Abstract: In this paper, we derive some algebraic identities on
right and left neighbors R(F) and L(F) of an indefinite binary
quadratic form F = F(x, y) = ax2 + bxy + cy2 of discriminant
Δ = b2 -4ac. We prove that the proper cycle of F can be given by
using its consecutive left neighbors. Also we construct a connection
between right and left neighbors of F.
Abstract: A wide spectrum of systems require reliable
personal recognition schemes to either confirm or determine the
identity of an individual person. This paper considers multimodal
biometric system and their applicability to access control,
authentication and security applications. Strategies for feature
extraction and sensor fusion are considered and contrasted. Issues
related to performance assessment, deployment and standardization
are discussed. Finally future directions of biometric systems
development are discussed.
Abstract: Titanium oxide hollow microspheres were synthesized from organic precursor titanium tetraisopropoxide (TTIP) using continuous spray pyrolysis reactor. Effects of precursor concentration, applied voltage and annealing have been investigated. It was observed that the annealing of the as-synthesized TiO2 hollow microspheres at 2500C, which had an average external diameter of 200 nm, leads to an increase in the size and also more spherical shape. The precursor concentration was found to have a direct impact on the size of the microspheres, which is also evident in the absorption spectrum. The as-prepared TiO2 hollow microspheres exhibited good photocatalytic activity for the degradation of MO.
Abstract: Biometrics methods include recognition techniques
such as fingerprint, iris, hand geometry, voice, face, ears and gait. The gait recognition approach has some advantages, for example it
does not need the prior concern of the observed subject and it can
record many biometric features in order to make deeper analysis, but
most of the research proposals use high computational cost. This
paper shows a gait recognition system with feature subtraction on a
bundle rectangle drawn over the observed person. Statistical results
within a database of 500 videos are shown.
Abstract: Social interest and demand on Home-Network has
been increasing greatly. Although various services are being
introduced to respond to such demands, they can cause serious
security problems when linked to the open network such as Internet.
This paper reviews the security requirements to protect the service
users with assumption that the Home-Network environment is
connected to Internet and then proposes the security model based on
the requirement. The proposed security model can satisfy most of the
requirements and further can be dynamically applied to the future
ubiquitous Home-Networks.
Abstract: A new paradigm for software design and development models software by its business process, translates the model into a process execution language, and has it run by a supporting execution engine. This process-oriented paradigm promotes modeling of software by less technical users or business analysts as well as rapid development. Since business process models may be shared by different organizations and sometimes even by different business domains, it is interesting to apply a technique used in traditional software component technology to design reusable business processes. This paper discusses an approach to apply a technique for software component fabrication to the design of process-oriented software units, called process components. These process components result from decomposing a business process of a particular application domain into subprocesses with an aim that the process components can be reusable in different process-based software models. The approach is quantitative because the quality of process component design is measured from technical features of the process components. The approach is also strategic because the measured quality is determined against business-oriented component management goals. A software tool has been developed to measure how good a process component design is, according to the required managerial goals and comparing to other designs. We also discuss how we benefit from reusable process components.
Abstract: This article discusses the concept of student ownership of knowledge and seeks to determine how to move students from knowledge acquisition to knowledge application and ultimately to knowledge generation in a virtual setting. Instructional strategies for fostering student engagement in a virtual environment are critical to the learner-s strategic ownership of the knowledge. A number of relevant theories that focus on learning, affect, needs and adult concerns are presented to provide a basis for exploring the transfer of knowledge from teacher to learner. A model under development is presented that combines the dimensions of knowledge approach, the teacher-student relationship with regards to knowledge authority and teaching approach to demonstrate the recursive and scaffolded design for creation of virtual learning environments.
Abstract: Temperature dependence of force of gravitation is one
of the fundamental problems of physics. This problem has got special
value in connection with that the general theory of relativity,
supposing the weakest positive influence of a body temperature on its
weight, actually rejects an opportunity of measurement of negative
influence of temperature on gravity in laboratory conditions. Really,
the recognition of negative temperature dependence of gravitation,
for example, means basic impossibility of achievement of a
singularity («a black hole») at a gravitational collapse. Laboratory
experiments with exact weighing the heated up metal samples,
indicating negative influence temperatures of bodies on their physical
weight are described. Influence of mistakes of measurements is
analyzed. Calculations of distribution of temperature in volume of the
bar, agreed with experimental data of time dependence of weight of
samples are executed. The physical substantiation of negative
temperature dependence of weight of the bodies, based on correlation
of acceleration at thermal movement of micro-particles of a body and
its absolute temperature, are given.
Abstract: With the growth of electricity generation from gas
energy gas pipeline reliability can substantially impact the electric
generation. A physical disruption to pipeline or to a compressor
station can interrupt the flow of gas or reduce the pressure and lead
to loss of multiple gas-fired electric generators, which could
dramatically reduce the supplied power and threaten the power
system security. Gas pressure drops during peak loading time on
pipeline system, is a common problem in network with no enough
transportation capacity which limits gas transportation and causes
many problem for thermal domain power systems in supplying their
demand. For a feasible generation scheduling planning in networks
with no sufficient gas transportation capacity, it is required to
consider gas pipeline constraints in solving the optimization problem
and evaluate the impacts of gas consumption in power plants on gas
pipelines operating condition. This paper studies about operating of
gas fired power plants in critical conditions when the demand of gas
and electricity peak together. An integrated model of gas and electric
model is used to consider the gas pipeline constraints in the economic
dispatch problem of gas-fueled thermal generator units.
Abstract: The recent developments in computing and
communication technology permit to users to access multimedia
documents with variety of devices (PCs, PDAs, mobile phones...)
having heterogeneous capabilities. This diversification of supports
has trained the need to adapt multimedia documents according to
their execution contexts. A semantic framework for multimedia
document adaptation based on the conceptual neighborhood graphs
was proposed. In this framework, adapting consists on finding
another specification that satisfies the target constraints and which is
as close as possible from the initial document. In this paper, we
propose a new way of building the conceptual neighborhood graphs
to best preserve the proximity between the adapted and the original
documents and to deal with more elaborated relations models by
integrating the relations relaxation graphs that permit to handle the
delays and the distances defined within the relations.
Abstract: The presence of heavy metals in the environment
could constitute a hazard to food security and public health. These
can be accumulated in aquatic animals such as fish. Samples of four
popular brands of canned fish in the Iranian market (yellowfin tuna,
common Kilka, Kawakawa and longtail tuna) were analyzed for level
of Cr after wet digestion with acids using graphite furnace atomic
absorption spectrophotometry. The mean concentrations for Cr in the
different brands were: 2.57, 3.24, 3.16 and 1.65 μg/g for brands A, B,
C and D respectively. Significant differences were observed in the Cr
levels between all of the different brands of canned fish evaluated in
this study. The Cr concentrations for the varieties of canned fishes
were generally within the FAO/WHO, U.S. FDA and U.S. EPA
recommended limits for fish.
Abstract: With the rapid growth in business size, today's businesses orient towards electronic technologies. Amazon.com and e-bay.com are some of the major stakeholders in this regard. Unfortunately the enormous size and hugely unstructured data on the web, even for a single commodity, has become a cause of ambiguity for consumers. Extracting valuable information from such an everincreasing data is an extremely tedious task and is fast becoming critical towards the success of businesses. Web content mining can play a major role in solving these issues. It involves using efficient algorithmic techniques to search and retrieve the desired information from a seemingly impossible to search unstructured data on the Internet. Application of web content mining can be very encouraging in the areas of Customer Relations Modeling, billing records, logistics investigations, product cataloguing and quality management. In this paper we present a review of some very interesting, efficient yet implementable techniques from the field of web content mining and study their impact in the area specific to business user needs focusing both on the customer as well as the producer. The techniques we would be reviewing include, mining by developing a knowledge-base repository of the domain, iterative refinement of user queries for personalized search, using a graphbased approach for the development of a web-crawler and filtering information for personalized search using website captions. These techniques have been analyzed and compared on the basis of their execution time and relevance of the result they produced against a particular search.
Abstract: Mung bean starches were subjected to heat-moisture treatment (HMT) by different moisture contents (15%, 20%, 25%, 30% and 35%) at 120Ôäâ for 12h. The impact on the yields of resistant starch (RS), microstructure, physicochemical and functional properties was investigated. Compared to native starch, the RS content of heat-moisture treated starches increased significantly. The RS level of HMT-20 was the highest of all the starches. Birefringence was displayed clear at the center of native starch. For HMT starches, pronounced birefringence was exhibited on the periphery of starch granules; however, birefringence disappeared at the centre of some starch granules. The shape of HMT starches hadn-t been changed and the integrity of starch granules was preserved for all the conditions. Concavity could be observed on HMT starches under scanning electronic microscopy. After HMT, apparent amylose contents were increased and starch macromolecule was degraded in comparison with those of native starch. There was a reduction in swelling power on HMT starches, but the solubility of HMT starches was higher than that of native starch. Both of native and HMT starches showed A-type X-ray diffraction pattern. Furthermore, there is a higher intensity at the peak of 15.0 and 22.9 Å than those of native starch.
Abstract: The PAX6, a transcription factor, is essential for the morphogenesis of the eyes, brain, pituitary and pancreatic islets. In rodents, the loss of Pax6 function leads to central nervous system defects, anophthalmia, and nasal hypoplasia. The haplo-insufficiency of Pax6 causes microphthalmia, aggression and other behavioral abnormalities. It is also required in brain patterning and neuronal plasticity. In human, heterozygous mutation of Pax6 causes loss of iris [aniridia], mental retardation and glucose intolerance. The 3- deletion in Pax6 leads to autism and aniridia. The phenotypes are variable in peneterance and expressivity. However, mechanism of function and interaction of PAX6 with other proteins during development and associated disease are not clear. It is intended to explore interactors of PAX6 to elucidated biology of PAX6 function in the tissues where it is expressed and also in the central regulatory pathway. This report describes In-silico approaches to explore interacting proteins of PAX6. The models show several possible proteins interacting with PAX6 like MITF, SIX3, SOX2, SOX3, IPO13, TRIM, and OGT. Since the Pax6 is a critical transcriptional regulator and master control gene of eye and brain development it might be interacting with other protein involved in morphogenesis [TGIF, TGF, Ras etc]. It is also presumed that matricelluar proteins [SPARC, thrombospondin-1 and osteonectin etc] are likely to interact during transport and processing of PAX6 and are somewhere its cascade. The proteins involved in cell survival and cell proliferation can also not be ignored.
Abstract: While the form of crises may change, their essence
remains the same (such as a cycle of abundant liquidity, rapid credit
growth, and a low-inflation environment followed by an asset-price
bubble). The current market turbulence began in mid-2000s when the
US economy shifted to imbalanced both internal and external
macroeconomic positions. We see two key causes of these problems
– loose US monetary policy in early 2000s and US government
guarantees issued on the securities by government-sponsored
enterprises what was further fueled by financial innovations such as
structured credit products. We have discovered both negative and
positive lessons deriving from this crisis and divided the negative
lessons into three groups: financial products and valuation, processes
and business models, and strategic issues. Moreover, we address key
risk management lessons and exit strategies derived from the current
crisis and recommend policies that should help diminish the negative
impact of future potential crises.
Abstract: In today's day and age, one of the important topics in
information security is authentication. There are several alternatives
to text-based authentication of which includes Graphical Password
(GP) or Graphical User Authentication (GUA). These methods stems
from the fact that humans recognized and remembers images better
than alphanumerical text characters. This paper will focus on the
security aspect of GP algorithms and what most researchers have
been working on trying to define these security features and
attributes. The goal of this study is to develop a fuzzy decision model
that allows automatic selection of available GP algorithms by taking
into considerations the subjective judgments of the decision makers
who are more than 50 postgraduate students of computer science. The
approach that is being proposed is based on the Fuzzy Analytic
Hierarchy Process (FAHP) which determines the criteria weight as a
linear formula.
Abstract: As part of national epidemiological survey on bovine
viral diarrhea virus (BVDV), a total of 274 dejecta samples were
collected from 14 cattle farms in 8 areas of Xinjiang Uygur
Autonomous Region in northwestern China. Total RNA was extracted
from each sample, and 5--untranslated region (UTR) of BVDV
genome was amplified by using two-step reverse
transcriptase-polymerase chain reaction (RT-PCR). The PCR products
were subsequently sequenced to study the genetic variations of BVDV
in these areas. Among the 274 samples, 33 samples were found
virus-positive. According to sequence analysis of the PCR products,
the 33 samples could be arranged into 16 groups. All the sequences,
however, were highly conserved with BVDV Osloss strains. The virus
possessed theses sequences belonged to BVDV-1b subtype by
phylogenetic analysis. Based on these data, we established a typing
tree for BVDV in these areas. Our results suggested that BVDV-1b
was a predominant subgenotype in northwestern China and no
correlation between the genetic and geographical distances could be
observed above the farm level.
Abstract: To learn about China-s future energy demand, this paper first proposed GM(1,1) model group based on recursive solutions of parameters estimation, setting up a general solving-algorithm of the model group. This method avoided the problems occurred on the past researches that remodeling, loss of information and large amount of calculation. This paper established respectively all-data-GM(1,1), metabolic GM(1,1) and new information GM (1,1)model according to the historical data of energy consumption in China in the year 2005-2010 and the added data of 2011, then modeling, simulating and comparison of accuracies we got the optimal models and to predict. Results showed that the total energy demand of China will be 37.2221 billion tons of equivalent coal in 2012 and 39.7973 billion tons of equivalent coal in 2013, which are as the same as the overall planning of energy demand in The 12th Five-Year Plan.
Abstract: The usage of internet is rapidly increasing and the usage of mobile agent technology in internet environment has a great demand. The security issue one of main obstacles that restrict the mobile agent technology to spread. This paper proposes Secure-Image Mechanism (SIM) as a new mechanism to protect mobile agents against malicious hosts. . SIM aims to protect mobile agent by using the symmetric encryption and hash function in cryptography science. This mechanism can prevent the eavesdropping and alteration attacks. It assists the mobile agents to continue their journey normally incase attacks occurred.
Abstract: This paper describes the development of an electronic
instrument that looks like a flute, which is able to sense the basic musical notes being executed by a specific user. The principal function of the instrument is to teach how to play a flute. This device
will generate a significant academic impact, in a field of virtual reality interactive that combine art and technology. With this example is expected to contribute in research and implementation of teaching devices around the world.