Abstract: Urban planning, in particular on protected landscape
areas, demands an increasing role of public participation within the
frame of the efficiency of sustainable planning process. The
development of urban planning actions in Protected Landscape areas,
as Sintra-Cascais Natural Park, should perform a methodological
process that is structured over distinct sequential stages, providing
the development of a continuous, interactive, integrated and
participative planning. From the start of Malveira da Serra and Janes
Plan process, several public participation actions were promoted, in
order to involve the local agents, stakeholders and the population in
the decision of specific local key issues and define the appropriate
priorities within the goals and strategies previously settled. As a
result, public participation encouraged an innovative process that
guarantees the efficiency of sustainable urban planning and promotes
a sustainable new way of living in community.
Abstract: Using the idea of prime and semiprime bi-ideals of
rings, the concept of prime and semiprime generalized bi-ideals of
rings is introduced, which is an extension of the concept of prime and
semiprime bi-ideals of rings and some interesting characterizations
of prime and semiprime generalized bi-ideals are obtained. Also,
we give the relationship between the Baer radical and prime and
semiprime generalized bi-ideals of rings in the same way as of biideals
of rings which was studied by Roux.
Abstract: Most of researches for conventional simulations were
studied focusing on flocks with a single species. While there exist the
flocking behaviors with a single species in nature, the flocking
behaviors are frequently observed with multi-species. This paper
studies on the flocking simulation for heterogeneous agents. In order
to simulate the flocks for heterogeneous agents, the conventional
method uses the identifier of flock, while the proposed method defines
the feature vector of agent and uses the similarity between agents by
comparing with those feature vectors. Based on the similarity, the
paper proposed the attractive force and repulsive force and then
executed the simulation by applying two forces. The results of
simulation showed that flock formation with heterogeneous agents is
very natural in both cases. In addition, it showed that unlike the
existing method, the proposed method can not only control the density
of the flocks, but also be possible for two different groups of agents to
flock close to each other if they have a high similarity.
Abstract: In this paper the authors present the framework of a
system for assisting users through counseling on personal health, the
Personal Health Assistance Service Expert System (PHASES).
Personal health assistance systems need Personal Health Records
(PHR), which support wellness activities, improve the understanding
of personal health issues, enable access to data from providers of
health services, strengthen health promotion, and in the end improve
the health of the population. This is especially important in societies
where the health costs increase at a higher rate than the overall
economy. The most important elements of a healthy lifestyle are
related to food (such as balanced nutrition and diets), activities for
body fitness (such as walking, sports, fitness programs), and other
medical treatments (such as massage, prescriptions of drugs). The
PHASES framework uses an ontology of food, which includes
nutritional facts, an expert system keeping track of personal health
data that are matched with medical treatments, and a comprehensive
data transfer between patients and the system.
Abstract: Computational techniques derived from digital image processing are playing a significant role in the security and digital copyrights of multimedia and visual arts. This technology has the effect within the domain of computers. This research presents discrete M-band wavelet transform (MWT) and cosine transform (DCT) based watermarking algorithm by incorporating the principal component analysis (PCA). The proposed algorithm is expected to achieve higher perceptual transparency. Specifically, the developed watermarking scheme can successfully resist common signal processing, such as geometric distortions, and Gaussian noise. In addition, the proposed algorithm can be parameterized, thus resulting in more security. To meet these requirements, the image is transformed by a combination of MWT & DCT. In order to improve the security further, we randomize the watermark image to create three code books. During the watermark embedding, PCA is applied to the coefficients in approximation sub-band. Finally, first few component bands represent an excellent domain for inserting the watermark.
Abstract: The purpose of this work was to inspect the potential
of vincristine-dextran complex loaded solid lipid nanoparticles for
drug delivery to the brain.
The nanoparticles were stained with a fluorescence dye and their
plasma pharmacokinetic and brain concentrations were investigated
following injection to rats.
The result revealed a significant improvement in the plasma
concentration profile of the SLN injected animals as well as a sharp
increased concentration in the brains.
Abstract: Together with the industrialization, women began to
be included in business life by peeling off of the tasks given them by
society and they have become a factor of production creating value in
economic and social sense. Thus, women have taken place in the
labor market, majority of which has been formed by men. In this
study, the experiences of women entrepreneurs, who succeed in
business activities, will be analyzed. By the study, current state of the
women entrepreneurs in the labor market of Turkey will be put down,
as a result of interferences obtained from the shared experiences of
women entrepreneurs. Findings obtained at the end of the study are
thought to light the way of future studies for increasing women
entrepreneurship.
Abstract: Language Reforms and potential use of ICTs has been a focal area of Higher Education Commission of Pakistan. Efforts are being accelerated to incorporate fast expanding ICTs to bring qualitative improvement in language instruction in higher education. This paper explores how university teachers are benefitting from ICTs to make their English class effective and what type of problems they face in practicing ICTs during their lectures. An in-depth qualitative study was employed to understand why language teachers tend to use ICTs in their instruction and how they are practicing it. A sample of twenty teachers from five universities located in Islamabad, three from public sector and two from private sector, was selected on non-random (Snowball) sampling basis. An interview with 15 semi-structured items was used as research instruments to collect data. The findings reveal that business English teaching is facilitated and improved through the use of ICTs. The language teachers need special training regarding the practices and implementation of ICTs. It is recommended that initiatives might be taken to equip university language teachers with modern methodology incorporating ICTs as focal area and efforts might be made to remove barriers regarding the training of language teachers and proper usage of ICTs.
Abstract: Intrusion detection systems (IDS)are crucial components
of the security mechanisms of today-s computer systems.
Existing research on intrusion detection has focused on sequential
intrusions. However, intrusions can also be formed by concurrent
interactions of multiple processes. Some of the intrusions caused
by these interactions cannot be detected using sequential intrusion
detection methods. Therefore, there is a need for a mechanism that
views the distributed system as a whole. L-BIDS (Lattice-Based
Intrusion Detection System) is proposed to address this problem. In
the L-BIDS framework, a library of intrusions and distributed traces
are represented as lattices. Then these lattices are compared in order
to detect intrusions in the distributed traces.
Abstract: Hybrid photovoltaic thermal (PV/T) solar system comprises a solar collector which is disposed on photovoltaic solar cells. The disadvantage of a conventional photovoltaic cell is that its performance decreases as the temperature increases. Indeed, part of the solar radiation is converted into electricity and is dissipated as heat, increasing the temperature of the photovoltaic cell with respect to the ambient temperature. The objective of this work is to study experimentally and implement a hybrid prototype to evaluate electrical and thermal performance. In this paper, an experimental study of two new configurations of hybrid collectors is exposed. The results are given and interpreted. The two configurations of absorber studied are a new combination with tubes and galvanized tank, the other is a tubes and sheet.
Abstract: There are multiple ways to implement a decimator
filter. This paper addresses usage of CIC (cascaded-integrator-comb)
filter and HB (half band) filter as the decimator filter to reduce the
frequency sample rate by factor of 64 and detail of the
implementation step to realize this design in hardware. Low power
design approach for CIC filter and half band filter will be discussed.
The filter design is implemented through MATLAB system
modeling, ASIC (application specific integrated circuit) design flow
and verified using a FPGA (field programmable gate array) board
and MATLAB analysis.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created
Abstract: Chinese Idioms are a type of traditional Chinese idiomatic
expressions with specific meanings and stereotypes structure
which are widely used in classical Chinese and are still common in
vernacular written and spoken Chinese today. Currently, Chinese
Idioms are retrieved in glossary with key character or key word in
morphology or pronunciation index that can not meet the need of
searching semantically. OCIRS is proposed to search the desired
idiom in the case of users only knowing its meaning without any key
character or key word. The user-s request in a sentence or phrase will
be grammatically analyzed in advance by word segmentation, key
word extraction and semantic similarity computation, thus can be
mapped to the idiom domain ontology which is constructed to provide
ample semantic relations and to facilitate description logics-based
reasoning for idiom retrieval. The experimental evaluation shows that
OCIRS realizes the function of searching idioms via semantics, obtaining
preliminary achievement as requested by the users.
Abstract: Based on the sources- smoothed rank profile (SRP) and modified minimum description length (MMDL) principle, a method for estimation of the source coherency structure (SCS) and the number of wideband sources is proposed in this paper. Instead of focusing, we first use a spatial smoothing technique to pre-process the array covariance matrix of each frequency for de-correlating the sources and then use smoothed rank profile to determine the SCS and the number of wideband sources. We demonstrate the availability of the method by numerical simulations.
Abstract: this paper presents an auto-regressive network called the Auto-Regressive Multi-Context Recurrent Neural Network (ARMCRN), which forecasts the daily peak load for two large power plant systems. The auto-regressive network is a combination of both recurrent and non-recurrent networks. Weather component variables are the key elements in forecasting because any change in these variables affects the demand of energy load. So the AR-MCRN is used to learn the relationship between past, previous, and future exogenous and endogenous variables. Experimental results show that using the change in weather components and the change that occurred in past load as inputs to the AR-MCRN, rather than the basic weather parameters and past load itself as inputs to the same network, produce higher accuracy of predicted load. Experimental results also show that using exogenous and endogenous variables as inputs is better than using only the exogenous variables as inputs to the network.
Abstract: The Time-Domain Boundary Element Method (TDBEM)
is a well known numerical technique that handles quite
properly dynamic analyses considering infinite dimension media.
However, when these analyses are also related to nonlinear behavior,
very complex numerical procedures arise considering the TD-BEM,
which may turn its application prohibitive. In order to avoid this
drawback and model nonlinear infinite media, the present work
couples two BEM formulations, aiming to achieve the best of two
worlds. In this context, the regions expected to behave nonlinearly
are discretized by the Domain Boundary Element Method (D-BEM),
which has a simpler mathematical formulation but is unable to deal
with infinite domain analyses; the TD-BEM is employed as in the
sense of an effective non-reflexive boundary. An iterative procedure
is considered for the coupling of the TD-BEM and D-BEM, which is
based on a relaxed renew of the variables at the common interfaces.
Elastoplastic models are focused and different time-steps are allowed
to be considered by each BEM formulation in the coupled analysis.
Abstract: In this article, we discuss project-based learning in the context of a wheel garden as an instructional tool in science and mathematics education. A wheel garden provides multiple opportunities to teach across the curriculum, to integrate disciplines, and to promote community involvement. Grounded in the theoretical framework of constructivism, the wheel garden provides a multidisciplined educational tool that provides a hands-on, non-traditional arena for learning. We will examine some of the cultural, art, science, and mathematics connections made with this project.
Abstract: In this paper the Huang-s method for solving a m×n fuzzy linear system when, m≤ n, is considered. The method in detail is discussed and illustrated by solving some numerical examples.
Abstract: This paper presents an algorithm of particle swarm
optimization with reduction for global optimization problems. Particle
swarm optimization is an algorithm which refers to the collective
motion such as birds or fishes, and a multi-point search algorithm
which finds a best solution using multiple particles. Particle
swarm optimization is so flexible that it can adapt to a number
of optimization problems. When an objective function has a lot of
local minimums complicatedly, the particle may fall into a local
minimum. For avoiding the local minimum, a number of particles are
initially prepared and their positions are updated by particle swarm
optimization. Particles sequentially reduce to reach a predetermined
number of them grounded in evaluation value and particle swarm
optimization continues until the termination condition is met. In order
to show the effectiveness of the proposed algorithm, we examine the
minimum by using test functions compared to existing algorithms.
Furthermore the influence of best value on the initial number of
particles for our algorithm is discussed.
Abstract: The occurrence and removal of trace organic
contaminants in the aquatic environment has become a focus of
environmental concern. For the selective removal of carbamazepine
from loaded waters molecularly imprinted polymers (MIPs) were
synthesized with carbamazepine as template. Parameters varied were
the type of monomer, crosslinker, and porogen, the ratio of starting
materials, and the synthesis temperature. Best results were obtained
with a template to crosslinker ratio of 1:20, toluene as porogen, and
methacrylic acid (MAA) as monomer. MIPs were then capable to
recover carbamazepine by 93% from a 10-5 M landfill leachate
solution containing also caffeine and salicylic acid. By comparison,
carbamazepine recoveries of 75% were achieved using a nonimprinted
polymer (NIP) synthesized under the same conditions, but
without template. In landfill leachate containing solutions
carbamazepine was adsorbed by 93-96% compared with an uptake of
73% by activated carbon. The best solvent for desorption was
acetonitrile, with which the amount of solvent necessary and dilution
with water was tested. Selected MIPs were tested for their reusability
and showed good results for at least five cycles. Adsorption
isotherms were prepared with carbamazepine solutions in the
concentration range of 0.01 M to 5*10-6 M. The heterogeneity index
showed a more homogenous binding site distribution.