Abstract: The issue of human anthropology took an important
role in the last epochs and still hasn-t lost its importance. Scientists of
different countries were interested in investigating the appearance of
human being and the idea of life after death. While writing this article
we noticed that scientists who made research in this issue, despite of
the different countries and different epochs in which they lived, had
similarities in their opinions. In given article we wrote great Kazakh
poet AbaiKunanbayev-s philosophical view to the problem of human
anthropology.
Abstract: In non destructive testing by radiography, a perfect knowledge of the weld defect shape is an essential step to appreciate the quality of the weld and make decision on its acceptability or rejection. Because of the complex nature of the considered images, and in order that the detected defect region represents the most accurately possible the real defect, the choice of thresholding methods must be done judiciously. In this paper, performance criteria are used to conduct a comparative study of thresholding methods based on gray level histogram, 2-D histogram and locally adaptive approach for weld defect extraction in radiographic images.
Abstract: Signal processing applications which are iterative in
nature are best represented by data flow graphs (DFG). In these
applications, the maximum sampling frequency is dependent on the
topology of the DFG, the cyclic dependencies in particular. The
determination of the iteration bound, which is the reciprocal of the
maximum sampling frequency, is critical in the process of hardware
implementation of signal processing applications. In this paper, a
novel technique to compute the iteration bound is proposed. This
technique is different from all previously proposed techniques, in the
sense that it is based on the natural flow of tokens into the DFG
rather than the topology of the graph. The proposed algorithm has
lower run-time complexity than all known algorithms. The
performance of the proposed algorithm is illustrated through
analytical analysis of the time complexity, as well as through
simulation of some benchmark problems.
Abstract: K-Means (KM) is considered one of the major
algorithms widely used in clustering. However, it still has some
problems, and one of them is in its initialization step where it is
normally done randomly. Another problem for KM is that it
converges to local minima. Genetic algorithms are one of the
evolutionary algorithms inspired from nature and utilized in the field
of clustering. In this paper, we propose two algorithms to solve the
initialization problem, Genetic Algorithm Initializes KM (GAIK) and
KM Initializes Genetic Algorithm (KIGA). To show the effectiveness
and efficiency of our algorithms, a comparative study was done
among GAIK, KIGA, Genetic-based Clustering Algorithm (GCA),
and FCM [19].
Abstract: Image interpolation is a common problem in imaging applications. However, most interpolation algorithms in existence suffer visually to some extent the effects of blurred edges and jagged artifacts in the image. This paper presents an adaptive feature preserving bidirectional flow process, where an inverse diffusion is performed to enhance edges along the normal directions to the isophote lines (edges), while a normal diffusion is done to remove artifacts (''jaggies'') along the tangent directions. In order to preserve image features such as edges, angles and textures, the nonlinear diffusion coefficients are locally adjusted according to the first and second order directional derivatives of the image. Experimental results on synthetic images and nature images demonstrate that our interpolation algorithm substantially improves the subjective quality of the interpolated images over conventional interpolations.
Abstract: Climate change could lead to changes in cultural
environments and landscapes as we know them.Climate change
presents an immediate and significant threat to our natural and built
environments and to the ways of life which co-exist with these
environments. In most traditional buildings, the harmony of texture
with nature and environment has been ever considered; so houses and
cities have been mixed with their natural environment so
astonishingly and the selection and usage of materials have been in
such a way that they have provided the utmost conformity with the
environment, as the result the created areas have a unique beauty and
attraction.The extent to which climate change contributes to
destruction procedure on Iran-s historic buildings.is a subject of
current discussion. Cities, towns and built-up areas also have their
own characteristics that might make them particularly vulnerable to
climate change.
Abstract: In aircraft applications, according to the nature of
electrical equipment its location may be in unpressurized area or very
close to the engine; thus, the environmental conditions may change
from atmospheric pressure to less than 100 mbar, and the temperature
may be higher than the ambient one as in most real working
conditions of electrical equipment. Then, the classical Paschen curve
has to be replotted since these parameters may affect the discharge
ignition voltage. In this paper, we firstly investigate the domain of
validity of two corrective expressions on the Paschen-s law found in
the literature, in case of changing the air environment and known as
Peek and Dunbar corrections. Results show that these corrections are
no longer valid for combined variation of temperature and pressure.
After that, a new empirical expression for breakdown voltage is
proposed and is validated in the case of combined variations of
temperature and pressure.
Abstract: Manufacturing Industries face a crucial change as products and processes are required to, easily and efficiently, be reconfigurable and reusable. In order to stay competitive and flexible, situations also demand distribution of enterprises globally, which requires implementation of efficient communication strategies. A prototype system called the “Broadcaster" has been developed with an assumption that the control environment description has been engineered using the Component-based system paradigm. This prototype distributes information to a number of globally distributed partners via an adoption of the circular-based data processing mechanism. The work highlighted in this paper includes the implementation of this mechanism in the domain of the manufacturing industry. The proposed solution enables real-time remote propagation of machine information to a number of distributed supply chain client resources such as a HMI, VRML-based 3D views and remote client instances regardless of their distribution nature and/ or their mechanisms. This approach is presented together with a set of evaluation results. Authors- main concentration surrounds the reliability and the performance metric of the adopted approach. Performance evaluation is carried out in terms of the response times taken to process the data in this domain and compared with an alternative data processing implementation such as the linear queue mechanism. Based on the evaluation results obtained, authors justify the benefits achieved from this proposed implementation and highlight any further research work that is to be carried out.
Abstract: Monitored 3-Dimensional (3D) video experience can be utilized as “feedback information” to fine tune the service parameters for providing a better service to the demanding 3D service customers. The 3D video experience which includes both video quality and depth perception is influenced by several contextual and content related factors (e.g., ambient illumination condition, content characteristics, etc) due to the complex nature of the 3D video. Therefore, effective factors on this experience should be utilized while assessing it. In this paper, structural information of the depth map sequences of the 3D video is considered as content related factor effective on the depth perception assessment. Cartoon-like filter is utilized to abstract the significant depth levels in the depth map sequences to determine the structural information. Moreover, subjective experiments are conducted using 3D videos associated with cartoon-like depth map sequences to investigate the effectiveness of ambient illumination condition, which is a contextual factor, on depth perception. Using the knowledge gained through this study, 3D video experience metrics can be developed to deliver better service to the 3D video service users.
Abstract: Learning programming is difficult for many learners. Some researches have found that the main difficulty relates to cognitive load. Cognitive overload happens in programming due to the nature of the subject which is intrinisicly over-bearing on the working memory. It happens due to the complexity of the subject itself. The problem is made worse by the poor instructional design methodology used in the teaching and learning process. Various efforts have been proposed to reduce the cognitive load, e.g. visualization softwares, part-program method etc. Use of many computer based systems have also been tried to tackle the problem. However, little success has been made to alleviate the problem. More has to be done to overcome this hurdle. This research attempts at understanding how cognitive load can be managed so as to reduce the problem of overloading. We propose a mechanism to measure the cognitive load during pre instruction, post instruction and in instructional stages of learning. This mechanism is used to help the instruction. As the load changes the instruction is made to adapt itself to ensure cognitive viability. This mechanism could be incorporated as a sub domain in the student model of various computer based instructional systems to facilitate the learning of programming.
Abstract: This paper presents a novel method that allows an
agent host to delegate its signing power to an anonymous mobile
agent in such away that the mobile agent does not reveal any information about its host-s identity and, at the same time, can be authenticated by the service host, hence, ensuring fairness of service
provision. The solution introduces a verification server to verify the
signature generated by the mobile agent in such a way that even if colluding with the service host, both parties will not get more information than what they already have. The solution incorporates
three methods: Agent Signature Key Generation method, Agent
Signature Generation method, Agent Signature Verification method.
The most notable feature of the solution is that, in addition to allowing secure and anonymous signature delegation, it enables
tracking of malicious mobile agents when a service host is attacked. The security properties of the proposed solution are analyzed, and the solution is compared with the most related work.
Abstract: The study presents a brief and synthetic discussion of selected conclusions resulting from multidimensional and in-depth empirical studies. Its theoretical part presents the assumptions referring to social responsibility management from the perspective of the specific nature of small enterprise functioning, while the empirical part presents the selected dysfunctions and paradoxes in social responsibility management referring to this group of enterprises. The paper is summarized by a short list of the resulting recommendations.
Abstract: Losses of surfactant due to sorption need to be
considered when selecting surfactant doses for soil bioremediation.
The degree of surfactant sorption onto soil depends primarily on the
organic carbon fraction of soil and the chemical nature of the
surfactant. The use of biosurfactants in the control of the
bioavailability of toxicants in soils is an attractive option because of
their biodegradability. In this work biosurfactants were produced
from a cheap raw material, trimming vine shoots, employing
Lactobacillus pentosus. When biosurfactants from L. pentosus was
added to sediments the surface tensión of the water containing the
sediments rapidly increase, the same behaviour was observed with
the chemical surfactant Tween 20; whereas sodyum dodecyl sulphate
(SDS) kept the surface tension of the water around 36 mN/m. It
means, that the behaviour of biosurfactants from L. pentosus is more
similar to non-ionic surfactatns than to anionic surfactants.
Abstract: Neem is a highly heterozygous and commercially
important perennial plant. Conventionally, it is propagated by seeds
which loose viability within two weeks. Strictly cross pollinating
nature of the plant causes serious barrier to the genetic improvement
by conventional methods. Alternative methods of tree improvement
such as somatic hybridization, mutagenesis and genetic
transformation require an efficient in vitro plant regeneration system.
In this regard, somatic embryogenesis particularly secondary somatic
embryogenesis may offer an effective system for large scale plant
propagation without affecting the clonal fidelity of the regenerants. It
can be used for synthetic seed production, which further bolsters
conservation of this tree species which is otherwise very difficult
The present report describes the culture conditions necessary to
induce and maintain repetitive somatic embryogenesis, for the first
time, in neem. Out of various treatments tested, the somatic embryos
were induced directly from immature zygotic embryos of neem on
MS + TDZ (0.1 μM) + ABA (4 μM), in more than 76 % cultures.
Direct secondary somatic embryogenesis occurred from primary
somatic embryos on MS + IAA (5 μM) + GA3 (5 μM) in 12.5 %
cultures. Embryogenic competence of the explant as well as of the
primary embryos was maintained for a long period by repeated
subcultures at frequent intervals. A maximum of 10 % of these
somatic embryos were converted into plantlets.
Abstract: Ontologies play an important role in semantic web applications and are often developed by different groups and continues to evolve over time. The knowledge in ontologies changes very rapidly that make the applications outdated if they continue to use old versions or unstable if they jump to new versions. Temporal frames using frame versioning and slot versioning are used to take care of dynamic nature of the ontologies. The paper proposes new tags and restructured OWL format enabling the applications to work with the old or new version of ontologies. Gene Ontology, a very dynamic ontology, has been used as a case study to explain the OWL Ontology with Temporal Tags.
Abstract: The two agro-ecological zones became the focus of
the study because of violent nature of the incessant conflict in the
zones. The available register of farmers association was the sampling
frame work where ten percent (61) farmers per state were randomly
sampled. Data were collected and analysed using z-test. The research
findings revealed tree crops and grains production enterprises ranked
higher in Osun (rain fed zones) and Taraba states (savannah zones)
respectively. Osun state entrepreneur felt the effect of the conflict on
their enterprises more than Tarba state. The reasons adduced for
severity of the conflict on enterprises are majority (77.0%) migrated
and (75.5%) of them were not allowed to enter their farms during and
when conflict deescalated unlike situation in Taraba state. The
different in enterprises production level between the two agroecological
zone was statistically significant at p
Abstract: ebXML (Electronic Business using eXtensible
Markup Language) is an e-business standard, sponsored by
UN/CEFACT and OASIS, which enables enterprises to exchange
business messages, conduct trading relationships, communicate
data in common terms and define and register business
processes. While there is tremendous e-business value in the
ebXML, security remains an unsolved problem and one of the
largest barriers to adoption. XML security technologies emerging
recently have extensibility and flexibility suitable for security
implementation such as encryption, digital signature, access
control and authentication.
In this paper, we propose ebXML business transaction models
that allow trading partners to securely exchange XML based
business transactions by employing XML security technologies.
We show how each XML security technology meets the ebXML
standard by constructing the test software and validating messages
between the trading partners.
Abstract: The present research focus on the processing of mullite-based ceramics from oil refinery industrial wastes and byproducts of agricultural industry and on the investigating of silane modified surface of ceramics. Two waste products were used as initial material – waste aluminum oxide and waste rice husk. The burning - out additives used were waste rise husk. It is known that the oxide ceramics surface is hydrophilic due to the presence of – OH groups in it. The nature of ceramic surface regarding permeation of water and hydrocarbons can be changed by further treatment with silanes. The samples were studied mainly by X-ray analysis, FT-IR absorbance measurements and microscopic analysis. The X-ray analyses showed the phase composition depends on the firing temperature and on the purity of the starting alumina. Two kind of silanes were used for the transformation of surface from hydrophilic to hydrophobic – trimethoxymethylsilane (TMMS) and trimethylclorsilane (TMCS).
Abstract: The knee bracing steel frame (KBF) is a new kind of energy dissipating frame, which combines excellent ductility and lateral stiffness. In this framing system, a special form of diagonal brace connected to a knee element instead of beam-column joint, is investigated. Recently, a similar system was proposed and named as chevron knee bracing system (CKB) which in comparison with the former system has a better energy absorption characteristic and at the same time retains the elastic nature of the structures. Knee bracing can provide a stiffer bracing system but reduces the ductility of the steel frame. Chevron knee bracing can be employed to provide the desired ductility level for a design. In this article, relation between seismic performance and structural parameters of the two above mentioned systems are investigated and compared. Frames with similar dimensions but various heights in both systems are designed according to Iranian code of practice for seismic resistant design of building, and then based on a non-linear push over static analysis; the seismic parameters such as behavior factor and performance levels are compared.
Abstract: Voice over Internet Protocol (VoIP) is a form of voice
communication that uses audio data to transmit voice signals to the
end user. VoIP is one of the most important technologies in the
World of communication. Around, 20 years of research on VoIP,
some problems of VoIP are still remaining. During the past decade
and with growing of wireless technologies, we have seen that many
papers turn their concentration from Wired-LAN to Wireless-LAN.
VoIP over Wireless LAN (WLAN) faces many challenges due to the
loose nature of wireless network. Issues like providing Quality of
Service (QoS) at a good level, dedicating capacity for calls and
having secure calls is more difficult rather than wired LAN.
Therefore VoIP over WLAN (VoWLAN) remains a challenging
research topic. In this paper we consolidate and address major
VoWLAN issues. This research is helpful for those researchers wants
to do research in Voice over IP technology over WLAN network.