Abstract: Acute kidney injury (AKI) is a new worldwide public
health problem. A diagnosis of this disease using creatinine is still a
problem in clinical practice. Therefore, a measurement of biomarkers
responsible for AKI has received much attention in the past couple
years. Cytokine interleukin-18 (IL-18) was reported as one of the
early biomarkers for AKI. The most commonly used method to
detect this biomarker is an immunoassay. This study used a planar
platform to perform an immunoassay using fluorescence for
detection. In this study, anti-IL-18 antibody was immobilized onto a
microscope slide using a covalent binding method. Make-up samples
were diluted at the concentration between 10 to 1000 pg/ml to create
a calibration curve. The precision of the system was determined
using a coefficient of variability (CV), which was found to be less
than 10%. The performance of this immunoassay system was
compared with the measurement from ELISA.
Abstract: How to coordinate the behaviors of the agents through
learning is a challenging problem within multi-agent domains.
Because of its complexity, recent work has focused on how
coordinated strategies can be learned. Here we are interested in using
reinforcement learning techniques to learn the coordinated actions of a
group of agents, without requiring explicit communication among
them. However, traditional reinforcement learning methods are based
on the assumption that the environment can be modeled as Markov
Decision Process, which usually cannot be satisfied when multiple
agents coexist in the same environment. Moreover, to effectively
coordinate each agent-s behavior so as to achieve the goal, it-s
necessary to augment the state of each agent with the information
about other existing agents. Whereas, as the number of agents in a
multiagent environment increases, the state space of each agent grows
exponentially, which will cause the combinational explosion problem.
Profit sharing is one of the reinforcement learning methods that allow
agents to learn effective behaviors from their experiences even within
non-Markovian environments. In this paper, to remedy the drawback
of the original profit sharing approach that needs much memory to
store each state-action pair during the learning process, we firstly
address a kind of on-line rational profit sharing algorithm. Then, we
integrate the advantages of modular learning architecture with on-line
rational profit sharing algorithm, and propose a new modular
reinforcement learning model. The effectiveness of the technique is
demonstrated using the pursuit problem.
Abstract: Long Term Evolution (LTE) is a 4G wireless
broadband technology developed by the Third Generation
Partnership Project (3GPP) release 8, and it's represent the
competitiveness of Universal Mobile Telecommunications System
(UMTS) for the next 10 years and beyond. The concepts for LTE
systems have been introduced in 3GPP release 8, with objective of
high-data-rate, low-latency and packet-optimized radio access
technology. In this paper, performance of different TCP variants
during LTE network investigated. The performance of TCP over
LTE is affected mostly by the links of the wired network and total
bandwidth available at the serving base station. This paper describes
an NS-2 based simulation analysis of TCP-Vegas, TCP-Tahoe, TCPReno,
TCP-Newreno, TCP-SACK, and TCP-FACK, with full
modeling of all traffics of LTE system. The Evaluation of the
network performance with all TCP variants is mainly based on
throughput, average delay and lost packet. The analysis of TCP
performance over LTE ensures that all TCP's have a similar
throughput and the best performance return to TCP-Vegas than other
variants.
Abstract: With the development of virtual communities, there is
an increase in the number of members in Virtual Communities (VCs).
Many join VCs with the objective of sharing their knowledge and
seeking knowledge from others. Despite the eagerness of sharing
knowledge and receiving knowledge through VCs, there is no
standard of assessing ones knowledge sharing capabilities and
prospects of knowledge sharing. This paper developed a vector space
model to assess the knowledge sharing prospect of VC users.
Abstract: In modern telecommunications industry, demand &
supply chain management (DSCM) needs reliable design and
versatile tools to control the material flow. The objective for efficient
DSCM is reducing inventory, lead times and related costs in order to
assure reliable and on-time deliveries from manufacturing units
towards customers. In this paper the multi-rate expert system based
methodology for developing simulation tools that would enable
optimal DSCM for multi region, high volume and high complexity
manufacturing environment was proposed.
Abstract: This paper deals with the modeling and the evaluation of a multiplicative phase noise influence on the bit error ratio in a general space communication system. Our research is focused on systems with multi-state phase shift keying modulation techniques and it turns out, that the phase noise significantly affects the bit error rate, especially for higher signal to noise ratios. These results come from a system model created in Matlab environment and are shown in a form of constellation diagrams and bit error rate dependencies. The change of a user data bit rate is also considered and included into simulation results. Obtained outcomes confirm theoretical presumptions.
Abstract: Network management techniques have long been of
interest to the networking research community. The queue size plays
a critical role for the network performance. The adequate size of the
queue maintains Quality of Service (QoS) requirements within
limited network capacity for as many users as possible. The
appropriate estimation of the queuing model parameters is crucial for
both initial size estimation and during the process of resource
allocation. The accurate resource allocation model for the
management system increases the network utilization. The present
paper demonstrates the results of empirical observation of memory
allocation for packet-based services.
Abstract: Developments in scientific and technical area cause to use new methods and techniques in education, as is the case in all fields. Especially, the internet contributes a variety of new methods to design virtual and real time laboratory applications in education. In this study, a real time virtual laboratory is designed and implemented for analog and digital communications laboratory experiments by using Lab VIEW program for Marmara University Electronics-Communication Department. In this application, students can access the virtual laboratory web site and perform their experiments without any limitation of time and location so as the students can observe the signals by changing the parameters of the experiment and evaluate the results.
Abstract: Towards the end of 19th century, the discovery of tin
and the growing importance of rubber, had led Malaya to once again
become the centre of attraction to western colonization, which later
on caused the region to be influxed by cheap labour from China and
India. One of the factors which attracted the alien communities was
the characteristics of social relation offered by the Malays. If one
analyzes the history of social relation of the Malays either among
themselves or their relation with alien communities, it is apparent that
the community places high regards to values such as tolerant,
cooperative, respectful and helpful with each other. In fact, all these
values are deeply rooted in the value of 'budi'. With the arrival of
Islam, the value of 'budi' had been well assimilated with Islamic
values thus giving birth to the value of 'budi-Islam'. Through 'budi-
Islam', the Malay conducted their dealings with British as well the
other communities during the time of peace or conflict. This value is
well nurtured due to the geographical circumstances like the fertile,
naturally rich land and bountiful marine life. Besides, a set of Malay
customs known as 'adat' custom contributed in enhancing the values
of budi.
Abstract: In today's world where everything is rapidly changing
and information technology is high in development, many features of culture, society, politic and economy has changed. The advent of
information technology and electronic data transmission lead to easy communication and fields like e-learning and e-commerce, are
accessible for everyone easily. One of these technologies is virtual
training. The "quality" of such kind of education systems is critical. 131 questionnaires were prepared and distributed among university
student in Toba University. So the research has followed factors that affect the quality of learning from the perspective of staff, students, professors and this type of university. It is concluded that the important factors in virtual training are the quality of professors, the
quality of staff, and the quality of the university. These mentioned factors were the most prior factors in this education system and
necessary for improving virtual training.
Abstract: Roundabout work on the principle of circulation and
entry flows, where the maximum entry flow rates depend largely on
circulating flow bearing in mind that entry flows must give away to
circulating flows. Where an existing roundabout has a road hump
installed at the entry arm, it can be hypothesized that the kinematics
of vehicles may prevent the entry arm from achieving optimum
performance. Road humps are traffic calming devices placed across
road width solely as speed reduction mechanism. They are the
preferred traffic calming option in Malaysia and often used on single
and dual carriageway local routes. The speed limit on local routes is
30mph (50 km/hr). Road humps in their various forms achieved the
biggest mean speed reduction (based on a mean speed before traffic
calming of 30mph) of up to 10mph or 16 km/hr according to the UK
Department of Transport. The underlying aim of reduced speed
should be to achieve a 'safe' distribution of speeds which reflects the
function of the road and the impacts on the local community.
Constraining safe distribution of speeds may lead to poor drivers
timing and delayed reflex reaction that can probably cause accident.
Previous studies on road hump impact have focused mainly on speed
reduction, traffic volume, noise and vibrations, discomfort and delay
from the use of road humps. The paper is aimed at optimal entry and
circulating flow induced by road humps. Results show that
roundabout entry and circulating flow perform better in
circumstances where there is no road hump at entrance.
Abstract: This paper introduces a hand gesture recognition system to recognize real time gesture in unstrained environments. Efforts should be made to adapt computers to our natural means of communication: Speech and body language. A simple and fast algorithm using orientation histograms will be developed. It will recognize a subset of MAL static hand gestures. A pattern recognition system will be using a transforrn that converts an image into a feature vector, which will be compared with the feature vectors of a training set of gestures. The final system will be Perceptron implementation in MATLAB. This paper includes experiments of 33 hand postures and discusses the results. Experiments shows that the system can achieve a 90% recognition average rate and is suitable for real time applications.
Abstract: PARADIGMA (PARticipative Approach to DIsease
Global Management) is a pilot project which aims to develop and
demonstrate an Internet based reference framework to share scientific
resources and findings in the treatment of major diseases.
PARADIGMA defines and disseminates a common methodology and
optimised protocols (Clinical Pathways) to support service functions
directed to patients and individuals on matters like prevention, posthospitalisation
support and awareness. PARADIGMA will provide a
platform of information services - user oriented and optimised
against social, cultural and technological constraints - supporting the
Health Care Global System of the Euro-Mediterranean Community
in a continuous improvement process.
Abstract: The objective of this study was to improve our
understanding of vulnerability and environmental change; it's causes
basically show the intensity, its distribution and human-environment
effect on the ecosystem in the Apodi Valley Region, This paper is
identify, assess and classify vulnerability and environmental change
in the Apodi valley region using a combined approach of landscape
pattern and ecosystem sensitivity. Models were developed using the
following five thematic layers: Geology, geomorphology, soil,
vegetation and land use/cover, by means of a Geographical
Information Systems (GIS)-based on hydro-geophysical parameters.
In spite of the data problems and shortcomings, using ESRI-s ArcGIS
9.3 program, the vulnerability score, to classify, weight and combine
a number of 15 separate land cover classes to create a single indicator
provides a reliable measure of differences (6 classes) among regions
and communities that are exposed to similar ranges of hazards.
Indeed, the ongoing and active development of vulnerability
concepts and methods have already produced some tools to help
overcome common issues, such as acting in a context of high
uncertainties, taking into account the dynamics and spatial scale of
asocial-ecological system, or gathering viewpoints from different
sciences to combine human and impact-based approaches. Based on
this assessment, this paper proposes concrete perspectives and
possibilities to benefit from existing commonalities in the
construction and application of assessment tools.
Abstract: Recently, wireless sensor networks have been paid
more interest, are widely used in a lot of commercial and military
applications, and may be deployed in critical scenarios (e.g. when a
malfunctioning network results in danger to human life or great
financial loss). Such networks must be protected against human
intrusion by using the secret keys to encrypt the exchange messages
between communicating nodes. Both the symmetric and asymmetric
methods have their own drawbacks for use in key management. Thus,
we avoid the weakness of these two cryptosystems and make use of
their advantages to establish a secure environment by developing the
new method for encryption depending on the idea of code
conversion. The code conversion-s equations are used as the key for
designing the proposed system based on the basics of logic gate-s
principals. Using our security architecture, we show how to reduce
significant attacks on wireless sensor networks.
Abstract: Cyber physical system (CPS) for target tracking, military surveillance, human health monitoring, and vehicle detection all require maximizing the utility and saving the energy. Sensor selection is one of the most important parts of CPS. Sensor selection problem (SSP) is concentrating to balance the tradeoff between the number of sensors which we used and the utility which we will get. In this paper, we propose a performance constrained slide windows (PCSW) based algorithm for SSP in CPS. we present results of extensive simulations that we have carried out to test and validate the PCSW algorithms when we track a target, Experiment shows that the PCSW based algorithm improved the performance including selecting time and communication times for selecting.
Abstract: The work we have accomplished in implementing a
Mobile Payment mechanism that enables customers to pay bills for
groceries and other purchased items in a store through the means of a
mobile phone, specifically a Smartphone. The mode of transaction, as
far as communication between the customer-s handset and the
merchant-s POS is concerned, we have decided upon NFC (Near
Field Communication). This is due to the fact that for the most part,
Pakistani Smartphone users have handsets that have Android mobile
OS, which supports the aforementioned platform, IOS, on the other
hand does not.
Abstract: Communication is becoming a significant tool to engage stakeholders since half of the century ago. In the recent years, there has been rapid growth of new technology developments. In tandem with such developments, there has been growing emphasis in communication strategies and management especially in determining the level of influence and management strategies among the said stakeholders on particular field. This paper presents a research conceptual framework focusing on stakeholder theories, communication and management strategies to be implied on the engagement of stakeholders of new technology developments of fertilizer industry in Malaysia. Framework espoused in this paper will provide insights into the various stakeholder theories and engagement strategies from different principal necessary for a successful introduction of new technology development in the above stated industry. The proposed framework has theoretical significance in filling the gap of the body of knowledge in the implementation of communication strategies in Malaysian fertilizer industry.
Abstract: Knowledge is attributed to human whose problemsolving
behavior is subjective and complex. In today-s knowledge
economy, the need to manage knowledge produced by a community
of actors cannot be overemphasized. This is due to the fact that
actors possess some level of tacit knowledge which is generally
difficult to articulate. Problem-solving requires searching and sharing
of knowledge among a group of actors in a particular context.
Knowledge expressed within the context of a problem resolution
must be capitalized for future reuse. In this paper, an approach that
permits dynamic capitalization of relevant and reliable actors-
knowledge in solving decision problem following Economic
Intelligence process is proposed. Knowledge annotation method and
temporal attributes are used for handling the complexity in the
communication among actors and in contextualizing expressed
knowledge. A prototype is built to demonstrate the functionalities of
a collaborative Knowledge Management system based on this
approach. It is tested with sample cases and the result showed that
dynamic capitalization leads to knowledge validation hence
increasing reliability of captured knowledge for reuse. The system
can be adapted to various domains.
Abstract: Dedicated Short Range Communication (DSRC) is a
key enabling technology for the next generation of
communication-based safety applications. One of the important
problems for DSRC deployment is maintaining high performance
under heavy channel load. Many studies focus on congestion control
mechanisms for simulating hundreds of physical radios deployed on
vehicles. The U.S. department of transportation-s (DOT) Intelligent
Transportation Systems (ITS) division has a plan to chosen prototype
on-board devices capable of transmitting basic “Here I am" safety
messages to other vehicles. The devices will be used in an IntelliDrive
safety pilot deployment of up to 3,000 vehicles. It is hard to log the
information of 3,000 vehicles. In this paper we present the designs and
issues related to the DSRC Radio Testbed under heavy channel load.
The details not only include the architecture of DSRC Radio Testbed,
but also describe how the Radio Interfere System is used to help for
emulating the congestion radio environment.