Abstract: Due to the high increase in and demand for a wide assortment of applications that require low-cost, high-efficiency, and compact systems, RF power amplifiers are considered the most critical design blocks and power consuming components in wireless communication, TV transmission, radar, and RF heating. Therefore, much research has been carried out in order to improve the performance of power amplifiers. Classes-A, B, C, D, E and F are the main techniques for realizing power amplifiers.
An implementation of high efficiency class-F power amplifier with Gallium Nitride (GaN) High Electron Mobility Transistor (HEMT) was realized in this paper. The simulation and optimization of the class-F power amplifier circuit model was undertaken using Agilent’s Advanced Design system (ADS). The circuit was designed using lumped elements.
Abstract: The main goal of this work is to propose a way for
combined use of two nontraditional algorithms by solving topological
problems on telecommunications concentrator networks. The
algorithms suggested are the Simulated Annealing algorithm and the
Genetic Algorithm. The Algorithm of Simulated Annealing unifies
the well known local search algorithms. In addition - Simulated
Annealing allows acceptation of moves in the search space witch lead
to decisions with higher cost in order to attempt to overcome any
local minima obtained. The Genetic Algorithm is a heuristic approach
witch is being used in wide areas of optimization works. In the last
years this approach is also widely implemented in
Telecommunications Networks Planning. In order to solve less or
more complex planning problem it is important to find the most
appropriate parameters for initializing the function of the algorithm.
Abstract: The world is moving rapidly toward the deployment
of information and communication systems. Nowadays, computing
systems with their fast growth are found everywhere and one of the main challenges for these systems is increasing attacks and security threats against them. Thus, capturing, analyzing and verifying security requirements becomes a very important activity in
development process of computing systems, specially in developing
systems such as banking, military and e-business systems. For
developing every system, a process model which includes a process,
methods and tools is chosen. The Rational Unified Process (RUP) is
one of the most popular and complete process models which is used
by developers in recent years. This process model should be extended to be used in developing secure software systems. In this
paper, the Requirement Discipline of RUP is extended to improve RUP for developing secure software systems. These proposed extensions are adding and integrating a number of Activities, Roles,
and Artifacts to RUP in order to capture, document and model threats
and security requirements of system. These extensions introduce a
group of clear and stepwise activities to developers. By following these activities, developers assure that security requirements are
captured and modeled. These models are used in design, implementation and test activitie
Abstract: This paper studies a vital issue in wireless
communications, which is the transmission of images over Wireless
Personal Area Networks (WPANs) through the Bluetooth network. It
presents a simple method to improve the efficiency of error control
code of old Bluetooth versions over mobile WPANs through
Interleaved Error Control Code (IECC) technique. The encoded
packets are interleaved by simple block interleaver. Also, the paper
presents a chaotic interleaving scheme as a tool against bursts of
errors which depends on the chaotic Baker map. Also, the paper
proposes using the chaotic interleaver instead of traditional block
interleaver with Forward Error Control (FEC) scheme. A comparison
study between the proposed and standard techniques for image
transmission over a correlated fading channel is presented.
Simulation results reveal the superiority of the proposed chaotic
interleaving scheme to other schemes. Also, the superiority of FEC
with proposed chaotic interleaver to the conventional interleavers
with enhancing the security level with chaotic interleaving packetby-
packet basis.
Abstract: 20 years of dentistry was a period of transition from
communist to market economy but Romanian doctors have
insufficient management knowledge. Recently, the need for modern
management has increased due to technologies and superior materials
appearance, as patient-s demands.
Research goal is to increase efficiency by evaluating dental
medical office cost categories in real pricing procedures.
Empirical research is based on guided study that includes
information about the association between categories of cost
perception and therapeutic procedures commonly used in dental
offices.
Due to the obtained results to identify all the labours that make up
a settled procedure costs were determined for each procedure.
Financial evaluation software was created with the main functions:
introducing and maintaining patient records, treatment and
appointments made, procedures cost and monitoring office
productivity.
We believe that the study results can significantly improve the
financial management of dental offices, increasing the effectiveness
and quality of services.
Abstract: Due to the legacy of apartheid segregation South Africa remains a divided society where most voters live in politically homogenous social environments. This paper argues that political discussion within one’s social context plays a primary role in shaping political attitudes and vote choice. Using data from the Comparative National Elections Project 2004 and 2009 South African post-election surveys, the paper explores the extent of social context partisan homogeneity in South Africa and finds that voters are not overly embedded in homogenous social contexts. It then demonstrates the consequences of partisan homogeneity on voting behavior. Homogenous social contexts tend to encourage stronger partisan loyalties and fewer defections in vote choice while voters in more heterogeneous contexts show less consistency in their attitudes and behaviour. Finally, the analysis shows how momentous sociopolitical events at the time of a particular election can change the social context, with important consequences for electoral outcomes.
Abstract: A design flow of multi-standard down-conversion
CMOS mixers for three modern standards: Global System Mobile,
Digital Enhanced Cordless Telephone and Universal Mobile
Telecommunication Systems is presented. Three active mixer-s
structures are studied. The first is based on the Gilbert cell which
gives a tolerable noise figure and linearity with a low conversion
gain. The second and third structures use the current bleeding and
charge injection techniques in order to increase the conversion gain.
An improvement of about 2 dB of the conversion gain is achieved
without a considerable degradation of the other characteristics. The
models used for noise figure, conversion gain and IIP3 used are
studied. This study describes the nature of trade-offs inherent in such
structures and gives insights that help in identifying which structure
is better for given conditions.
Abstract: Optimal routing in communication networks is a
major issue to be solved. In this paper, the application of Tabu Search
(TS) in the optimum routing problem where the aim is to minimize
the computational time and improvement of quality of the solution in
the communication have been addressed. The goal is to minimize the
average delays in the communication. The effectiveness of Tabu
Search method is shown by the results of simulation to solve the
shortest path problem. Through this approach computational cost can
be reduced.
Abstract: This study proposes novel hybrid social network analysis and collaborative filtering approach to enhance the performance of recommender systems. The proposed model selects subgroups of users in Internet community through social network analysis (SNA), and then performs clustering analysis using the information about subgroups. Finally, it makes recommendations using cluster-indexing CF based on the clustering results. This study tries to use the cores in subgroups as an initial seed for a conventional clustering algorithm. This model chooses five cores which have the highest value of degree centrality from SNA, and then performs clustering analysis by using the cores as initial centroids (cluster centers). Then, the model amplifies the impact of friends in social network in the process of cluster-indexing CF.
Abstract: There is an urgent need to conserve the biological diversity of the Nigerian Environment for the future and present generation in the face of current energy resources development. This paper gives an in-depth analysis of the impact of oil and gas activities on the biological diversity of the Nigerian Niger Delta area and its consequences on the sustainable development of the host communities as it relates to their social, economic and environmental issues, particularly on the womenfolk who are the key managers of environmental resources. Also reviewed is the frustration of these communities that is reflected in unending conflicts.
Abstract: Message Passing Interface is widely used for Parallel
and Distributed Computing. MPICH and LAM are popular open
source MPIs available to the parallel computing community also
there are commercial MPIs, which performs better than MPICH etc.
In this paper, we discuss a commercial Message Passing Interface, CMPI
(C-DAC Message Passing Interface). C-MPI is an optimized
MPI for CLUMPS. It is found to be faster and more robust compared
to MPICH. We have compared performance of C-MPI and MPICH
on Gigabit Ethernet network.
Abstract: Implementing Information Technology/ Information
System (IT/IS) is critical for every industry as its potential benefits
have been to motivate many industries including the Malaysian
construction industry to invest in it. To successfully implement IT/IS
has become the major concern for every organisation. Identifying the
critical success factors (CSFs) has become the main agenda for
researchers, academicians and practitioners due to the wide number
of failures reported. This research paper seeks to identify the CSFs
that influence the successful implementation of IT/IS in construction
industry in Malaysia. Limited factors relating to people issue will be
highlighted here to showcase some as it becomes one of the major
contributing factors to the failure. Three (3) organisations have
participated in this study. Semi-structured interviews are employed as
they offer sufficient flexibility to ensure that all relevant factors are
covered. Several key issues contributing to successful
implementations of IT/IS are identified. The results of this study
reveal that top management support, communication, user
involvement, IT staff roles and responsibility, training/skills, leader/
IT Leader, organisation culture, knowledge/ experience, motivation,
awareness, focus and ambition, satisfaction, teamwork/ collaboration,
willingness to change, attitude, commitment, management style,
interest in IT, employee behaviour towards collaborative
environment, trust, interpersonal relationship, personal characteristic
and competencies are significantly associated with the successful
implementations of IT/IS. It is anticipated that this study will create
awareness and contribute to a better understanding amongst
construction industry players and will assist them to successfully
implement IT/IS.
Abstract: In this paper methodology to exploit creeping wave
for body area network BAN communication reliability are described.
Creeping wave propagation effects are visualized & analyzed.
During this work Dipole, IA antennas various antennas were
redesigned using existing designs and their propagation
characteristics were verified for optimum performance when used on
BANs. These antennas were then applied on body shapes-including
rectangular, spherical and cylindrical so that all the effects of actual
human body can be taken nearly into account. Parametric simulation
scheme was devised so that on Body channel characterization can be
visualized at front, curved and back region. In the next phase
multiple inputs multiple output MIMO scheme was introduced where
virtual antennas were used in order to diminish the effects of
antennas on the propagation of waves. Results were, extracted and
analyzed at different heights. Finally based on comparative
measurement and analysis it was concluded that on body propagation
can be exploited to gain spatial diversity.
Abstract: This paper explores the use of project work in a
content-based instruction in a Rajabhat University, a teacher college,
where student teachers are instructed to perform teaching roles
mainly in basic education level. Its aim is to link theory to practice,
and to help language teachers maximize the full potential of project
work for genuine communication and give real meaning to writing
activity. Two research questions are formulated to guide this study:
a) What is the academic achievement of the students- writing skill
against the 70% attainment target after the use of project to enhance
the skill? and b) To what degree is the development of the students-
writing skills during the course of project to enhance the skill? The
sample of the study comprised of 38 fourth-year English major
students. The data was collected by means of achievement test,
student writing works, and project diary. The scores in the summative
achievement test were analyzed by mean score, standard deviation,
and t-test. Project diary serves as students- record of the language
acquired during the project. List of structures and vocabulary noted in
the diary has shown students- ability to attend to, recognize, and
focus on meaningful patterns of language forms.
Abstract: The product development process (PDP) in the
Technology group plays a very important role in the launch of any
product. While a manufacturing process encourages the use of certain
measures to reduce health, safety and environmental (HSE) risks on
the shop floor, the PDP concentrates on the use of Geometric
Dimensioning and Tolerancing (GD&T) to develop a flawless design.
Furthermore, PDP distributes and coordinates activities between
different departments such as marketing, purchasing, and
manufacturing. However, it is seldom realized that PDP makes a
significant contribution to developing a product that reduces HSE
risks by encouraging the Technology group to use effective GD&T.
The GD&T is a precise communication tool that uses a set of
symbols, rules, and definitions to mathematically define parts to be
manufactured. It is a quality assurance method widely used in the oil
and gas sector. Traditionally it is used to ensure the
interchangeability of a part without affecting its form, fit, and
function. Parts that do not meet these requirements are rejected
during quality audits.
This paper discusses how the Technology group integrates this
quality assurance tool into the PDP and how the tool plays a major
role in helping the HSE department in its goal towards eliminating
HSE incidents. The PDP involves a thorough risk assessment and
establishes a method to address those risks during the design stage.
An illustration shows how GD&T helped reduce safety risks by
ergonomically improving assembling operations. A brief discussion
explains how tolerances provided on a part help prevent finger injury.
This tool has equipped Technology to produce fixtures, which are
used daily in operations as well as manufacturing. By applying
GD&T to create good fits, HSE risks are mitigated for operating
personnel. Both customers and service providers benefit from
reduced safety risks.
Abstract: Recent research result has shown that two multidelay
feedback systems can synchronize each other under different
schemes, i.e. lag, projective-lag, anticipating, or projectiveanticipating
synchronization. There, the driving signal is significantly
complex due that it is constituted by multiple nonlinear transformations
of delayed state variable. In this paper, a secure communication
model is proposed based on synchronization of coupled multidelay
feedback systems, in which the plain signal is mixed with a complex
signal at the transmitter side and it is precisely retrieved at the receiver
side. The effectiveness of the proposed model is demonstrated and
verified in the specific example, where the message signal is masked
directly by the complex signal and security is examined under the
breaking method of power spectrum analysis.
Abstract: The purpose of this article is to introduce an advanced
system for the support of processing of medical image information,
and the terminology related to this system, which can be an important
element to a faster transition to a fully digitalized hospital.
The core of the system is a set of DICOM compliant applications
running over a dedicated computer network. The whole integrated
system creates a collaborative platform supporting daily routines in
the radiology community, developing communication channels,
supporting the exchange of information and special consultations
among various medical institutions as well as supporting medical
training for practicing radiologists and medical students. It gives the
users outside of hospitals the tools to work in almost the same
conditions as in the radiology departments.
Abstract: With the rapid growth in business size, today-s businesses orient Throughout thirty years local, national and international experience in medicine as a medical student, junior doctor and eventually Consultant and Professor in Anaesthesia, Intensive Care and Pain Management, I note significant generalised dissatisfaction among medical students and doctors regarding their medical education and practice. We repeatedly hear complaints from patients about the dysfunctional health care system they are dealing with and subsequently the poor medical service that they are receiving. Medical students are bombarded with lectures, tutorials, clinical rounds and various exams. Clinicians are weighed down with a never-ending array of competing duties. Patients are extremely unhappy about the long waiting lists, loss of their records and the continuous deterioration of the health care service. This problem has been reported in different countries by several authors [1,2,3]. In a trial to solve this dilemma, a genuine idea has been suggested implementing computer technology in medicine [2,3]. Computers in medicine are a medium of international communication of the revolutionary advances being made in the application of the computer to the fields of bioscience and medicine [4,5]. The awareness about using computers in medicine has recently increased all over the world. In Misr University for Science & Technology (MUST), Egypt, medical students are now given hand-held computers (Laptop) with Internet facility making their medical education accessible, convenient and up to date. However, this trial still needs to be validated. Helping the readers to catch up with the on going fast development in this interesting field, the author has decided to continue reviewing the literature, exploring the state-of-art in computer based medicine and up dating the medical professionals especially the local trainee Doctors in Egypt. In part I of this review article we will give a general background discussing the potential use of computer technology in the various aspects of the medical field including education, research, clinical practice and the health care service given to patients. Hope this will help starting changing the culture, promoting the awareness about the importance of implementing information technology (IT) in medicine, which is a field in which such help is needed. An international collaboration is recommended supporting the emerging countries achieving this target.
Abstract: In conducting a case study to analyze the status-quo of
the extremists’ dominance in Egypt, the author of this paper uses
qualitative research method to analyze the evolution of extreme
Islamist groups in Egypt. In conducting this qualitative research, the
author of this paper intends to use several lenses to understand the
rise and the evolution of the hegemony of extremist groups, such as
the Muslim Brotherhood and other groups in Egypt. Therefore, unless
he intends to show an important nexus between the Egyptian groups
and their sister-groups in other countries, he will intentionally
exclude analyzing extreme Islamism of non-Egyptian origins. This
case study relies on the moral disengagement theory to shed light on
the ideological evolution of extremism in Egypt. The goal of this case
study is to help in understanding extreme-Islamism adverse to the
mainstream Islam; therefore, understanding the concept here should
help in preventing similar groups from threatening the international
community.
Abstract: Truly successful bloggers, navigating the public to know them, often use their blogs as a way to better communicate with customers. Integrating with marketing tools, storytelling can be regarded as one of the most effective ways that businesses can follow to gain competitive edge. Even though the literature on marketing contains much discussion of traditional vehicles, the issue of business blogs applying storytelling has, as yet, received little attention. In the exploration stage, this paper identifies four storytelling disciplines and then presents a road map to business blogging. This paper also provides a two-path framework for blog storytelling and initiates an issue for further study.