Abstract: The aim of this work is to present a multi-objective optimization method to find maximum efficiency kinematics for a flapping wing unmanned aerial vehicle. We restrained our study to rectangular wings with the same profile along the span and to harmonic dihedral motion. It is assumed that the birdlike aerial vehicle (whose span and surface area were fixed respectively to 1m and 0.15m2) is in horizontal mechanically balanced motion at fixed speed. We used two flight physics models to describe the vehicle aerodynamic performances, namely DeLaurier-s model, which has been used in many studies dealing with flapping wings, and the model proposed by Dae-Kwan et al. Then, a constrained multi-objective optimization of the propulsive efficiency is performed using a recent evolutionary multi-objective algorithm called є-MOEA. Firstly, we show that feasible solutions (i.e. solutions that fulfil the imposed constraints) can be obtained using Dae-Kwan et al.-s model. Secondly, we highlight that a single objective optimization approach (weighted sum method for example) can also give optimal solutions as good as the multi-objective one which nevertheless offers the advantage of directly generating the set of the best trade-offs. Finally, we show that the DeLaurier-s model does not yield feasible solutions.
Abstract: Due to the constant increase in the volume of information available to applications in fields varying from medical diagnosis to web search engines, accurate support of similarity becomes an important task. This is also the case of spam filtering techniques where the similarities between the known and incoming messages are the fundaments of making the spam/not spam decision. We present a novel approach to filtering based solely on layout, whose goal is not only to correctly identify spam, but also warn about major emerging threats. We propose a mathematical formulation of the email message layout and based on it we elaborate an algorithm to separate different types of emails and find the new, numerically relevant spam types.
Abstract: This paper considers the benefits gained by using an
efficient quality of service management such as DiffServ technique to
improve the performance of military communications. Low delay and
no blockage must be achieved especially for real time tactical data.
All traffic flows generated by different applications do not need same
bandwidth, same latency, same error ratio and this scalable technique
of packet management based on priority levels is analysed. End to
end architectures supporting various traffic flows and including lowbandwidth
and high-delay HF or SHF military links as well as
unprotected Internet sub domains are studied. A tuning of Diffserv
parameters is proposed in accordance with different loads of various
traffic and different operational situations.
Abstract: In this paper, we propose a method of resolving dependency ambiguities of Korean subordinate clauses based on Support Vector Machines (SVMs). Dependency analysis of clauses is well known to be one of the most difficult tasks in parsing sentences, especially in Korean. In order to solve this problem, we assume that the dependency relation of Korean subordinate clauses is the dependency relation among verb phrase, verb and endings in the clauses. As a result, this problem is represented as a binary classification task. In order to apply SVMs to this problem, we selected two kinds of features: static and dynamic features. The experimental results on STEP2000 corpus show that our system achieves the accuracy of 73.5%.
Abstract: This study had two goals. First, it investigated marital
interaction variables as predictors of treatment outcome in panic
disorder with agoraphobia (PDA) in sixty-five couples with one
spouse suffering from PDA. Second, it analyzed the impact of PDA
improvement, following therapy, on marital interaction patterns of
both spouses. The partners were observed during a problem-solving
task, before and after treatment. Negative behaviors at the outset of
therapy, both in the PDA and the NPDA partners, predicted less
improvement at post-test. It also appears that improvement in some
PDA symptoms following therapy is linked to increase in the
dominant behavior of the NPDA spouse and to an improvement in
terms of his intrusiveness.
Abstract: The purposes of this study are 1) to study the impact
of the 3-community-core model: House (H), Temple (T), and School
(S) with the co-operation of official departments on community
development to ASEAN economic community involvement and 2) to
study the procedures and extension of the model. The research which
is a qualitative research is based on the formal and informal
interviews. Local people in a community are observed. Group
interview is, also, operated by executors and cooperators in the
school in the community. In terms of social and cultural dimension,
the 3-community-core model consisting of house, temple and school
is the base of Thai cultures bringing about understanding, happiness
and unity to the community. The result of this research is that the
official departments in accompanied with this model developers
cooperatively work together in the community to support such factors
as budget, plan, activities. Moreover, the need of community, and the
continual result to sustain the community are satisfied by the model
implementation. In terms of the procedures of the model
implementation, executors and co-operators can work, coordinate,
think, and launch their public relation altogether. Concerning the
model development, this enables the community to achieve its goal to
prepare the community’s readiness for ASEAN Economic
Community involvement.
Abstract: Worm propagation profiles have significantly changed
since 2003-2004: sudden world outbreaks like Blaster or Slammer
have progressively disappeared and slower but stealthier worms
appeared since, most of them for botnets dissemination. Decreased
worm virulence results in more difficult detection.
In this paper, we describe a stealth worm propagation model
which has been extensively simulated and analysed on a huge virtual
network. The main features of this model is its ability to infect any
Internet-like network in a few seconds, whatever may be its size while
greatly limiting the reinfection attempt overhead of already infected
hosts. The main simulation results shows that the combinatorial
topology of routing may have a huge impact on the worm propagation
and thus some servers play a more essential and significant role than
others. The real-time capability to identify them may be essential to
greatly hinder worm propagation.
Abstract: In this study the enthalpies of dissociation for pure
methane and pure carbon dioxide was calculated using a hydrate
equilibrium data obtained in this study. The enthalpy of dissociation
was determined using Clausius-Clapeyron equation. The results were
compared with the values reported in literature obtained using
various techniques.
Abstract: This study was carried out to reveal the bacterial composition of aerosol in the studied abattoirs. Bacteria isolated were characterized according to microbiological standards. Factors such as temperature and distance were considered as variable in this study. The isolation was carried out at different temperatures such as 27oC, 31oC and 29oC and at various distances of 100meters and 200meters away from the slaughter sites. Result obtained showed that strains of Staphylococcus aureus, Escherichia coli, Bacillus subtilis, Lactobacillus alimentarius and Micrococcus sp. were identified. The total viable counts showed that more microorganisms were present in the morning while the least viable count of 388cfu was recorded in the evening period of this study. This study also showed that more microbial loads were recorded the further the distance is to the slaughter site. Conclusively, the array of bacteria isolated suggests that abattoir sites may be a potential source of pathogenic organisms to commuters if located within residential environment.
Abstract: The classical temporal scan statistic is often used to
identify disease clusters. In recent years, this method has become as a
very popular technique and its field of application has been notably
increased. Many bioinformatic problems have been solved with this
technique. In this paper a new scan fuzzy method is proposed. The
behaviors of classic and fuzzy scan techniques are studied with
simulated data. ROC curves are calculated, being demonstrated the
superiority of the fuzzy scan technique.
Abstract: The public sector holds large amounts of data of
various areas such as social affairs, economy, or tourism. Various
initiatives such as Open Government Data or the EU Directive on
public sector information aim to make these data available for public
and private service providers. Requirements for the provision of
public sector data are defined by legal and organizational
frameworks. Surprisingly, the defined requirements hardly cover
security aspects such as integrity or authenticity.
In this paper we discuss the importance of these missing
requirements and present a concept to assure the integrity and
authenticity of provided data based on electronic signatures. We
show that our concept is perfectly suitable for the provisioning of
unaltered data. We also show that our concept can also be extended
to data that needs to be anonymized before provisioning by
incorporating redactable signatures. Our proposed concept enhances
trust and reliability of provided public sector data.
Abstract: The most common domestic birds live in Turkey are: crows (Corvus corone), pigeons (Columba livia), sparrows (Passer domesticus), starlings (Sturnus vulgaris) and blackbirds (Turdus merula). These birds give damage to the agricultural areas and make dirty the human life areas. In order to send away these birds, some different materials and methods such as chemicals, treatments, colored lights, flash and audible scarers are used. It is possible to see many studies about chemical methods in the literatures. However there is not enough works regarding audible bird scarers are reported in the literature. Therefore, a solar powered bird scarer was designed, manufactured and tested in this experimental investigation. Firstly, to understand the sensitive level of these domestic birds against to the audible scarer, many series preliminary studies were conducted. These studies showed that crows are the most resistant against to the audible bird scarer when compared with pigeons, sparrows, starlings and blackbirds. Therefore the solar powered audible bird scarer was tested on crows. The scarer was tested about one month during April- May, 2007. 18 different common known predators- sounds (voices or calls) of domestic birds from Falcon (Falco eleonorae), Falcon (Buteo lagopus), Eagle (Aquila chrysaetos), Montagu-s harrier (Circus pygargus) and Owl (Glaucidium passerinum) were selected for test of the scarer. It was seen from the results that the reaction of the birds was changed depending on the predators- sound type, camouflage of the scarer, sound quality and volume, loudspeaker play and pause periods in one application. In addition, it was also seen that the sound from Falcon (Buteo lagopus) was most effective on crows and the scarer was enough efficient.
Abstract: The purpose of the article is to illustrate the main
characteristics of the corporate governance challenge facing the
countries of South-Eastern Europe (SEE) and to subsequently
determine and assess the extensiveness and effectiveness of corporate
governance regulations in these countries. Therefore, we start with an
overview on the subject of the key problems of corporate governance
in transition. We then address the issue of corporate governance
measurement for SEE countries. To this end, we include a review of
the methodological framework for determining both the
extensiveness and the effectiveness of corporate governance
legislation. We then focus on the actual analysis of the quality of
corporate governance codes, as well as of legal institutions
effectiveness and provide a measure of corporate governance in
Romania and other SEE emerging markets. The paper concludes by
emphasizing the corporate governance enforcement gap and by
identifying research issues that require further study.
Abstract: The proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch. Web Application Firewall (WAF) is an intermediate tool between web server and users that provides comprehensive protection for web application. WAF is a negative security model where the detection and prevention mechanisms are based on predefined or user-defined attack signatures and patterns. However, WAF alone is not adequate to offer best defensive system against web vulnerabilities that are increasing in number and complexity daily. This paper presents a methodology to automatically design a positive security based model which identifies and allows only legitimate web queries. The paper shows a true positive rate of more than 90% can be achieved.
Abstract: Entrepreneurs are important for national labour markets and economies in that they contribute significantly to economic growth as well as provide the majority of jobs and create new ones. According to the Global Entrepreneurship Monitor’s “Report on Women and Entrepreneurship”, investment in women’s entrepreneurship is an important way to exponentially increase the impact of new venture creation finding ways to empower women’s participation and success in entrepreneurship are critical for more sustainable and successful economic development. Our results confirm that they are still differences between men and women entrepreneurs The reasons seems to be the lack of specific business skills, the less extensive social network, and the lack of identification patterns among women. Those differences can be explained by the fact that women still have fewer opportunities to make a career. If this is correct, we can predict an increasing proportion of women among entrepreneurs in the next years. Concerning the development of a favorable environment for developing and enhancing women entrepreneurship activities, our results show the insertion in a network and the role of a model doubtless represent elements determining in the choice to launch an entrepreneurship activity, as well as a precious resource for the success of her company.
Abstract: Anti-money laundering is commonly recognized as a
set of procedures, laws or regulations designed to reduce the practice
of generating income through illegal actions. In Malaysia, the
government and law enforcement agencies have stepped up their
capacities and efforts to curb money laundering since 2001. One of
these measures was the enactment of the Anti-Money Laundering
Act (AMLA) in 2001. The implementation costs on anti-money
laundering requirements (AMLR) can be burdensome to those who
are involved in enforcing them. The objective of this paper is to
explore the perceived effectiveness of AMLR from the enforcement
agencies- perspective. This is a preliminary study whose findings
will help to give direction for further AML research in Malaysia. In
addition, the results of this study provide empirical evidences on the
perceived effectiveness of AMLR prior to further investigations on
barriers and improvements of the implementation of the anti-money
laundering regime in Malaysia.
Abstract: A plausible architecture of an ancient genetic code is derived from an extended base triplet vector space over the Galois field of the extended base alphabet {D, G, A, U, C}, where the letter D represent one or more hypothetical bases with unspecific pairing. We hypothesized that the high degeneration of a primeval genetic code with five bases and the gradual origin and improvements of a primitive DNA repair system could make possible the transition from the ancient to the modern genetic code. Our results suggest that the Watson-Crick base pairing and the non-specific base pairing of the hypothetical ancestral base D used to define the sum and product operations are enough features to determine the coding constraints of the primeval and the modern genetic code, as well as the transition from the former to the later. Geometrical and algebraic properties of this vector space reveal that the present codon assignment of the standard genetic code could be induced from a primeval codon assignment. Besides, the Fourier spectrum of the extended DNA genome sequences derived from the multiple sequence alignment suggests that the called period-3 property of the present coding DNA sequences could also exist in the ancient coding DNA sequences.
Abstract: This paper introduces and proves new concept of salt
dissolving in water as very tiny solid sodium chloride particles of
nanovolumes, from this point of view salt water can be desalinated by
collision with special surface characterized by smoothness upon nano
level, high rigidity, high hardness under appropriate conditions of
water launching in the form of thin laminar flow under suitable speed
and angle of incidence to get desalinated water.
Abstract: This study examines the mediating effects of male
dyadic adjustment on the relationships between attachment and
attributional styles, and both psychological and physical husband
violence. Based on data from 68 married violent men recruited
through community organizations that work with violent men,
regression analyses showed that husbands- dyadic adjustment
mediates the associations between avoidant attachment and
attributional style, and psychological aggression, but not physical
violence. Scientific and clinical implications are discussed
Abstract: According to dramatic growth of internet services, an easy and prompt service deployment has been important for internet service providers to successfully maintain time-to-market. Before global service deployment, they have to pay the big cost for service evaluation to make a decision of the proper system location, system scale, service delay and so on. But, intra-Lab evaluation tends to have big gaps in the measured data compared with the realistic situation, because it is very difficult to accurately expect the local service environment, network congestion, service delay, network bandwidth and other factors. Therefore, to resolve or ease the upper problems, we propose multiple cloud based GPES Broker system and use case that helps internet service providers to alleviate the above problems in beta release phase and to make a prompt decision for their service launching. By supporting more realistic and reliable evaluation information, the proposed GPES Broker system saves the service release cost and enables internet service provider to make a prompt decision about their service launching to various remote regions.