Abstract: People usually have a telephone voice, which means
they adjust their speech to fit particular situations and to blend in with
other interlocutors. The question is: Do we speak differently to
different people? This possibility has been suggested by social
psychologists within Accommodation Theory [1]. Converging toward
the speech of another person can be regarded as a polite speech
strategy while choosing a language not used by the other interlocutor
can be considered as the clearest example of speech divergence [2].
The present study sets out to investigate such processes in the course
of everyday telephone conversations. Using Joos-s [3] model of
formality in spoken English, the researchers try to explore
convergence to or divergence from the addressee. The results
propound the actuality that lexical choice, and subsequently, patterns
of style vary intriguingly in concordance with the person being
addressed.
Abstract: Although the STL (stereo lithography) file format is
widely used as a de facto industry standard in the rapid prototyping
industry due to its simplicity and ability to tessellation of almost all
surfaces, but there are always some defects and shortcoming in their
usage, which many of them are difficult to correct manually. In
processing the complex models, size of the file and its defects grow
extremely, therefore, correcting STL files become difficult. In this
paper through optimizing the exiting algorithms, size of the files and
memory usage of computers to process them will be reduced. In spite
of type and extent of the errors in STL files, the tail-to-head
searching method and analysis of the nearest distance between tails
and heads techniques were used. As a result STL models sliced
rapidly, and fully closed contours produced effectively and errorless.
Abstract: This study presents a systematic analysis of wetted region due to cooling of aluminum plate by water spray impingement with respect to different water flow rates, spray nozzle heights, and subcooling. Unlike jet impingement, the wetting is not commenced upon spray impingement and there is a delay in wetness of hot test surface. After initiation, the wetting (black zone) progresses gradually to cover all test plate and provides efficient cooling in nucleate boiling regime. Generally, spray cooling is found function of spray flow rate, spray-to-surface distance and water subcooling. Wetting delay is decreasing by increasing of spray flow rate until spray impact area is not become bigger that test surface. Otherwise, higher spray flow rate is not practically accelerated start of wetting. Very fast wetting due to spray cooling can be obtained by dense spray (high floe rate) discharged from adjacent nozzle to the test surface. Highly subcooling water spray also triggers earlier wetting of hot aluminum plate.
Abstract: In sport, human resources management gives special
attention to method of applying volunteers, their maintenance, and
participation of volunteers with each other and management
approaches for better operation of events celebrants. The recognition
of volunteers- characteristics and motives is important to notice,
because it makes the basis of their participation and commitment at
sport environment. The motivation and commitment of 281
volunteers were assessed using the organizational commitment scale,
motivation scale and personal characteristics questionnaire.The
descriptive results showed that; 64% of volunteers were women with
age average 21/24 years old. They were physical education student,
single (71/9%), without occupation (53%) and with average of 5
years sport experience. Their most important motivation was career
factor and the most important commitment factor was normative
factor. The results of examining the hypothesized showed that; age,
sport experience and education are effective in the amount of
volunteers- commitment. And the motive factors such as career,
material, purposive and protective factors also have the power to
predict the amount of sports volunteers- commitment value.
Therefore it is recommended to provide possible opportunities for
volunteers and carrying out appropriate instructional courses by
events executive managers.
Abstract: Nowadays, consumption of whole flours and flours
with high extraction rate is recommended, because of their high
amount of fibers, vitamins and minerals. Despite nutritional benefits
of whole flour, concentration of some undesirable components such
as phytic acid is higher than white flour. In this study, effect of
several lactic acid bacteria sourdough on Toast bread is investigated.
Sourdough from lactic acid bacteria (Lb. plantarum, Lb. reuteri) with
different dough yield (250 and 300) is made and incubated at 30°C
for 20 hour, then added to dough in the ratio of 10, 20 and 30%
replacement. Breads that supplemented with Lb. plantarum
sourdough had lower phytic acid. Higher replacement of sourdough
and higher DY cause higher decrease in phytic acid content.
Sourdough from Lb. plantarum, DY = 300 and 30% replacement
cause the highest decrease in phytic acid content (49.63 mg/100g).
As indicated by panelists, Lb. reuteri sourdough can present the
greatest effect on overall quality score of the breads. DY reduction
cause a decrease in bread quality score. Sensory score of Toast bread
is 81.71 in the samples that treated with Lb. reuteri sourdough with
DY = 250 and 20% replacement.
Abstract: The growing outsourcing of logistics services
resulting from the ongoing current in firms of costs
reduction/increased efficiency means that it is becoming more and
more important for the companies doing the outsourcing to carry out
a proper evaluation.
The multiple definitions and measures of logistics service
performance found in research on the topic create a certain degree of
confusion and do not clear the way towards the proper measurement
of their performance. Do a model and a specific set of indicators exist
that can be considered appropriate for measuring the performance of
logistics services outsourcing in industrial environments? Are said
indicators in keeping with the objectives pursued by outsourcing? We
aim to answer these and other research questions in the study we have
initiated in the field within the framework of the international High
Performance Manufacturing (HPM) project of which this paper
forms part.
As the first stage of this research, this paper reviews articles
dealing with the topic published in the last 15 years with the aim of
detecting the models most used to make this measurement and
determining which performance indicators are proposed as part of
said models and which are most used. The first steps are also taken in
determining whether these indicators, financial and operational, cover
the aims that are being pursued when outsourcing logistics services.
The findings show there is a wide variety of both models and
indicators used. This would seem to testify to the need to continue
with our research in order to try to propose a model and a set of
indicators for measuring the performance of logistics services
outsourcing in industrial environments.
Abstract: This paper describes a 3D modeling system in
Augmented Reality environment, named 3DARModeler. It can be
considered a simple version of 3D Studio Max with necessary
functions for a modeling system such as creating objects, applying
texture, adding animation, estimating real light sources and casting
shadows. The 3DARModeler introduces convenient, and effective
human-computer interaction to build 3D models by combining both
the traditional input method (mouse/keyboard) and the tangible input
method (markers). It has the ability to align a new virtual object with
the existing parts of a model. The 3DARModeler targets nontechnical
users. As such, they do not need much knowledge of
computer graphics and modeling techniques. All they have to do is
select basic objects, customize their attributes, and put them together
to build a 3D model in a simple and intuitive way as if they were
doing in the real world. Using the hierarchical modeling technique,
the users are able to group several basic objects to manage them as a
unified, complex object. The system can also connect with other 3D
systems by importing and exporting VRML/3Ds Max files. A
module of speech recognition is included in the system to provide
flexible user interfaces.
Abstract: Propagation of solitons in single-mode birefringent fibers is considered under the presence of third-order dispersion (TOD). The behavior of two neighboring solitons and their interaction is investigated under the presence of third-order dispersion with different group velocity dispersion (GVD) parameters. It is found that third-order dispersion makes the resultant soliton to deviate from its ideal position and increases the interaction between adjacent soliton pulses. It is also observed that this deviation due to third-order dispersion is considerably small when the optical pulse propagates at wavelengths relatively far from the zerodispersion. Modified coupled nonlinear Schrödinger-s equations (CNLSE) representing the propagation of optical pulse in single mode fiber with TOD are solved using split-step Fourier algorithm. The results presented in this paper reveal that the third-order dispersion can substantially increase the interaction between the solitons, but large group velocity dispersion reduces the interaction between neighboring solitons.
Abstract: Scale defects are common surface defects in hot steel rolling. The modelling of such defects is problematic and their causes are not straightforward. In this study, we investigated genetic algorithms in search for a mathematical solution to scale formation. For this research, a high-dimensional data set from hot steel rolling process was gathered. The synchronisation of the variables as well as the allocation of the measurements made on the steel strip were solved before the modelling phase.
Abstract: Encryption protects communication partners from
disclosure of their secret messages but cannot prevent traffic analysis
and the leakage of information about “who communicates with
whom". In the presence of collaborating adversaries, this linkability
of actions can danger anonymity. However, reliably providing
anonymity is crucial in many applications. Especially in contextaware
mobile business, where mobile users equipped with PDAs
request and receive services from service providers, providing
anonymous communication is mission-critical and challenging at the
same time. Firstly, the limited performance of mobile devices does
not allow for heavy use of expensive public-key operations which are
commonly used in anonymity protocols. Moreover, the demands for
security depend on the application (e.g., mobile dating vs. pizza
delivery service), but different users (e.g., a celebrity vs. a normal
person) may even require different security levels for the same
application. Considering both hardware limitations of mobile devices
and different sensitivity of users, we propose an anonymity
framework that is dynamically configurable according to user and
application preferences. Our framework is based on Chaum-s mixnet.
We explain the proposed framework, its configuration
parameters for the dynamic behavior and the algorithm to enforce
dynamic anonymity.
Abstract: The birdhouses and dovecotes, which are the indicator
of naturalness and human-animal relationship, are one of the
traditional cultural values of Turkey. With their structures compatible
with nature and respectful to humans the bird houses and dovecotes,
which have an important position in local urbanization models as a
representative of the civil architecture with their unique form and
function are important subjects that should be evaluated in a wide
frame comprising from architecture to urbanism, from ecologic
agriculture to globalization. The traditional bird houses and
dovecotes are disregarded due to the insensitivity affecting the city
life and the change in the public sense of art. In this study, the
characteristic properties of traditional dovecotes and birdhouses,
started in 13th century and ended in 19th century in Anatolia, are
tried to be defined for the sustainability of the tradition and for giving
a new direction to the designers.
Abstract: Company mergers and acquisitions reached their peak
in the twenty-first century. Mergers and acquisitions have become one
of the competitive strategies for external growth. In general, it is
believed that mergers and acquisitions can create synergies. However,
they require complete information technology system and service
integration, especially in the banking industry. Much of the research
has focused on performance evaluation, shareholder equity allocation,
or even the increase of company market value after the merger and
acquisition, whereas few scholars have focused on information system
integration post merger and acquisition. This study indicates the role
of information systems after a merger and acquisition, explaining the
benefits of information system integration using a merger and
acquisition case in the banking industry as an example. In addition, we
discuss factors that affect the performance of information system
integration, and utilize system dynamics to interpret the relationship
among factors that affect information system integration performance
in the banking industry after a merger and acquisition.
Abstract: A major challenge in biomaterials research is the
regulation of protein adsorption which is a key factor for controlling
the subsequent cell adhesion at implant surfaces. The aim of the
present study was to control the adsorption of fibronectin (FN) and
the attachment of MG-63 osteoblasts with an electronic
nanostructure. Shallow doping line lattices with a period of 260 nm
were produced for this purpose by implantation of phosphorous in
silicon wafers. Protein coverage was determined after incubating the
substrate with FN by means of an immunostaining procedure and the
measurement of the fluorescence intensity with a TECAN analyzer.
We observed an increased amount of adsorbed FN on the
nanostructure compared to control substrates. MG-63 osteoblasts
were cultivated for 24h on FN-incubated substrates and their
morphology was assessed by SEM. Preferred orientation and
elongation of the cells in direction of the doping lattice lines was
observed on FN-coated nanostructures.
Abstract: In the globalized e-learning environment, students coming from different cultures and countries have different characteristics and require different support designed for their approaches to study and learning styles. This paper explores the ways in which cultural background influences students- approaches to study and learning styles. Participants in the study consisted of 131 eastern students and 54 western students from an Australian university. The students were tested using the Study Process Questionnaire (SPQ) for assessing their approaches to study and the Index of Learning Styles Questionnaire (ILS) for assessing their learning styles. The results of the study led to a set of principles being proposed to guide personalization of e-learning system design on the basis of cultural differences.
Abstract: The present work is a numerical simulation of
nanofluids flow in a double pipe heat exchanger provided with
porous baffles. The hot nanofluid flows in the inner cylinder, whereas
the cold nanofluid circulates in the annular gap. The Darcy-
Brinkman-Forchheimer model is adopted to describe the flow in the
porous regions, and the governing equations with the appropriate
boundary conditions are solved by the finite volume method. The
results reveal that the addition of metallic nanoparticles enhances the
rate of heat transfer in comparison to conventional fluids but this
augmentation is accompanied by an increase in pressure drop. The
highest heat exchanger performances are obtained when
nanoparticles are added only to the cold fluid.
Abstract: Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). However, the scheme is vulnerable to privileged insider attack at their proposed registration phase and to forgery attack at their proposed authentication phase. In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual authentication between the user and the remote server. Therefore, this paper points out that the Jia et al. scheme is vulnerable to the above three attacks.
Abstract: The possibility of intrinsic electromagnetic fields
within living cells and their resonant self-interaction and interaction
with ambient electromagnetic fields is suggested on the basis of a
theoretical and experimental study. It is reported that intrinsic
electromagnetic fields are produced in the form of radio-frequency
and infra-red photons within atoms (which may be coupled or
uncoupled) in cellular structures, such as the cell cytoskeleton and
plasma membrane. A model is presented for the interaction of these
photons among themselves or with atoms under a dipole-dipole
coupling, induced by single-photon or two-photon processes. This
resonance is manifested by conspicuous field amplification and it is
argued that it is possible for these resonant photons to undergo
tunnelling in the form of evanescent waves to a short range (of a few
nanometers to micrometres). This effect, suggested as a resonant
photon tunnelling mechanism in this report, may enable these fields
to act as intracellular signal communication devices and as bridges
between macromolecules or cellular structures in the cell
cytoskeleton, organelles or membrane. A brief overview of an
experimental technique and a review of some preliminary results are
presented, in the detection of these fields produced in living cell
membranes under physiological conditions.
Abstract: Acoustical properties of speech have been shown to
be related to mental states of speaker with symptoms: depression
and remission. This paper describes way to address the issue of
distinguishing depressed patients from remitted subjects based on
measureable acoustics change of their spoken sound. The vocal-tract
related frequency characteristics of speech samples from female
remitted and depressed patients were analyzed via speech
processing techniques and consequently, evaluated statistically by
cross-validation with Support Vector Machine. Our results
comparatively show the classifier's performance with effectively
correct separation of 93% determined from testing with the subjectbased
feature model and 88% from the frame-based model based on
the same speech samples collected from hospital visiting interview
sessions between patients and psychiatrists.
Abstract: The evolutionary tree is an important topic in bioinformation. In 2006, Chen and Lindsay proposed a new method to build the mixture tree from DNA sequences. Mixture tree is a new type evolutionary tree, and it has two additional information besides the information of ordinary evolutionary tree. One of the information is time parameter, and the other is the set of mutated sites. In 2008, Lin and Juan proposed an algorithm to compute the distance between two mixture trees. Their algorithm computes the distance with only considering the time parameter between two mixture trees. In this paper, we proposes a method to measure the similarity of two mixture trees with considering the set of mutated sites and develops two algorithm to compute the distance between two mixture trees. The time complexity of these two proposed algorithms are O(n2 × max{h(T1), h(T2)}) and O(n2), respectively
Abstract: The paper evaluates several hundred one-day-ahead
VaR forecasting models in the time period between the years 2004
and 2009 on data from six world stock indices - DJI, GSPC, IXIC,
FTSE, GDAXI and N225. The models model mean using the ARMA
processes with up to two lags and variance with one of GARCH,
EGARCH or TARCH processes with up to two lags. The models are
estimated on the data from the in-sample period and their forecasting
accuracy is evaluated on the out-of-sample data, which are more
volatile. The main aim of the paper is to test whether a model
estimated on data with lower volatility can be used in periods with
higher volatility. The evaluation is based on the conditional coverage
test and is performed on each stock index separately. The primary
result of the paper is that the volatility is best modelled using a
GARCH process and that an ARMA process pattern cannot be found
in analyzed time series.