Abstract: Nigerian bread is baked with vitamin A fortified wheat flour. Study aimed at determining its contribution to preschoolers- vitamin A nutriture. A cross-sectional/experimental study was carried out in four poor-urban Local Government Areas (LGAs) of Metropolitan Lagos, Nigeria. A pretested food frequency questionnaire was administered to randomly selected mothers of 1600 preschoolers (24-59 months). Retinyl Palmitate content of fourteen bread samples randomly collected from bakeries in all LGAs was analyzed at 0 and 5 days at 25oC using High Performance Liquid Chromatography. Data analysis was done at p
Abstract: Secure electronic payment system is presented in this
paper. This electronic payment system is to be secure for clients such
as customers and shop owners. The security architecture of the
system is designed by RC5 encryption / decryption algorithm. This
eliminates the fraud that occurs today with stolen credit card
numbers. The symmetric key cryptosystem RC5 can protect
conventional transaction data such as account numbers, amount and
other information. This process can be done electronically using RC5
encryption / decryption program written by Microsoft Visual Basic
6.0. There is no danger of any data sent within the system being
intercepted, and replaced. The alternative is to use the existing
network, and to encrypt all data transmissions. The system with
encryption is acceptably secure, but that the level of encryption has
to be stepped up, as computing power increases. Results In order to
be secure the system the communication between modules is
encrypted using symmetric key cryptosystem RC5. The system will
use simple user name, password, user ID, user type and cipher
authentication mechanism for identification, when the user first
enters the system. It is the most common method of authentication in
most computer system.
Abstract: In this study, a synthetic pathway was created by
assembling genes from Clostridium butyricum and Escherichia coli
in different combinations. Among the genes were dhaB1 and dhaB2
from C. butyricum VPI1718 coding for glycerol dehydratase (GDHt)
and its activator (GDHtAc), respectively, involved in the conversion
of glycerol to 3-hydroxypropionaldehyde (3-HPA). The yqhD gene
from E.coli BL21 was also included which codes for an NADPHdependent
1,3-propanediol oxidoreductase isoenzyme (PDORI)
reducing 3-HPA to 1,3-propanediol (1,3-PD). Molecular modeling
analysis indicated that the conformation of fusion protein of YQHD
and DHAB1 was favorable for direct molecular channeling of the
intermediate 3-HPA. According to the simulation results, the yqhD
and dhaB1 gene were assembled in the upstream of dhaB2 to express
a fusion protein, yielding the recombinant strain E. coliBL21
(DE3)//pET22b+::yqhD-dhaB1_dhaB2 (strain BP41Y3). Strain
BP41Y3 gave 10-fold higher 1,3-PD concentration than E. coliBL21
(DE3)//pET22b+::yqhD-dhaB1_dhaB2 (strain BP31Y2) expressing
the recombinant enzymes simultaneously but in a non-fusion mode.
This is the first report using a gene fusion approach to enhance the
biological conversion of glycerol to the value added compound 1,3-
PD.
Abstract: Business continuity management (BCM) identifies
potential external and internal threats to an organization and their
impacts to business operations. The goal of the article is to identify,
based on the analysis of employee turnover in organizations in the
Czech Republic, the role of personnel planning in BCM. The article
is organized as follows. The first part of the article concentrates on
the theoretical background of the topic. The second part of the article
is dedicated to the evaluation of the outcomes of the survey
conducted (questionnaire survey), focusing on the analysis of
employee turnover in organizations in the Czech Republic. The final
part of the article underlines the role of personnel planning in BCM,
since poor planning of staff needs in an organization can represent
a future threat for business continuity ensuring.
Abstract: Termination Mechanism is an indispensible part of the
emergency management mechanism. Despite of its importance in both
theory and practice, it is almost a brand new field for researching. The
concept of termination mechanism is proposed firstly in this paper,
and the design and implementation which are helpful to guarantee the
effect and integrity of emergency management are discussed secondly.
Starting with introduction of the problems caused by absent
termination and incorrect termination, the essence of termination
mechanism is analyzed, a model based on Optimal Stopping Theory is
constructed and the termination index is given. The model could be
applied to find the best termination time point.. Termination decision
should not only be concerned in termination stage, but also in the
whole emergency management process, which makes it a dynamic
decision making process. Besides, the main subjects and the procedure
of termination are illustrated after the termination time point is given.
Some future works are discussed lastly.
Abstract: In this paper, a watermarking algorithm that uses the wavelet transform with Multiple Description Coding (MDC) and Quantization Index Modulation (QIM) concepts is introduced. Also, the paper investigates the role of Contourlet Transform (CT) versus Wavelet Transform (WT) in providing robust image watermarking. Two measures are utilized in the comparison between the waveletbased and the contourlet-based methods; Peak Signal to Noise Ratio (PSNR) and Normalized Cross-Correlation (NCC). Experimental results reveal that the introduced algorithm is robust against different attacks and has good results compared to the contourlet-based algorithm.
Abstract: the research was conducted using the self report of
shoplifters who apprehended in the supermarket while stealing. 943
shoplifters in three years were interviewed right after the stealing act
and before calling the police. The aim of the study is to know the
shoplifting characteristics in Saudi Arabia, including the trait of
shoplifters and the situation of the supermarkets where the stealing
takes place. The analysis based on the written information about each
thief as the documentary research method. Descriptive statistics as
well as some inferential statistics were employed. The result shows
that there are differences between genders, age groups, occupations,
time of the day, days of the week, months, way of stealing, individual
or group of thieves and other supermarket situations in the type of
items stolen, total price and the count of items. The result and the
recommendation will serve as a guide for retailers where, when and
who to look at to prevent shoplifting.
Abstract: A motion protection system is designed for a parallel
motion platform with subsided cabin. Due to its complex structure,
parallel mechanism is easy to encounter interference problems
including link length limits, joints limits and self-collision. Thus a
virtual spring algorithm in operational space is developed for the
motion protection system to avoid potential damages caused by
interference. Simulation results show that the proposed motion
protection system can effectively eliminate interference problems and
ensure safety of the whole motion platform.
Abstract: In Peer-to-Peer service networks, where peers offer any kind of publicly available services or applications, intuitive navigation through all services in the network becomes more difficult as the number of services increases. In this article, a concept is discussed that enables users to intuitively browse and use large scale P2P service networks. The concept extends the idea of creating virtual 3D-environments solely based on Peer-to-Peer technologies. Aside from browsing, users shall have the possibility to emphasize services of interest using their own semantic criteria. The appearance of the virtual world shall intuitively reflect network properties that may be of interest for the user. Additionally, the concept comprises options for load- and traffic-balancing. In this article, the requirements concerning the underlying infrastructure and the graphical user interface are defined. First impressions of the appearance of future systems are presented and the next steps towards a prototypical implementation are discussed.
Abstract: IVE toolkit has been created for facilitating research,education and development in the field of virtual storytelling and computer games. Primarily, the toolkit is intended for modelling action selection mechanisms of virtual humans, investigating level-of-detail AI techniques for large virtual environments, and for exploring joint behaviour and role-passing technique (Sec. V). Additionally, the toolkit can be used as an AI middleware without any changes. The main facility of IVE is that it serves for prototyping both the AI and virtual worlds themselves. The purpose of this paper is to describe IVE's features in general and to present our current work - including an educational game - on this platform.
Abstract: This study presents a systematic analysis of the
dynamic behaviors of a gear-bearing system with porous squeeze film
damper (PSFD) under nonlinear suspension, nonlinear oil-film force
and nonlinear gear meshing force effect. It can be found that the
system exhibits very rich forms of sub-harmonic and even the chaotic
vibrations. The bifurcation diagrams also reveal that greater values of
permeability may not only improve non-periodic motions effectively,
but also suppress dynamic amplitudes of the system. Therefore, porous
effect plays an important role to improve dynamic stability of
gear-bearing systems or other mechanical systems. The results
presented in this study provide some useful insights into the design
and development of a gear-bearing system for rotating machinery that
operates in highly rotational speed and highly nonlinear regimes.
Abstract: The chemical degradation of dieldrin in ferric
sulfide and iron powder aqueous suspension was investigated
in laboratory batch type experiments. To identify the reaction
mechanism, reduced copper was used as reductant. More than
90% of dieldrin was degraded using both reaction systems after
29 days. Initial degradation rate of the pesticide using ferric
sulfide was superior to that using iron powder. The reaction
schemes were completely dissimilar even though the ferric ion
plays an important role in both reaction systems. In the case of
metallic iron powder, dieldrin undergoes partial dechlorination.
This reaction proceeded by reductive hydrodechlorination with
the generation of H+, which arise by oxidation of ferric iron.
This reductive reaction was accelerated by reductant but
mono-dechlorination intermediates were accumulated. On the
other hand, oxidative degradation was observed in the reaction
with ferric sulfide, and the stable chemical structure of dieldrin
was decomposed into water-soluble intermediates. These
reaction intermediates have no chemical structure of drin class.
This dehalogenation reaction assumes to occur via the adsorbed
hydroxyl radial generated on the surface of ferric sulfide.
Abstract: Traditionally, terror groups have been formed by ideologically aligned actors who perceive a lack of options for achieving political or social change. However, terrorist attacks have been increasingly carried out by small groups of actors or lone individuals who may be only ideologically affiliated with larger, formal terrorist organizations. The formation of these groups represents the inverse of traditional organizational growth, whereby structural de-evolution within issue-based organizations leads to the formation of small, independent terror cells. Ideological franchising – the bypassing of formal affiliation to the “parent" organization – represents the de-evolution of traditional concepts of organizational structure in favor of an organic, independent, and focused unit. Traditional definitions of dark networks that are issue-based include focus on an identified goal, commitment to achieving this goal through unrestrained actions, and selection of symbolic targets. The next step in the de-evolution of small dark networks is the miniorganization, consisting of only a handful of actors working toward a common, violent goal. Information-sharing through social media platforms, coupled with civil liberties of democratic nations, provide the communication systems, access to information, and freedom of movement necessary for small dark networks to flourish without the aid of a parent organization. As attacks such as the 7/7 bombings demonstrate the effectiveness of small dark networks, terrorist actors will feel increasingly comfortable aligning with an ideology only, without formally organizing. The natural result of this de-evolving organization is the single actor event, where an individual seems to subscribe to a larger organization-s violent ideology with little or no formal ties.
Abstract: Research on damage of gears and gear pairs using
vibration signals remains very attractive, because vibration signals
from a gear pair are complex in nature and not easy to interpret.
Predicting gear pair defects by analyzing changes in vibration signal
of gears pairs in operation is a very reliable method. Therefore, a
suitable vibration signal processing technique is necessary to extract
defect information generally obscured by the noise from dynamic
factors of other gear pairs.This article presents the value of cepstrum
analysis in vehicle gearbox fault diagnosis. Cepstrum represents the
overall power content of a whole family of harmonics and sidebands
when more than one family of sidebands is present at the same time.
The concept for the measurement and analysis involved in using the
technique are briefly outlined. Cepstrum analysis is used for detection
of an artificial pitting defect in a vehicle gearbox loaded with
different speeds and torques. The test stand is equipped with three
dynamometers; the input dynamometer serves asthe internal
combustion engine, the output dynamometers introduce the load on
the flanges of the output joint shafts. The pitting defect is
manufactured on the tooth side of a gear of the fifth speed on the
secondary shaft. Also, a method for fault diagnosis of gear faults is
presented based on order Cepstrum. The procedure is illustrated with
the experimental vibration data of the vehicle gearbox. The results
show the effectiveness of Cepstrum analysis in detection and
diagnosis of the gear condition.
Abstract: Negation is useful in the majority of the real world applications. However, its introduction leads to semantic and canonical problems. SEPN nets are well adapted extension of predicate nets for the definition and manipulation of stratified programs. This formalism is characterized by two main contributions. The first concerns the management of the whole class of stratified programs. The second contribution is related to usual operations optimization (maximal stratification, incremental updates ...). We propose, in this paper, useful algorithms for manipulating stratified programs using SEPN. These algorithms were implemented and validated with STRPRO tool.
Abstract: The study was designed to develop a measurement of
the positive emotion regulation questionnaire (PERQ) that assesses
positive emotion regulation strategies through self-report. The 14
items developed for the surveying instrument of the study were based
upon literatures regarding elements of positive regulation strategies.
319 elementary students (age ranging from 12 to14) were recruited
among three public elementary schools to survey on their use of
positive emotion regulation strategies. Of 319 subjects, 20 invalid
questionnaire s yielded a response rate of 92%. The data collected
wasanalyzed through methods such as item analysis, factor analysis,
and structural equation models. In reference to the results from item
analysis, the formal survey instrument was reduced to 11 items. A
principal axis factor analysis with varimax was performed on
responses, resulting in a 2-factor equation (savoring strategy and
neutralizing strategy), which accounted for 55.5% of the total
variance. Then, the two-factor structure of scale was also identified by
structural equation models. Finally, the reliability coefficients of the
two factors were Cronbach-s α .92 and .74. Gender difference was
only found in savoring strategy. In conclusion, the positive emotion
regulation strategies questionnaire offers a brief, internally consistent,
and valid self-report measure for understanding the emotional
regulation strategies of children that may be useful to researchers and
applied professionals.
Abstract: In recent years, there has been an increasing interest
toward the use of bovine genotyped embryos for commercial embryo
transfer programs. Biopsy of a few cells in morulla stage is essential
for preimplantation genetic diagnosis (PGD). Low amount of DNA
have limited performing the several molecular analyses within PGD
analyses. Whole genome amplification (WGA) promises to eliminate
this problem. We evaluated the possibility and performance of an
improved primer extension preamplification (I-PEP) method with a
range of starting bovine genomic DNA from 1-8 cells into the WGA
reaction. We optimized a short and simple I-PEP (ssI-PEP) procedure
(~3h). This optimized WGA method was assessed by 6 loci specific
polymerase chain reactions (PCRs), included restriction fragments
length polymorphism (RFLP). Optimized WGA procedure possesses
enough sensitivity for molecular genetic analyses through the few
input cells. This is a new era for generating characterized bovine
embryos in preimplantation stage.
Abstract: The aim of this research was to calculate the thermal
properties of Au3Ni Nanowire. The molecular dynamics (MD)
simulation technique was used to obtain the effect of radius size on
the energy, the melting temperature and the latent heat of fusion at
the isobaric-isothermal (NPT) ensemble. The Quantum Sutton-Chen
(Q-SC) many body interatomic potentials energy have been used for
Gold (Au) and Nickel (Ni) elements and a mixing rule has been
devised to obtain the parameters of these potentials for nanowire
stats. Our MD simulation results show the melting temperature and
latent heat of fusion increase upon increasing diameter of nanowire.
Moreover, the cohesive energy decreased with increasing diameter of
nanowire.
Abstract: The need to implement intelligent highways is much
more emphasized with the growth of vehicle production line as well as vehicle intelligence. The control of intelligent vehicles in order to
reduce human error and boost ease congestion is not accomplished solely by the aid of human resources. The present article is an attempt
to introduce an intelligent control system based on a single central computer. In this project, central computer, without utilizing Global
Positioning System (GPS), is capable of tracking all vehicles, crisis management and control, traffic guidance and recording traffic
crimes along the highway. By the help of RFID technology, vehicles
are connected to computerized systems, intelligent light poles and
other available hardware along the way. By the aid of Wimax
communicative technology, all components of the system are
virtually connected together through local and global networks
devised in them and the energy of the network is provided by the
solar cells installed on the intelligent light poles.
Abstract: This paper proposes a new technique for improving
the efficiency of software testing, which is based on a conventional
attempt to reduce test cases that have to be tested for any given
software. The approach utilizes the advantage of Regression Testing
where fewer test cases would lessen time consumption of the testing
as a whole. The technique also offers a means to perform test case
generation automatically. Compared to one of the techniques in the
literature where the tester has no option but to perform the test case
generation manually, the proposed technique provides a better
option. As for the test cases reduction, the technique uses simple
algebraic conditions to assign fixed values to variables (Maximum,
minimum and constant variables). By doing this, the variables values
would be limited within a definite range, resulting in fewer numbers
of possible test cases to process. The technique can also be used in
program loops and arrays.