Abstract: Apps are today the most important possibility to adapt
mobile phones and computers to fulfill the special needs of their
users. Location- and context-sensitive programs are hereby the key to
support the interaction of the user with his/her environment and also
to avoid an overload with a plenty of dispensable information. The
contribution shows, how a trusted, secure and really bi-directional
communication and interaction among users and their environment
can be established and used, e.g. in the field of home automation.
Abstract: The development of the agricultural sector in Ghana
has been reliant on the use of irrigation systems to ensure food
security. However, the manual operation of these systems has not
facilitated their maximum efficiency due to human limitations.
This paper seeks to address this problem by designing and
implementing an efficient, cost effective automated system which
monitors and controls the water flow of irrigation through
communication with an authorized operator via text messages. The
automatic control component of the system is timer based with an
Atmega32 microcontroller and a real time clock from the SM5100B
cellular module. For monitoring purposes, the system sends periodic
notification of the system on the performance of duty via SMS to the
authorized person(s). Moreover, the GSM based Irrigation
Monitoring and Control System saves time and labour and reduces
cost of operating irrigation systems by saving electricity usage and
conserving water.
Field tests conducted have proven its operational efficiency and
ease of assessment of farm irrigation equipment due to its costeffectiveness
and data logging capabilities.
Abstract: The objective of this study is to analyze the
prophylactic usage of low molecular weight heparin (LMWH) along
pregnancy and the correlation between their usage and month/week
of pregnancy, in the Department of Gynecology and Obstetrics, at
Clinical Hospital in Tetovo. A retrospective study was undertaken
during 01 January – 31 December 2012. Over of one year, the total
number of patients was 4636. Among the 1447 (32.21%) pregnant
women, 298 (20.59%) of them were prescribed LMWH. The majority
of patients given LMWH, 119 (39.93%) were diagnosed
hypercoagulable. The age group with the highest attendance was 25-
35, 141 patients (47.32%). For 195 (65.44%) patients, this was their
first pregnancy. Earliest stage of using LMWH was the second month
of pregnancy 4 (1.34%) cases. The most common patients were 70
women along the seventh month (23.49%), followed by 68 in the
ninth month of pregnancy (22.81%). Women in the 28th gestational
week, were found to be the most affected, a total of 55 (78.57%) were
in that week. Clexane 2000 and Fraxiparine 0.3 were the most
common for which low molecular weight heparin was prescribed.
The number of patients which received Clexane 2000 was 84
(28.19%), followed by those with Fraxiparine 0.3 81 (27.18%). The
administration of LMWH is associated with long hospitalization
(median 14,6 days).
Abstract: The sub-task pattern in terms of deviations and defects
should be identified and understood in order to improve the quality of
practices in construction projects. Therefore, sub-task susceptibility
to exposure to deviations and defects has been evaluated and
classified via six classifications proposed in this study. Thirty-four
case studies of specific sub-tasks (from compression members in
constructed concrete structures) were collected from seven
construction projects in order to examine the study’s proposed
classifications. The study revealed that the sub-task has a high
sensitivity to deviation, where 91% of the cases were recorded as
deviations; however, only 19% of cases were recorded as defects.
Other findings were that the actual work during the execution process
is a high source of deviation for this sub-task (74%), while only 26%
of the source of deviation was due to both design documentation and
the actual work. These findings significantly imply that the study’s
proposed classifications could be used to determine the pattern of
each sub-task and develop proactive actions to overcome issues of
sub-task deviations and defects.
Abstract: In our paper we describe the security capabilities of
data collection. Data are collected with probes located in the near and
distant surroundings of the company. Considering the numerous
obstacles e.g. forests, hills, urban areas, the data collection is realized
in several ways. The collection of data uses connection via wireless
communication, LAN network, GSM network and in certain areas
data are collected by using vehicles. In order to ensure the connection
to the server most of the probes have ability to communicate in
several ways. Collected data are archived and subsequently used in
supervisory applications.
To ensure the collection of the required data, it is necessary to
propose algorithms that will allow the probes to select suitable
communication channel.
Abstract: The paper deals with communication standards for
control and production system. The authors formulate the
requirements for communication security protection. The paper is
focused on application protocols of the industrial networks and their
basic classification. The typical attacks are analysed and the safety
protection, based on requirements for specific industrial network is
suggested and defined in this paper.
Abstract: This paper presents a real-time visualization technique
and filtering of classified LiDAR point clouds. The visualization is
capable of displaying filtered information organized in layers by the
classification attribute saved within LiDAR datasets. We explain the
used data structure and data management, which enables real-time
presentation of layered LiDAR data. Real-time visualization is
achieved with LOD optimization based on the distance from the
observer without loss of quality. The filtering process is done in two
steps and is entirely executed on the GPU and implemented using
programmable shaders.
Abstract: Ancillary services are support services which are
essential for humanizing and enhancing the reliability and security of
the electric power system. Reactive power ancillary service is one of
the important ancillary services in a restructured electricity market
which determines the cost of supplying ancillary services and finding
of how this cost would change with respect to operating decisions.
This paper presents a new formation that can be used to minimize the
Independent System Operator (ISO)’s total payment for reactive
power ancillary service. The modified power flow tracing algorithm
estimates the availability of reserve reactive power for ancillary
service. In order to find optimum reactive power dispatch,
Biogeography based optimization method (BPO) is proposed. Market
Reactive Clearing Price (MRCP) is then estimated and it encourages
generator companies (GENCOs) to participate in an ancillary service.
Finally, optimal weighting factor and real time utilization factor of
reactive power give the minimum ISO’s total payment. The
effectiveness of proposed design is verified using IEEE 30 bus
system.
Abstract: In MANET, mobile nodes communicate with each
other using the wireless channel where transmission takes place with
significant interference. The wireless medium used in MANET is a
shared resource used by all the nodes available in MANET. Packet
reserving is one important resource management scheme which
controls the allocation of bandwidth among multiple flows through
node cooperation in MANET. This paper proposes packet reserving
and clogging control via Routing Aware Packet Reserving (RAPR)
framework in MANET. It mainly focuses the end-to-end routing
condition with maximal throughput. RAPR is complimentary system
where the packet reserving utilizes local routing information
available in each node. Path setup in RAPR estimates the security
level of the system, and symbolizes the end-to-end routing by
controlling the clogging. RAPR reaches the packet to the destination
with high probability ratio and minimal delay count. The standard
performance measures such as network security level,
communication overhead, end-to-end throughput, resource utilization
efficiency and delay measure are considered in this work. The results
reveals that the proposed packet reservation and clogging control via
Routing Aware Packet Reserving (RAPR) framework performs well
for the above said performance measures compare to the existing
methods.
Abstract: The use of IT equipment has become a part of every
day. However, each device that is part of cyberspace should be
secured against unauthorized use. It is very important to know the
basics of these security devices, but also the basics of safe conduct
their owners. This information should be part of every curriculum
computer science education in primary and secondary schools.
Therefore, the work focuses on the education of pupils in primary and
secondary schools on the Internet. Analysis of the current state
describes approaches to the education of pupils in security issues on
the Internet. The paper presents a questionnaire-based survey which
was carried out in the Czech Republic, whose task was to ascertain
the level of opinion pupils in primary and secondary schools on the
issue of communication in social networks. The research showed that
awareness of socio-pathological phenomena on the Internet
environment is very low. Based on the results it was proposed
appropriate ways of teaching to this issue and its inclusion a proposal
of curriculum for primary and secondary schools.
Abstract: Immunomodulators are substances that alter immune
system via dynamic regulation of messenger molecules. It can be
divided into immunostimulant and immunosuppressant. It can help to
increase immunity of people with a low immune system, and also can
help to normalize an overactive immune system. Aim of this study is
to investigate the effects of in vitro exposure to low and high doses of
several immunomodulators which include caffeine, kaloba and
quercetin on antigen-stimulated whole blood culture cytokine
production. Whole blood samples were taken from 5 healthy males
(age: 32 ± 12 years; weight: 75.7 ± 6.1 kg; BMI: 24.3 ± 1.5 kg/m2)
following an overnight fast with no vigorous activity during the
preceding 24 h. The whole blood was then stimulated with 50 μl of
100 x diluted Pediacel vaccine and low or high dose of
immunomodulators in the culture plate. After 20 h incubation (5%
CO2, 37°C), it was analysed using the Evidence Investigator to
determine the production of cytokines including IL-2, IL-4, IL-10,
IFN-γ, and IL-1α. Caffeine and quercetin showed a tendency towards
decrease cytokine production as the doses were increased. On the
other hand, an upward trend was evident with kaloba, where a high
dose of kaloba seemed to increase the cytokine production. In
conclusion, we found that caffeine and quercetin have potential as
immunosuppressant and kaloba as immunostimulant.
Abstract: WiMAX is a telecommunications technology and it is
specified by the Institute of Electrical and Electronics Engineers Inc.,
as the IEEE 802.16 standard. The goal of this technology is to
provide a wireless data over long distances in a variety of ways. IEEE
802.16 is a recent standard for mobile communication. In this paper,
we provide an overview of various key management algorithms to
provide security for WiMAX.
Abstract: Persea declinata (Bl.) Kosterm is a member of the
Lauraceae family, widely distributed in Southeast Asia. It is from the
same genus with avocado (Persea americana Mill), which is widely
consumed as food and for medicinal purposes. In the present study,
we examined the anticancer properties of Persea declinata (Bl.)
Kosterm bark methanolic crude extract (PDM). PDM exhibited a
potent antiproliferative effect in MCF-7 human breast cancer cells,
with an IC50 value of 16.68 .g/mL after 48h of treatment. We
observed that PDM caused cell cycle arrest and subsequent apoptosis
in MCF-7 cells, as exhibited by increased population at G0/G1 phase,
higher lactate dehydrogenase (LDH) release, and DNA
fragmentation. Mechanistic studies showed that PDM caused
significant elevation in ROS production, leading to perturbation of
mitochondrial membrane potential, cell permeability, and activation
of caspases-3/7. On the other hand, real-time PCR and Western blot
analysis showed that PDM treatment increased the expression of the
proapoptotic molecule, Bax, but decreased the expression of
prosurvival proteins, Bcl-2 and Bcl-xL, in a dose-dependent manner.
These findings imply that PDM could inhibit proliferation in MCF-7
cells via cell cycle arrest and apoptosis induction, indicating its
potential as a therapeutic agent worthy of further development.
Abstract: The organizations of European and Czech critical
infrastructure have specific position, mission, characteristics and
behaviour in European Union and Czech state/business environments,
regarding specific requirements for regional and global security
environments. They must respect policy of national security and
global rules, requirements and standards in all their inherent and
outer processes of supply - customer chains and networks. A
controlling is generalized capability to have control over situational
policy. This paper aims and purposes are to introduce the controlling
as quite new necessary process attribute providing for critical
infrastructure is environment the capability and profit to achieve its
commitment regarding to the effectiveness of the quality
management system in meeting customer/ user requirements and also
the continual improvement of critical infrastructure organization’s
processes overall performance and efficiency, as well as its societal
security via continual planning improvement via DYVELOP
modelling.
Abstract: Load Forecasting plays a key role in making today's
and future's Smart Energy Grids sustainable and reliable. Accurate
power consumption prediction allows utilities to organize in advance
their resources or to execute Demand Response strategies more
effectively, which enables several features such as higher
sustainability, better quality of service, and affordable electricity
tariffs. It is easy yet effective to apply Load Forecasting at larger
geographic scale, i.e. Smart Micro Grids, wherein the lower available
grid flexibility makes accurate prediction more critical in Demand
Response applications. This paper analyses the application of
short-term load forecasting in a concrete scenario, proposed within the
EU-funded GreenCom project, which collect load data from single
loads and households belonging to a Smart Micro Grid. Three
short-term load forecasting techniques, i.e. linear regression, artificial
neural networks, and radial basis function network, are considered,
compared, and evaluated through absolute forecast errors and training
time. The influence of weather conditions in Load Forecasting is also
evaluated. A new definition of Gain is introduced in this paper, which
innovatively serves as an indicator of short-term prediction
capabilities of time spam consistency. Two models, 24- and
1-hour-ahead forecasting, are built to comprehensively compare these
three techniques.
Abstract: An anthropometric study applied to 1,115 students of
the Faculty of Chemical Sciences and Engineering of the
Autonomous University of California. Thirteen individual
measurements were taken in a sitting position. The results obtained
allow forming a reliable anthropometric database for statistical
studies and analysis and inferences of specific distributions, so the
opinion of experts in occupational medicine recommendations may
emit to reduce risks resulting in an alteration of the vital signs during
the execution of their school activities. Another use of these analyses
is to use them as a reliable reference for future deeper research, to the
design of spaces, tools, utensils, workstations, with anthropometric
dimensions and ergonomic characteristics suitable to use.
Abstract: Economic Dispatch (ED) is one of the most
challenging problems of power system since it is difficult to determine
the optimum generation scheduling to meet the particular load demand
with the minimum fuel costs while all constraints are satisfied. The
objective of the Economic Dispatch Problems (EDPs) of electric
power generation is to schedule the committed generating units
outputs so as to meet the required load demand at minimum operating
cost while satisfying all units and system equality and inequality
constraints. In this paper, an efficient and practical steady-state genetic
algorithm (SSGAs) has been proposed for solving the economic
dispatch problem. The objective is to minimize the total generation
fuel cost and keep the power flows within the security limits. To
achieve that, the present work is developed to determine the optimal
location and size of capacitors in transmission power system where,
the Participation Factor Algorithm and the Steady State Genetic
Algorithm are proposed to select the best locations for the capacitors
and determine the optimal size for them.
Abstract: Cognitive Radio is a turning out technology that
empowers viable usage of the spectrum. Energy Detector-based
Sensing is the most broadly utilized spectrum sensing strategy.
Besides, it's a lot of generic as receivers doesn't would like any
information on the primary user's signals, channel data, of even the
sort of modulation. This paper puts forth the execution of energy
detection sensing for AM (Amplitude Modulated) signal at 710 KHz,
FM (Frequency Modulated) signal at 103.45 MHz (local station
frequency), Wi-Fi signal at 2.4 GHz and WiMAX signals at 6 GHz.
The OFDM/OFDMA based WiMAX physical layer with
convolutional channel coding is actualized utilizing USRP N210
(Universal Software Radio Peripheral) and GNU Radio based
Software Defined Radio (SDR). Test outcomes demonstrated the
BER (Bit Error Rate) augmentation with channel noise and BER
execution is dissected for different Eb/N0 (the energy per bit to noise
power spectral density ratio) values.
Abstract: Access control is one of the most challenging issues
facing information security. Access control is defined as, the ability to
permit or deny access to a particular computational resource or digital
information by an unauthorized user or subject. The concept of usage
control (UCON) has been introduced as a unified approach to capture a
number of extensions for access control models and systems. In
UCON, an access decision is determined by three factors:
authorizations, obligations and conditions. Attribute mutability and
decision continuity are two distinct characteristics introduced by
UCON for the first time. An observation of UCON components
indicates that, the components are predefined and static. In this paper,
we propose a new and flexible model of usage control for the creation
and elimination of some of these components; for example new
objects, subjects, attributes and integrate these with the original
UCON model. We also propose a model for concurrent usage
scenarios in UCON.
Abstract: The importance of the formal specification in the
software life cycle is barely concealing to anyone. Formal
specifications use mathematical notation to describe the properties of
information system precisely, without unduly constraining the way in
how these properties are achieved. Having a correct and quality
software specification is not easy task. This study concerns with how
a group of rectifiers can communicate with each other and work to
prepare and produce a correct formal software specification. WBCS
has been implemented based mainly in the proposed supported
cooperative work model and a survey conducted on the existing Webbased
collaborative writing tools. This paper aims to assess the
feasibility of executing the web-based collaboration process using
WBCS. The purpose of conducting this test is to test the system as a
whole for functionality and fitness for use based on the evaluation
test plan.