Abstract: Discussion and development of principles of the
uniform nation formation within the limits of the Kazakhstan state
obviously became one of the most pressing questions of the day. The
fact that this question has not been solved "from above" as many
other questions has caused really brisk discussion, shows us increase
of civil consciousness in Kazakhstan society, and also the actuality of
this theme which can be carried in the category of fatal questions. In
any sense, nation building has raised civil society to a much higher
level. It would be better to begin with certain definitions. First is the
word "nation". The second is the "state". Both of these terms are very
closely connected with each other, so that in English language they
are in general synonyms. In Russian more shades of these terms
exist. For example in Kazakhstan the citizens of the country
irrespective of nationality (but mainly with reference to non-kazakhs)
are called «kazakhstanians», while the name of the title nation is
\"Kazakhs\". The same we can see in Russia, where, for example, the
Chechen or the Yakut –are \"Rossiyane\" which means “the citizens
of Russian Federation, but not \"Russians\".
The paper was written under the research project “Islam in modern
Kazakhstan: the nature and outcome of the religious revival”.
Abstract: Innovations in technology have created new ethical
challenges. Essential use of electronic communication in the
workplace has escalated at an astronomical rate over the past decade.
As such, legal and ethical dilemmas confronted by both the employer
and the employee concerning managerial control and ownership of einformation
have increased dramatically in the USA. From the
employer-s perspective, ownership and control of all information
created for the workplace is an undeniable source of economic
advantage and must be monitored zealously. From the perspective of
the employee, individual rights, such as privacy, freedom of speech,
and freedom from unreasonable search and seizure, continue to be
stalwart legal guarantees that employers are not legally or ethically
entitled to abridge in the workplace. These issues have been the
source of great debate and the catalyst for legal reform. The fine line
between ethical and legal has been complicated by emerging
technologies. This manuscript will identify and discuss a number of
specific legal and ethical issues raised by the dynamic electronic
workplace and conclude with suggestions that employers should
follow to respect the delicate balance between employees- legal
rights to privacy and the employer's right to protect its knowledge
systems and infrastructure.
Abstract: Mapping between local and global coordinates is an
important issue in finite element method, as all calculations are
performed in local coordinates. The concern arises when subparametric
are used, in which the shape functions of the field variable
and the geometry of the element are not the same. This is particularly
the case for C* elements in which the extra degrees of freedoms
added to the nodes make the elements sub-parametric. In the present
work, transformation matrix for C1* (an 8-noded hexahedron
element with 12 degrees of freedom at each node) is obtained using
equivalent C0 elements (with the same number of degrees of
freedom). The convergence rate of 8-noded C1* element is nearly
equal to its equivalent C0 element, while it consumes less CPU time
with respect to the C0 element. The existence of derivative degrees
of freedom at the nodes of C1* element along with excellent
convergence makes it superior compared with it equivalent C0
element.
Abstract: Increase in globalization of capital markets brings the
higher requirements on financial information provided for investors
who look for a highly comparable information. Paper deals with the
advantages and limitations of applying International Financial
Reporting Standards (IFRS) in the Czech Republic and Ukraine. As a
greatest limit for full adoption of IFRS shall be acknowledged the
strong connection of continental accounting to tax system and
enormous high administrative burden for IFRS appliers.
Abstract: The purpose of this study was to present a reliable mean for human-computer interfacing based on finger gestures made in two dimensions, which could be interpreted and adequately used in controlling a remote robot's movement. The gestures were captured and interpreted using an algorithm based on trigonometric functions, in calculating the angular displacement from one point of touch to another as the user-s finger moved within a time interval; thereby allowing for pattern spotting of the captured gesture. In this paper the design and implementation of such a gesture based user interface was presented, utilizing the aforementioned algorithm. These techniques were then used to control a remote mobile robot's movement. A resistive touch screen was selected as the gesture sensor, then utilizing a programmed microcontroller to interpret them respectively.
Abstract: Cosmic showers, during the transit through space, produce
sub - products as a result of interactions with the intergalactic
or interstellar medium which after entering earth generate secondary
particles called Extensive Air Shower (EAS). Detection and analysis
of High Energy Particle Showers involve a plethora of theoretical and
experimental works with a host of constraints resulting in inaccuracies
in measurements. Therefore, there exist a necessity to develop a
readily available system based on soft-computational approaches
which can be used for EAS analysis. This is due to the fact that soft
computational tools such as Artificial Neural Network (ANN)s can be
trained as classifiers to adapt and learn the surrounding variations. But
single classifiers fail to reach optimality of decision making in many
situations for which Multiple Classifier System (MCS) are preferred
to enhance the ability of the system to make decisions adjusting
to finer variations. This work describes the formation of an MCS
using Multi Layer Perceptron (MLP), Recurrent Neural Network
(RNN) and Probabilistic Neural Network (PNN) with data inputs
from correlation mapping Self Organizing Map (SOM) blocks and
the output optimized by another SOM. The results show that the setup
can be adopted for real time practical applications for prediction
of primary energy and location of EAS from density values captured
using detectors in a circular grid.
Abstract: This paper seeks to explore the actual classroom
setting, to examine its role for students- learning, and attitude in the
class. It presents a theoretical approach of the classroom as system to
be explored and examines the concrete reality of Greek secondary
education students, under the light of the above approach. Based on
the findings of a quantitative and qualitative research, authors
propose a rather ontological approach of the classroom and underline
what the key-elements for such approach should be. The paper
explores extensively the theoretical dimensions for the change of
paradigm required and addresses the new issues to be considered.
Abstract: Since communications between tag and reader in RFID
system are by radio, anyone can access the tag and obtain its any
information. And a tag always replies with the same ID so that it is
hard to distinguish between a real and a fake tag. Thus, there are many
security problems in today-s RFID System. Firstly, unauthorized
reader can easily read the ID information of any Tag. Secondly,
Adversary can easily cheat the legitimate reader using the collected
Tag ID information, such as the any legitimate Tag. These security
problems can be typically solved by encryption of messages
transmitted between Tag and Reader and by authentication for Tag.
In this paper, to solve these security problems on RFID system, we
propose the Tag Authentication Scheme based on self shrinking
generator (SSG). SSG Algorithm using in our scheme is proposed by
W.Meier and O.Staffelbach in EUROCRYPT-94. This Algorithm is
organized that only one LFSR and selection logic in order to generate
random stream. Thus it is optimized to implement the hardware logic
on devices with extremely limited resource, and the output generating
from SSG at each time do role as random stream so that it is allow our
to design the light-weight authentication scheme with security against
some network attacks. Therefore, we propose the novel tag
authentication scheme which use SSG to encrypt the Tag-ID
transmitted from tag to reader and achieve authentication of tag.
Abstract: In synchronized games players make their moves simultaneously
rather than alternately. Synchronized Triomineering
and Synchronized Tridomineering are respectively the synchronized
versions of Triomineering and Tridomineering, two variants of a
classic two-player combinatorial game called Domineering. Experimental
results for small m × n boards (with m + n ≤ 12 for
Synchronized Triomineering and m + n ≤ 10 for Synchronized
Tridomineering) and some theoretical results for general k×n boards
(with k = 3, 4, 5 for Synchronized Triomineering and k = 3
for Synchronized Tridomineering) are presented. Future research is
indicated.
Abstract: We consider a network of two M/M/1 parallel queues having the same poisonnian arrival stream with rate λ. Upon his arrival to the system a customer heads to the shortest queue and stays until being served. If the two queues have the same length, an arriving customer chooses one of the two queues with the same probability. Each duration of service in the two queues is an exponential random variable with rate μ and no jockeying is permitted between the two queues. A new numerical method, based on linear programming and convex optimization, is performed for the computation of the steady state solution of the system.
Abstract: This work aims to investigate a potential of
microalgae for utilizing industrial wastewater as a cheap nutrient for
their growth and oil accumulation. Wastewater was collected from
the effluent ponds of agro-industrial factories (cassava and ethanol
production plants). Only 2 microalgal strains were isolated and
identified as Scenedesmus quadricauda and Chlorella sp.. However,
only S. quadricauda was selected to cultivate in various wastewater
concentrations (10%, 20%, 40%, 60%, 80% and 100%). The highest
biomass obtained at 6.6×106 and 6.27×106 cells/ml when 60%
wastewater was used in flask and photo-bioreactor. The cultures gave
the highest lipid content at 18.58 % and 42.86% in cases of S.
quadricauda and S. obliquus. In addition, under salt stress (1.0 M
NaCl), S. obliquus demonstrated the highest lipid content at 50%
which was much more than the case of no NaCl adding. However, the
concentration of NaCl does not affect on lipid accumulation in case
of S. quadricauda.
Abstract: This paper reports on the influence of surface-treated coarse recycled concrete aggregate (RCA) on developing the compressive strength of concrete. The coarse RCA was initially treated by separately impregnating it in calcium metasilicate (CM) or wollastonite and nanosilica (NS) prepared at various concentrations. The effects of both treatment materials on concrete properties (e.g., slump, density and compressive strength) were evaluated. Scanning electron microscopy (SEM) analysis was performed to examine the microstructure of the resulting concrete. Results show that the effective use of treated coarse RCA significantly enhances the compressive strength of concrete. This result is supported by the SEM analysis, which indicates the formation of a dense interface between the treated coarse RCA and the cement matrix. Coarse RCA impregnated in CM solution results in better concrete strength than NS, and the optimum concentration of CM solution recommended for treated coarse RCA is 10%.
Abstract: An adaptive neural network controller for
autonomous underwater vehicles (AUVs) is presented in this paper.
The AUV model is highly nonlinear because of many factors, such as
hydrodynamic drag, damping, and lift forces, Coriolis and centripetal
forces, gravity and buoyancy forces, as well as forces from thruster.
In this regards, a nonlinear neural network is used to approximate the
nonlinear uncertainties of AUV dynamics, thus overcoming some
limitations of conventional controllers and ensure good performance.
The uniform ultimate boundedness of AUV tracking errors and the
stability of the proposed control system are guaranteed based on
Lyapunov theory. Numerical simulation studies for motion control of
an AUV are performed to demonstrate the effectiveness of the
proposed controller.
Abstract: The demand for higher performance graphics
continues to grow because of the incessant desire towards realism.
And, rapid advances in fabrication technology have enabled us to
build several processor cores on a single die. Hence, it is important to
develop single chip parallel architectures for such data-intensive
applications. In this paper, we propose an efficient PIM architectures
tailored for computer graphics which requires a large number of
memory accesses. We then address the two important tasks necessary
for maximally exploiting the parallelism provided by the architecture,
namely, partitioning and placement of graphic data, which affect
respectively load balances and communication costs. Under the
constraints of uniform partitioning, we develop approaches for optimal
partitioning and placement, which significantly reduce search space.
We also present heuristics for identifying near-optimal placement,
since the search space for placement is impractically large despite our
optimization. We then demonstrate the effectiveness of our partitioning
and placement approaches via analysis of example scenes; simulation
results show considerable search space reductions, and our heuristics
for placement performs close to optimal – the average ratio of
communication overheads between our heuristics and the optimal was
1.05. Our uniform partitioning showed average load-balance ratio of
1.47 for geometry processing and 1.44 for rasterization, which is
reasonable.
Abstract: The special and unique advantages of explosive
forming, has developed its use in different industries. Considering the
important influence of improving the current explosive forming
techniques on increasing the efficiency and control over the
explosive forming procedure, the effects of air and water as the
energy-conveying medium, and also their differences will be
illustrated in this paper. Hence, a large number of explosive forming
tests have been conducted on two sizes of thin walled cylindrical
shells by using air and water as the working medium. Comparative
diagrams of the maximum radial deflection of work-pieces of the
same size, as a function of the scaled distance, show that for the
points with the same values of scaled distance, the maximum radial
deformation caused by the under water explosive loading is 4 to 5
times more than the deflection of the shells under explosive forming,
while using air. Results of this experimental research have also been
compared with other studies which show that using water as the
energy conveying media increases the efficiency up to 4.8 times. The
effect of the media on failure modes of the shells, and the necking
mechanism of the walls of the specimens, while being explosively
loaded, are also discussed in this issue. Measuring the tested
specimens shows that, the increase in the internal volume has been
accompanied by necking of the walls, which finally results in the
radial rupture of the structure.
Abstract: Only recently have water ethics received focused interest in the international water community. Because water is metabolically basic to life, an ethical dimension persists in every decision related to water. Water ethics at once express human society-s approach to water and act as guidelines for behaviour. Ideas around water are often implicit and embedded as assumptions. They can be entrenched in behaviour and difficult to contest because they are difficult to “see". By explicitly revealing the ethical ideas underlying water-related decisions, human society-s relationship with water, and with natural systems of which water is part, can be contested and shifted or be accepted with conscious intention by human society. In recent decades, improved understanding of water-s importance for ecosystem functioning and ecological services for human survival is moving us beyond this growth-driven, supplyfocused management paradigm. Environmental ethics challenge this paradigm by extending the ethical sphere to the environment and thus water or water Resources management per se. An ethical approach is a legitimate, important, and often ignored approach to effect change in environmental decision making. This qualitative research explores principles of water ethics and examines the underlying ethical precepts of selected water policy examples. The constructed water ethic principles act as a set of criteria against which a policy comparison can be established. This study shows that water Resources management is a progressive issue by embracing full public participation and a new planning model, and knowledgegeneration initiatives.
Abstract: The rapid adoption of Internet has turned the Millennial Teens- life like a lightning speed. Empirical evidence has illustrated that Pathological Internet Use (PIU) among them ensure long-term success to the market players in the children industry. However, it creates concerns among their care takers as it generates mental disorder among some of them. The purpose of this paper is to examine the determinants of PIU and identify its outcomes among urban Millennial Teens. It aims to develop a theoretical framework based on a modified Media System Dependency (MSD) Theory that integrates important systems and components that determine and resulted from PIU.
Abstract: Programmable logic controllers are the main controllers in the today's industries; they are used for several applications in industrial control systems and there are lots of examples exist from the PLC applications in industries especially in big companies and plants such as refineries, power plants, petrochemical companies, steel companies, and food and production companies. In the PLCs there are some functions in the function library in software that can be used in PLC programs as basic program elements. The aim of this project are introducing and implementing a new function block of a neural network to the function library of PLC. This block can be applied for some control applications or nonlinear functions calculations after it has been trained for these applications. The implemented neural network is a Perceptron neural network with three layers, three input nodes and one output node. The block can be used in manual or automatic mode. In this paper the structure of the implemented function block, the parameters and the training method of the network are presented by considering the especial method of PLC programming and its complexities. Finally the application of the new block is compared with a classic simulated block and the results are presented.
Abstract: A cognitive collaborative reinforcement learning
algorithm (CCRL) that incorporates an advisor into the learning
process is developed to improve supervised learning. An autonomous
learner is enabled with a self awareness cognitive skill to decide
when to solicit instructions from the advisor. The learner can also
assess the value of advice, and accept or reject it. The method is
evaluated for robotic motion planning using simulation. Tests are
conducted for advisors with skill levels from expert to novice. The
CCRL algorithm and a combined method integrating its logic with
Clouse-s Introspection Approach, outperformed a base-line fully
autonomous learner, and demonstrated robust performance when
dealing with various advisor skill levels, learning to accept advice
received from an expert, while rejecting that of less skilled
collaborators. Although the CCRL algorithm is based on RL, it fits
other machine learning methods, since advisor-s actions are only
added to the outer layer.
Abstract: During recent years, attention in 'Green Computing'
has moved research into energy-saving techniques for home
computers to enterprise systems' Client and Server machines. Saving
energy or reduction of carbon footprints is one of the aspects of
Green Computing. The research in the direction of Green Computing
is more than just saving energy and reducing carbon foot prints. This
study provides a brief account of Green Computing. The emphasis of
this study is on current trends in Green Computing; challenges in the
field of Green Computing and the future trends of Green Computing.