OALib Journal期刊

ISSN: 2333-9721




9 ( 1 )

2018 ( 81 )

2017 ( 234 )

2016 ( 258 )


匹配条件: “Jamal Mehr Ali Pour” ,找到相关结果约19486条。
Removal of cyanide by eggshell as low-cost adsorbent
Ghorban Asgari,AbdolMotaleb Seid Mohammadi,Amir Shabanlo,Jamal Mehr Ali Pour
Pajouhan Scientific Journal , 2013,
Abstract: Introduction: Cyanides as carbon-nitrogen radicals are very toxic compounds and highly harmful to humans and aquatic organisms. The efficacy of eggshells (ES) was investigated in this research work as an adsorbent for the elimination of cyanide from polluted streams.Material and Methods: In this experimental study, the capability of ES to adsorb cyanide ions was conducted using a series of batch tests in a shaker-incubator instrument. For each batch run, 100 mL of solution containing a known initial concentration of cyanide and with the preferred level of pH was shacked. The effects of selected parameters such as pH (3-11), reaction time (5–60 min) cyanide concentrations (50–150 mg/L) and the adsorbent dosage (0.25–2 g/L) were investigated on the removal cyanide as a target contaminate. Chemical composition ES were analyzed using a Philips model XL-30 scanning electron microscope (SEM) with energy-dispersive X-ray microanalysis (EDX). The specific surface and pore size distributions of ES were measured via Brunauer-Emmett-Teller (BET) isotherm and Barrett-Joyner-Halenda (BJH) methods using a Micrometrics particle size analyzer. The concentration of cyanide in solution before and after treatment was determined using the titrimetric method as described in the standard methods.Results: Analysis of the ES component using the EDX technique showed that the main part of it consisted of calcium and its other components were magnesium, iron, aluminum and silicate. The experimental data showed that the maximum cyanide removal occurred at pH of 11, adsorbent dose (0.5 g/L ) and 40 min contact time. The kinetic evaluation indicated that the pseudo-second-order kinetic had the best fit to the experimental results predicting a chemisorption process. The equilibrium adsorption of cyanide onto ES was well represented by the Langmuir equation.Conclusion: As a result, ES as waste materials was revealed as a very efficient and low-cost adsorbent and a promising option for removing cyanide from industrial wastewaters.
A New Steganography Method Based on the Complex Pixels  [PDF]
Amin Hashemi Pour, Ali Payandeh
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.33025
Abstract: Today steganography has attracted the attention of many researchers. In this paper, we propose a new steganography method for secure Data communication on half tone pictures. Using the halftone pictures improve the security and capacity. In this method, the complexity of every pixel in picture is computed, then a neibourhood is defined to compute the complexity of every pixel, and then the complexity of every pixel is computed in the neibourhood. Placing data in the monotonous areas of halftone can explain the presence of hidden data. A method has been represented that surveys the position of every pixel neibouring others and prevents including in monotonous areas. If that was a complicated one, steganography bit after stonehalf will be hidden after scrolling the whole, the process of spreading error will be done. Performing the suggested method improves the quality of placing picture and increases its security.
Candidates for non-zero Betti numbers of monomial ideals
Ali Akbar Yazdan Pour
Mathematics , 2015,
Abstract: Let $I$ be a monomial ideal in the polynomial ring $S$ generated by elements of degree at most $d$. In this paper, it is shown that, if the $i$-th syzygy of $I$ has no element of degrees $j, \ldots, j+(d-1)$ (where $j \geq i+d$), then $(i+1)$-syzygy of $I$ does not have any element of degree $j+d$. Then we give several applications of this result, including an alternative proof for Green-Lazarsfeld index of the edge ideals of graphs as well as an alternative proof for Fr\"oberg's theorem on classification of square-free monomial ideals generated in degree two with linear resolution. Among all, we describe the possible indices $i, j$ for which $I$ may have non-zero Betti numbers $\beta_{i,j}$.
Synthesis, Spectroscopic, and in Vitro Cytotoxic Studies of Fatty Acid Analogues of 2, 6-Diisopropylphenol  [PDF]
Ali Mohammad, Fauzia B. Faruqi, Jamal Mustafa
Journal of Cancer Therapy (JCT) , 2010, DOI: 10.4236/jct.2010.13020
Abstract: This paper represents the synthesis, spectral analysis and in-vitro cytotoxic studies of some novel fatty acid anti-cancer conjugates of 2, 6-diisopropylphenol (propofol). Propofol is a potent intravenous hypnotic agent which is widely used for the induction and maintenance of anesthesia and for sedation in the intensive care unit. Propofol also possess anti-cancer properties in addition to its sedative effects. Cytotoxicity of all the synthesized compounds was examined against human HeLa cancer cell lines. The anti-cancer screening of these novel drug candidates suggest that all of them reported here may be useful for the treatment of cancer as all of them exhibited significant anticancer activity against human HeLa cancer cell lines. The results indicate that these novel drug candidates might represent a new class of anticancer agents.
Ant-Crypto, a Cryptographer for Data Encryption Standard
Salabat Khan,Armughan Ali,Mehr Yahya Durrani
International Journal of Computer Science Issues , 2013,
Abstract: Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryptography. This paper presents a novel swarm based attack called Ant-Crypto (Ant-Cryptographer) for the cryptanalysis of Data Encryption Standard (DES). Ant-Crypto is based on Binary Ant Colony Optimization (BACO) i.e. a binary search space based directed graph is modeled for efficiently searching the optimum result (an original encryption key, in our case). The reason that why evolutionary techniques are becoming attractive is because of the inapplicability of traditional techniques and brute force attacks against feistel ciphers due to their inherent structure based on high nonlinearity and low autocorrelation. Ant-Crypto uses a known-plaintext attack to recover the secret key of DES which is required to break/ decipher the secret messages. Ant-Crypto iteratively searches for the secret key while generating several candidate optimum keys that are guessed across different runs on the basis of routes completed by ants. These optimum keys are then used to find each individual bit of the 56 bit secret key used during encryption by DES. Ant-Crypto is compared with some other state of the art evolutionary based attacks i.e. Genetic Algorithm and Comprehensive Binary Particle Swarm Optimization. The experimental results show that Ant-Crypto is an effective evolutionary attack against DES and can deduce large number of valuable bits as compared to other evolutionary algorithms; both in terms of time and space complexity.
Leptin Receptor in Ram Epididymal Spermatozoa  [PDF]
Mohammad Roostaei-Ali Mehr, Rasool Motamedi-Mojdehi, Reza Rajabi-Toustani
Engineering (ENG) , 2012, DOI: 10.4236/eng.2012.410B031
This experiment was designed to investigate leptin receptors (Ob-R and Ob-Rb) mRNA in ram epididymal spermatozoa by RT-PCR. Ten testes were obtained from abattoir and epididymal spermatozoa recovery was performed. To purify spermatozoa, motile sperm were isolated by the swim-up procedure. Total RNA was isolated from epididymal spermatozoa and placental cotyledon, as a positive control, and then they were purified. Specific bands (98 and 308 bp) for Ob-R and Ob-Rb were detected after RT-PCR in both epididymal spermatozoa and placental cotyledon. We may conclude that Ob-R and Ob-Rb mRNA are present in ram epididymal spermatozoa and leptin perhaps exerts physiological effects, as already demonstrated in human.
Human Identification Based on Gait
Ali Pour Yazdanpanah,Karim Faez
Majlesi Journal of Electrical Engineering , 2008, DOI: 10.1234/mjee.v2i3.86
Abstract: Analysis of person’s behavioral and psychological features like Gait or the manner of walking, allows human identification process to be able to extract the gait information from a video sequence of different persons at a distance and recognize the specific person. This paper proposes a fast gait recognition algorithm based on the averaged silhouette of person. Three important novelties in our proposed algorithm cause that it gives a better performance than previous methods in both recognition rate and computational speed.1- frame sampling method, which causes the algorithm computational time, without any change in recognition rate, decrease to about half. 2- New method for background estimation, which gives an acceptable estimate of the background. 3- Local thresholding method, which gives more complete and more accurate binary silhouette pictures. Experimental results demonstrate that our proposed algorithm accuracy is superior to other previous methods in the gait recognition application.
Impact of Enforcement and Co-Management on Compliance Behavior of Fishermen
Jamal Ali,Hussin Abdullah
International Journal of Economics and Finance , 2010, DOI: 10.5539/ijef.v2n4p113
Abstract: The purpose of this paper is to examine the factors believed to affect compliance behavior with regard to the zoning regulation of 284 Peninsular Malaysian fishermen. Frequent violation of regulations will have an impact on the demand for protection, and therefore lead to greater expenditure on law enforcement. The theoretical models of compliance behavior tested include the basic deterrent model, which focuses on the certainty and severity of penalty as a key determinant of compliance, and models which integrate economic theory with theories of social psychology to account for legitimacy, deterrence and other motivations expected to influence an individuals’ decisions on whether to comply. Policy makers who want to improve compliance face two choices: the first choice is whether to focus only on building staff capacity to detect and correct non-compliance; and the second choice is a combination of the strategies in building staff capacity and at the same time building commitment among fishermen so that they will comply with the regulations. The results of the empirical analysis provide evidence of the relationship between co-management strategies on the one hand, and types of fishermen on the other. These findings imply that co-management activities should be strengthened to complement the deterrent strategies in the management of fishery resources in Peninsular Malaysia.
Luminance-based Embedding Approach for Color Image Watermarking
Jamal Ali Hussein
International Journal of Image, Graphics and Signal Processing , 2012,
Abstract: In this paper a new non-blind luminance-based color image watermarking technique is proposed. The original 512×512 color host image is divided into 8×8 blocks, and each block is converted to YCbCr color space. A 32×32 monochrome image is used as a watermark and embedded in the selected blocks of the original image. The selected blocks must have log-average luminance that is closer to the log-average luminance of the image. DCT transform is applied to the Y component of each selected block. Each four values of the watermark image are embedded into each selected block of the host image. The watermark values are embedded in the first four AC coefficients leaving the DC value unchanged. The watermark is extracted from the watermarked image using the same selected blocks and DCT coefficients that have been used in the embedding process. This approach is tested against variety of attacks and filters: such as, highpass, lowpass, Gaussian, median, salt and peppers, and JPEG compression. The proposed approach shows a great ability to preserve the watermark against these attacks.
Primary and Delayed Repair and Nerve Grafting for Treatment of Cut Median and Ulnar Nerves
Mohammad-Ali Mohseni,Jaafar Soleyman Pour,Jaafar Ganj Pour
Pakistan Journal of Biological Sciences , 2010,
Abstract: Traumatic cutting of peripheral nerves of median and ulnar in forearm and wrist can cause disablating sensory and motor disorders in patients’ hands. We conducted the present study to compare the results of three surgical methods for repair of injured median and ulnar nerves. We studied 85 patients aged 12-59 years (average, 34±18 years) with 105 cut median and ulnar nerves at forearm and wrist presenting to Tabriz Shohada hospital from 1994 to 2003. The patients followed for 2-10 years. Sixty patients (65 nerves) underwent primary repair, 16 (25 nerves) treated with delayed method and 9 (15 nerves) received nerve graft. Success was obtained in all patients underwent primary repair. The excellent results were common in younger patients. Of 65 nerves (60 patients) repaired by primary method, 25 had excellent result. Of 16 patients 25 nerves (16 patients) underwent delayed repair, 7 was unsuccessful. Of 15 nerves (9 patients) underwent delayed repair, 5 was unsuccessful. It is concluded that the recovery following primary repair was faster than other methods. For reaching excellent results in repairing peripheral nerves, it is important to considering all rules needed for repairing cut peripheral nerves, as well as accurate evaluation and correct repair of injured surrounding soft tissue such as tendons and their synovium and injured vessels.

Copyright © 2008-2017 Open Access Library. All rights reserved.