Abstract: As various mobile sensing technologies, remote
control and ubiquitous infrastructure are developing and expectations
on quality of life are increasing, a lot of researches and developments
on home network technologies and services are actively on going,
Until now, we have focused on how to provide users with high-level
home network services, while not many researches on home network
security for guaranteeing safety are progressing. So, in this paper, we
propose an access control model specific to home network that
provides various kinds of users with home network services up one-s
characteristics and features, and protects home network systems from
illegal/unnecessary accesses or intrusions.
Abstract: In medical therapy, laser has been widely used to conduct cosmetic, tumor and other treatments. During the process of laser irradiation, there may be thermal damage caused by excessive laser exposure. Thus, the establishment of a complete thermal analysis model is clinically helpful to physicians in reference data. In this study, porcine liver in place of tissue was subjected to laser irradiation to set up the experimental data considering the explored impact on surface thermal field and thermal damage region under different conditions of power, laser irradiation time, and distance between laser and porcine liver. In the experimental process, the surface temperature distribution of the porcine lever was measured by the infrared thermal imager. In the part of simulation, the bio heat transfer Pennes-s equation was solved by software SYSWELD applying in welding process. The double ellipsoid function as a laser source term is firstly considered in the prediction for surface thermal field and internal tissue damage. The simulation results are compared with the experimental data to validate the mathematical model established here in.
Abstract: This article addresses the procedures to validate the Arabic version of Multiple Intelligence Development Assessment Scale (MIDAS). The content validity was examined based on the experts- judgments on the MIDAS-s items in the Arabic version. The content of eleven items in the Arabic version of MIDAS was modified to match the Arabic context. Then a translation from original English version of MIDAS into Arabic language was performed. The reliability of the Arabic MIDAS was calculated based on test and retest method and found to be 0.85 for the overall MIDAS and for the different subscales ranging between 0.78 - 0.87. The examination of construct validity for the overall Arabic MIDAS and its subscales was established by using Winsteps program version 6 based on Rasch model in order to fit the items into the Arabic context. The findings indicated that, the eight subscales in Arabic version of MIDAS scale have a unidimensionality, and the total number of kept items in the overall scale is 108 items.
Abstract: In recent years, strategic alliances have taken
increasing importance as a means to control competitive forces and to
enter into new markets. Joint ventures are one of the most frequently
used contractual forms in strategic alliances. There are various
motivations for cooperation between two or more firms e.g.,
accessing to technical know-how, accessing to financial resources
and managing risks. The firms must know about these motivations to
encourage for establishing joint venture. So, it is important for
managers to understand about these motives. On the other hand, the
cooperation section is one of the most effective parts in each country.
In this way, our study identifies goals of joint venture between
cooperative manufacturing firms, and prioritizes those using
TOPSIS1. The results show that the most important of joint venture
goals are: accessing to managerial know-how, sharing total capital
investment.
Abstract: This article deals with the numerical simulation of the
floor heating convector in 3D. Presented convector can operate in
two modes – cooling mode and heating mode. This initial numerical
simulation is focused on cooling mode of the convector. Models with
different temperature of the fins are compared and three various
shapes of the fins are examined as well. The objective of the work is
to predict air flow and heat transfer inside convector for further
optimalization of these devices. For the numerical simulation was
used commercial software Ansys Fluent.
Abstract: Address Matching is an important application of
Geographic Information System (GIS). Prior to Address Matching
working, obtaining X,Y coordinates is necessary, which process is
calling Address Geocoding. This study will illustrate the effective
address geocoding process of using household registry database, and
the check system for geocoded address.
Abstract: The study was designed to evaluate the use of low
concentrations of separan flocculent (Less than 3 ppm) on
physicochemical properties of sugar cane juice. Colour, pH, purity,
turbidity, pol, brix, reducing sugars tannins and polyphenols of
crushed cane (green and burned) juice, mixed juice and clarified
juice were studied. The results showed that pol, brix, reducing sugar
and turbidity are higher in crushed cane juice. Clarified burned juice
had low turbidity, reducing sugars, pol and brix but had significantly
lower pH, purity and colour when compared to crushed juice.
Polyphenols of the crushed juice (1.19%) decreased significantly in
the clarified juice to 0.006%. Addition of separan at a concentration
of 0.015 ppm reduced significantly colour, polyphenols and tannins
and reducing sugar compared to the control.
Abstract: The kinetic properties of enzymes are often reported
using the apparent KM and Vmax appropriate to the standard
Michaelis-Menten enzyme. However, this model is inappropriate to
enzymes that have more than one substrate or where the rate
expression does not apply for other reasons. Consequently, it is
desirable to have a means of estimating the appropriate kinetic
parameters from the apparent values of KM and Vmax reported for each
substrate. We provide a means of estimating the range within which
the parameters should lie and apply the method to data for glutamate
dehydrogenase from the nematode parasite of sheep Teladorsagia
circumcincta.
Abstract: This study include the effect of strain and storage
period and their interaction on some quantitative and qualitative traits
and percentages of the egg components in the eggs collected at the
start of production (at age 24 weeks). Eggs were divided into three
storage periods (1, 7 and 14) days under refrigerator temperature (5-
7)0C. Fifty seven eggs obtained randomly from each strain including
Isa Brown and Lohman White. General Linear Model within
SAS programme was used to analyze the collected data
and correlations between the studied traits were calculated for each
strain.Average egg weight (EW), Haugh Unit (HU), yolk index (YI),
yolk % (HP), albumin % (AP) and yolk to albumin ratio (YAR) was
56.629 gm, 87.968 %, 0.493, 22.13%, 67.74% and 32.76
respectively. Egg produced from ISA Brown surpassed those
produced by Lohman White significantly (P
Abstract: In this paper, we establish existence and uniqueness of
solutions for a class of inverse problems of degenerate differential
equations. The main tool is the perturbation theory for linear operators.
Abstract: In this paper the effects of top management commitment on knowledge management activities has been analyzed. This research has been conducted as a case study in an academic environment. The data collection was carried out in the form of semi-structured interview with an interview guide. This study shows the effects of knowledge management strategic plan developing in academia strategic plan on knowledge management success. This paper shows the importance top management commitment factors including strategic plan, communication, and training on knowledge management success in academia. In particular the most important role of Strategic planning in knowledge management success is clarified. This study explores one of the necessary organizational infrastructures of successful implementation of knowledge management. The idea of this research could be applied in the other context especially in the industrial organizations.
Abstract: The paper presents a novel method for the 3D shaping
of different materials using a high-pressure abrasive water jet and a
flat target image. For steering movement process of the jet a principle
similar to raster image way of record and readout was used.
However, respective colors of pixel of such a bitmap are connected
with adequate jet feed rate that causes erosion of material with
adequate depth. Thanks to that innovation, one can observe spatial
imaging of the object. Theoretical basis as well as spatial model of
material shaping and experimental stand including steering program
are presented in. There are also presented methodic and some
experimental erosion results as well as practical example of object-s
bas-relief made of metal.
Abstract: Various security APIs (Application Programming
Interfaces) are being used in a variety of application areas requiring
the information security function. However, these standards are not
compatible, and the developer must use those APIs selectively
depending on the application environment or the programming
language. To resolve this problem, we propose the standard draft of
the information security component, while SSL (Secure Sockets
Layer) using the confidentiality and integrity component interface has
been implemented to verify validity of the standard proposal. The
implemented SSL uses the lower-level SSL component when
establishing the RMI (Remote Method Invocation) communication
between components, as if the security algorithm had been
implemented by adding one more layer on the TCP/IP.
Abstract: This paper is aimed to give an illustration on the
application of Data Envelopment Analysis (DEA) as a tool to assess
Quality Management (QM) efficiency. A variant of DEA, slack based
measure (SBM) is used for this purpose. From this study, it is found
that DEA is suitable to measure QM efficiency and give
improvement suggestions to the inefficient QM.
Abstract: The advent of modern technology shadows its impetus repercussions on successful Legacy systems making them obsolete with time. These systems have evolved the large organizations in major problems in terms of new business requirements, response time, financial depreciation and maintenance. Major difficulty is due to constant system evolution and incomplete, inconsistent and obsolete documents which a legacy system tends to have. The myriad dimensions of these systems can only be explored by incorporating reverse engineering, in this context, is the best method to extract useful artifacts and by exploring these artifacts for reengineering existing legacy systems to meet new requirements of organizations. A case study is conducted on six different type of software systems having source code in different programming languages using the architectural recovery framework.
Abstract: Program slicing is the task of finding all statements in a program that directly or indirectly influence the value of a variable occurrence. The set of statements that can affect the value of a variable at some point in a program is called a program slice. In several software engineering applications, such as program debugging and measuring program cohesion and parallelism, several slices are computed at different program points. In this paper, algorithms are introduced to compute all backward and forward static slices of a computer program by traversing the program representation graph once. The program representation graph used in this paper is called Program Dependence Graph (PDG). We have conducted an experimental comparison study using 25 software modules to show the effectiveness of the introduced algorithm for computing all backward static slices over single-point slicing approaches in computing the parallelism and functional cohesion of program modules. The effectiveness of the algorithm is measured in terms of time execution and number of traversed PDG edges. The comparison study results indicate that using the introduced algorithm considerably saves the slicing time and effort required to measure module parallelism and functional cohesion.
Abstract: Globin superfamily proteins including myoglobin and
hemoglobin, have welcome new members recently, namely,
cytoglobin, neuroglobin and globin X, though their physiological
functions are still to be addressed. Fish are the excellent models for the
study of these globins, but their characteristics have not yet been
discussed to date. In the present study, attempts have been made to
characterize their structural uniqueness by making use of proteomics
approach. This is the first comparative study on the characterization of
globin superfamily proteins from fish.
Abstract: Counting people from a video stream in a noisy environment is a challenging task. This project aims at developing a counting system for transport vehicles, integrated in a video surveillance product. This article presents a method for the detection and tracking of multiple faces in a video by using a model of first and second order local moments. An iterative process is used to estimate the position and shape of multiple faces in images, and to track them. the trajectories are then processed to count people entering and leaving the vehicle.
Abstract: Aggression is a behavior that cannot be approved by
the society. Vandalism which is aggression towards objects is an
action that tends to damage public or personal property. The
behaviors that are described as vandalism can often be observed in
the schools as well. According to Zwier and Vaughan (1)
previous research about the reasons of and precautionary measures
for vandalism in schools can be grouped in three tendency categories:
conservative, liberal and radical. In this context, the main aim of this
study is to discover which ideological tendency of the reasons of
school vandalism is adopted by the teachers and what are their
physical, environmental, school system and societal solutions for
vandalism. A total of 200 teachers participated in this study, and the
mean age was 34.20 years (SD = 6.54). The sample was made up of
109 females and 91 males. For the analysis of the data, SPSS 15.00,
frequency, percentage, and t-test were used. The research showed
that the teachers have tendencies in the order of conservative, liberal
and radical for the reasons of vandalism. The research also showed
that the teachers do not have any tendency for eliminating vandalism
physically and general solutions on the level of society; on the other
hand they mostly adopt a conservative tendency in terms of
precautions against vandalism in the school system. Second most,
they adopt the liberal tendency in terms of precautions against
vandalism in the school system. . It is observed that the findings of
this study are comparable to the existing literature on the subject.
Future studies should be conducted with multiple variants and
bigger sampling.
Abstract: There are various kinds of medical equipment which
requires relatively accurate positional adjustments for successful
treatment. However, patients tend to move without notice during a
certain span of operations. Therefore, it is common practice that
accompanying operators adjust the focus of the equipment. In this
paper, tracking controllers for medical equipment are suggested to
replace the operators. The tracking controllers use AHRS sensor
information to recognize the movements of patients. Sensor fusion is
applied to reducing the error magnitudes through linear Kalman filters.
The image processing of optical markers is included to adjust the
accumulation errors of gyroscope sensor data especially for yaw
angles.
The tracking controller reduces the positional errors between the
current focus of a device and the target position on the body of a
patient. Since the sensing frequencies of AHRS sensors are very high
compared to the physical movements, the control performance is
satisfactory. The typical applications are, for example, ESWT or
rTMS, which have the error ranges of a few centimeters.