented to find more
non-supersingular elliptic curves for pairing-based cryptosystems with
general embedding degree k and large values of cofactor h. In
addition, some effective parameters of these non-supersingular elliptic
curves are provided in this paper.
Abstract: Success is a European project that will implement several clean transport offers in three European cities and evaluate the environmental impacts. The goal of these measures is to improve urban mobility or the displacement of residents inside cities. For e.g. park and ride, electric vehicles, hybrid bus and bike sharing etc. A list of 28 criteria and 60 measures has been established for evaluation of these transport projects. The evaluation criteria can be grouped into: Transport, environment, social, economic and fuel consumption. This article proposes a decision support system based that encapsulates a hybrid approach based on fuzzy logic, multicriteria analysis and belief theory for the evaluation of impacts of urban mobility solutions. A web-based tool called DeSSIA (Decision Support System for Impacts Assessment) has been developed that treats complex data. The tool has several functionalities starting from data integration (import of data), evaluation of projects and finishes by graphical display of results. The tool development is based on the concept of MVC (Model, View, and Controller). The MVC is a conception model adapted to the creation of software's which impose separation between data, their treatment and presentation. Effort is laid on the ergonomic aspects of the application. It has codes compatible with the latest norms (XHTML, CSS) and has been validated by W3C (World Wide Web Consortium). The main ergonomic aspect focuses on the usability of the application, ease of learning and adoption. By the usage of technologies such as AJAX (XML and Java Script asynchrones), the application is more rapid and convivial. The positive points of our approach are that it treats heterogeneous data (qualitative, quantitative) from various information sources (human experts, survey, sensors, model etc.).
Abstract: Motion capture devices have been utilized in
producing several contents, such as movies and video games. However,
since motion capture devices are expensive and inconvenient to use,
motions segmented from captured data was recycled and synthesized
to utilize it in another contents, but the motions were generally
segmented by contents producers in manual. Therefore, automatic
motion segmentation is recently getting a lot of attentions. Previous
approaches are divided into on-line and off-line, where on-line
approaches segment motions based on similarities between
neighboring frames and off-line approaches segment motions by
capturing the global characteristics in feature space. In this paper, we
propose a graph-based high-level motion segmentation method. Since
high-level motions consist of several repeated frames within temporal
distances, we consider all similarities among all frames within the
temporal distance. This is achieved by constructing a graph, where
each vertex represents a frame and the edges between the frames are
weighted by their similarity. Then, normalized cuts algorithm is used
to partition the constructed graph into several sub-graphs by globally
finding minimum cuts. In the experiments, the results using the
proposed method showed better performance than PCA-based method
in on-line and GMM-based method in off-line, as the proposed method
globally segment motions from the graph constructed based
similarities between neighboring frames as well as similarities among
all frames within temporal distances.
Abstract: Evapotranspiration (ET) is a major component of the hydrologic cycle and its accurate estimation is essential for hydrological studies. In past, various estimation methods have been developed for different climatological data, and the accuracy of these methods varies with climatic conditions. Reference crop evapotranspiration (ET0) is a key variable in procedures established for estimating evapotranspiration rates of agricultural crops. Values of ET0 are used with crop coefficients for many aspects of irrigation and water resources planning and management. Numerous methods are used for estimating ET0. As per internationally accepted procedures outlined in the United Nations Food and Agriculture Organization-s Irrigation and Drainage Paper No. 56(FAO-56), use of Penman-Monteith equation is recommended for computing ET0 from ground based climatological observations. In the present study, seven methods have been selected for performance evaluation. User friendly software has been developed using programming language visual basic. The visual basic has ability to create graphical environment using less coding. For given data availability the developed software estimates reference evapotranspiration for any given area and period for which data is available. The accuracy of the software has been checked by the examples given in FAO-56.The developed software is a user friendly tool for estimating ET0 under different data availability and climatic conditions.
Abstract: Given bipartite graphs H1 and H2, the bipartite Ramsey number b(H1;H2) is the smallest integer b such that any subgraph G of the complete bipartite graph Kb,b, either G contains a copy of H1 or its complement relative to Kb,b contains a copy of H2. It is known that b(K2,2;K2,2) = 5, b(K2,3;K2,3) = 9, b(K2,4;K2,4) = 14 and b(K3,3;K3,3) = 17. In this paper we study the case that both H1 and H2 are even cycles, prove that b(C2m;C2n) ≥ m + n - 1 for m = n, and b(C2m;C6) = m + 2 for m ≥ 4.
Abstract: In this study, we present a new and fast algorithm for lung segmentation using CTA images. This process is quite important especially at lung vessel segmentation, detection of pulmonary emboly, finding nodules or segmentation of airways. Applied method has been carried out at four steps. At first step, images have been applied optimal threshold. At the second one, the subsegment vessels, which have a place in lung region and which are in small dimension, have been removed. At the third one, identifying and segmentation of lungs and airway edges have been carried out. Lastly, by throwing away the airway, lung segmentation has been presented.
Abstract: The commercial white tyres are usually used for forklifts in food and medicine industries. Conventionally, silica is used as reinforcement in the tyres. However, the adhesion between silica particles and rubber is remarkably poor. To improve the problem of adhesion and hence enhance wear resistance, modification of silica surface is one of the solutions. In this work, the natural rubber compound blending with polyisoprene-coated silica prepared by admicellar polymerization technique was studied to compare with the natural rubber compound of unmodified silica. The surface characterization of modified silica was also examined by SEM, FTIR, and TGA. The results show that polyisoprene-coated silica/natural rubber compound gave better overall mechanical properties, especially wear resistance with the improvement of the adhesion between silica and natural rubber matrix that can be seen in the SEM micrograph.
Abstract: This paper analysis performance of disbursement
procedure of public works project in Thailand. The results of
research were summarised based on contracts, submitted invoice,
inspection dated, copies of disbursement dated between client and
their main contractor and interviewed with persons involved in
central and local government projects during 1994-2008 in Thailand.
The data collection was to investigate the disbursement procedure
related to performance in disbursement during construction period
(Planned duration of contract against Actual execution date in each
month). A graphical presentation of a duration analysis of the
projects illustrated significant disbursement formation in each
project. It was established that the shortage of staff, the financial
stability of clients, bureaucratic, method of disbursement and
economics situation has play major role on performance of
disbursement to their main contractors.
Abstract: The most important property of the Gene Ontology is
the terms. These control vocabularies are defined to provide
consistent descriptions of gene products that are shareable and
computationally accessible by humans, software agent, or other
machine-readable meta-data. Each term is associated with
information such as definition, synonyms, database references, amino
acid sequences, and relationships to other terms. This information has
made the Gene Ontology broadly applied in microarray and
proteomic analysis. However, the process of searching the terms is
still carried out using traditional approach which is based on keyword
matching. The weaknesses of this approach are: ignoring semantic
relationships between terms, and highly depending on a specialist to
find similar terms. Therefore, this study combines semantic similarity
measure and genetic algorithm to perform a better retrieval process
for searching semantically similar terms. The semantic similarity
measure is used to compute similitude strength between two terms.
Then, the genetic algorithm is employed to perform batch retrievals
and to handle the situation of the large search space of the Gene
Ontology graph. The computational results are presented to show the
effectiveness of the proposed algorithm.
Abstract: Electronic banking must be secure and easy to use and
many banks heavily advertise an apparent of 100% secure system
which is contestable in many points. In this work, an alternative
approach to the design of e-banking system, through a new solution
for user authentication and security with digital certificate called
LumaCert is introduced. The certificate applies new algorithm for
asymmetric encryption by utilizing two mathematical operators
called Pentors and UltraPentors. The public and private key in this
algorithm represent a quadruple of parameters which are directly
dependent from the above mentioned operators. The strength of the
algorithm resides in the inability to find the respective Pentor and
UltraPentor operator from the mentioned parameters.