1,456 research outputs found
RELIABILITY OF PROGRAMMING SOFTWARE: COMPARISON OF SHAZAM AND SAS
Research Methods/ Statistical Methods,
Steganography in Arabic Text Using Full Diacritics Text
The need for secure communications has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper we propose a new Steganogaphy algorithm for Arabic text. The algorithm employs some Arabic language characteristics, which represent as small vowel letters. Arabic Diacritics is an optional property for any text and usually is not popularly used. Many algorithms tried to employ this property to hide data in Arabic text. In our method, we use this property to hide data and reduce the probability of suspicions hiding. Our approach uses a performance metric involves the file size before and after adding Diacritics and ability to hide data with being suspicious
Asymptotic Methods for Metal Oxide Semiconductor Field Effect Transistor Modeling
The behavior of metal oxide semiconductor field effect transistors (MOSFETs) with small aspect ratio and large doping levels is analyzed using formal perturbation techniques. Specifically, the influence of interface layers in the potential on the averaged channel conductivity is closely examined. The interface and internal layers that occur in the potential are resolved in the limit of large doping using the method of matched asymptotic expansions. This approach, together with other asymptotic techniques, provides both a pointwise description of the state variables as well as lumped current-voltage relations that vary uniformly across the various bias regimes. These current-voltage relations are derived for a variable doping model respresenting a particular class of devices
Characterizations of Soil Collapsibility: Effect of Salts Dilution
Collapsibility of soils is the large change in volume of soil upon saturation or wetting. This change may or may not be the result of the application of additional load. Soil at a construction site may not always be suitable for supporting structures such as buildings, bridges, highways, and dams. For example, if soil is placed in a certain none desire density, a large settlement will occur either due to loading or wetting of soil deposits. Hence, a collapse will occur which will create a large subsidence or a sinkhole.In this study, soil samples of CL-ML soil were modified by adding different amounts of brine. The main goal of which was to examine the effect of brine presence on the collapse potential of the soil. Soil index properties, compaction characteristics, and a collapse potential were evaluated according to ASTM standards. The test includes Atterberg's limit, Harvard miniature compaction, and double oedometer tests.It has been shown that brine additive has pronounced effect on the Atterberg’s limits; it is clearly shown that as the amount of brine increases both liquid limit and plastic limit decrease. Compaction curve characteristics of soil were altered by the presence of brine, the maximum dry density, obtained using Harvard miniature device, increased as brine percentage increased, however, the optimum moisture content showed substantial decrease with increasing the amount of brine.
DETERMINANTS OF AGRICULTURAL ECONOMIC FACULTY SALARIES: A QUARTER OF A CENTURY LATER
Factors influencing the salaries of university agricultural economists were examined and compared to previous work. Results suggest the impact of publication output has remained relatively constant for the past 25 years, while other factors like grantsmanship have changed significantly. Additional analyses suggest significant impacts of appointment apportionment and Ph.D. programs.Teaching/Communication/Extension/Profession,
Low complexity interference aware distributed resource allocation for multi-cell OFDMA cooperative relay networks
In this paper we focus on the subcarrier allocation for the uplink OFDMA based cooperative relay networks. Multiple cells were considered, each composed of a single base station (destination), multiple amplify and forward (AF) relay stations and multiple subscriber stations (sources). The effects of inter-cell interference (ICI) have been considered to optimize the subcarrier allocation with low complexity. The optimization problem aims to maximize the sum rate of all sources and at the same time maintain the fairness among them. Full channel state information (CSI) is assumed to be available at the base station. In the proposed algorithm the subcarrier allocation is performed in three steps; firstly the subcarriers are allocated to the Relay Stations (RSs) by which the received ICI on each RS is minimized. Then, the pre-allocated subcarriers are allocated to subscribers to achieve their individual rate requirements. Finally the remaining subcarriers are allocated to subscribers with the best channel condition to maximize the total sum of their data rates. The results show that the proposed algorithm significantly reduces the complexity with almost the same achievable rate of the optimal allocation in a single cell case. In case of multi-cell, the proposed algorithm outperforms the conventional algorithm in terms of total network achievable data rate and overall network complexity. ©2010 IEEE
Coupling of a high-energy excitation to superconducting quasiparticles in a cuprate from Coherent Charge Fluctuation Spectroscopy
Dynamical information on spin degrees of freedom of proteins or solids can be
obtained by Nuclear Magnetic Resonance (NMR) and Electron Spin Resonance (ESR).
A technique with similar versatility for charge degrees of freedom and their
ultrafast correlations could move forward the understanding of systems like
unconventional superconductors. By perturbing the superconducting state in a
high-Tc cuprate using a femtosecond laser pulse, we generate coherent
oscillations of the Cooper pair condensate which can be described by an NMR/ESR
formalism. The oscillations are detected by transient broad-band reflectivity
and found to resonate at the typical scale of Mott physics (2.6 eV), suggesting
the existence of a non-retarded contribution to the pairing interaction, as in
unconventional (non Migdal-Eliashberg) theories.Comment: Accepted for publication in the Proceedings of the National Academy
of Sciences of the U.S.A. (PNAS
Steganography in Text by Merge ZWC and Space Character
Secure communication is essential for data confidentiality and integrity especially with the massive growth of the internet and mobile communication. Steganography is an art for data hiding by embedding the data to different objects such as text, images, audio and video objects. In this paper we propose a new algorithm for data hiding using Text Steganography in Arabic language. Our algorithm uses the Zero Width Character from Unicode (U+200B) and space character to pass bits before and after space. Main advantage of our algorithm file format will not be change and this will decrease the ability of Stegoanalysis to observe hidden data. Moreover ZWC algorithm can be applied to any language (ASCII, Unicode)
Novel Steganography Over HTML Code Process
Different security strategies have been developed to protect the transfer of information between users. This has become especially important after the tremendous growth of internet use. Encryption techniques convert readable data into a ciphered form. Other techniques hide the message in another file, and some powerful techniques combine hiding and encryption concepts
- …
