Abstract: The focus of this research is in the area of the soviet period and the mission of the Russian Orthodox Church in Kazakhstan in the XIX century. There was close connection of national customs and traditions with religious practices, outlooks and attitudes. In particular, such an approach has alleged estimation by Kazakh historians of the process of Christianization of the local population. Some of them are inclined to consider the small number of Christening Kazakhs as evidence that the Russian Orthodox Church didn’t achieve its mission. The number of historians who think that the church didn’t achieve its mission has thousand over the last centuries, however our calculations of the number of Kazakhs who became Orthodox Christian is much more than other historians think. Such Christians can be divided into 3 groups: Some remained Christian until their deaths, others had two faiths and the third hid their true religions, having returned to their former belief. Therefore, to define the exact amount of Christening Kazakhs represented a challenge. Some data does not create a clear picture of the level of Christianization, constant and accurate was not collected. The data appearing in reports of spiritual attendants and civil authorities is not always authentic. Article purpose is illumination and the analysis missionary activity of Russian Orthodox Church in Kazakhstan.
Abstract: Argument over the use of particular method in interlanguage pragmatics has increased recently. Researchers argued the advantages and disadvantages of each method either natural or elicited. Findings of different studies indicated that the use of one method may not provide enough data to answer all its questions. The current study investigated the validity of using multimethod approach in interlanguage pragmatics to understand the development of requests in Arabic as a second language (Arabic L2). To this end, the study adopted two methods belong to two types of data sources: the institutional discourse (natural data), and the role play (elicited data). Participants were 117 learners of Arabic L2 at the university level, representing four levels (beginners, low-intermediate, highintermediate, and advanced). Results showed that using two or more methods in interlanguage pragmatics affect the size and nature of data.
Abstract: In this paper we investigate the influence of external
noise on the inference of network structures. The purpose of our
simulations is to gain insights in the experimental design of microarray
experiments to infer, e.g., transcription regulatory networks
from microarray experiments. Here external noise means, that the
dynamics of the system under investigation, e.g., temporal changes of
mRNA concentration, is affected by measurement errors. Additionally
to external noise another problem occurs in the context of microarray
experiments. Practically, it is not possible to monitor the mRNA
concentration over an arbitrary long time period as demanded by the
statistical methods used to learn the underlying network structure. For
this reason, we use only short time series to make our simulations
more biologically plausible.
Abstract: Virtually all existing networked system management
tools use a Manager/Agent paradigm. That is, distributed agents are
deployed on managed devices to collect local information and report
it back to some management unit. Even those that use standard
protocols such as SNMP fall into this model. Using standard protocol
has the advantage of interoperability among devices from different
vendors. However, it may not be able to provide customized
information that is of interest to satisfy specific management needs.
In this dissertation work, different approaches are used to
collect information regarding the devices attached to a Local Area
Network. An SNMP aware application is being developed that will
manage the discovery procedure and will be used as data collector.
Abstract: Currently, there is no database or local norms for the
physical performance of Malaysian rugby players. This database or
norms are vital for Malaysian-s sports development as programs can
be setup to improve the current status. This pilot study was
conducted to evaluate the status of our semi professional rugby
players. The rugby players were randomly selected from the
Malaysian National team and several clubs in the Klang valley, Kuala
Lumpur Malaysia. 54 male rugby players (Age: 24.41 ± 4.06 years)
were selected for this pilot study. Height, bodyweight, percentage
body fat and body mass index (BMI) and several other physical tests
were performed. Results from the BLEEP test revealed an average of
level 9, shuttle 2 for the players. Interestingly, forwards were taller,
heavier, and had lower maximal aerobic power than backs in the
same team. In conclusion, the physical characteristics of the rugby
players were much lower when compared to international players
from other countries. From this pilot study, the physical performance
of the Malaysian team must be improved in order to further develop
the sports.
Abstract: Free and open source software is gaining popularity at
an unprecedented rate of growth. Organizations despite some
concerns about the quality have been using them for various
purposes. One of the biggest concerns about free and open source
software is post release software defects and their fixing. Many
believe that there is no appropriate support available to fix the bugs.
On the contrary some believe that due to the active involvement of
internet user in online forums, they become a major source of
communicating the identification and fixing of defects in open source
software. The research model of this empirical investigation
establishes and studies the relationship between open source software
defects and online public forums. The results of this empirical study
provide evidence about the realities of software defects myths of
open source software. We used a dataset consist of 616 open source
software projects covering a broad range of categories to study the
research model of this investigation. The results of this investigation
show that online forums play a significant role identifying and fixing
the defects in open source software.
Abstract: Microarray experiments are information rich; however, extensive data mining is required to identify the patterns that characterize the underlying mechanisms of action. For biologists, a key aim when analyzing microarray data is to group genes based on the temporal patterns of their expression levels. In this paper, we used an iterative clustering method to find temporal patterns of gene expression. We evaluated the performance of this method by applying it to real sporulation data and simulated data. The patterns obtained using the iterative clustering were found to be superior to those obtained using existing clustering algorithms.
Abstract: This study compares family communication patterns in association with family socio-cultural status, especially marriage and family pattern, and couples- socio-economic status between Muslim and Santal communities in rural Bangladesh. A total of 288 couples, 145 couples from the Muslim and 143 couples from the Santal were randomly selected through cluster sampling procedure from Kalna village situated in Tanore Upazila of Rajshahi district of Bangladesh, where both the communities dwell as neighbors. In order to collect data from the selected samples, interview method with semistructural questionnaire schedule was applied. The responses given by the respondents were analyzed by Pearson-s chi-squire test and bivariate correlation techniques. The results of Pearson-s chi-squire test revealed that family communication patterns (X2= 25. 90, df= 2, p0.05) were significantly different between the Muslim and Santal communities. In addition, Spearman-s bivariate correlation coefficients suggested that among the exogenous factors, family type (rs=.135, p
Abstract: The seismic vulnerability of an urban area is of a great
deal for local authorities especially those facing earthquakes. So, it is
important to have an efficient tool to assess the vulnerability of
existing buildings. The use of the VIP (Vulnerability Index Program)
and the GIS (Geographic Information System) let us to identify the
most vulnerable districts of an urban area.
The use of the vulnerability index method lets us to assess the
vulnerability of the center town of Blida (Algeria) which is a
historical town and which has grown enormously during the last
decades. In this method, three levels of vulnerability are defined. The
GIS has been used to build a data base in order to perform different
thematic analyses. These analyses show the seismic vulnerability of
Blida.
Abstract: In this document we studied more in detail the Performances of the vertical handover in the networks WLAN, WiMAX, UMTS before studying of it the Procedure of Handoff Vertical, the whole buckled by simulations putting forward the performances of the handover in the heterogeneous networks. The goal of Vertical Handover is to carry out several accesses in real-time in the heterogeneous networks. This makes it possible a user to use several networks (such as WLAN UMTS andWiMAX) in parallel, and the system to commutate automatically at another basic station, without disconnecting itself, as if there were no cut and with little loss of data as possible.
Abstract: Dengue fever has become a major concern for health
authorities all over the world particularly in the tropical countries.
These countries, in particular are experiencing the most worrying
outbreak of dengue fever (DF) and dengue haemorrhagic fever
(DHF). The DF and DHF epidemics, thus, have become the main
causes of hospital admissions and deaths in Malaysia. This paper,
therefore, attempts to examine the environmental factors that may
influence the recent dengue outbreak. The aim of this study is twofold,
firstly is to establish a statistical model to describe the
relationship between the number of dengue cases and a range of
explanatory variables and secondly, to identify the lag operator for
explanatory variables which affect the dengue incidence the most.
The explanatory variables involved include the level of cloud cover,
percentage of relative humidity, amount of rainfall, maximum
temperature, minimum temperature and wind speed. The Poisson and
Negative Binomial regression analyses were used in this study. The
results of the analyses on the 915 observations (daily data taken from
July 2006 to Dec 2008), reveal that the climatic factors comprising of
daily temperature and wind speed were found to significantly
influence the incidence of dengue fever after 2 and 3 weeks of their
occurrences. The effect of humidity, on the other hand, appears to be
significant only after 2 weeks.
Abstract: This study aims to assess the vulnerability and risk of
the coastal areas of Taijiang to abnormal oceanographic phenomena.
In addition, this study aims to investigate and collect data regarding
the disaster losses, land utilization, and other social, economic, and
environmental issues in these coastal areas to construct a coastal
vulnerability and risk map based on the obtained climate-change risk
assessment results. Considering the indexes of the three coastal
vulnerability dimensions, namely, man-made facilities, environmental
geography, and social economy, this study adopted the equal
weighting process and Analytic Hierarchy Process to analyze the
vulnerability of these coastal areas to disasters caused by climatic
changes. Among the areas with high coastal vulnerability to climatic
changes, three towns had the highest coastal vulnerability and four had
the highest relative vulnerability. Areas with lower disaster risks were
found to be increasingly vulnerable to disasters caused by climatic
changes as time progresses.
Abstract: Technical laboratories are typically considered as
highly hazardous places in the polytechnic institution when
addressing the problems of high incidences and fatality rates. In
conjunction with several topics covered in the technical curricular,
safety and health precaution should be highlighted in order to
connect to few key ideas of being safe. Therefore the assessment of
safety awareness in terms of safety and health about hazardous and
risks at laboratories is needed and has to be incorporated with
technical education and other training programmes. The purpose of
this study was to determine the efficacy of technical laboratory safety
in one of the polytechnics in northern region. The study examined
three related issues that were; the availability of safety material and
equipment, safety practice adopted by technical teachers and
administrator-s safety attitudes in enforcing safety to the students. A
model of efficacy technical laboratory was developed to test the
linear relationship between existing safety material and equipment,
teachers- safety practice and administrators- attitude in enforcing
safety and to identify which of technical laboratory safety issues was
the most pertinent factor to realize safety in technical laboratory.
This was done by analyzing survey-based data sets particularly those
obtained from samples of 210 students in the polytechnic. The
Pearson Correlation was used to measure the association between the
variables and to test the research hypotheses. The result of the study
has found that there was a significant correlation between existing
safety material and equipment, safety practice adopted by teacher
and administrator-s attitude. There was also a significant relationship
between technical laboratory safety and safety practice adopted by
teacher and between technical laboratory safety and administrator
attitude. Hence, safety practice adopted by teacher and administrator
attitude is vital in realizing technical laboratory safety.
Abstract: The National Blood Center, Thai Red Cross Society is
responsible for providing blood to hospitals all over the country.
When any hospital needs blood, it will have to send the vehicle to
pick up at the NBC. There are a lot of vehicles to pick up blood at the
NBC every day. Each vehicle is usually empty for inbound trip and a
little loaded for outbound. The NBC realized such waste or loss and
there have been the third party offered to distribute blood and charge
for fee. This paper proposes to apply the vehicle routing problem
(VRP) for estimating the fair price. The idea is tested with the real
data during seven-day period of 6 – 12 July 2010 to estimate the fair
price for transporting blood in Bangkok Metropolitan Region.
Abstract: Thousands of masters athletes participate
quadrennially in the World Masters Games (WMG), yet this cohort
of athletes remains proportionately under-investigated. Due to a
growing global obesity pandemic in context of benefits of physical
activity across the lifespan, the BMI trends for this unique population
was of particular interest. The nexus between health, physical
activity and aging is complex and has raised much interest in recent
times due to the realization that a multifaceted approach is necessary
in order to counteract the obesity pandemic. By investigating age
based trends within a population adhering to competitive sport at
older ages, further insight might be gleaned to assist in understanding
one of many factors influencing this relationship.BMI was derived
using data gathered on a total of 6,071 masters athletes (51.9% male,
48.1% female) aged 25 to 91 years ( =51.5, s =±9.7), competing at
the Sydney World Masters Games (2009). Using linear and loess
regression it was demonstrated that the usual tendency for prevalence
of higher BMI increasing with age was reversed in the sample. This
trend in reversal was repeated for both male and female only sub-sets
of the sample participants, indicating the possibility of improved
prevalence of BMI with increasing age for both the sample as a
whole and these individual sub-groups.This evidence of improved
classification in one index of health (reduced BMI) for masters
athletes (when compared to the general population) implies there are
either improved levels of this index of health with aging due to
adherence to sport or possibly the reduced BMI is advantageous and
contributes to this cohort adhering (or being attracted) to masters
sport at older ages.
Abstract: In this paper, a neural network technique is applied to
real-time classifying media while a projectile is penetrating through
them. A laboratory-scaled penetrating setup was built for the
experiment. Features used as the network inputs were extracted from
the acceleration of penetrator. 6000 set of features from a single
penetration with known media and status were used to train the neural
network. The trained system was tested on 30 different penetration
experiments. The system produced an accuracy of 100% on the
training data set. And, their precision could be 99% for the test data
from 30 tests.
Abstract: The paper shows the necessity to increase the security
level for paper management in the cadastral field by using specific
graphical watermarks. Using the graphical watermarking will
increase the security in the cadastral content management;
furthermore any altered document will be validated afterwards of its
originality by checking the graphic watermark. If, by any reasons the
document is changed for counterfeiting, it is invalidated and found
that is an illegal copy due to the graphic check of the watermarking,
check made at pixel level
Abstract: This paper presents data annotation models at five levels of granularity (database, relation, column, tuple, and cell) of relational data to address the problem of unsuitability of most relational databases to express annotations. These models do not require any structural and schematic changes to the underlying database. These models are also flexible, extensible, customizable, database-neutral, and platform-independent. This paper also presents an SQL-like query language, named Annotation Query Language (AnQL), to query annotation documents. AnQL is simple to understand and exploits the already-existent wide knowledge and skill set of SQL.
Abstract: Mobile Ad Hoc network is an infrastructure less
network which operates with the coordination of each node. Each node
believes to help another node, by forwarding its data to/from another
node. Unlike a wired network, nodes in an ad hoc network are resource
(i.e. battery, bandwidth computational capability and so on)
constrained. Such dependability of one node to another and limited
resources of nodes can result in non cooperation by any node to
accumulate its resources. Such non cooperation is known as selfish
behavior.
This paper discusses the performance analysis of very well known
MANET single-path (i.e. AODV) and multi-path (i.e. AOMDV)
routing protocol, in the presence of selfish behaviors. Along with
existing selfish behaviors, a new variation is also studied. Extensive
simulations were carried out using ns-2 and the study concluded that
the multi-path protocol (i.e. AOMDV) with link disjoint configuration
outperforms the other two configurations.
Abstract: Wireless capsule Endoscopy (WCE) has rapidly
shown its wide applications in medical domain last ten years
thanks to its noninvasiveness for patients and support for thorough
inspection through a patient-s entire digestive system including
small intestine. However, one of the main barriers to efficient
clinical inspection procedure is that it requires large amount of
effort for clinicians to inspect huge data collected during the
examination, i.e., over 55,000 frames in video. In this paper, we
propose a method to compute meaningful motion changes of
WCE by analyzing the obtained video frames based on regional
optical flow estimations. The computed motion vectors are used to
remove duplicate video frames caused by WCE-s imaging nature,
such as repetitive forward-backward motions from peristaltic
movements. The motion vectors are derived by calculating
directional component vectors in four local regions. Our
experiments are performed on small intestine area, which is of
main interest to clinical experts when using WCEs, and our
experimental results show significant frame reductions comparing
with a simple frame-to-frame similarity-based image reduction
method.