Abstract: Today advertising is actively penetrating into many spheres of our lives. We cannot imagine the existence of a lot of economic activities without advertising. That mostly concerns trade and services. Everyone of us should look better into the everyday communication and carefully consider the amount and the quality of the information we receive as well as its influence on our behaviour. Special attention should be paid to the young generation. Theoretical and practical research has proved the ever growing influence of information (especially the one contained in advertising) on a society; on its economics, culture, religion, politics and even people-s private lives and behaviour. Children have plenty of free time and, therefore, see a lot of different advertising. Though education of children is in the hands of parents and schools, advertising makers and customers should think with responsibility about the selection of time and transmission channels of child targeted advertising. The purpose of the present paper is to investigate the influence of advertising upon consumer views and behaviour of children in different age groups. The present investigation has clarified the influence of advertising as a means of information on a certain group of society, which in the modern information society is the most vulnerable – children. In this paper we assess children-s perception and their understanding of advertising.
Abstract: Fault detection determines faultexistence and detecting
time. This paper discusses two layered fault detection methods to
enhance the reliability and safety. Two layered fault detection methods
consist of fault detection methods of component level controllers and
system level controllers. Component level controllers detect faults by
using limit checking, model-based detection, and data-driven
detection and system level controllers execute detection by stability
analysis which can detect unknown changes. System level controllers
compare detection results via stability with fault signals from lower
level controllers. This paper addresses fault detection methods via
stability and suggests fault detection criteria in nonlinear systems. The
fault detection method applies tothe hybrid control unit of a military
hybrid electric vehicleso that the hybrid control unit can detect faults
of the traction motor.
Abstract: The current-voltage characteristics of a PtSi/p-Si
Schottky barrier diode was measured at the temperature of 85 K and
from the forward bias region of the I-V curve, the electrical
parameters of the diode were measured by three methods. The results
obtained from the two methods which considered the series resistance
were in close agreement with each other and from them barrier height
(), ideality factor (n) and series resistance () were found to be
0.2045 eV, 2.877 and 14.556 K respectively. By measuring the I-V
characteristics in the temperature range of 85-136 K the electrical
parameters were observed to have strong dependency on temperature.
The increase of barrier height and decrease of ideality factor with
increasing temperature is attributed to the existence of barrier height
inhomogeneities in the silicide-semiconductor structure.
Abstract: By the end of XX century in the structure of humanity some changes have been provoked: a new ethnos - Ethnos of Intellect is formed and is still being formed, beside the historical types of ethnoses: open ethnos, closed ethnos, wandering ethnos, dead ethnos, - and this event was caused by the technical progress, development of informational and transport communications, especially - by creation of Internet. The Ethnos of Intellect is something very close to the ÔÇ×Information Society“ described by J. Ellule and Y. Masuda that was regarded as the culture of XXI century, being an antithesis for technical and technicistical civilizations, but it-s necessary to indicate also the essential difference between these concepts: the Ethnos of Intellect is the antithesis of Socium. The existence of such an ethnos within human society that has already become an Information Society itself is extremely important in observing legally and informatically a new kind of reins in the hands of the political power, revealing every attempt to violate the human rights of simple citizens. A concrete example of some conjunction points of legal informatics and informatical law in a certain kind of ambiental studies of the project ''State Registre of Population'' in Russia is very eloquent.
Abstract: the article analyzes the national security as a scientific and practical problem, characterized by the state's political institutions to ensure effective action to maintain optimal conditions for the existence and development of the individual and society. National security, as a category of political science reflects the relationship between the security to the nation, including public relations and social consciousness, social institutions and their activities, ensuring the realization of national interests in a particular historical situation. In national security are three security levels: individual, society and state. Their role and place determined by the nature of social relations, political systems, the presence of internal and external threats. In terms of content in the concept of national security is taken to provide political, economic, military, environmental, information security and safety of the cultural development of the nation.
Abstract: Mammalian genomes contain large number of
retroelements (SINEs, LINEs and LTRs) which could affect
expression of protein coding genes through associated transcription
factor binding sites (TFBS). Activity of the retroelement-associated
TFBS in many genes is confirmed experimentally but their global
functional impact remains unclear. Human SINEs (Alu repeats) and
mouse SINEs (B1 and B2 repeats) are known to be clustered in GCrich
gene rich genome segments consistent with the view that they
can contribute to regulation of gene expression. We have shown
earlier that Alu are involved in formation of cis-regulatory modules
(clusters of TFBS) in human promoters, and other authors reported
that Alu located near promoter CpG islands have an increased
frequency of CpG dinucleotides suggesting that these Alu are
undermethylated. Human Alu and mouse B1/B2 elements have an
internal bipartite promoter for RNA polymerase III containing
conserved sequence motif called B-box which can bind basal
transcription complex TFIIIC. It has been recently shown that TFIIIC
binding to B-box leads to formation of a boundary which limits
spread of repressive chromatin modifications in S. pombe. SINEassociated
B-boxes may have similar function but conservation of
TFIIIC binding sites in SINEs located near mammalian promoters
has not been studied earlier. Here we analysed abundance and
distribution of retroelements (SINEs, LINEs and LTRs) in annotated
sequences of the Database of mammalian transcription start sites
(DBTSS). Fractions of SINEs in human and mouse promoters are
slightly lower than in all genome but >40% of human and mouse
promoters contain Alu or B1/B2 elements within -1000 to +200 bp
interval relative to transcription start site (TSS). Most of these SINEs
is associated with distal segments of promoters (-1000 to -200 bp
relative to TSS) indicating that their insertion at distances >200 bp
upstream of TSS is tolerated during evolution. Distribution of SINEs
in promoters correlates negatively with the distribution of CpG
sequences. Using analysis of abundance of 12-mer motifs from the
B1 and Alu consensus sequences in genome and DBTSS it has been
confirmed that some subsegments of Alu and B1 elements are poorly
conserved which depends in part on the presence of CpG
dinucleotides. One of these CpG-containing subsegments in B1
elements overlaps with SINE-associated B-box and it shows better
conservation in DBTSS compared to genomic sequences. It has been
also studied conservation in DBTSS and genome of the B-box
containing segments of old (AluJ, AluS) and young (AluY) Alu
repeats and found that CpG sequence of the B-box of old Alu is
better conserved in DBTSS than in genome. This indicates that Bbox-
associated CpGs in promoters are better protected from
methylation and mutation than B-box-associated CpGs in genomic
SINEs. These results are consistent with the view that potential
TFIIIC binding motifs in SINEs associated with human and mouse
promoters may be functionally important. These motifs may protect
promoters from repressive histone modifications which spread from
adjacent sequences. This can potentially explain well known
clustering of SINEs in GC-rich gene rich genome compartments and
existence of unmethylated CpG islands.
Abstract: Web-based systems have become increasingly
important due to the fact that the Internet and the World Wide Web
have become ubiquitous, surpassing all other technological
developments in our history. The Internet and especially companies
websites has rapidly evolved in their scope and extent of use, from
being a little more than fixed advertising material, i.e. a "web
presences", which had no particular influence for the company's
business, to being one of the most essential parts of the company's
core business.
Traditional software engineering approaches with process models
such as, for example, CMM and Waterfall models, do not work very
well since web system development differs from traditional
development. The development differs in several ways, for example,
there is a large gap between traditional software engineering designs
and concepts and the low-level implementation model, many of the
web based system development activities are business oriented (for
example web application are sales-oriented, web application and
intranets are content-oriented) and not engineering-oriented.
This paper aims to introduce Increment Iterative extreme
Programming (IIXP) methodology for developing web based
systems. In difference to the other existence methodologies, this
methodology is combination of different traditional and modern
software engineering and web engineering principles.
Abstract: The unanticipated destruct of more of the steel moment frames in Northridge earthquake, altered class of regard to the beamto- column connections in moment frames. Panel zone is one the significant part of joints which, it-s stiffness and rigidity has an important effect on the behavior and ductility of the frame. Specifically that behavior of panel zone has a very significant effect on the special moment frames. In this paper , meanwhile the relations for modeling of panel zone in frames are expressed , special moment frames with different spans and stories were studied in the way of performance-based design. The frames designed in according with Iranian steel building code. The effect of panel zone is also considered and in the case of non-existence of performance level, by changing in intimacies and parameter of panel zone, performance level is considered.
Abstract: Tufting carpet is a very suitable substrate for growing
microorganism such as pathogenic microbes, due to the direct touch
with human body, long washing periods and laying on the floor; in
fact there are 3 major problems: To risk human health, Prepare bad
odors and Destruction of the products.. In the presented research, for
investigation of presence most common microbes on polyester
tufting, first goods laid in a public place (in the corridor fair) for 30
days and the existence of some microbes were investigate on it with
two methods of enrichment in nutrient environments such as
thioglycolate and noutrunt brath, and shake the dust off the polyester
tufting onto cultivation mediums such as blood agar and noutrunt
agar. After the microorganism colonics are grown, the colonies were
separated and six microbial tests such as cataloes and sitrat were
carried out in five phases on the colonics for identifying the varieties
of bacteria. As a result of tests, 5 type of bacteria, such as
Escherichia coli, staphylococcus saprophytic as were identified. Each
of the mentioned bacteria can be seriously harmful for the heath of
human.
Abstract: In this paper, a delayed competitive system with the effect of toxic substances is investigated. With the aid of differential equations with piecewise constant arguments, a discrete analogue of continuous non-autonomous delayed competitive system with the effect of toxic substances is proposed. By using Gaines and Mawhin,s continuation theorem of coincidence degree theory, a easily verifiable sufficient condition for the existence of positive solutions of difference equations is obtained.
Abstract: This paper deals with a nonlinear fractional differential equation with integral boundary condition of the following form: Dαt x(t) = f(t, x(t),Dβ t x(t)), t ∈ (0, 1), x(0) = 0, x(1) = 1 0 g(s)x(s)ds, where 1 < α ≤ 2, 0 < β < 1. Our results are based on the Schauder fixed point theorem and the Banach contraction principle.
Abstract: An exploration in the competency of the optical
multilevel Mapping Multiplexing Technique (MMT) system in
tolerating to the impact of nonlinearities as Self Phase Modulation
(SPM) during the presence of dispersion compensation methods. The
existence of high energy pulses stimulates deterioration in the chirp
compression process attained by SPM which introduces an upper
power boundary limit. An evaluation of the post and asymmetric prepost
fiber compensation methods have been deployed on the MMT
system compared with others of the same bit rate modulation formats.
The MMT 40 Gb/s post compensation system has 1.4 dB
enhancements to the 40 Gb/s 4-Arysystem and less than 3.9 dB
penalty compared to the 40 Gb/s OOK-RZsystem. However, the
optimized Pre-Post asymmetric compensation has an enhancement of
4.6 dB compared to the Post compensation MMT configuration for a
30% pre compensation dispersion.
Abstract: In this paper, a class of impulsive BAM fuzzy cellular neural networks with time delays in the leakage terms is formulated and investigated. By establishing a delay differential inequality and M-matrix theory, some sufficient conditions ensuring the existence, uniqueness and global exponential stability of equilibrium point for impulsive BAM fuzzy cellular neural networks with time delays in the leakage terms are obtained. In particular, a precise estimate of the exponential convergence rate is also provided, which depends on system parameters and impulsive perturbation intention. It is believed that these results are significant and useful for the design and applications of BAM fuzzy cellular neural networks. An example is given to show the effectiveness of the results obtained here.
Abstract: Steganography is the art of hiding and transmitting data
through apparently innocuous carriers in an effort to conceal the
existence of the data. A lot of steganography algorithms have been
proposed recently. Many of them use the digital image data as a carrier.
In data hiding scheme of halftoning and coordinate projection, still
image data is used as a carrier, and the data of carrier image are
modified for data embedding. In this paper, we present three features
for analysis of data hiding via halftoning and coordinate projection.
Also, we present a classifier using the proposed three features.
Abstract: In this paper, the existence of periodic solutions of a delayed competitive system with the effect of toxic substances is investigated by using the Gaines and Mawhin,s continuation theorem of coincidence degree theory on time scales. New sufficient conditions are obtained for the existence of periodic solutions. The approach is unified to provide the existence of the desired solutions for the continuous differential equations and discrete difference equations. Moreover, The approach has been widely applied to study existence of periodic solutions in differential equations and difference equations.
Abstract: In this paper, a higher order nonlinear neutral functional differential equation with distributed delay is studied by using the continuation theorem of coincidence degree theory. Some new results on the existence of periodic solutions are obtained.
Abstract: In this paper, a discrete-time SIR epidemic model with nonlinear incidence rate, time delays and impulses is investigated. Sufficient conditions for the existence and uniqueness of periodic solutions are obtained by using contraction theorem and inequality techniques. An example is employed to illustrate our results.
Abstract: Persuasive technology has been applied in marketing,
health, environmental conservation, safety and other domains and is
found to be quite effective in changing people-s attitude and
behaviours. This research extends the application domains of
persuasive technology to information security awareness and uses a
theory-driven approach to evaluate the effectiveness of a web-based
program developed based on the principles of persuasive technology
to improve the information security awareness of end users. The
findings confirm the existence of a very strong effect of the webbased
program in raising users- attitude towards information security
aware behavior. This finding is useful to the IT researchers and
practitioners in developing appropriate and effective education
strategies for improving the information security attitudes for endusers.
Abstract: In this work, a special case of the image superresolution
problem where the only type of motion is global
translational motion and the blurs are shift-invariant is investigated.
The necessary conditions for exact reconstruction of the original
image by using finite impulse-response reconstruction filters are
developed. Given that the conditions are satisfied, a method for exact
super-resolution is presented and some simulation results are shown.
Abstract: True stress-strain curve of railhead steel is required to
investigate the behaviour of railhead under wheel loading through elasto-plastic Finite Element (FE) analysis. To reduce the rate of wear, the railhead material is hardened through annealing and
quenching. The Australian standard rail sections are not fully hardened and hence suffer from non-uniform distribution of the
material property; usage of average properties in the FE modelling can potentially induce error in the predicted plastic strains. Coupons
obtained at varying depths of the railhead were, therefore, tested under axial tension and the strains were measured using strain gauges as well as an image analysis technique, known as the Particle Image Velocimetry (PIV). The head hardened steel exhibit existence of three distinct zones of yield strength; the yield strength as the ratio of the average yield strength provided in the standard (σyr=780MPa) and
the corresponding depth as the ratio of the head hardened zone along
the axis of symmetry are as follows: (1.17 σyr, 20%), (1.06 σyr, 20%-80%) and (0.71 σyr, > 80%). The stress-strain curves exhibit limited plastic zone with fracture occurring at strain less than 0.1.