Abstract: Issues relating to the destructive phenomena that can
damage people and goods have returned to the centre of debate in
Italy with the increase in catastrophic episodes in recent years in a
country which is highly vulnerable to hydrological risk.
Environmental factors and geological and geomorphological
territorial characteristics play an important role in determining the
level of vulnerability and the natural tendency to risk. However, a
territory has also been subjected to the requirements of and
transformations of society and this brings other relevant factors. The
reasons for the increase in destructive phenomena are often to be
found in the territorial development models adopted. Stewardship of
the landscape and management of risk are related issues. This study aims to summarize the most relevant elements about
this connection and at the same time to clarify the role of
environmental risk assessment as a tool to aid in the sustainable
management of landscape. Finally, the study reflects on how regional
and urban planners deal with environmental risk and which aspects
should be monitored in order to adopt responsible and useful
interventions.
Abstract: Opportunistic Routing (OR) increases the
transmission reliability and network throughput. Traditional routing
protocols preselects one or more predetermined nodes before
transmission starts and uses a predetermined neighbor to forward a
packet in each hop. The opportunistic routing overcomes the
drawback of unreliable wireless transmission by broadcasting one
transmission can be overheard by manifold neighbors. The first
cooperation-optimal protocol for Multirate OR (COMO) used to
achieve social efficiency and prevent the selfish behavior of the
nodes. The novel link-correlation-aware OR improves the
performance by exploiting the miscellaneous low correlated forward
links. Context aware Adaptive OR (CAOR) uses active suppression
mechanism to reduce packet duplication. The Context-aware OR
(COR) can provide efficient routing in mobile networks. By using
Cooperative Opportunistic Routing in Mobile Ad hoc Networks
(CORMAN), the problem of opportunistic data transfer can be
tackled. While comparing to all the protocols, COMO is the best as it
achieves social efficiency and prevents the selfish behavior of the
nodes.
Abstract: Routing in adhoc networks is a challenge as nodes are
mobile, and links are constantly created and broken. Present ondemand
adhoc routing algorithms initiate route discovery after a path
breaks, incurring significant cost to detect disconnection and
establish a new route. Specifically, when a path is about to be broken,
the source is warned of the likelihood of a disconnection. The source
then initiates path discovery early, avoiding disconnection totally. A
path is considered about to break when link availability decreases.
This study modifies Adhoc On-demand Multipath Distance Vector
routing (AOMDV) so that route handoff occurs through link
availability estimation.
Abstract: In this paper, a novel fuzzy approach is developed
while solving the Dynamic Routing and Wavelength Assignment
(DRWA) problem in optical networks with Wavelength Division
Multiplexing (WDM). In this work, the effect of nonlinear and linear
impairments such as Four Wave Mixing (FWM) and amplifier
spontaneous emission (ASE) noise are incorporated respectively. The
novel algorithm incorporates fuzzy logic controller (FLC) to reduce
the effect of FWM noise and ASE noise on a requested lightpath
referred in this work as FWM aware fuzzy dynamic routing and
wavelength assignment algorithm. The FWM crosstalk products and
the static FWM noise power per link are pre computed in order to
reduce the set up time of a requested lightpath, and stored in an
offline database. These are retrieved during the setting up of a
lightpath and evaluated online taking the dynamic parameters like
cost of the links into consideration.
Abstract: Hydrogels are three-dimensional, hydrophilic,
polymeric networks composed of homopolymers or copolymers and
are insoluble in water due to the presence of chemical or physical
cross-links. When hydrogels come in contact with aqueous solutions,
they can effectively sorb and retain the dissolved substances,
depending on the nature of the monomeric units comprising the
hydrogel. For this reason, hydrogels have been proposed in several
studies as water purification agents. At the present work anionic
hydrogels bearing negatively charged –COO- groups were prepared
and investigated. These gels are based on sodium acrylate (ANa),
either homopolymerized (poly(sodiumacrylate), PANa) or
copolymerized (P(DMAM-co-ANa)) with N,N Dimethylacrylamide
(DMAM). The hydrogels were used to extract some model organic
dyes from water. It is found that cationic dyes are strongly sorbed and
retained by the hydrogels, while sorption of anionic dyes was
negligible. In all cases it was found that both maximum sorption
capacity and equilibrium binding constant varied from one dye to the
other depending on the chemical structure of the dye, the presence of
functional chemical groups and the hydrophobic-hydrophilic balance.
Finally, the nonionic hydrogel of the homopolymer poly(N,Ndimethylacrylamide),
PDMAM, was also used for reasons of
comparison.
Abstract: A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure. Routing is an important issue which impacts network performance. As MANETs lack central administration and prior organization, their security concerns are different from those of conventional networks. Wireless links make MANETs susceptible to attacks. This study proposes a new trust mechanism to mitigate wormhole attack in MANETs. Different optimization techniques find available optimal path from source to destination. This study extends trust and reputation to an improved link quality and channel utilization based Adhoc Ondemand Multipath Distance Vector (AOMDV). Differential Evolution (DE) is used for optimization.
Abstract: This paper contributes to the ongoing debate as to the relevance of translation studies to professional practitioners. It exposes the various misconceptions permeating the links between theory and practice in the translation landscape in the Arab World. It is a thesis of this paper that specialization in translation should be redefined; taking account of the fact, that specialized knowledge alone is neither crucial nor sufficient in technical translation. It should be tested against the readability of the translated text, the appropriateness of its style and the usability of its content by endusers to carry out their intended tasks. The paper also proposes a preliminary model to establish a working link between theory and practice from the perspective of professional trainers and practitioners, calling for the latter to participate in the production of knowledge in a systematic fashion. While this proposal is driven by a rather intuitive conviction, a research line is needed to specify the methodological moves to establish the mediation strategies that would relate the components in the model of knowledge transfer proposed in this paper.
Abstract: Although there has been a growing interest in the
hybrid free-space optical link and radio frequency FSO/RF
communication system, the current literature is limited to results
obtained in moderate or cold environment. In this paper, using a soft
switching approach, we investigate the effect of weather
inhomogeneities on the strength of turbulence hence the channel
refractive index under Qatar harsh environment and their influence
on the hybrid FSO/RF availability. In this approach, either FSO/RF
or simultaneous or none of them can be active. Based on soft
switching approach and a finite state Markov Chain (FSMC) process,
we model the channel fading for the two links and derive a
mathematical expression for the outage probability of the hybrid
system. Then, we evaluate the behavior of the hybrid FSO/RF under
hazy and harsh weather. Results show that the FSO/RF soft switching
renders the system outage probability less than that of each link
individually. A soft switching algorithm is being implemented on
FPGAs using Raptor code interfaced to the two terminals of a
1Gbps/100 Mbps FSO/RF hybrid system, the first being implemented
in the region. Experimental results are compared to the above
simulation results.
Abstract: Passive control methods can be utilized to build
earthquake resistant structures, and also to strengthen the vulnerable
ones. In this paper, we studied the effect of this system in increasing
the ductility and energy dissipation and also modeled the behavior of
this type of eccentric bracing, and compared the hysteresis diagram
of the modeled samples with the laboratory samples. We studied
several samples of frames with vertical shear-links in order to assess
the behavior of this type of eccentric bracing. Each of these samples
was modeled in finite element software ANSYS 9.0, and was
analyzed under the static cyclic loading. It was found that vertical
shear-links have a more stable hysteresis loops. Another analysis
showed that using honeycomb beams as the horizontal beam along
with steel reinforcement has no negative effect on the hysteresis
behavior of the sample.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: Mobile Adhoc Networks (MANETs) are
infrastructure-less, dynamic network of collections of wireless mobile
nodes communicating with each other without any centralized
authority. A MANET is a mobile device of interconnections through
wireless links, forming a dynamic topology. Routing protocols have a
big role in data transmission across a network. Routing protocols,
two major classifications are unipath and multipath. This study
evaluates performance of an on-demand multipath routing protocol
named Adhoc On-demand Multipath Distance Vector routing
(AOMDV). This study proposes Energy Aware AOMDV (EAAOMDV)
an extension of AOMDV which decreases energy
consumed on a route.
Abstract: The environmental, cultural, social, and technological
changes have led higher education institutes to question their
traditional roles. Many declarations and frameworks highlight the
importance of fulfilling social responsibility of higher education
institutes. The study aims at developing a framework of university
social responsibility and sustainability (USR&S) with focus on South
Valley University (SVU) as a case study of Egyptian Universities.
The study used meetings with 12 vice deans of community services
and environmental affairs on social responsibility and environmental
issues. The proposed framework integrates social responsibility with
strategic management through the establishment and maintenance of
the vision, mission, values, goals and management systems;
elaboration of policies; provision of actions; evaluation of services
and development of social collaboration with stakeholders to meet
current and future needs of the community and environment. The
framework links between different stakeholders internally and
externally using communication and reporting tools. The results show
that SVU integrates social responsibility and sustainability in its
strategic plans. It has policies and actions however fragmented and
lack of appropriate structure and budgeting. The proposed framework
could be valuable for researchers and decision makers of the
Egyptian Universities. The study proposed recommendations and
highlighted building on the results and conducting future research.
Abstract: The Trustworthy link failure recovery algorithm is
introduced in this paper, to provide the forwarding continuity even
with compound link failures. The ephemeral failures are common in
IP networks and it also has some proposals based on local rerouting.
To ensure forwarding continuity, we are introducing the compound
link failure recovery algorithm, even with compound link failures.
For forwarding the information, each packet carries a blacklist, which
is a min set of failed links encountered along its path, and the next
hop is chosen by excluding the blacklisted links. Our proposed
method describes how it can be applied to ensure forwarding to all
reachable destinations in case of any two or more link or node
failures in the network. After simulating with NS2 contains lot of
samples proved that the proposed protocol achieves exceptional
concert even under elevated node mobility using Trustworthy link
Failure Recovery Algorithm.
Abstract: A new steganographic method via the use of numeric
data on public websites with a self-authentication capability is
proposed. The proposed technique transforms a secret message into
partial shares by Shamir’s (k, n)-threshold secret sharing scheme with
n = k + 1. The generated k+1 partial shares then are embedded into the
numeric items to be disguised as part of the website’s numeric content,
yielding the stego numeric content. Afterward, a receiver links to the
website and extracts every k shares among the k+1 ones from the stego
numeric content to compute k+1 copies of the secret, and the
phenomenon of value consistency of the computed k+1 copies is taken
as an evidence to determine whether the extracted message is authentic
or not, attaining the goal of self-authentication of the extracted secret
message. Experimental results and discussions are provided to show
the feasibility and effectiveness of the proposed method.
Abstract: The aim of this exploratory research is to understand
further how organisations can evaluate their activities, which
generate knowledge creation, to meet changing stakeholder
expectations. A Scale of Knowledge (SoK) Framework is proposed
which links knowledge management and organisational activities to
changing stakeholder expectations. The framework was informed by
the knowledge management literature, as well as empirical work
conducted via a single case study of a multi-site hospital organisation
in Saudi Arabia. Eight in-depth semi-structured interviews were
conducted with managers from across the organisation regarding
current and future stakeholder expectations, organisational
strategy/activities and knowledge management. Data were analysed
using thematic analysis and a hierarchical value map technique to
identify activities that can produce further knowledge and
consequently impact on how stakeholder expectations are met.
The SoK Framework developed may be useful to practitioners as
an analytical aid to determine if current organisational activities
produce organisational knowledge which helps them meet
(increasingly higher levels of) stakeholder expectations. The
limitations of the research and avenues for future development of the
proposed framework are discussed.
Abstract: In order to avoid self-collision of space manipulators
during operation process, a real-time detection method is proposed in
this paper. The manipulator is fitted into a cylinder-enveloping
surface, and then, a kind of detection algorithm of collision between
cylinders is analyzed. The collision model of space manipulator
self-links can be detected by using this algorithm in real-time detection
during the operation process. To ensure security of the operation, a
safety threshold is designed. The simulation and experiment results
verify the effectiveness of the proposed algorithm for a 7-DOF space
manipulator.
Abstract: The web’s increased popularity has included a huge
amount of information, due to which automated web page
classification systems are essential to improve search engines’
performance. Web pages have many features like HTML or XML
tags, hyperlinks, URLs and text contents which can be considered
during an automated classification process. It is known that Webpage
classification is enhanced by hyperlinks as it reflects Web page
linkages. The aim of this study is to reduce the number of features to
be used to improve the accuracy of the classification of web pages. In
this paper, a novel feature selection method using an improved
Particle Swarm Optimization (PSO) using principle of evolution is
proposed. The extracted features were tested on the WebKB dataset
using a parallel Neural Network to reduce the computational cost.
Abstract: Wireless mesh networking is rapidly gaining in
popularity with a variety of users: from municipalities to enterprises,
from telecom service providers to public safety and military
organizations. This increasing popularity is based on two basic facts:
ease of deployment and increase in network capacity expressed in
bandwidth per footage; WMNs do not rely on any fixed
infrastructure. Many efforts have been used to maximizing
throughput of the network in a multi-channel multi-radio wireless
mesh network. Current approaches are purely based on either static or
dynamic channel allocation approaches. In this paper, we use a
hybrid multichannel multi radio wireless mesh networking
architecture, where static and dynamic interfaces are built in the
nodes. Dynamic Adaptive Channel Allocation protocol (DACA), it
considers optimization for both throughput and delay in the channel
allocation. The assignment of the channel has been allocated to be codependent
with the routing problem in the wireless mesh network and
that should be based on passage flow on every link. Temporal and
spatial relationship rises to re compute the channel assignment every
time when the pattern changes in mesh network, channel assignment
algorithms assign channels in network. In this paper a computing
path which captures the available path bandwidth is the proposed
information and the proficient routing protocol based on the new path
which provides both static and dynamic links. The consistency
property guarantees that each node makes an appropriate packet
forwarding decision and balancing the control usage of the network,
so that a data packet will traverse through the right path.
Abstract: Given the importance of ports as links in the global
supply chains and because they are key elements to induce
competitiveness in their hinterlands, the number of studies devoted to
port governance, management and operations has increased in the last
decades. Some of these studies address the port governance model as
an element to improve coordination among the actors of the portlogistics
chain and to generate a better port performance. In this
context, the present study analyzes the governance of Port of Santos
through individual interviews with port managers, based on a
conceptual model that considers the key dimensions associated with
port governance. The results reinforce the usefulness of the applied
model and highlight some existing improvement opportunities in the
port studied.
Abstract: Nowadays social media information, such as news,
links, images, or VDOs, is shared extensively. However, the
effectiveness of disseminating information through social media
lacks in quality: less fact checking, more biases, and several rumors.
Many researchers have investigated about credibility on Twitter, but
there is no the research report about credibility information on
Facebook. This paper proposes features for measuring credibility on
Facebook information. We developed the system for credibility on
Facebook. First, we have developed FB credibility evaluator for
measuring credibility of each post by manual human’s labelling. We
then collected the training data for creating a model using Support
Vector Machine (SVM). Secondly, we developed a chrome extension
of FB credibility for Facebook users to evaluate the credibility of
each post. Based on the usage analysis of our FB credibility chrome
extension, about 81% of users’ responses agree with suggested
credibility automatically computed by the proposed system.