Abstract: Methods for organizing web data into groups in order
to analyze web-based hypertext data and facilitate data availability
are very important in terms of the number of documents available
online. Thereby, the task of clustering web-based document structures
has many applications, e.g., improving information retrieval on the
web, better understanding of user navigation behavior, improving web
users requests servicing, and increasing web information accessibility.
In this paper we investigate a new approach for clustering web-based
hypertexts on the basis of their graph structures. The hypertexts will
be represented as so called generalized trees which are more general
than usual directed rooted trees, e.g., DOM-Trees. As a important
preprocessing step we measure the structural similarity between the
generalized trees on the basis of a similarity measure d. Then,
we apply agglomerative clustering to the obtained similarity matrix
in order to create clusters of hypertext graph patterns representing
navigation structures. In the present paper we will run our approach
on a data set of hypertext structures and obtain good results in
Web Structure Mining. Furthermore we outline the application of
our approach in Web Usage Mining as future work.
Abstract: Due to memory leaks, often-valuable system memory
gets wasted and denied for other processes thereby affecting the
computational performance. If an application-s memory usage
exceeds virtual memory size, it can leads to system crash. Current
memory leak detection techniques for clusters are reactive and
display the memory leak information after the execution of the
process (they detect memory leak only after it occur).
This paper presents a Dynamic Memory Monitoring Agent
(DMMA) technique. DMMA framework is a dynamic memory leak
detection, that detects the memory leak while application is in
execution phase, when memory leak in any process in the cluster is
identified by DMMA it gives information to the end users to enable
them to take corrective actions and also DMMA submit the affected
process to healthy node in the system. Thus provides reliable service
to the user. DMMA maintains information about memory
consumption of executing processes and based on this information
and critical states, DMMA can improve reliability and
efficaciousness of cluster computing.
Abstract: A low cost Short Message System (SMS) based Home security system equipped with motion, smoke, temperature, humidity and light sensors has been studied and tested. The sensors are controlled by a microprocessor PIC 18F4520 through the SMS having password protection code for the secure operation. The user is able to switch light and the appliances and get instant feedback. Also in cases of emergencies such as fire or robbery the system will send alert message to occupant and relevant civil authorities. The operation of the home security has been tested on Vodafone- Fiji network and Digicel Fiji Network for emergency and feedback responses for 25 samples. The experiment showed that it takes about 8-10s for the security system to respond in case of emergency. It takes about 18-22s for the occupant to switch and monitor lights and appliances and then get feedback depending upon the network traffic.
Abstract: This paper presents a solution for ceramic cutting tools availability in interrupted machining. Experiments were performed on a special fixture – the interrupted cut simulator. This fixture was constructed at our Department of Machining and Assembly within the scope of a project by the Czech Science Foundation. The goals of the tests were to contribute to the wider usage of these cutting materials in machining, especially in interrupted machining. Through the centuries, producers of ceramic cutting tools have taken big steps forward. Namely, increasing durability in maintaining high levels of strength and hardness lends an advantage. Some producers of these materials advise cutting inserts for interrupted machining at the present time [1, 2].
Abstract: Serial Analysis of Gene Expression is a powerful
quantification technique for generating cell or tissue gene expression
data. The profile of the gene expression of cell or tissue in several
different states is difficult for biologists to analyze because of the large
number of genes typically involved. However, feature selection in
machine learning can successfully reduce this problem. The method
allows reducing the features (genes) in specific SAGE data, and
determines only relevant genes. In this study, we used a genetic
algorithm to implement feature selection, and evaluate the
classification accuracy of the selected features with the K-nearest
neighbor method. In order to validate the proposed method, we used
two SAGE data sets for testing. The results of this study conclusively
prove that the number of features of the original SAGE data set can be
significantly reduced and higher classification accuracy can be
achieved.
Abstract: Wavelet transforms are multiresolution
decompositions that can be used to analyze signals and images.
Image compression is one of major applications of wavelet
transforms in image processing. It is considered as one of the most
powerful methods that provides a high compression ratio. However,
its implementation is very time-consuming. At the other hand,
parallel computing technologies are an efficient method for image
compression using wavelets. In this paper, we propose a parallel
wavelet compression algorithm based on quadtrees. We implement
the algorithm using MatlabMPI (a parallel, message passing version
of Matlab), and compute its isoefficiency function, and show that it is
scalable. Our experimental results confirm the efficiency of the
algorithm also.
Abstract: Over the past few years, a number of efforts have
been exerted to build parallel processing systems that utilize the idle
power of LAN-s and PC-s available in many homes and corporations.
The main advantage of these approaches is that they provide cheap
parallel processing environments for those who cannot afford the
expenses of supercomputers and parallel processing hardware.
However, most of the solutions provided are not very flexible in the
use of available resources and very difficult to install and setup.
In this paper, a multi-level web-based parallel processing system
(MWPS) is designed (appendix). MWPS is based on the idea of
volunteer computing, very flexible, easy to setup and easy to use.
MWPS allows three types of subscribers: simple volunteers (single
computers), super volunteers (full networks) and end users. All of
these entities are coordinated transparently through a secure web site.
Volunteer nodes provide the required processing power needed by
the system end users. There is no limit on the number of volunteer
nodes, and accordingly the system can grow indefinitely. Both
volunteer and system users must register and subscribe. Once, they
subscribe, each entity is provided with the appropriate MWPS
components. These components are very easy to install.
Super volunteer nodes are provided with special components that
make it possible to delegate some of the load to their inner nodes.
These inner nodes may also delegate some of the load to some other
lower level inner nodes .... and so on. It is the responsibility of the
parent super nodes to coordinate the delegation process and deliver
the results back to the user.
MWPS uses a simple behavior-based scheduler that takes into
consideration the current load and previous behavior of processing
nodes. Nodes that fulfill their contracts within the expected time get a
high degree of trust. Nodes that fail to satisfy their contract get a
lower degree of trust.
MWPS is based on the .NET framework and provides the minimal
level of security expected in distributed processing environments.
Users and processing nodes are fully authenticated. Communications
and messages between nodes are very secure. The system has been
implemented using C#.
MWPS may be used by any group of people or companies to
establish a parallel processing or grid environment.
Abstract: Although a picture can be automatically a graphic
work, but especially in the field of graphics and images based on the
idea of advertising and graphic design will be prepared and
photographers to realize the design using his own knowledge and
skills to help does. It is evident that knowledge of photography,
photographer and designer of the facilities, fields of reaching a
higher level of quality offers. At the same time do not have a graphic
designer is also skilled photographer, but can execute your idea may
delegate to an expert photographer. Using technology and methods in
all fields of photography, graphic art may be applicable. But most of
its application in Iran, in works such as packaging, posters, Bill
Board, advertising, brochures and catalogs are. In this study, we
review how the images and techniques in the chart should be used in
Iranian graphic photo what impact has left. Using photography
techniques and procedures can be designed and helped advance the
goals graphic. Technique could not determine the idea. But what is
important to think about design and photography and his creativity
can flourish as a tool to be effective graphic designer in mind.
Computer software to help it's very promotes creativity techniques
shall graphic designer but also it is as a tool. Using images in various
fields, especially graphic arts and only because it is not being
documented, but applications are beautiful. As to his photographic
style from today is graphics. Graphic works try to affect impacts on
their audience. Hence the photo as an important factor is attention.
The other hand saw the man with the extent of forgiving and
understanding people's image, instead of using the word to your files,
allows large messages and concepts should be sent in the shortest
time. Posters, advertisements, brochures, catalog and packaging
products very diverse agricultural, industrial and food could not be
self-image. Today, the use of graphic images for a big score and the
photos to richen the role graphic design plays a major.
Abstract: The development of the poultry industry in Albania is mainly based on the existence of intensive modern farms with huge capacities, which often are mixed with other forms. Colibacillosis is commonly displayed regardless of the type of breeding, delivering high mortality in poultry industry. The mechanisms with which pathogen enterobacters are able to cause the infection in poultry are not yet clear. The routine diagnose in the field, followed by isolation of E. coli and species of Salmonella genres in reference laboratories cannot lead in classification or full recognition of circulative strains in a territory, if it is not performed a differentiation among the present microorganisms in intensive farms and those in rural areas. In this study were isolated 1.496 strains of E. coli and 378 Salmonella spp. This study, presents distribution of poultry pathogenosity of E.coli and Salmonella spp., based on the usage of innovative diagnostic methods.
Abstract: In this paper, we evaluate the choice of suitable
quantization characteristics for both the decoder messages and the
received samples in Low Density Parity Check (LDPC) coded
systems using M-QAM (Quadrature Amplitude Modulation)
schemes. The analysis involves the demapper block that provides
initial likelihood values for the decoder, by relating its quantization
strategy of the decoder. A mapping strategy refers to the grouping of
bits within a codeword, where each m-bit group is used to select a
2m-ary signal in accordance with the signal labels. Further we
evaluate the system with mapping strategies like Consecutive-Bit
(CB) and Bit-Reliability (BR). A new demapper version, based on
approximate expressions, is also presented to yield a low complexity
hardware implementation.
Abstract: In this paper application of artificial intelligence for
baby and children caring is studied. Then a new idea for injury
prevention and safety announcement is presented by using digital
image processing. The paper presents the structure of the proposed
system. The system determines the possibility of the dangers for
children and babies in yards, gardens and swimming pools or etc. In
the presented idea, multi camera System is used and receiver videos
are processed to find the hazardous areas then the entrance of
children and babies in the determined hazardous areas are analyzed.
In this condition the system does the programmed action capture,
produce alarm or tone or send message.
Abstract: There are many expand of Wi-Fi zones provided
mobile careers and usage of wireless access point at home as increase
of usage of wireless internet caused by the use of smart phone. This
paper shows wireless local area network status, security threats of
WLAN and functionality of major wireless access point in Korea. We
propose security countermeasures concerned with life cycle of access
point from manufacturing to installation, using and finally disposal.
There needed to releasing with configured secure at access point.
Because, it is most cost effective resolution than stage of installation or
other life cycle of access point.
Abstract: Universities have an important role in social education in many aspects. In terms of creating awareness and convincing public about social issues, universities take a leading position for public. The best way to provide public support for social education is to develop public communication campaigns. The aim of this study is to present a public communication model which will be guided in social education practices. The study titled “Importance of public communication campaigns and art activities in Social Education “is based on the following topics: Effects of public communication campaigns on social education, Public relations techniques for education, communication strategies, Steps of public relations campaigns in social education, making persuasive messages for public communication campaigns, developing artistic messages and organizing art activities in social education. In addition to these topics, media planning for social education, forming a team as campaign managers, dialogues with opinion leaders in education and preparing creative communication models for social education will be taken into consideration. This study also aims to criticize social education Case studies in Turkey. At the same time, some communicative methods and principles will be given in the light of communication campaigns within the context of this notice.
Abstract: The Yasuj city stream named the Beshar supply
water for different usages such as aquaculture farms , drinking,
agricultural and industrial usages. Fish processing plants
,Agricultural farms, waste water of industrial zones and hospitals
waste water which they are generate by human activity produce a
considerable volume of effluent and when they are released in to the
stream they can effect on the water quality and down stream aquatic
systems. This study was conducted to evaluate the effects of outflow
effluent from different human activity and point and non point
pollution sources on the water quality and health of the Beshar
river next to Yasuj. Yasuj is the biggest and most important city in
the Kohkiloye and Boyerahmad province . The Beshar River is one
of the most important aquatic ecosystems in the upstream of the
Karun watershed in south of Iran which is affected by point and non
point pollutant sources . This study was done in order to evaluate the
effects of human activities on the water quality and health of the
Beshar river. This river is approximately 190 km in length and
situated at the geographical positions of 51° 20' to 51° 48' E and 30°
18' to 30° 52' N it is one of the most important aquatic ecosystems of
Kohkiloye and Boyerahmad province in south-west Iran. In this
research project, five study stations were selected to examine water
pollution in the Beshar River systems. Human activity is now one of
the most important factors affecting on hydrology and water quality
of the Beshar river. Humans use large amounts of resources to sustain
various standards of living, although measures of sustainability are
highly variable depending on how sustainability is defined. The
Beshar river ecosystems are particularly sensitive and vulnerable to
human activities. The water samples were analyzed, then some
important water quality parameters such as pH, dissolve oxygen
(DO), Biochemical Oxygen Demand (BOD5), Chemical Oxygen
Demand (COD), Total Suspended Solids (TDS),Turbidity,
Temperature, Nitrates (NO3) and Phosphates (PO4) were estimated
at the two stations. The results show a downward trend in the water
quality at the down stream of the city. The amounts of
BOD5,COD,TSS,T,Turbidity, NO3 and PO4 in the down stream
stations were considerably more than the station 1. By contrast the
amounts of DO in the down stream stations were less than to the
station 1. However when effluent discharge consequence of human
activities are released into the Beshar river near the city, the quality
of river are decreases and the environmental problems of the river
during the next years are predicted to rise.
Abstract: The purpose of this paper is to contribute to the body
of knowledge in the area of management accounting, particularly
performance measurement systems within the BSC framework, by
investigating empirically the extent of multiple performance
measures usage and their effects on the financial performance of
Jordanian banks in the branches level. Nevertheless, the result of this
study shows that the non-financial measures usages, particularly,
customer oriented indicators and product/ service oriented indicators,
appears to be important as it enhances firm performance.
Remarkably, the findings reveal that there is positive relationship
between the usages of multiple performance measures via overall
BSC measures and financial performance in the branches level.
Abstract: One of the main problems of suspended cable structures is initial shape change under the action of non uniform load. The problem can be solved by increasing of weight of construction or by using of prestressing. But this methods cause increasing of materials consumption of suspended cable structure. The cable truss usage is another way how the problem of shape change under the action of non uniform load can be fixed. The cable trusses with the vertical and inclined suspensions, cross web and single cable were analyzed as the main load-bearing structures of suspension bridge. It was shown, that usage of cable truss allows to reduce the vertical displacements up to 32% in comparison with the single cable in case of non uniformly distributed load. In case of uniformly distributed load single cable is preferable.
Abstract: Nowadays the asynchronous learning has granted the permission to the anywhere and anything learning via the technology and E-media which give the learner more convenient. This research is about the design of the blended and online learning for the asynchronous learning of the process management subject in order to create the prototype of this subject asynchronous learning which will create the easiness and increase capability in the learning. The pattern of learning is the integration between the in-class learning and online learning via the internet. This research is mainly focused on the online learning and the online learning can be divided into 5 parts which are virtual classroom, online content, collaboration, assessment and reference material. After the system design was finished, it was evaluated and tested by 5 experts in blended learning design and 10 students which the user’s satisfaction level is good. The result is as good as the assumption so the system can be used in the process management subject for a real usage.
Abstract: Web usage mining is an interesting application of data
mining which provides insight into customer behaviour on the Internet. An important technique to discover user access and navigation trails is based on sequential patterns mining. One of the
key challenges for web access patterns mining is tackling the problem
of mining richly structured patterns. This paper proposes a novel
model called Web Access Patterns Graph (WAP-Graph) to represent all of the access patterns from web mining graphically. WAP-Graph
also motivates the search for new structural relation patterns, i.e. Concurrent Access Patterns (CAP), to identify and predict more
complex web page requests. Corresponding CAP mining and modelling methods are proposed and shown to be effective in the
search for and representation of concurrency between access patterns
on the web. From experiments conducted on large-scale synthetic
sequence data as well as real web access data, it is demonstrated that
CAP mining provides a powerful method for structural knowledge discovery, which can be visualised through the CAP-Graph model.
Abstract: Effect of oral administration of “Gadagi" tea on liver
function was assessed on 50 healthy male albino rats which were
grouped and administered with different doses(mg/kg) i.e low dose
(380mg/kg, 415mg/kg, 365mg/kg, 315mg/kg for “sak", “sada" and
“magani" respectively), standard dose ( 760mg/kg, 830mg/kg,
730mg/kg for “sak-, “sada" and “magani" respectively) and high dose
(1500mg/kg, 1700mg/kg and 1460mg/kg for “sak--,"sada" and
“magani" groups respectively) for a period of four weeks. Animals
that were not administered with the tea constituted the control group.
At the end of fourth week, the animals were sacrificed and their
serum alanine aminotransferase (ALT), aspartate aminotransferase
(AST), alkaline phosphatase (ALP), total protein (TP), albumin
(ALB), and globulins (GLO) were determined. Mean serum ALT and
ALP activities were significantly higher (P
Abstract: The Internet telephony employs a new type of Internet communication on which a mutual communication is realized by establishing sessions. Session Initiation Protocol (SIP) is used to establish sessions between end-users. For unreliable transmission (UDP), SIP message should be retransmitted when it is lost. The retransmissions increase a load of the SIP signaling network, and sometimes lead to performance degradation when a network is overloaded. The paper proposes an overload control for a SIP signaling network to protect from a performance degradation. Introducing two thresholds in a queue of a SIP proxy server, the SIP proxy server detects a congestion. Once congestion is detected, a SIP signaling network restricts to make new calls. The proposed overload control is evaluated using the network simulator (ns-2). With simulation results, the paper shows the proposed overload control works well.