Abstract: In the paper, the performance of quasi-synchronous
CDMA (QS-CDMA) system, which can allow an increased timing
error in synchronized access, is discussed. Average BER performance
of the system is analyzed in the condition of different access timing
error and different asynchronous users by simulation in AWGN
channel. The results show that QS-CDMA system is shown to have
great performance gain over the asynchronous system when access
timing error is within a few chips and asynchronous users is tolerable.
However, with access timing error increasing and asynchronous users
increasing, the performance of QS-CDMA will degrade. Also, we can
determine the number of tolerable asynchronous users for different
access timing error by simulation figures.
Abstract: Many supervised induction algorithms require discrete
data, even while real data often comes in a discrete
and continuous formats. Quality discretization of continuous
attributes is an important problem that has effects on speed,
accuracy and understandability of the induction models. Usually,
discretization and other types of statistical processes are applied
to subsets of the population as the entire population is practically
inaccessible. For this reason we argue that the discretization
performed on a sample of the population is only an estimate of
the entire population. Most of the existing discretization methods,
partition the attribute range into two or several intervals using
a single or a set of cut points. In this paper, we introduce a
technique by using resampling (such as bootstrap) to generate
a set of candidate discretization points and thus, improving the
discretization quality by providing a better estimation towards
the entire population. Thus, the goal of this paper is to observe
whether the resampling technique can lead to better discretization
points, which opens up a new paradigm to construction of
soft decision trees.
Abstract: There is a general feeling that Internet crime is an
advanced type of crime that has not yet infiltrated developing
countries like Uganda. The carefree nature of the Internet in which
anybody publishes anything at anytime poses a serious security threat
for any nation. Unfortunately, there are no formal records about this
type of crime for Uganda. Could this mean that it does not exist
there? The author conducted an independent research to ascertain
whether cyber crimes have affected people in Uganda and if so, to
discover where they are reported. This paper highlights the findings.
Abstract: In this paper a numerical simulation of electric and
hydrodynamic fields distribution in an electrofilter for dielectric
liquids cell is made. The simulation is made with the purpose to
determine the trajectory of particles that moves under the action of
external force in an electric and hydrodynamic field created inside of
an electrofilter for dielectric liquids. Particle trajectory is analyzed
for a dielectric liquid-solid particles suspension.
Abstract: The medical studies often require different methods
for parameters selection, as a second step of processing, after the
database-s designing and filling with information. One common
task is the selection of fields that act as risk factors using wellknown
methods, in order to find the most relevant risk factors and
to establish a possible hierarchy between them. Different methods
are available in this purpose, one of the most known being the
binary logistic regression. We will present the mathematical
principles of this method and a practical example of using it in the
analysis of the influence of 10 different psychiatric diagnostics
over 4 different types of offences (in a database made from 289
psychiatric patients involved in different types of offences).
Finally, we will make some observations about the relation
between the risk factors hierarchy established through binary
logistic regression and the individual risks, as well as the results of
Chi-squared test. We will show that the hierarchy built using the
binary logistic regression doesn-t agree with the direct order of risk
factors, even if it was naturally to assume this hypothesis as being
always true.
Abstract: A 3D simulation study for an incompressible
slip flow around a spherical aerosol particle was performed.
The full Navier-Stokes equations were solved and the velocity
jump at the gas-particle interface was treated numerically by
imposition of the slip boundary condition. Analytical solution
to the Stokesian slip flow past a spherical particle was used as
a benchmark for code verification, and excellent agreement
was achieved. The Simulation results showed that in addition
to the Knudsen number, the Reynolds number affects the slip
correction factor. Thus, the Cunningham-based slip corrections
must be augmented by the inclusion of the effect of
Reynolds number for application to Lagrangian tracking of
fine particles. A new expression for the slip correction factor
as a function of both Knudsen number and Reynolds number
was developed.
Abstract: Attachment theory focuses on the bond that develops between child and caretaker and the consequences that this bond has on the childs future relationships. Adolescents attempt to define their identity by experiencing various risky behaviors. The first aim of the study was whether risk taking behavior differs according to attachment styles. The second was to examine risk taking behavior differences according to gender. The third aim of this study was to examine attachment X gender interaction effect for risk taking behavior. And final was to investigate attachment styles differences according to gender. Data were collected from 218 participants (114 female and 104 male) who are university students. The results of this study showed that attachment styles differentiated by risk taking behavior and males had higher risk taking score than females. It was also found out that there was significant attachment X gender interaction effect for risk taking behavior. And finally, the results showed that attachment styles differentiated according to gender.KeywordsAttachment style, risk taking
Abstract: The study was carried out to gather and identify
medicinal plants their curative effects and the part of them which is
used from the reservation area of Miankaleh. The region under study
has an area of 68800 hectares situated 12 kilometers north of the city
of Behshahr and northwest of the city of Gorgan. Results obtained
showed that out of a total of 43 families, 125 genera, and 155 species
found in the region, 33 families, 52 genera and 61 species (39% of all
the species) belonged to medicinal plants, among which the class
Asteraceae with 6 species and the class Chenopodiaceae with 5
species had the most medicinal species. The most used parts of the
plants were the leaves with 31%, the whole plants with 19%, and the
roots with 15%.
Abstract: The aim of this study is to investigate the kinematics of undulatory elongated fish swimming against a velocity flow. We perform the experiments on European eel Anguilla Anguilla swimming in a hydrodynamic re-circulating tank with the velocity flow fixed at 0.2 m/s. We find that the undulating shape of overall eel body changes when it swims slantwise from the flow direction, by comparison to axial undulation shape. We examine this kinematics and we propose a general equation describing the lateral position of undulation body taking into account the direction of the eel-s swimming.
Abstract: The Chiu-s method which generates a Takagi-Sugeno Fuzzy Inference System (FIS) is a method of fuzzy rules extraction. The rules output is a linear function of inputs. In addition, these rules are not explicit for the expert. In this paper, we develop a method which generates Mamdani FIS, where the rules output is fuzzy. The method proceeds in two steps: first, it uses the subtractive clustering principle to estimate both the number of clusters and the initial locations of a cluster centers. Each obtained cluster corresponds to a Mamdani fuzzy rule. Then, it optimizes the fuzzy model parameters by applying a genetic algorithm. This method is illustrated on a traffic network management application. We suggest also a Mamdani fuzzy rules generation method, where the expert wants to classify the output variables in some fuzzy predefined classes.
Abstract: Throughout the world, the Islamic way of banking and
financing is increasing. The same trend is also visible in Pakistan, where the Islamic banking sector is increasing in size and volume
each year. The question immediately arises as why the Pakistanis patronize the Islamic banking system? This study was carried out to
find whether following the Islamic rules in finance is the main factor for such selection or whether other factors such as customer service,
location, banking hour, physical facilities of the bank etc also have
importance. The study was carried by distributing questionnaire and
200 responses were collected from the clients of Islamic banks. The result showed that the service quality and other factors are as
important as following the Islamic rules for finance to retain old ustomers and catch new customers. The result is important and
Islamic banks can take actions accordingly to look after both the factors
Abstract: This article is based on the technique which is called
Discrete Parameter Tracking (DPT). First introduced by A. A. Azab
[8] which is applicable for less order reference model. The order of
the reference model is (n-l) and n is the number of the adjustable
parameters in the physical plant.
The technique utilizes a modified gradient method [9] where the
knowledge of the exact order of the nonadaptive system is not
required, so, as to eliminate the identification problem. The
applicability of the mentioned technique (DPT) was examined
through the solution of several problems.
This article introduces the solution of a third order system with
three adjustable parameters, controlled according to second order
reference model. The adjustable parameters have great initial error
which represent condition.
Computer simulations for the solution and analysis are provided
to demonstrate the simplicity and feasibility of the technique.
Abstract: The purpose of this paper is to investigate the
durability of cement mortar in presence of Rice Husk Ash (RHA).
The strength and durability of mortar with different replacement
level (0%, 10%, 15%, 20%, 25% and 30%) of Ordinary Portland
Cement (OPC) by RHA is investigated here. RHA was
manufactured from an uncontrolled burning process. Test samples
were prepared with river sand of FM 2.73. Samples were kept in
controlled environment up to test time. The results show that
addition of RHA was shown better results for 20% replacement
level than OPC at 90 days. In durability test all samples passed for
20 cycles except 25% and 30% replacement level.
Abstract: In this work, an organic compound 5,10,15,20-
Tetrakis(3,5-di-tertbutylphenyl)porphyrinatocopper(II) (TDTBPPCu)
is studied as an active material for thin film electronic devices. To
investigate the electrical properties of TDTBPPCu, junction of
TDTBPPCu with heavily doped n-Si and Al is fabricated.
TDTBPPCu film was sandwiched between Al and n-Si electrodes.
Various electrical parameters of TDTBPPCu are determined. The
current-voltage characteristics of the junction are nonlinear,
asymmetric and show rectification behavior, which gives the clue of
formation of depletion region. This behavior indicates the potential
of TDTBPPCu for electronics applications. The current-voltage and
capacitance-voltage techniques are used to find the different
electronic parameters.
Abstract: This paper describes the two stage control using a disturbance observer and a Kalman filter. The system feedback uses the estimated state when it controls the speed. After the change-over point, its feedback uses the controlled plant output when it controls the position. To change the system continually, a change-over point has to be determined pertinently, and the controlled plant input has to be adjusted by the addition of the appropriate value. The proposed method has noise-reduction effect. It changes the system continually, even if the controlled plant identification has the error. Although the conventional method needs a speed sensor, the proposed method does not need it. The proposed method has a superior robustness compared with the conventional two stage control.
Abstract: This report focus on phase behavior of polyethylene glycol (PEG)4000/ phosphate/ guanidine hydrochloride/ water system at different guanidine hydrochloride concentrations and pH. The binodal of the systems was displaced toward higher concentrations of the components with increasing guanidine hydrochloride concentrations. The partition coefficient of guanidine hydrochloride was near unity and increased with decreasing pH and increasing PEG/salt (%w/w) ratio.
Abstract: This paper presents the H-ARQ techniques comparison for OFDM systems with a new family of non-binary LDPC codes which has been developed within the EU FP7 DAVINCI project. The punctured NB-LDPC codes have been used in a simulated model of the transmission system. The link level performance has been evaluated in terms of spectral efficiency, codeword error rate and average number of retransmissions. The NB-LDPC codes can be easily and effective implemented with different methods of the retransmission needed if correct decoding of a codeword failed. Here the Optimal Symbol Selection method is proposed as a Chase Combining technique.
Abstract: An ontology is widely used in many kinds of applications as a knowledge representation tool for domain knowledge. However, even though an ontology schema is well prepared by domain experts, it is tedious and cost-intensive to add instances into the ontology. The most confident and trust-worthy way to add instances into the ontology is to gather instances from tables in the related Web pages. In automatic populating of instances, the primary task is to find the most proper concept among all possible concepts within the ontology for a given table. This paper proposes a novel method for this problem by defining the similarity between the table and the concept using the overlap of their properties. According to a series of experiments, the proposed method achieves 76.98% of accuracy. This implies that the proposed method is a plausible way for automatic ontology population from Web tables.
Abstract: Multi-agent communication of Semantic Web
information cannot be realized without the need to reason with
ontology and agent locations. This is because for an agent to be able to
reason with an external semantic web ontology, it must know where
and how to access to that ontology. Similarly, for an agent to be able to
communicate with another agent, it must know where and how to send
a message to that agent. In this paper we propose a framework of an
agent which can reason with ontology and agent locations in order to
perform reasoning with multiple distributed ontologies and perform
communication with other agents on the semantic web. The agent
framework and its communication mechanism are formulated entirely
in meta-logic.
Abstract: The special constraints of sensor networks impose a
number of technical challenges for employing them. In this review,
we study the issues and existing protocols in three areas: coverage
and routing. We present two types of coverage problems: to
determine the minimum number of sensor nodes that need to perform
active sensing in order to monitor a certain area; and to decide the
quality of service that can be provided by a given sensor network.
While most routing protocols in sensor networks are data-centric,
there are other types of routing protocols as well, such as
hierarchical, location-based, and QoS-aware. We describe and
compare several protocols in each group. We present several multipath
routing protocols and single-path with local repair routing
protocols, which are proposed for recovering from sensor node
crashes. We also discuss some transport layer schemes for reliable
data transmission in lossy wireless channels.