Abstract: This study examined the effects of eight weeks of
whole-body vibration training (WBVT) on vertical and decuple jump
performance in handball athletes. Sixteen collegiate Level I handball
athletes volunteered for this study. They were divided equally as
control group and experimental group (EG). During the period of the
study, all athletes underwent the same handball specific training, but
the EG received additional WBVT (amplitude: 2 mm, frequency: 20 -
40 Hz) three time per week for eight consecutive weeks. The vertical
jump performance was evaluated according to the maximum height of
squat jump (SJ) and countermovement jump (CMJ). Single factor
ANCOVA was used to examine the differences in each parameter
between the groups after training with the pretest values as a covariate.
The statistic significance was set at p < .05. After 8 weeks WBVT, the
EG had significantly improved the maximal height of SJ (40.92 ± 2.96
cm vs. 48.40 ± 4.70 cm, F = 5.14, p < .05) and the maximal height
CMJ (47.25 ± 7.48 cm vs. 52.20 ± 6.25 cm, F = 5.31, p < .05). 8 weeks
of additional WBVT could improve the vertical and decuple jump
performance in handball athletes. Enhanced motor unit
synchronization and firing rates, facilitated muscular contraction
stretch-shortening cycle, and improved lower extremity
neuromuscular coordination could account for these enhancements.
Abstract: During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Abstract: In this paper, a PSO-based approach is proposed to
derive a digital controller for redesigned digital systems having an interval plant based on resemblance of the extremal gain/phase
margins. By combining the interval plant and a controller as an interval system, extremal GM/PM associated with the loop transfer function
can be obtained. The design problem is then formulated as an optimization problem of an aggregated error function revealing the deviation on the extremal GM/PM between the redesigned digital
system and its continuous counterpart, and subsequently optimized by
a proposed PSO to obtain an optimal set of parameters for the digital controller. Computer simulations have shown that frequency
responses of the redesigned digital system having an interval plant bare a better resemblance to its continuous-time counter part by the incorporation of a PSO-derived digital controller in comparison to those obtained using existing open-loop discretization methods.
Abstract: Ensemble learning algorithms such as AdaBoost and
Bagging have been in active research and shown improvements in
classification results for several benchmarking data sets with mainly
decision trees as their base classifiers. In this paper we experiment to
apply these Meta learning techniques with classifiers such as random
forests, neural networks and support vector machines. The data sets
are from MAGIC, a Cherenkov telescope experiment. The task is to
classify gamma signals from overwhelmingly hadron and muon
signals representing a rare class classification problem. We compare
the individual classifiers with their ensemble counterparts and
discuss the results. WEKA a wonderful tool for machine learning has
been used for making the experiments.
Abstract: This paper proposes a new of cloud computing for individual computer users to share applications in distributed communities, called community-based personal cloud computing (CPCC). The paper also presents a prototype design and implementation of CPCC. The users of CPCC are able to share their computing applications with other users of the community. Any member of the community is able to execute remote applications shared by other members. The remote applications behave in the same way as their local counterparts, allowing the user to enter input, receive output as well as providing the access to the local data of the user. CPCC provides a peer-to-peer (P2P) environment where each peer provides applications which can be used by the other peers that are connected CPCC.
Abstract: The importance for manipulating an incorporated
scaffold and directing cell behaviors is well appreciated for tissue
engineering. Here, we developed newly nano-topographic oxidized
silicon nanosponges capable of being various chemical modifications
to provide much insight into the fundamental biology of how cells
interact with their surrounding environment in vitro. A wet etching
technique is exerted to allow us fabricated the silicon nanosponges in a
high-throughput manner. Furthermore, various organo-silane
chemicals enabled self-assembled on the surfaces by vapor deposition.
We have found that Chinese hamster ovary (CHO) cells displayed
certain distinguishable morphogenesis, adherent responses, and
biochemical properties while cultured on these chemical modified
nano-topographic structures in compared with the planar oxidized
silicon counterparts, indicating that cell behaviors can be influenced
by certain physical characteristic derived from nano-topography in
addition to the hydrophobicity of contact surfaces crucial for cell
adhesion and spreading. Of particular, there were predominant
nano-actin punches and slender protrusions formed while cells were
cultured on the nano-topographic structures. This study shed potential
applications of these nano-topographic biomaterials for controlling
cell development in tissue engineering or basic cell biology research.
Abstract: Determination of wellbore problems during a
production/injection process might be evaluated thorough
temperature log analysis. Other applications of this kind of log
analysis may also include evaluation of fluid distribution analysis
along the wellbore and identification of anomalies encountered
during production/injection process. While the accuracy of such
prediction is paramount, the common method of determination of a
wellbore temperature log includes use of steady-state energy balance
equations, which hardly describe the real conditions as observed in
typical oil and gas flowing wells during production operation; and
thus increase level of uncertainties. In this study, a practical method
has been proposed through development of a simplified semianalytical
model to apply for predicting temperature profile along the
wellbore. The developed model includes an overall heat transfer
coefficient accounting all modes of heat transferring mechanism,
which has been focused on the prediction of a temperature profile as
a function of depth for the injection/production wells. The model has
been validated with the results obtained from numerical simulation.
Abstract: The counter flow solar air heaters, with four
transverse fins and wire mesh layers are constructed and investigated
experimentally for thermal efficiency at a geographic location of
Cyprus in the city of Famagusta. The absorber plate is replaced by
sixteen steel wire mesh layers, 0.18 x 0.18cm in cross section
opening and a 0.02cm in diameter. The wire mesh layers arranged in
three groups, first and second include 6 layers, while the third include
4 layers. All layers fixed in the duct parallel to the glazing and each
group separated from the others by wood frame thickness of 0.5cm to
reduce the pressure drop. The transverse fins arranged in a way to
force the air to flow through the bed like eight letter path with flow
depth 3cm. The proposed design has increased the heat transfer rate,
but on other hand causes a high pressure drop. The obtained results
show that, for air mass flow rate range between 0.011-0.036kg/s, the
thermal efficiency increases with increasing the air mass flow. The
maximum efficiency obtained is 65.6% for the mass flow rate of
0.036kg/s. Moreover, the temperature difference between the outlet
flow and the ambient temperature, ΔT, reduces as the air mass flow
rate increase. The maximum difference between the outlet and
ambient temperature obtained was 43°C for double pass for minimum
mass flow rate of 0.011kg/s. Comparison with a conventional solar
air heater collector shows a significantly development in the thermal
efficiency.
Abstract: We developed a new method based on quasimolecular
modeling to simulate the cavity flow in three cavity
shapes: rectangular, half-circular and bucket beer in cgs units. Each
quasi-molecule was a group of particles that interacted in a fashion
entirely analogous to classical Newtonian molecular interactions.
When a cavity flow was simulated, the instantaneous velocity vector
fields were obtained by using an inverse distance weighted
interpolation method. In all three cavity shapes, fluid motion was
rotated counter-clockwise. The velocity vector fields of the three
cavity shapes showed a primary vortex located near the upstream
corners at time t ~ 0.500 s, t ~ 0.450 s and t ~ 0.350 s, respectively.
The configurational kinetic energy of the cavities increased as time
increased until the kinetic energy reached a maximum at time t ~
0.02 s and, then, the kinetic energy decreased as time increased. The
rectangular cavity system showed the lowest kinetic energy, while
the half-circular cavity system showed the highest kinetic energy.
The kinetic energy of rectangular, beer bucket and half-circular
cavities fluctuated about stable average values 35.62 x 103, 38.04 x
103 and 40.80 x 103 ergs/particle, respectively. This indicated that the
half-circular shapes were the most suitable shape for a shrimp pond
because the water in shrimp pond flows best when we compared with
rectangular and beer bucket shape.
Abstract: A therapeutic success is the aim of any therapeutic
intervention, but a therapeutic failure is the other side of the same
coin. The purpose of this study is to present the activity of a personal
development group, composed of 14 participants (psychologists,
doctors and a priest) registered for a 2 days course of integrative
psychotherapy. The objectives of this study are centred on: the
management of the personal development group breaking moment
realized by the therapist/trainer; the analysis of the trainer’s personal
situation and of some group participants and the brief presentation of
the main work methods applied on participants in the repairing of the
therapeutic relation and in the counter transfer management. The
therapist’s orientation is an integrative one and the demarche realized
includes T.A. techniques, role play, Gestalt and family systemic
psychotherapy. The conclusions obtained represent landmarks for the
future activity within that group and strengthen the therapeutic
relation with the group.
Abstract: While financial institutions have faced difficulties
over the years for a multitude of reasons, the major cause of serious
banking problems continues to be directly related to lax credit
standards for borrowers and counterparties, poor portfolio risk
management, or a lack of attention to changes in economic or other
circumstances that can lead to a deterioration in the credit standing of
a bank's counterparties. Credit risk is most simply defined as the
potential that a bank borrower or counterparty will fail to meet its
obligations in accordance with agreed terms. The goal of credit risk
management is to maximize a bank's risk-adjusted rate of return by
maintaining credit risk exposure within acceptable parameters. Banks
need to manage the credit risk inherent in the entire portfolio as well
as the risk in individual credits or transactions. Banks should also
consider the relationships between credit risk and other risks. The
effective management of credit risk is a critical component of a
comprehensive approach to risk management and essential to the
long-term success of any banking organization. In this research we
also study the relationship between credit risk indices and borrower-s
timely payback in Karafarin bank.
Abstract: In this paper, we propose a novel metal oxide
semiconductor field effect transistor with L-shaped channel structure
(LMOS), and several type of L-shaped structures are also designed,
studied and compared with the conventional MOSFET device for the
same average gate length (Lavg). The proposed device electrical
characteristics are analyzed and evaluated by three dimension (3-D)
ISE-TCAD simulator. It can be confirmed that the LMOS devices
have higher on-state drain current and both lower drain-induced
barrier lowering (DIBL) and subthreshold swing (S.S.) than its
conventional counterpart has. In addition, the transconductance and
voltage gain properties of the LMOS are also improved.
Abstract: Attitude Determination (AD) of a spacecraft using the
phase measurements of the Global Navigation Satellite System
(GNSS) is an active area of research. Various attitude determination
algorithms have been developed in yester years for spacecrafts using
different sensors but the last two decades have witnessed a
phenomenal increase in research related with GPS receivers as a
stand-alone sensor for determining the attitude of satellite using the
phase measurements of the signals from GNSS. The GNSS-based
Attitude determination algorithms have been experimented in many
real missions. The problem of AD algorithms using GNSS phase
measurements has two important parts; the ambiguity resolution and
the determining of attitude. Ambiguity resolution is the widely
addressed topic in literature for implementing the AD algorithm
using GNSS phase measurements for achieving the accuracy of
millimeter level. This paper broadly overviews the different
techniques for resolving the integer ambiguities encountered in AD
using GNSS phase measurements.
Abstract: A person-to-person information sharing is easily realized
by P2P networks in which servers are not essential. Leakage
of information, which are caused by malicious accesses for P2P
networks, has become a new social issues. To prevent information
leakage, it is necessary to detect and block traffics of P2P software.
Since some P2P softwares can spoof port numbers, it is difficult to
detect the traffics sent from P2P softwares by using port numbers.
It is more difficult to devise effective countermeasures for detecting
the software because their protocol are not public.
In this paper, a discriminating method of network applications
based on communication characteristics of application messages
without port numbers is proposed. The proposed method is based
on an assumption that there can be some rules about time intervals
to transmit messages in application layer and the number of necessary
packets to send one message. By extracting the rule from network
traffic, the proposed method can discriminate applications without
port numbers.
Abstract: For higher order multiplications, a huge number of
adders or compressors are to be used to perform the partial product
addition. We have reduced the number of adders by introducing
special kind of adders that are capable to add five/six/seven bits per
decade. These adders are called compressors. Binary counter
property has been merged with the compressor property to develop
high order compressors. Uses of these compressors permit the
reduction of the vertical critical paths. A 16×16 bit multiplier has
been developed using these compressors. These compressors make
the multipliers faster as compared to the conventional design that
have been used 4-2 compressors and 3-2 compressors.
Abstract: Biomimicry has many potential benefits as many
technologies found in nature are superior to their man-made
counterparts. As technological device components approach the micro
and nanoscale, surface properties such as surface adhesion and friction
may need to be taken into account. Lowering surface adhesion by
manipulating chemistry alone might no longer be sufficient for such
components and thus physical manipulation may be required.
Adhesion reduction is only one of the many surface functions
displayed by micro/nano-structured cuticles of insects. Here, we
present a mini review of our understanding of insect cuticle structures
and the relationship between the structure dimensions and the
corresponding functional mechanisms. It may be possible to introduce
additional properties to material surfaces (indeed multi-functional
properties) based on the design of natural surfaces.
Abstract: The proposed paper examines strategies whose aim is
to counter the all too often sighted process of abandonment that
characterizes contemporary cities. The city of Nicosia in Cyprus is
used as an indicative case study, whereby several recent projects are
presented as capitalizing on traditional cultural assets to revive the
downtown. The reuse of existing building stock as museums,
performing arts centers and theaters but also as in the form of various
housing typologies is geared to strengthen the ranks of local residents
and to spur economic growth. Unlike the examples from the 1960s,
the architecture of more recent adaptive reuse for urban regeneration
seems to be geared in reinforcing a connection to the city where the
buildings often reflect the characteristics of their urban context.
Abstract: Power flow (PF) study, which is performed to
determine the power system static states (voltage magnitudes and
voltage angles) at each bus to find the steady state operating
condition of a system, is very important and is the most frequently
carried out study by power utilities for power system planning,
operation and control. In this paper, a counterpropagation neural
network (CPNN) is proposed to solve power flow problem under
different loading/contingency conditions for computing bus voltage
magnitudes and angles of the power system. The counterpropagation
network uses a different mapping strategy namely
counterpropagation and provides a practical approach for
implementing a pattern mapping task, since learning is fast in this
network. The composition of the input variables for the proposed
neural network has been selected to emulate the solution process of a
conventional power flow program. The effectiveness of the proposed
CPNN based approach for solving power flow is demonstrated by
computation of bus voltage magnitudes and voltage angles for
different loading conditions and single line-outage contingencies in
IEEE 14-bus system.
Abstract: Higher-order Statistics (HOS), also known as
cumulants, cross moments and their frequency domain counterparts,
known as poly spectra have emerged as a powerful signal processing
tool for the synthesis and analysis of signals and systems. Algorithms
used for the computation of cross moments are computationally
intensive and require high computational speed for real-time
applications. For efficiency and high speed, it is often advantageous
to realize computation intensive algorithms in hardware. A promising
solution that combines high flexibility together with the speed of a
traditional hardware is Field Programmable Gate Array (FPGA). In
this paper, we present FPGA-based parallel architecture for the
computation of third-order cross moments. The proposed design is
coded in Very High Speed Integrated Circuit (VHSIC) Hardware
Description Language (VHDL) and functionally verified by
implementing it on Xilinx Spartan-3 XC3S2000FG900-4 FPGA.
Implementation results are presented and it shows that the proposed
design can operate at a maximum frequency of 86.618 MHz.
Abstract: A total of fourteen slab-edge beam-column connection specimens were tested gradually to failure under the effect of simultaneous action of shear force and moment. The objective was to investigate the influence of some parameters thought to be important on the behavior and strength of slab-column connections with edge beams encountered in flat slab flooring and roofing systems. The parameters included the existence and strength of edge beam, depth and width of edge beam, steel reinforcement ratio of slab, ratio of moment to shear force, and the existence of openings in the region next to the column.
Results obtained demonstrated the importance of the studied parameters on the strength and behavior of slab-column connections with edge beams.