Abstract: The building sector is the largest energy consumer and
CO2 emitter in the European Union (EU) and therefore the active
reduction of energy consumption and elimination of energy wastage
are among the main goals in it. Healthy housing and energy
efficiency are affected by many factors which set challenges to
monitoring, control and research of indoor air quality (IAQ) and
energy consumption, especially in old buildings. These challenges
include measurement and equipment costs, for example.
Additionally, the measurement results are difficult to interpret and
their usage in the ventilation control is also limited when taking into
account the energy efficiency of housing at the same time. The main
goal of this study is to develop a cost-effective building monitoring
and control system especially for old buildings. The starting point or
keyword of the development process is a wireless system; otherwise
the installation costs become too high. As the main result, this paper
describes an idea of a wireless building monitoring and control
system. The first prototype of the system has been installed in 10
residential buildings and in 10 school buildings located in the City of
Kuopio, Finland.
Abstract: This research is a collaborative narrative research, which is mixed with issues of selected papers and researcher's experience as an anonymous user on social networking sites. The objective of this research is to understand the reasons of the regular users who reject to contact with anonymous users, and to study the communication traditions used in the selected studies. Anonymous users are rejected by regular users, because of the fear of cyber bully, the fear of unpleasant behaviors, and unwillingness of changing communication norm. The suggestion for future research design is to use longitudinal design or quantitative design; and the theory in rhetorical tradition should be able to help develop a strong trust message.
Abstract: This paper presents preliminary results regarding system-level power awareness for FPGA implementations in wireless sensor networks. Re-configurability of field programmable gate arrays (FPGA) allows for significant flexibility in its applications to embedded systems. However, high power consumption in FPGA becomes a significant factor in design considerations. We present several ideas and their experimental verifications on how to optimize power consumption at high level of designing process while maintaining the same energy per operation (low-level methods can be used additionally). This paper demonstrates that it is possible to estimate feasible power consumption savings even at the high level of designing process. It is envisaged that our results can be also applied to other embedded systems applications, not limited to FPGA-based.
Abstract: In the open space of decision support system the
mental impression of a manager-s decision has been the subject of
large importance than the ordinary famous one, when helped by
decision support system. Much of this study is an attempt to realize
the relation of decision support system usage and decision outcomes
that governs the system. For example, several researchers have
proposed so many different models to analyze the linkage between
decision support system processes and results of decision making.
This study draws the important relation of manager-s mental
approach with the use of decision support system. The findings of
this paper are theoretical attempts to provide Decision Support
System (DSS) in a way to exhibit and promote the learning in semi
structured area. The proposed model shows the points of one-s
learning improvements and maintains a theoretical approach in order
to explore the DSS contribution in enhancing the decision forming
and governing the system.
Abstract: Mobile marketing through mobile messaging service
has highly impressive growth as it enables e-business firms to
communicate with their customers effectively. Educational
institutions hence start using this service to enhance communication
with their students. Previous studies, however, have limited
understanding of applying mobile messaging service in education.
This study proposes a theoretical model to understand the drivers of
students- intentions to use the university-s mobile messaging service.
The model indicates that social influence, perceived control and
attitudes affect students- intention to use the university-s mobile
messaging service. It also provides five antecedents of students-
attitudes–perceived utility (information utility, entertainment utility,
and social utility), innovativeness, information seeking, transaction
specificity (content specificity, sender specificity, and time
specificity) and privacy concern. The proposed model enables
universities to understand what students concern about the use of a
mobile messaging service in universities and handle the service more
effectively. The paper discusses the model development and
concludes with limitations and implications of the proposed model.
Abstract: A nucleotide sequence can be expressed as a numerical sequence when each nucleotide is assigned its proton number. A resulting gene numerical sequence can be investigated for its fractal dimension in terms of evolution and chemical properties for comparative studies. We have investigated such nucleotide fluctuation in the 16S rRNA gene of archaea thermophiles. The studied archaea thermophiles were archaeoglobus fulgidus, methanothermobacter thermautotrophicus, methanocaldococcus jannaschii, pyrococcus horikoshii, and thermoplasma acidophilum. The studied five archaea-euryarchaeota thermophiles have fractal dimension values ranging from 1.93 to 1.97. Computer simulation shows that random sequences would have an average of about 2 with a standard deviation about 0.015. The fractal dimension was found to correlate (negative correlation) with the thermophile-s optimal growth temperature with R2 value of 0.90 (N =5). The inclusion of two aracheae-crenarchaeota thermophiles reduces the R2 value to 0.66 (N = 7). Further inclusion of two bacterial thermophiles reduces the R2 value to 0.50 (N =9). The fractal dimension is correlated (positive) to the sequence GC content with an R2 value of 0.89 for the five archaea-euryarchaeota thermophiles (and 0.74 for the entire set of N = 9), although computer simulation shows little correlation. The highest correlation (positive) was found to be between the fractal dimension and di-nucleotide Shannon entropy. However Shannon entropy and sequence GC content were observed to correlate with optimal growth temperature having an R2 of 0.8 (negative), and 0.88 (positive), respectively, for the entire set of 9 thermophiles; thus the correlation lacks species specificity. Together with another correlation study of bacterial radiation dosage with RecA repair gene sequence fractal dimension, it is postulated that fractal dimension analysis is a sensitive tool for studying the relationship between genotype and phenotype among closely related sequences.
Abstract: Opportunistic network is a kind of Delay Tolerant Networks (DTN) where the nodes in this network come into contact with each other opportunistically and communicate wirelessly and, an end-to-end path between source and destination may have never existed, and disconnection and reconnection is common in the network. In such a network, because of the nature of opportunistic network, perhaps there is no a complete path from source to destination for most of the time and even if there is a path; the path can be very unstable and may change or break quickly. Therefore, routing is one of the main challenges in this environment and, in order to make communication possible in an opportunistic network, the intermediate nodes have to play important role in the opportunistic routing protocols. In this paper we proposed an Adaptive Fuzzy Routing in opportunistic network (AFRON). This protocol is using the simple parameters as input parameters to find the path to the destination node. Using Message Transmission Count, Message Size and Time To Live parameters as input fuzzy to increase delivery ratio and decrease the buffer consumption in the all nodes of network.
Abstract: The development and application of wind power for
renewable energy has attracted growing interest in recent years. Renewable energy sources are attracting much alteration as they can
reduce both environmental damage and dependence on fossil fuels. With the growing need for sustainable energy supplies, a case is made
for decentralized, stand-alone power supplies (SAPS) as an alternative to power grids. In the era which traditional petroleum energy resource
decreasing and the green house affect significant increasing, the development and usage of regenerative resources is inevitable. Due to the contribution of the pioneers, the development of regenerative resources already has a remarkable achievement; however, in the view of economy and quantity, it is still a long road for regenerative energy
to replace traditional petroleum energy. In our prospective, in stead of
investigate larger regenerative energy equipment, it is much wiser to
think about the blind side and breakthrough of the current technique.
Abstract: This paper presents an effective method for detecting vehicles in front of the camera-assisted car during nighttime driving. The proposed method detects vehicles based on detecting vehicle headlights and taillights using techniques of image segmentation and clustering. First, to effectively extract spotlight of interest, a segmentation process based on automatic multi-level threshold method is applied on the road-scene images. Second, to spatial clustering vehicle of detecting lamps, a grouping process based on light tracking and locating vehicle lighting patterns. For simulation, we are implemented through Da-vinci 7437 DSP board with near infrared mono-camera and tested it in the urban and rural roads. Through the test, classification performances are above 97% of true positive rate evaluated on real-time environment. Our method also has good performance in the case of clear, fog and rain weather.
Abstract: Use of the Internet and the World-Wide-Web
(WWW) has become widespread in recent years and mobile agent
technology has proliferated at an equally rapid rate. In this scenario
load balancing becomes important for P2P systems. Beside P2P
systems can be highly heterogeneous, i.e., they may consists of peers
that range from old desktops to powerful servers connected to
internet through high-bandwidth lines. There are various loads
balancing policies came into picture. Primitive one is Message
Passing Interface (MPI). Its wide availability and portability make it
an attractive choice; however the communication requirements are
sometimes inefficient when implementing the primitives provided by
MPI. In this scenario we use the concept of mobile agent because
Mobile agent (MA) based approach have the merits of high
flexibility, efficiency, low network traffic, less communication
latency as well as highly asynchronous. In this study we present
decentralized load balancing scheme using mobile agent technology
in which when a node is overloaded, task migrates to less utilized
nodes so as to share the workload. However, the decision of which
nodes receive migrating task is made in real-time by defining certain
load balancing policies. These policies are executed on PMADE (A
Platform for Mobile Agent Distribution and Execution) in
decentralized manner using JuxtaNet and various load balancing
metrics are discussed.
Abstract: The efficacy of the separate mixing of four tropical spicy and medicinal plant products: Dennettia tripetala Baker (pepper fruit), Eugenia aromatica Hook (clove), Piper guineense (Schum and Thonn) (black pepper) and Monodora myristica (Dunal) (African nut-meg) with a household vegetable oil was evaluated under tropical storage conditions for the control and reproductive performance of Dermestes maculatus (De Geer) (hide beetle) and Necroba rufipes (De Geer) (copra beetle) on African catfish, Clarias gariepinus (Burchell). Each of the plant materials was pulverized into powder and applied as a mix of 1ml of oil and plant powder at 2.5, 5.0, 7.5 and 10.0g per 100g of dried fish, and allowed to dry for 6h. Each of the four oil-mixed powder treatments evoked significant (P < 05) mortalities of the two insects compared with the control (oil only) at 1, 3 and 7 days post treatment. The oil-powder mixture dosages did not prevent insect egg hatchability but while the emergent larvae on the treated samples died, the emergent larvae in the control survived into adults. The application of oil-mixed powders effectively suppressed the emergence of the larvae of the beetles. Similarly, each of the oil-powder mixtures significantly reduced weight loss in smoked fish that were exposed to D. maculatus and N. rufipes when compared to the control (P < 05). The results of this study suggest that the plant powders rather than the domestic oil demonstrated protective ability against the fish beetles and confirm the efficacy of the plant products as pest control agents.
Abstract: This paper describes Clinical Document Architecture Release Two (CDA R2) standard and a client application for messaging with SAĞLIK-NET project developed by The Ministry of Health of Turkey. CDA R2 , developed by Health Level 7 (HL7) organization and approved by American National Standards Institute (ANSI) in 2004, to standardize medical information to be able to share semantically and syntactically. In this study, a client application compatible with HL7 V3 for a project named SAĞLIKNET, aimed to build a National Health Information System by Turkey. Moreover, CDA conformance of this application will also be evaluated.
Abstract: Tandem mass spectrometry (MS/MS) is the engine
driving high-throughput protein identification. Protein mixtures possibly
representing thousands of proteins from multiple species are
treated with proteolytic enzymes, cutting the proteins into smaller
peptides that are then analyzed generating MS/MS spectra. The
task of determining the identity of the peptide from its spectrum
is currently the weak point in the process. Current approaches to de
novo sequencing are able to compute candidate peptides efficiently.
The problem lies in the limitations of current scoring functions. In this
paper we introduce the concept of proteome signature. By examining
proteins and compiling proteome signatures (amino acid usage) it is
possible to characterize likely combinations of amino acids and better
distinguish between candidate peptides. Our results strongly support
the hypothesis that a scoring function that considers amino acid usage
patterns is better able to distinguish between candidate peptides. This
in turn leads to higher accuracy in peptide prediction.
Abstract: As a multicultural country, Indonesia has many subcultures
with unique performing arts. Some of them are well-known
to international tourists, such as music ensemble (known as gamelan)
in Bali and Java, shadow puppet play (wayang) in Java, and martial
arts (known as pencak silat) in Sumatra. Some examples of famous
traditional dances in Indonesia are Srimpi from Yogyakarta and Solo,
Legong from Bali, and Gong dance from Kalimantan. Performing arts
show the identity of a nation. However, they are a complex subject,
especially when they are addressed to children. The performing arts,
e.g. music, dance theatre, and opera are experiential, experimental,
and emotionally charged. Therefore, the right strategy and promotion
need to be developed to engage children to appreciate and preserve
traditional dances. This study aims to explore and identify
possibilities of internet usage as a medium to promote traditional
dances, especially to children in Indonesia.
Abstract: Image segmentation is an important step in image
processing. Major developments in medical imaging allow
physicians to use potent and non-invasive methods in order to
evaluate structures, performance and to diagnose human diseases. In
this study, an active contour was used to extract vessel networks
from color retina images. Automatic analysis of retina vessels
facilitates calculation of arterial index which is required to diagnose
some certain retinopathies.
Abstract: Method of Parallel Joint Channel Coding and
Cryptography has been analyzed and simulated in this paper. The
method is an extension of Soft Input Decryption with feedback,
which is used for improvement of channel decoding of secured
messages. Parallel Joint Channel Coding and Cryptography results in
improved coding gain of channel decoding, which achieves more
than 2 dB. Such results are an implication of a combination of
receiver components and their interoperability.
Abstract: Steganography, derived from Greek, literally means
“covered writing". It includes a vast array of secret communications
methods that conceal the message-s very existence. These methods
include invisible inks, microdots, character arrangement, digital
signatures, covert channels, and spread spectrum communications.
This paper proposes a new improved version of Least Significant Bit
(LSB) method. The approach proposed is simple for implementation
when compared to Pixel value Differencing (PVD) method and yet
achieves a High embedding capacity and imperceptibility. The
proposed method can also be applied to 24 bit color images and
achieve embedding capacity much higher than PVD.
Abstract: In cryptography, confusion and diffusion are very
important to get confidentiality and privacy of message in block
ciphers and stream ciphers. There are two types of network to provide
confusion and diffusion properties of message in block ciphers. They
are Substitution- Permutation network (S-P network), and Feistel
network. NLFS (Non-Linear feedback stream cipher) is a fast and
secure stream cipher for software application. NLFS have two modes
basic mode that is synchronous mode and self synchronous mode.
Real random numbers are non-deterministic. R-box (random box)
based on the dynamic properties and it performs the stochastic
transformation of data that can be used effectively meet the
challenges of information is protected from international destructive
impacts. In this paper, a new implementation of stochastic
transformation will be proposed.
Abstract: Computer technology and the Internet have made a
breakthrough in the existence of data communication. This has
opened a whole new way of implementing steganography to ensure
secure data transfer. Steganography is the fine art of hiding the
information. Hiding the message in the carrier file enables the
deniability of the existence of any message at all. This paper designs
a stego machine to develop a steganographic application to hide data
containing text in a computer video file and to retrieve the hidden
information. This can be designed by embedding text file in a video
file in such away that the video does not loose its functionality using
Least Significant Bit (LSB) modification method. This method
applies imperceptible modifications. This proposed method strives
for high security to an eavesdropper-s inability to detect hidden
information.
Abstract: The area of Project Risk Management (PRM) has
been extensively researched, and the utilization of various tools and
techniques for managing risk in several industries has been
sufficiently reported. Formal and systematic PRM practices have
been made available for the construction industry. Based on such
body of knowledge, this paper tries to find out the global picture of
PRM practices and approaches with the help of a survey to look into
the usage of PRM techniques and diffusion of software tools, their
level of maturity, and their usefulness in the construction sector.
Results show that, despite existing techniques and tools, their usage is
limited: software tools are used only by a minority of respondents
and their cost is one of the largest hurdles in adoption. Finally, the
paper provides some important guidelines for future research
regarding quantitative risk analysis techniques and suggestions for
PRM software tools development and improvement.