Abstract: Adolescents in Northern Uganda are at risk of teenage
pregnancies, unsafe abortions and sexually transmitted infections
(STIs). There is silence on sex both at home and school. This cross
sectional descriptive analytical study interviews a random sample of
827 students and 13 teachers on knowledge, perception and
acceptability to a comprehensive adolescent sexual and reproductive
health education in “O” and “A” level secondary schools in Gulu
District. Quantitative data was analyzed using SPSS 16.0. Directed
content analysis of themes of transcribed qualitative data was
conducted manually for common codes, sub-categories and
categories. Of the 827 students; 54.3% (449) reported being in a
sexual relationship especially those aged 15-17 years. Majority
96.1% (807) supported the teaching of a comprehensive ASRHE,
citing no negative impact 71.5% (601). Majority 81.6% (686) agreed
that such education could help prevention of STIs, abortions and
teenage pregnancies, and that it should be taught by health workers
69.0% (580). Majority 76.6% (203) reported that ASRHE was not
currently being taught in their schools. Students had low knowledge
levels and misconceptions about ASRHE. ASRHE was highly
acceptable though not being emphasized; its success in school
settings requires multidisciplinary culturally sensitive approaches
amongst which health workers should be frontiers.
Abstract: The wisest economic decision of United States in the
20th century was establishing the favorable international monetary
system, and capturing the leadership position in it. This decision gave
economic hegemony to the US for the next more than 7 decades. The
continuation of this hegemony till the next decade seems difficult as
the US economy is under continuous streams of recessions since
2007. On the other hand, Chinese economy is progressing with a
very fast speed and is estimated to pass the US economy till 2025, in
various aspects. Will the US be able to continue its leadership in the
IMS? Will China replace US in the international monetary system?
The answers to these questions have been explored by comparing the
economic competitiveness of US and China, with respect to each
other. The paper concludes that the change in global economic
environment will compel US to share the leadership of international
monetary system with China. This sharing will solve most problems
of the current IMS, but will also birth some new problems.
Abstract: Wavelet transforms are multiresolution
decompositions that can be used to analyze signals and images.
Image compression is one of major applications of wavelet
transforms in image processing. It is considered as one of the most
powerful methods that provides a high compression ratio. However,
its implementation is very time-consuming. At the other hand,
parallel computing technologies are an efficient method for image
compression using wavelets. In this paper, we propose a parallel
wavelet compression algorithm based on quadtrees. We implement
the algorithm using MatlabMPI (a parallel, message passing version
of Matlab), and compute its isoefficiency function, and show that it is
scalable. Our experimental results confirm the efficiency of the
algorithm also.
Abstract: Understanding how precipitation inter-annually
changes and its implication in agricultural drought and production change in winter wheat (Triticum aestivum L.) growth season is critical for crop production in China. MODIS Temperature-Vegetation Dryness Index (TVDI) and daily mean precipitation time series for the main growth season(Feb. to May) of winter wheat from 2000 to 2010
were used to analyze the distribution of trends of precipitation,
agricultural drought and winter wheat yield change respectively, and
relationships between them in North China region(Huang-huai-hai
region, HHH region), China. The results indicated that the trend of
precipitation in HHH region past 11 years was increasing, which had
induced generally corresponding decreasing trend of agricultural
drought and increasing trend of wheat yield, while the trend of drought
was spatially diverse. The study could provide a basis for agricultural
drought research during winter wheat season in HHH region under the
ground of climate change.
Abstract: Among all mechanical joining processes, welding has
been employed for its advantage in design flexibility, cost saving,
reduced overall weight and enhanced structural performance.
However, for structures made of relatively thin components, welding
can introduce significant buckling distortion which causes loss of
dimensional control, structural integrity and increased fabrication
costs. Different parameters can affect buckling behavior of welded
thin structures such as, heat input, welding sequence, dimension of
structure. In this work, a 3-D thermo elastic-viscoplastic finite
element analysis technique is applied to evaluate the effect of shell
dimensions on buckling behavior and entropy generation of welded
thin shells. Also, in the present work, the approximated longitudinal
transient stresses which produced in each time step, is applied to the
3D-eigenvalue analysis to ratify predicted buckling time and
corresponding eigenmode. Besides, the possibility of buckling
prediction by entropy generation at each time is investigated and it is
found that one can predict time of buckling with drawing entropy
generation versus out of plane deformation. The results of finite
element analysis show that the length, span and thickness of welded
thin shells affect the number of local buckling, mode shape of global
buckling and post-buckling behavior of welded thin shells.
Abstract: If there exists a nonempty, proper subset S of the set of all (n+1)(n+2)/2 inertias such that S Ôèå i(A) is sufficient for any n×n zero-nonzero pattern A to be inertially arbitrary, then S is called a critical set of inertias for zero-nonzero patterns of order n. If no proper subset of S is a critical set, then S is called a minimal critical set of inertias. In [Kim, Olesky and Driessche, Critical sets of inertias for matrix patterns, Linear and Multilinear Algebra, 57 (3) (2009) 293-306], identifying all minimal critical sets of inertias for n×n zero-nonzero patterns with n ≥ 3 and the minimum cardinality of such a set are posed as two open questions by Kim, Olesky and Driessche. In this note, the minimum cardinality of all critical sets of inertias for 4 × 4 irreducible zero-nonzero patterns is identified.
Abstract: Acute disseminated encephalomyelitis (ADEM) has
been reported to develop after a hymenoptera sting, but its
pathogenesis is not known in detail. Myelin basic protein (MBP)-
specific T cells have been detected in the blood of patients with
ADEM, and a proportion of these patients develop multiple sclerosis
(MS). In an attempt to understand the mechanisms underlying
ADEM, molecular mimicry between hymenoptera venom peptides
and the human immunodominant MBP peptide was scrutinized,
based on the sequence and structural similarities, whether it was the
root of the disease. The results suggest that the three wasp venom
peptides have low sequence homology with the human
immunodominant MBP residues 85-99. Structural similarity analysis
among the three venom peptides and the MS-related HLA-DR2b
(DRA, DRB1*1501)-associated immunodominant MHC
binding/TCR contact residues 88-93, VVHFFK showed that
hyaluronidase residues 7-12, phospholipase A1 residues 98-103, and
antigen 5 residues 109-114 showed a high degree of similarity
83.3%, 100%, and 83.3% respectively. In conclusion, some wasp
venom peptides, particularly phospholipase A1, may potentially act
as the molecular motifs of the human 3HLA-DR2b-associated
immunodominant MBP88-93, and possibly present a mechanism for
induction of wasp sting-associated ADEM.
Abstract: This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS), coupled with the decoy system to perform intrusion prevention. When NIDS detects an activity of intrusions, it will signal a redirection module to redirect all malicious traffics to attack the decoy system instead, and hence the production system is protected and safe. However, in a normal situation, traffic will be simply forwarded to the production system as usual. Furthermore, we assess the performance of the model with various bandwidths, packet sizes and inter-attack intervals (attacking frequencies).
Abstract: Today, the preferences and participation of the TD groups such as the elderly and disabled is still lacking in decision-making of transportation planning, and their reactions to certain type of policies are not well known. Thus, a clear methodology is needed. This study aimed to develop a method to extract the preferences of the disabled to be used in the policy-making stage that can also guide to future estimations. The method utilizes the combination of cluster analysis and data filtering using the data of the Arao city (Japan). The method is a process that follows: defining the TD group by the cluster analysis tool, their travel preferences in tabular form from the household surveys by policy variableimpact pairs, zones, and by trip purposes, and the final outcome is the preference probabilities of the disabled. The preferences vary by trip purpose; for the work trips, accessibility and transit system quality policies with the accompanying impacts of modal shifts towards public mode use as well as the decreasing travel costs, and the trip rate increase; for the social trips, the same accessibility and transit system policies leading to the same mode shift impact, together with the travel quality policy area leading to trip rate increase. These results explain the policies to focus and can be used in scenario generation in models, or any other planning purpose as decision support tool.
Abstract: Service identification is one of the main activities in
the modeling of a service-oriented solution, and therefore errors
made during identification can flow down through detailed design
and implementation activities that may necessitate multiple
iterations, especially in building composite applications. Different
strategies exist for how to identify candidate services that each of
them has its own benefits and trade offs. The approach presented in
this paper proposes a selective identification of services approach,
based on in depth business process analysis coupled with use cases
and existing assets analysis and goal service modeling. This article
clearly emphasizes the key activities need for the analysis and
service identification to build a optimized service oriented
architecture. In contrast to other approaches this article mentions
some best practices and steps, wherever appropriate, to point out the
vagueness involved in service identification.
Abstract: A considerable progress has been achieved in transient
stability analysis (TSA) with various FACTS controllers. But, all
these controllers are associated with single transmission line. This
paper is intended to discuss a new approach i.e. a multi-line FACTS
controller which is interline power flow controller (IPFC) for TSA of
a multi-machine power system network. A mathematical model of
IPFC, termed as power injection model (PIM) presented and this
model is incorporated in Newton-Raphson (NR) power flow
algorithm. Then, the reduced admittance matrix of a multi-machine
power system network for a three phase fault without and with IPFC
is obtained which is required to draw the machine swing curves. A
general approach based on L-index has also been discussed to find
the best location of IPFC to reduce the proximity to instability of a
power system. Numerical results are carried out on two test systems
namely, 6-bus and 11-bus systems. A program in MATLAB has
been written to plot the variation of generator rotor angle and speed
difference curves without and with IPFC for TSA and also a simple
approach has been presented to evaluate critical clearing time for test
systems. The results obtained without and with IPFC are compared
and discussed.
Abstract: Cognitive radio devices have been considered as a key technology for next-generation of wireless communication. These devices in the context of IEEE 802.11 standards and IEEE 802.16 standards, can opportunistically utilize the wireless spectrum to achieve better user performance and improve the overall spectrumutilization efficiency, mainly in the unlicensed 5 GHz bands. However, opportunistic use of wireless spectrum creates news problems such as peaceful coexistence with other wireless technologies, such as the radiolocation systems, as well as understanding the influence of interference that each of these networks can create. In this paper, we suggest a dynamic access model that considerably reduces this interference and allows efficiency and fairness use of the wireless spectrum.
Abstract: In this paper, we present an algorithm for computing a
Schur factorization of a real nonsymmetric matrix with ordered diagonal
blocks such that upper left blocks contains the largest magnitude
eigenvalues. Especially in case of multiple eigenvalues, when matrix
is non diagonalizable, we construct an invariant subspaces with few
additional tricks which are heuristic and numerical results shows the
stability and accuracy of the algorithm.
Abstract: This paper presents the theoretical background and
the real implementation of an automated computer system to
introduce machine vision in flower, fruit and vegetable processing
for recollection, cutting, packaging, classification, or fumigation
tasks. The considerations and implementation issues presented in this
work can be applied to a wide range of varieties of flowers, fruits and
vegetables, although some of them are especially relevant due to the
great amount of units that are manipulated and processed each year
over the world. The computer vision algorithms developed in this
work are shown in detail, and can be easily extended to other
applications. A special attention is given to the electromagnetic
compatibility in order to avoid noisy images. Furthermore, real
experimentation has been carried out in order to validate the
developed application. In particular, the tests show that the method
has good robustness and high success percentage in the object
characterization.
Abstract: This paper proposes an auto-classification algorithm
of Web pages using Data mining techniques. We consider the
problem of discovering association rules between terms in a set of
Web pages belonging to a category in a search engine database, and
present an auto-classification algorithm for solving this problem that
are fundamentally based on Apriori algorithm. The proposed
technique has two phases. The first phase is a training phase where
human experts determines the categories of different Web pages, and
the supervised Data mining algorithm will combine these categories
with appropriate weighted index terms according to the highest
supported rules among the most frequent words. The second phase is
the categorization phase where a web crawler will crawl through the
World Wide Web to build a database categorized according to the
result of the data mining approach. This database contains URLs and
their categories.
Abstract: The B'enard-Marangoni thermal instability problem for
a viscoelastic Jeffreys- fluid layer with internal heat generation is
investigated. The fluid layer is bounded above by a realistic free
deformable surface and by a plane surface below. Our analysis
shows that while the internal heat generation and the relaxation time
both destabilize the fluid layer, its stability may be enhanced by an
increased retardation time.
Abstract: Presented herein is an assessment of current nonlinear
static procedures (NSPs) for seismic evaluation of bucklingrestrained
braced frames (BRBFs) which have become a favorable
lateral-force resisting system for earthquake resistant buildings. The
bias and accuracy of modal, improved modal pushover analysis
(MPA, IMPA) and mass proportional pushover (MPP) procedures
are comparatively investigated when they are applied to BRBF
buildings subjected to two sets of strong ground motions. The
assessment is based on a comparison of seismic displacement
demands such as target roof displacements, peak floor/roof
displacements and inter-story drifts. The NSP estimates are compared
to 'exact' results from nonlinear response history analysis (NLRHA).
The response statistics presented show that the MPP
procedure tends to significantly overestimate seismic demands of
lower stories of tall buildings considered in this study while MPA
and IMPA procedures provide reasonably accurate results in
estimating maximum inter-story drift over all stories of studied BRBF
systems.
Abstract: India recognizes the personal laws of the various
religious communities that reside in the country. At the same time all
the institutions of the state in India are committed to the value of
secularism. This paper has been developed on the basis of a case
study that indicates the dynamics of religion in the working of the
lower judiciary in India. Majority of the commentary on religion and
the judiciary has focused on debates surrounding the existence and
application of personal laws. This paper, through a case study in the
lower judiciary, makes an attempt to examine whether the interface
between religion and the judiciary goes beyond personal laws.
The first part of this paper explains the history and application of
personal laws in social, political and legal contexts in India. The
second part examines the case study located in two courts of first
instance, following into the third part which provides an analysis of
the empirical evidence. The fourth part focuses on preliminary
observations about why there is a hesitancy to speak about religion in
relation to the working of the judicial system.
Abstract: A new interface circuit for capacitive sensor is
presented. This paper presents the design and simulation of soil
moisture capacitive sensor interface circuit based on phase
differential technique. The circuit has been designed and fabricated
using MIMOS- 0.35"m CMOS technology. Simulation and test
results show linear characteristic from 36 – 52 degree phase
difference, representing 0 – 100% in soil moisture level. Test result
shows the circuit has sensitivity of 0.79mV/0.10 phase difference,
translating into resolution of 10% soil moisture level.
Abstract: In order to meet the limits imposed on automotive
emissions, engine control systems are required to constrain air/fuel
ratio (AFR) in a narrow band around the stoichiometric value, due to
the strong decay of catalyst efficiency in case of rich or lean mixture.
This paper presents a model of a sample spark ignition engine and
demonstrates Simulink-s capabilities to model an internal combustion
engine from the throttle to the crankshaft output. We used welldefined
physical principles supplemented, where appropriate, with
empirical relationships that describe the system-s dynamic behavior
without introducing unnecessary complexity. We also presents a PID
tuning method that uses an adaptive fuzzy system to model the
relationship between the controller gains and the target output
response, with the response specification set by desired percent
overshoot and settling time. The adaptive fuzzy based input-output
model is then used to tune on-line the PID gains for different
response specifications. Experimental results demonstrate that better
performance can be achieved with adaptive fuzzy tuning relative to
similar alternative control strategies. The actual response
specifications with adaptive fuzzy matched the desired response
specifications.