Abstract: This paper investigates the connotation, and some of
the realistic implications, of the economic reform of health sector in
under developed countries. The paper investigates the issues that
economic reforms have to address, and the policy targets they are
considered to accomplish. The work argues that the development of
economic reform is not connected only with understanding the
priorities and refining them, furthermore with reformation and
restructuring the organizations through which health policies are
employed. Considering various organizational values, that are likely
to be regular to all economic reform programs, a regulatory approach
to institutional reform is unsuitable. The paper further investigates the
selection of economic reform that may as well influence via technical
suggestions and analysis, but the verdict to continue, and the
consequent success of execution, eventually depends on the
progressive political sustainability. The paper concludes by giving
examples of institutional reforms from various underdeveloped
countries and includes recommendation of the responsibility and
control of donor organizations.
Abstract: The rapid growth of multimedia technology demands
the secure and efficient access to information. This fast growing lose
the confidence of unauthorized duplication. Henceforth the protection
of multimedia content is becoming more important. Watermarking
solves the issue of unlawful copy of advanced data. In this paper,
blind video watermarking technique has been proposed. A luminance
layer of selected frames is interlaced into two even and odd rows of
an image, further it is deinterlaced and equalizes the coefficients of
the two shares. Color watermark is split into different blocks, and the
pieces of block are concealed in one of the share under the wavelet
transform. Stack the two images into a single image by introducing
interlaced even and odd rows in the two shares. Finally, chrominance
bands are concatenated with the watermarked luminance band. The
safeguard level of the secret information is high, and it is
undetectable. Results show that the quality of the video is not
changed also yields the better PSNR values.
Abstract: Ant Colony Optimization (ACO) is a promising
modern approach to the unused combinatorial optimization. Here
ACO is applied to finding the shortest during communication link
failure. In this paper, the performances of the prim’s and ACO
algorithm are made. By comparing the time complexity and program
execution time as set of parameters, we demonstrate the pleasant
performance of ACO in finding excellent solution to finding shortest
path during communication link failure.
Abstract: The elastic properties and fracture of two-dimensional
graphene were calculated purely from the atomic bonding (stretching
and bending) based on molecular mechanics method. Considering the
representative unit cell of graphene under various loading conditions,
the deformations of carbon bonds and the variations of the interlayer
distance could be realized numerically under the geometry constraints
and minimum energy assumption. In elastic region, it was found that
graphene was in-plane isotropic. Meanwhile, the in-plane deformation
of the representative unit cell is not uniform along armchair direction
due to the discrete and non-uniform distributions of the atoms. The
fracture of graphene could be predicted using fracture criteria based on
the critical bond length, over which the bond would break. It was
noticed that the fracture behavior were directional dependent, which
was consistent with molecular dynamics simulation results.
Abstract: Several parameters are established in order to measure
biodiesel quality. One of them is the iodine value, which is an
important parameter that measures the total unsaturation within a
mixture of fatty acids. Limitation of unsaturated fatty acids is
necessary since warming of higher quantity of these ones ends in
either formation of deposits inside the motor or damage of lubricant.
Determination of iodine value by official procedure tends to be very
laborious, with high costs and toxicity of the reagents, this study uses
artificial neural network (ANN) in order to predict the iodine value
property as an alternative to these problems. The methodology of
development of networks used 13 esters of fatty acids in the input
with convergence algorithms of back propagation of back
propagation type were optimized in order to get an architecture of
prediction of iodine value. This study allowed us to demonstrate the
neural networks’ ability to learn the correlation between biodiesel
quality properties, in this caseiodine value, and the molecular
structures that make it up. The model developed in the study reached
a correlation coefficient (R) of 0.99 for both network validation and
network simulation, with Levenberg-Maquardt algorithm.
Abstract: In this study, breeding biology and induced breeding
of freshwater mud eel, Monopterus cuchia was observed during the
experimental period from February to June, 2013. Breeding biology
of freshwater mud eel, Monopterus cuchia was considered in terms of
gonadosomatic index, length-weight relationship of gonad, ova
diameter and fecundity. The ova diameter was recorded from 0.3 mm
to 4.30 mm and the individual fecundity was recorded from 155 to
1495 while relative fecundity was found from 2.64 to 12.45. The
fecundity related to body weight and length of fish was also
discussed. A peak of GSI was observed 2.14±0.2 in male and 5.1
±1.09 in female. Induced breeding of freshwater mud eel,
Monopterus cuchia was also practiced with different doses of
different inducing agents like pituitary gland (PG), human chorionic
gonadotropin (HCG), Gonadotropin releasing hormone (GnRH) and
Ovuline-a synthetic hormone in different environmental conditions.
However, it was observed that the artificial breeding of freshwater
mud eel, Monopterus cuchia was not yet succeeded through inducing
agents in captive conditions, rather the inducing agent showed
negative impacts on fecundity and ovarian tissues. It was seen that
mature eggs in the oviduct were reduced, absorbed and some eggs
were found in spoiled condition.
Abstract: This study found that most corporate personnel are
using social media to communicate with colleagues to make the
process of working more efficient. Complete satisfaction occurred on
the use of security within the University’s computer network. The
social network usage for communication, collaboration,
entertainment and demonstrating concerns accounted for fifty percent
of variance to predict interpersonal relationships of corporate
personnel. This evaluation on the effectiveness of social networking
involved 213 corporate personnel’s. The data was collected by
questionnaires. This data was analyzed by using percentage, mean,
and standard deviation.
The results from the analysis and the effectiveness of using online
social networks were derived from the attitude of private users and
safety data within the security system. The results showed that the
effectiveness on the use of an online social network for corporate
personnel of Suan Sunandha Rajabhat University was specifically at
a good level, and the overall effects of each aspect was (Ẋ=3.11).
Abstract: In this paper, the actuality of the study, and the role of
subjective well-being problem in modern psychology and the
comprehending of subjective well-being by current students is
defined. The purpose of this research is to educe peculiarities of
comprehending of subjective well-being by students with various
levels of emotional intelligence. Methods of research are adapted
Russian-Language questionnaire of K. Riff 'The scales of
psychological well-being'; emotional intelligence questionnaire of D.
V. Lusin. The research involved 72 students from different
universities and disciplines aged between 18 and 24. Analyzing the
results of the studies, it can be concluded that the understanding of
happiness in different groups of students with high and low levels of
overall emotional intelligence is different, as well as differentiated by
gender. Students with a higher level of happiness possess more
capacity and higher need to control their emotions, to cause and
maintain the desired emotions and control something undesirable.
Abstract: Continuous upflow filters can combine the nutrient
(nitrogen and phosphate) and suspended solid removal in one unit
process. The contaminant removal could be achieved chemically or
biologically; in both processes the filter removal efficiency depends
on the interaction between the packed filter media and the influent. In
this paper a residence time distribution (RTD) study was carried out
to understand and compare the transfer behaviour of contaminants
through a selected filter media packed in a laboratory-scale
continuous up flow filter; the selected filter media are limestone and
white dolomite. The experimental work was conducted by injecting a
tracer (red drain dye tracer –RDD) into the filtration system and then
measuring the tracer concentration at the outflow as a function of
time; the tracer injection was applied at hydraulic loading rates
(HLRs) (3.8 to 15.2 m h-1). The results were analysed according to
the cumulative distribution function F(t) to estimate the residence
time of the tracer molecules inside the filter media. The mean
residence time (MRT) and variance σ2 are two moments of RTD that
were calculated to compare the RTD characteristics of limestone with
white dolomite. The results showed that the exit-age distribution of
the tracer looks better at HLRs (3.8 to 7.6 m h-1) and (3.8 m h-1) for
limestone and white dolomite respectively. At these HLRs the
cumulative distribution function F(t) revealed that the residence time
of the tracer inside the limestone was longer than in the white
dolomite; whereas all the tracer took 8 minutes to leave the white
dolomite at 3.8 m h-1. On the other hand, the same amount of the
tracer took 10 minutes to leave the limestone at the same HLR. In
conclusion, the determination of the optimal level of hydraulic
loading rate, which achieved the better influent distribution over the
filtration system, helps to identify the applicability of the material as
filter media. Further work will be applied to examine the efficiency
of the limestone and white dolomite for phosphate removal by
pumping a phosphate solution into the filter at HLRs (3.8 to 7.6 m h-1).
Abstract: Background in music analysis: Traditionally, when we
think about a composer’s sketches, the chances are that we are
thinking in terms of the working out of detail, rather than the
evolution of an overall concept. Since music is a “time art,” it follows
that questions of a form cannot be entirely detached from
considerations of time. One could say that composers tend to regard
time either as a place gradually and partially intuitively filled, or they
can look for a specific strategy to occupy it. It seems that the one
thing that sheds light on Stockhausen’s compositional thinking is his
frequent use of “form schemas,” that is often a single-page
representation of the entire structure of a piece.
Background in music technology: Sonic Visualiser is a program
used to study a musical recording. It is an open source application for
viewing, analyzing, and annotating music audio files. It contains a
number of visualisation tools, which are designed with useful default
parameters for musical analysis. Additionally, the Vamp plugin
format of SV supports to provide analysis such as for example
structural segmentation.
Aims: The aim of paper is to show how SV may be used to obtain
a better understanding of the specific musical work, and how the
compositional strategy does impact on musical structures and musical
surfaces. It is known that “traditional” music analytic methods don’t
allow indicating interrelationships between musical surface (which is
perceived) and underlying musical/acoustical structure.
Main Contribution: Stockhausen had dealt with the most diverse
musical problems by the most varied methods. A characteristic which
he had never ceased to be placed at the center of his thought and
works, it was the quest for a new balance founded upon an acute
connection between speculation and intuition. In the case with
Mikrophonie I (1964) for tam-tam and 6 players Stockhausen makes
a distinction between the “connection scheme,” which indicates the
ground rules underlying all versions, and the form scheme, which is
associated with a particular version. The preface to the published
score includes both the connection scheme, and a single instance of a
“form scheme,” which is what one can hear on the CD recording. In
the current study, the insight into the compositional strategy chosen
by Stockhausen was been compared with auditory image, that is, with
the perceived musical surface. Stockhausen’s musical work is
analyzed both in terms of melodic/voice and timbre evolution.
Implications: The current study shows how musical structures
have determined of musical surface. The general assumption is this,
that while listening to music we can extract basic kinds of musical
information from musical surfaces. It is shown that interactive
strategies of musical structure analysis can offer a very fruitful way
of looking directly into certain structural features of music.
Abstract: The legality of some countries or agencies’ acts to spy
on personal phone calls of the public became a hot topic to many
social groups’ talks. It is believed that this act is considered an
invasion to someone’s privacy. Such act may be justified if it is
singling out specific cases but to spy without limits is very
unacceptable. This paper discusses the needs for not only a simple
and light weight technique to secure mobile voice calls but also a
technique that is independent from any encryption standard or library.
It then presents and tests one encrypting algorithm that is based of
Frequency scrambling technique to show fair and delay-free process
that can be used to protect phone calls from such spying acts.
Abstract: Given the limited research on Small and Mediumsized
Enterprises’ (SMEs) contribution to Corporate Social
Responsibility (CSR) and even scarcer research on Swiss SMEs, this
paper helps to fill these gaps by enabling the identification of supranational
SME parameters. Thus, the paper investigates the current
state of SME practices in Switzerland and across 15 other countries.
Combining the degree to which SMEs demonstrate an explicit (or
business case) approach or see CSR as an implicit moral activity with
the assessment of their attributes for “variety of capitalism” defines
the framework of this comparative analysis. To outline Swiss small
business CSR patterns in particular, 40 SME owner-managers were
interviewed. A secondary data analysis of studies from different
countries laid groundwork for this comparative overview of small
business CSR. The paper identifies Swiss small business CSR as
driven by norms, values, and by the aspiration to contribute to
society, thus, as an implicit part of the day-to-day business. Similar to
most Central European, Mediterranean, Nordic, and Asian countries,
explicit CSR is still very rare in Swiss SMEs. Astonishingly, also
British and American SMEs follow this pattern in spite of their strong
and distinctly liberal market economies. Though other findings show
that nationality matters this research concludes that SME culture and
an informal CSR agenda are strongly formative and superseding even
forces of market economies, nationally cultural patterns, and
language. Hence, classifications of countries by their market system,
as found in the comparative capitalism literature, do not match the
CSR practices in SMEs as they do not mirror the peculiarities of their
business. This raises questions on the universality and
generalisability of unmediated, explicit management concepts,
especially in the context of small firms.
Abstract: It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.
Abstract: Nowadays, cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime. It also provides an optimized and secured access to the resources and gives more security for the data which is stored in the platform. However, some companies do not trust Cloud providers, they think that providers can access and modify some confidential data such as bank accounts. Many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, but, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some operations on the data before sending them to the provider Cloud in the objective to make them unreadable. The principal idea is to allow user how it can protect his data with his own methods. In this paper, we are going to demonstrate our approach and prove that is more efficient in term of execution time than some existing methods. This work aims at enhancing the quality of service of providers and ensuring the trust of the customers.
Abstract: Obesity and osteoporosis are the two diseases whose
increasing prevalence and high impact on the global morbidity and
mortality, during the two recent decades, have gained a status of
major health threats worldwide. Obesity purports to affect the bone
metabolism through complex mechanisms. Debated data on the
connection between the bone mineral density and fracture prevalence
in the obese patients are widely presented in literature. There is
evidence that the correlation of weight and fracture risk is sitespecific.
This study is aimed at determining the connection between
the bone mineral density (BMD) and trabecular bone score (TBS)
parameters in Ukrainian women suffering from obesity. We
examined 1025 40-89-year-old women, divided them into the groups
according to their body mass index: Group A included 360 women
with obesity whose BMI was ≥30 kg/m2, and Group B – 665 women
with no obesity and BMI of
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: Experimental economics is subject to criticism with
regards to frequently discussed the trade-off between internal and
external validity requirements, which seems to be critically flawed.
This paper evaluates incompatibility of trade-off condition and
condition of internal validity as a prerequisite for external validity. In
addition, it outlines the imprecise concept of artificiality, which is
found to be rather improving the external validity and seems to
strengthen the illusory status of external versus internal validity
tension. Internal validity is further analyzed with regards to Duhem-
Quine problem, where unpredictability argument is significantly
weakened trough application of inductivism within the illustrative
hypothetical-deductive model. Our discussion partially weakens
critical arguments related to the robustness of results in experimental
economics, if the perfectly controlled experimental environment is
secured.
Abstract: The security of cloud services is the concern of cloud
service providers. In this paper, we will mention different
classifications of cloud attacks referred by specialized organizations.
Each agency has its classification of well-defined properties. The
purpose is to present a high-level classification of current research in
cloud computing security. This classification is organized around
attack strategies and corresponding defenses.
Abstract: Electrohydraulic servo system have been used in industry in a wide number of applications. Its dynamics are highly nonlinear and also have large extent of model uncertainties and external disturbances. In this paper, a robust back-stepping control (RBSC) scheme is proposed to overcome the problem of disturbances and system uncertainties effectively and to improve the tracking performance of EHS systems. In order to implement the proposed control scheme, the system uncertainties in EHS systems are considered as total leakage coefficient and effective oil volume. In addition, in order to obtain the virtual controls for stabilizing system, the update rule for the system uncertainty term is induced by the Lyapunov control function (LCF). To verify the performance and robustness of the proposed control system, computer simulation of the proposed control system using Matlab/Simulink Software is executed. From the computer simulation, it was found that the RBSC system produces the desired tracking performance and has robustness to the disturbances and system uncertainties of EHS systems.
Abstract: Biodiesel as an alternative diesel fuel is steadily gaining more attention and significance. However, there are some drawbacks while using biodiesel regarding its properties that requires it to be blended with petrol based diesel and/or additives to improve the fuel characteristics. This study analyses thermal cracking as an alternative technology to improve biodiesel characteristics in which, FAME based biodiesel produced by transesterification of castor oil is fed into a continuous thermal cracking reactor at temperatures range of 450-500°C and flowrate range of 20-40 g/hr. Experiments designed by response surface methodology and subsequent statistical studies show that temperature and feed flowrate significantly affect the products yield. Response surfaces were used to study the impact of temperature and flowrate on the product properties. After each experiment, the produced crude bio-oil was distilled and diesel cut was separated. As shorter chain molecules are produced through thermal cracking, the distillation curve of the diesel cut fitted more with petrol based diesel curve in comparison to the biodiesel. Moreover, the produced diesel cut properties adequately pose within property ranges defined by the related standard of petrol based diesel. Cold flow properties, high heating value as the main drawbacks of the biodiesel are improved by this technology. Thermal cracking decreases kinematic viscosity, Flash point and cetane number.