Abstract: Autism Spectrum Disorders (ASDs) are characterized
by abnormalities in social interaction and communication, as well as
repetitive and stereotyped behaviors. Although various studies have
been conducted in ASDs etiology across the world, it seems that they
are still unknown in Middle East. Some scientific researches have
been conducted on ASDs in Middle East (ME) especially in
Kingdom of Saudi Arabia (KSA).
A systematic literature review was performed to identify the ASDs
studies in KSA. Accordingly, PubMed, ISI web of Science and
Google were searched to find KSA and ME studies in ASDs. The
main focus of this review work is to outline an improved
understanding of the underpinnings of ASD in order to achieve
therapeutic interventions and we will discuss the main problem we
waiting for solution with reference with role of Transcranial
Magnetic Stimulation (TMS) to modulate cortical activity improve
understanding ASD.
Abstract: Advances in processors architecture, such as multicore,
increase the size of complexity of parallel computer systems.
With multi-core architecture there are different parallel languages
that can be used to run parallel programs. One of these languages is
OpenMP which embedded in C/Cµ or FORTRAN. Because of this
new architecture and the complexity, it is very important to evaluate
the performance of OpenMP constructs, kernels, and application
program on multi-core systems. Performance is the activity of
collecting the information about the execution characteristics of a
program. Performance tools consists of at least three interfacing
software layers, including instrumentation, measurement, and
analysis. The instrumentation layer defines the measured
performance events. The measurement layer determines what
performance event is actually captured and how it is measured by the
tool. The analysis layer processes the performance data and
summarizes it into a form that can be displayed in performance tools.
In this paper, a number of OpenMP performance tools are surveyed,
explaining how each is used to collect, analyse, and display data
collection.
Abstract: Celiac disease is an immune-mediated disease, triggered in genetically susceptible individuals by ingested gluten from wheat, rye, barley and other closely related cereal grains. The only effective treatment is a strict gluten free diet for life. Latvian producers do not offer gluten-free products. In this research, use of extruded maize flour was tested for substituting rice, maize or buckwheat flour in gluten-free bread formulations at different ratios. Also the influence of extruded maize flour on the quality parameters of gluten-free bread was investigated. The aim of research was to study the influence of extruded maize flour on gluten-free bread quality. Addition of extruded maize flour affect gluten-free bread crumb color, structure of crumb, weight loss and dry off of bread.
Abstract: To coop with urbanization issues and the economic need for expansion, the city of Jakarta is planning to reclaim more land in the Jakarta Bay. However, the reclamation activities of some islands have barely started and already the developers are facing difficulties in finding sufficient quantities of sand as fill material. When addressing the problem of sand scarcity in the case of Jakarta where, an excess of waste production, an inadequate solid waste management system and a lack of dumping ground pose a major problem, it is hard not to think of the use of waste as alternative fill material. This paper analyses the possibilities of using waste in the land reclamation projects, considering the governmental, social, environmental and economic context of the city. The results identify types of waste that could be used, ways of using those types of waste and implementation conditions for the city of Jakarta.
Abstract: This paper considers the design of a motion planner
that will simultaneously accomplish control and motion planning of a
n-link nonholonomic mobile manipulator, wherein, a n-link
holonomic manipulator is coupled with a nonholonomic mobile
platform, within an obstacle-ridden environment. This planner,
derived from the Lyapunov-based control scheme, generates
collision-free trajectories from an initial configuration to a final
configuration in a constrained environment cluttered with stationary
solid objects of different shapes and sizes. We demonstrate the
efficiency of the control scheme and the resulting acceleration
controllers of the mobile manipulator with results through computer
simulations of an interesting scenario.
Abstract: In the present paper the extreme shear stresses with the corresponding planes are established using the freely available computer tools like the Gnuplot, Sage, R, Python and Octave. In order to support these freely available computer tools, their strong symbolical and graphical abilities are illustrated. The nature of the stationary points obtained by the Method of Lagrangian Multipliers can be determined using freely available computer symbolical tools like Sage. The characters of the stationary points can be explained in the easiest way using freely available computer graphical tools like Gnuplot, Sage, R, Python and Octave. The presented figures improve the understanding of the problem and the obtained solutions for the majority of students of civil or mechanical engineering.
Abstract: This paper explain about analysis and design a business directory for micro-scale businesses, small and medium enterprises (SMEs). Business Directory, if implemented will facilitate and optimize the access of SMEs to ease suppliers access to marketing. Business Directory will be equipped with the power of geocoding, so each location can be easily viewed SMEs on the map. The map will be constructed by using the functionality of a webbased Google Maps API. The information presented in the form of multimedia that can be more interesting and interactive. The method used to achieve the goal are: observation; interviews; modeling and classifying business directory for SMEs.
Abstract: Cattle manure and mineral fertilizers are two source
of Nitrogen, which can affect the growth and quantity of potato. In
this research the effects of the use of cattle manure (5, 10, 15 and 20
ton ha-1), Nitrogen fertilizer (50, 100 and 150 kg N ha-1) and their
interaction on potato growth were evaluated during field
experiments in 2008 with the help of Randomized Complete Block
(RCB) with the factorial arrangement of three experimental
replications in Iran. At the 75 th day after emergence, dry weight of
Shoots, leaf area index (LAI) and plant height were recorded. Results
showed that, dry weight of Shoots, LAI and plant height increased
linearly and very significantly in response to the application of
manure and Nitrogen fertilizer. While the interaction between
manure and Nitrogen fertilizer just on the LAI and plant height was
significant, somehow the maximum amount of plant height( 73 cm)
was obtained by using 150 kg Nitrogen + 15 tons of manure per
hectare, and maximum LAI ( 5.36) was obtained by using 150 kg
Nitrogen + 20 tons of manure per hectare. Also in this experiment
maximum tuber yield (36.8 tons ha-1) was obtained by the utilization
of 150 kg Nitrogen per hectare + 20 tons manure.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created
Abstract: Textile structures are engineered and fabricated to
meet worldwide structural applications. Nevertheless, research
varying textile structure on natural fibre as composite reinforcement
was found to be very limited. Most of the research is focusing on
short fibre and random discontinuous orientation of the reinforcement
structure. Realizing that natural fibre (NF) composite had been
widely developed to be used as synthetic fibre composite
replacement, this research attempted to examine the influence of
woven and cross-ply laminated structure towards its mechanical
performances. Laminated natural fibre composites were developed
using hand lay-up and vacuum bagging technique. Impact and
flexural strength were investigated as a function of fibre type (coir
and kenaf) and reinforcement structure (imbalanced plain woven,
0°/90° cross-ply and +45°/-45° cross-ply). Multi-level full factorial
design of experiment (DOE) and analysis of variance (ANOVA) was
employed to impart data as to how fibre type and reinforcement
structure parameters affect the mechanical properties of the
composites. This systematic experimentation has led to determination
of significant factors that predominant influences the impact and
flexural properties of the textile composites. It was proven that both
fibre type and reinforcement structure demonstrated significant
difference results. Overall results indicated that coir composite and
woven structure exhibited better impact and flexural strength. Yet,
cross-ply composite structure demonstrated better fracture resistance.
Abstract: This paper addresses the fundamental requirements for
starting an online business. It covers the process of ideation,
conceptualization, formulation, and implementation of new venture
ideas on the Web. Using Facebook as an illustrative example, we learn
how to turn an idea into a successful electronic business and to execute
a business plan with IT skills, management expertise, a good
entrepreneurial attitude, and an understanding of Internet culture. The
personality traits and characteristics of a successful e-commerce
entrepreneur are discussed with reference to Facebook-s founder,
Mark Zuckerberg. Facebook is a social and e-commerce success. It
provides a trusted environment of which participants can conduct
business with social experience. People are able to discuss products
before, during the after the sale within the Facebook environment. The
paper also highlights the challenges and opportunities for e-commerce
entrepreneurial startups to go public and of entering the China market.
Abstract: In this treatise we will study the capability of static
compensator for reactive power to stabilize sheen voltage with motor
loading on power networks system. We also explain the structure and main function of STATCOM and the method to control it using STATCOM transformer current to simultaneously predict after
telling about the necessity of FACTS tools to compensate in power networks. Then we study topology and controlling system to stabilize
voltage during start of inductive motor. The outcome of stimulat by MATLAB software supports presented controlling idea and
system in the treatise.
Abstract: Three-dimensional geometric models have been used
to present architectural and engineering works, showing their final
configuration. When the clarification of a detail or the constitution of
a construction step in needed, these models are not appropriate. They
do not allow the observation of the construction progress of a
building. Models that could present dynamically changes of the
building geometry are a good support to the elaboration of projects.
Techniques of geometric modeling and virtual reality were used to
obtain models that could visually simulate the construction activity.
The applications explain the construction work of a cavity wall and a
bridge. These models allow the visualization of the physical
progression of the work following a planned construction sequence,
the observation of details of the form of every component of the
works and support the study of the type and method of operation of
the equipment applied in the construction. These models presented
distinct advantage as educational aids in first-degree courses in Civil
Engineering. The use of Virtual Reality techniques in the
development of educational applications brings new perspectives to
the teaching of subjects related to the field of civil construction.
Abstract: Stipples are desired for pattern fillings and
transparency effects. In contrast, some graphics standards, including
OpenGL ES 1.1 and 2.0, omitted this feature. We represent details of
providing line stipples and polygon stipples, through combining
texture mapping and alpha blending functions. We start from the
OpenGL-specified stipple-related API functions. The details of
mathematical transformations are explained to get the correct texture
coordinates. Then, the overall algorithm is represented, and its
implementation results are followed. We accomplished both of line
and polygon stipples, and verified its result with conformance test
routines.
Abstract: The development of the power electronics has allowed
increasing the precision and reliability of the electrical trainings,
thanks to the adjustable inverters, as the Pulse Wide Modulation
(PWM) five level inverters, which is the object of study in this
article.The authors treat the relation between the law order adopted for
a given system and the oscillations of the electrical and mechanical
parameters of which the tolerance depends on the process with which
they are integrated (paper factory, lifting of the heavy loads,
etc.).Thus the best choice of the regulation indexes allows us to
achieve stability and safety training without investment (management
of existing equipment).
Abstract: A serious problem on the WWW is finding reliable
information. Not everything found on the Web is true and the
Semantic Web does not change that in any way. The problem will be
even more crucial for the Semantic Web, where agents will be
integrating and using information from multiple sources. Thus, if an
incorrect premise is used due to a single faulty source, then any
conclusions drawn may be in error. Thus, statements published on
the Semantic Web have to be seen as claims rather than as facts, and
there should be a way to decide which among many possibly
inconsistent sources is most reliable. In this work, we propose a trust
model for the Semantic Web. The proposed model is inspired by the
use trust in human society. Trust is a type of social knowledge and
encodes evaluations about which agents can be taken as reliable
sources of information or services. Our proposed model allows
agents to decide which among different sources of information to
trust and thus act rationally on the semantic web.
Abstract: In this paper is being described a possible use of
virtualization technology in teaching computer networks. The
virtualization can be used as a suitable tool for creating virtual
network laboratories, supplementing the real laboratories and
network simulation software in teaching networking concepts. It will
be given a short description of characteristic projects in the area of
virtualization technology usage in network simulation, network
experiments and engineering education. A method for implementing
laboratory has also been explained, together with possible laboratory
usage and design of laboratory exercises. At the end, the laboratory
test results of virtual laboratory are presented as well.
Abstract: Strategic alliances generally mean the cooperation or
collaboration between firms which pursue for a synergy that each
member hopes the benefits from the alliances would be much more
than those from individual efforts. Past researches provide us
sufficient theories and considerations for alliance forming in liner
shipping market. This research reviews important academic journals
for the past decade regarding to the most important reasons to form the
alliances. We would explain the motive of alliances and details of
shipping cooperation in literature review.
The paper also empirically investigates the key service quality
requirements improved through alliances by using quality function
deployment (QFD). Moreover, the research investigates famous
shipping reports, shipping consultant websites and most recent
shipping publications to find out the executive-s viewpoint of several
leading carriers among top 20 to assess current shipping strategic
alliance on Asia/Europe route. These comments provide meaningful
managerial reasons to consider alliance formations and search if there
is any gap between the theories and industrial practice. Analysis of the
empirical investigation and top management-s perspective on current
market situation will contribute us some meaningful managerial
suggestions to evaluate these theories applied to current strategic
alliances.
Abstract: Considering the numerous applications of the study of
the flow due to leakage in a buried pipe
in unsaturated porous media, finding a proper model to explain the
influence of the effective factors is of great importance.There are
various important factors involved in this type of flow such as: pipe
leakage size and location, burial depth, the degree of the saturation of
the surrounding porous medium, characteristics of the porous
medium, fluid type and pressure of the upstream.In this study, the
flow through unsaturated porous media due to leakage of a buried
pipe for up and down leakage location is studied experimentally and
numerically and their results are compared. Study results show that
Darcy equation together with BCM method (for calculating the
relative permeability) have suitable ability for predicting the flow due
to leakage of buried pipes in unsaturated porous media.
Abstract: This paper addresses a novel technique for placement of distributed generation (DG) in electric power systems. A GA based approach for sizing and placement of DG keeping in view of system power loss minimization in different loading conditions is explained. Minimal system power loss is obtained under voltage and line loading constraints. Proposed strategy is applied to power distribution systems and its effectiveness is verified through simulation results on 16, 37-bus and 75-bus test systems.