Abstract: In this paper the authors present the framework of a
system for assisting users through counseling on personal health, the
Personal Health Assistance Service Expert System (PHASES).
Personal health assistance systems need Personal Health Records
(PHR), which support wellness activities, improve the understanding
of personal health issues, enable access to data from providers of
health services, strengthen health promotion, and in the end improve
the health of the population. This is especially important in societies
where the health costs increase at a higher rate than the overall
economy. The most important elements of a healthy lifestyle are
related to food (such as balanced nutrition and diets), activities for
body fitness (such as walking, sports, fitness programs), and other
medical treatments (such as massage, prescriptions of drugs). The
PHASES framework uses an ontology of food, which includes
nutritional facts, an expert system keeping track of personal health
data that are matched with medical treatments, and a comprehensive
data transfer between patients and the system.
Abstract: The persistent nature of perfluorochemicals (PFCs) has attracted global concern in recent years. Perfluorooctanesulfonate (PFOS) and perfluorooctanoate (PFOA) are the most commonly found PFC compounds, and thus their fate and transport play key roles in PFC distribution in the natural environment. The kinetic behavior of PFOS or PFOA on boehmite consists of a fast adsorption process followed by a slow adsorption process which may be attributed to the slow transport of PFOS or PFOA into the boehmite pore surface. The adsorption isotherms estimated the maximum adsorption capacities of PFOS and PFOA on boehmite as 0.877 μg/m2 and 0.633 μg/m2, with the difference primarily due to their different functional groups. The increase of solution pH led to a moderate decrease of PFOS and PFOA adsorption, owing to the increase of ligand exchange reactions and the decrease of electrostatic interactions. The presence of NaCl in solution demonstrated negative effects for PFOS and PFOA adsorption on boehmite surfaces, with potential mechanisms being electrical double layer compression, competitive adsorption of chloride.
Abstract: Computational techniques derived from digital image processing are playing a significant role in the security and digital copyrights of multimedia and visual arts. This technology has the effect within the domain of computers. This research presents discrete M-band wavelet transform (MWT) and cosine transform (DCT) based watermarking algorithm by incorporating the principal component analysis (PCA). The proposed algorithm is expected to achieve higher perceptual transparency. Specifically, the developed watermarking scheme can successfully resist common signal processing, such as geometric distortions, and Gaussian noise. In addition, the proposed algorithm can be parameterized, thus resulting in more security. To meet these requirements, the image is transformed by a combination of MWT & DCT. In order to improve the security further, we randomize the watermark image to create three code books. During the watermark embedding, PCA is applied to the coefficients in approximation sub-band. Finally, first few component bands represent an excellent domain for inserting the watermark.
Abstract: In this paper we present a substantiation of a new
Laguerre-s type iterative method for solving of a nonlinear
polynomial equations systems with real coefficients. The problems of
its implementation, including relating to the structural choice of
initial approximations, were considered. Test examples demonstrate
the effectiveness of the method at the solving of many practical
problems solving.
Abstract: Liners are made to protect the groundwater table from
the infiltration of leachate which normally carries different kinds of
toxic materials from landfills. Although these liners are engineered to
last for long period of time; unfortunately these liners fail; therefore,
toxic materials pass to groundwater. This paper focuses on the
changes of the hydraulic conductivity of a sand-bentonite liner due to
the infiltration of biofuel and ethanol fuel. Series of laboratory tests
were conducted in 20-cm-high PVC columns. Several compositions
of sand-bentonite liners were tested: 95% sand: 5% bentonite; 90%
sand: 10% bentonite; and 100% sand (passed mesh #40). The
columns were subjected to extreme pressures of 40 kPa, and 100 kPa
to evaluate the transport of alternative fuels (biofuel and ethanol
fuel). For comparative studies, similar tests were carried out using
water. Results showed that hydraulic conductivity increased due to
the infiltration of alternative fuels through the liners. Accordingly,
the increase in the hydraulic conductivity showed significant
dependency on the type of liner mixture and the characteristics of the
liquid. The hydraulic conductivity of a liner (subjected to biofuel
infiltration) consisting of 5% bentonite: 95% sand under pressure of
40 kPa and 100 kPa had increased by one fold. In addition, the
hydraulic conductivity of a liner consisting of 10% bentonite: 90%
sand under pressure of 40 kPa and 100 kPa and infiltrated by biofuel
had increased by three folds. On the other hand, the results obtained
by water infiltration under 40 kPa showed lower hydraulic
conductivities of 1.50×10-5 and 1.37×10-9 cm/s for 5% bentonite:
95% sand, and 10% bentonite: 90% sand, respectively. Similarly,
under 100 kPa, the hydraulic conductivities were 2.30×10-5 and
1.90×10-9 cm/s for 5% bentonite: 95% sand, and 10% bentonite: 90%
sand, respectively.
Abstract: Together with the industrialization, women began to
be included in business life by peeling off of the tasks given them by
society and they have become a factor of production creating value in
economic and social sense. Thus, women have taken place in the
labor market, majority of which has been formed by men. In this
study, the experiences of women entrepreneurs, who succeed in
business activities, will be analyzed. By the study, current state of the
women entrepreneurs in the labor market of Turkey will be put down,
as a result of interferences obtained from the shared experiences of
women entrepreneurs. Findings obtained at the end of the study are
thought to light the way of future studies for increasing women
entrepreneurship.
Abstract: Metrics is the process by which numbers or symbols
are assigned to attributes of entities in the real world in such a way as
to describe them according to clearly defined rules. Software metrics
are instruments or ways to measuring all the aspect of software
product. These metrics are used throughout a software project to
assist in estimation, quality control, productivity assessment, and
project control. Object oriented software metrics focus on
measurements that are applied to the class and other characteristics.
These measurements convey the software engineer to the behavior of
the software and how changes can be made that will reduce
complexity and improve the continuing capability of the software.
Object oriented software metric can be classified in two types static
and dynamic. Static metrics are concerned with all the aspects of
measuring by static analysis of software and dynamic metrics are
concerned with all the measuring aspect of the software at run time.
Major work done before, was focusing on static metric. Also some
work has been done in the field of dynamic nature of the software
measurements. But research in this area is demanding for more work.
In this paper we give a set of dynamic metrics specifically for
polymorphism in object oriented system.
Abstract: Language Reforms and potential use of ICTs has been a focal area of Higher Education Commission of Pakistan. Efforts are being accelerated to incorporate fast expanding ICTs to bring qualitative improvement in language instruction in higher education. This paper explores how university teachers are benefitting from ICTs to make their English class effective and what type of problems they face in practicing ICTs during their lectures. An in-depth qualitative study was employed to understand why language teachers tend to use ICTs in their instruction and how they are practicing it. A sample of twenty teachers from five universities located in Islamabad, three from public sector and two from private sector, was selected on non-random (Snowball) sampling basis. An interview with 15 semi-structured items was used as research instruments to collect data. The findings reveal that business English teaching is facilitated and improved through the use of ICTs. The language teachers need special training regarding the practices and implementation of ICTs. It is recommended that initiatives might be taken to equip university language teachers with modern methodology incorporating ICTs as focal area and efforts might be made to remove barriers regarding the training of language teachers and proper usage of ICTs.
Abstract: German electricity European options on futures using
Lévy processes for the underlying asset are examined. Implied
volatility evolution, under each of the considered models, is
discussed after calibrating for the Merton jump diffusion (MJD),
variance gamma (VG), normal inverse Gaussian (NIG), Carr, Geman,
Madan and Yor (CGMY) and the Black and Scholes (B&S) model.
Implied volatility is examined for the entire sample period, revealing
some curious features about market evolution, where data fitting
performances of the five models are compared. It is shown that
variance gamma processes provide relatively better results and that
implied volatility shows significant differences through time, having
increasingly evolved. Volatility changes for changed uncertainty, or
else, increasing futures prices and there is evidence for the need to
account for seasonality when modelling both electricity spot/futures
prices and volatility.
Abstract: In wireless and mobile communications, this progress
provides opportunities for introducing new standards and improving
existing services. Supporting multimedia traffic with wireless networks
quality of service (QoS). In this paper, a grey-fuzzy controller for radio
resource management (GF-RRM) is presented to maximize the number
of the served calls and QoS provision in wireless networks. In a
wireless network, the call arrival rate, the call duration and the
communication overhead between the base stations and the control
center are vague and uncertain. In this paper, we develop a method to
predict the cell load and to solve the RRM problem based on the
GF-RRM, and support the present facility has been built on the
application-level of the wireless networks. The GF-RRM exhibits the
better adaptability, fault-tolerant capability and performance than other
algorithms. Through simulations, we evaluate the blocking rate, update
overhead, and channel acquisition delay time of the proposed method.
The results demonstrate our algorithm has the lower blocking rate, less
updated overhead, and shorter channel acquisition delay.
Abstract: The error monitoring and processing system, EMPS is
the system located in the substantia nigra of the midbrain, basal
ganglia and cortex of the forebrain, and plays a leading role in error
detection and correction. The main components of EMPS are the
dopaminergic system and anterior cingulate cortex. Although, recent
studies show that alcohol disrupts the EMPS, the ways in which
alcohol affects this system are poorly understood. Based on current
literature data, here we suggest a hypothesis of alcohol-related
glucose-dependent system of error monitoring and processing, which
holds that the disruption of the EMPS is related to the competency of
glucose homeostasis regulation, which in turn may determine the
dopamine level as a major component of EMPS. Alcohol may
indirectly disrupt the EMPS by affecting dopamine level through
disorders in blood glucose homeostasis regulation.
Abstract: Intrusion detection systems (IDS)are crucial components
of the security mechanisms of today-s computer systems.
Existing research on intrusion detection has focused on sequential
intrusions. However, intrusions can also be formed by concurrent
interactions of multiple processes. Some of the intrusions caused
by these interactions cannot be detected using sequential intrusion
detection methods. Therefore, there is a need for a mechanism that
views the distributed system as a whole. L-BIDS (Lattice-Based
Intrusion Detection System) is proposed to address this problem. In
the L-BIDS framework, a library of intrusions and distributed traces
are represented as lattices. Then these lattices are compared in order
to detect intrusions in the distributed traces.
Abstract: The fluid flow and the properties of the hydraulic
fluid inside a torque converter are the main topics of interest in this
research. The primary goal is to investigate the applicability of
various viscous fluids inside the torque converter. The Taguchi
optimization method is adopted to analyse the fluid flow in a torque
converter from a design perspective. Calculations are conducted in
maximizing the pressure since greater the pressure, greater the torque
developed. Using the values of the S/N ratios obtained, graphs are
plotted. Computational Fluid Dynamics (CFD) analysis is also
conducted.
Abstract: The fast growth in complexity coupled with requests for shorter development periods for embedded systems are bringing demands towards a more effective, i.e. higher-abstract, design process for hardaware/software integrated design. In Software Engineering area, Model Driven Architecture (MDA) and Executable UML (xUML) has been accepted to bring further improvement in software design. This paper constructs MDA and xUML stepwise transformations from an abstract specification model to a more concrete implementation model using the refactoring technique for hardaware/software integrated design. This approach provides clear and structured models which enables quick exploration and synthesis, and early stage verification.
Abstract: Mobile learning (M-learning) integrates mobile
devices and wireless computing technology to enhance the current
conventional learning system. However, there are constraints which
are affecting the implementation of platform and device independent
M-learning. The main aim of this research is to fulfill the following
main objectives: to develop platform independent mobile learning
tool (M-LT) for structured programming course, and evaluate its
effectiveness and usability using ADDIE instructional design model
(ISD) as M-LT life cycle. J2ME (Java 2 micro edition) and XML
(Extensible Markup Language) were used to develop platform
independent M-LT. It has two modules lecture materials and quizzes.
This study used Quasi experimental design to measure effectiveness
of the tool. Meanwhile, questionnaire is used to evaluate the usability
of the tool. Finally, the results show that the system was effective and
also usability evaluation was positive.
Abstract: Based on different experiences in the historic centers
of Spain, we propose an global strategy for the regeneration of the
pre-tertiary fabrics and its application to the specific case of San
Mateo neighborhood, in Jerez de la Frontera (Andalusia), through a
diagnosis that focus particularly on the punishments the last-decade
economic situation (building boom and crisis) and shows the tragic
transition from economic center to an imminent disappearance with
an image similar to the ruins of war, due to the loss of their
traditional roles. From it we will learn their historically-tested
mechanisms of environment adaptation, which distill the vernacular
architecture essence and that we will apply to our strategy of action
based on a dotacional-and-free-space rhizome which rediscovers its
hidden character. The architectural fact will be crystallized in one of
the example-pieces proposed: The Artistic Revitalization Center.
Abstract: Severe heart failure is a common problem that has a significant effect on health expenditures in industrialized countries; moreover it reduces patient-s quality of life. However, current research usually focuses either on detailed modeling of the heart or on detailed modeling of the cardiovascular system. Thus, this paper aims to present a sophisticated model of the heart enhanced with an extensive model of the cardiovascular system. Special interest is on the pressure and flow values close to the heart since these values are critical to accurately diagnose causes of heart failure. The model is implemented in Dymola an object-oriented, physical modeling language. Results achieved with the novel model show overall feasibility of the approach. Moreover, results are illustrated and compared to other models. The novel model shows significant improvements.
Abstract: There are multiple ways to implement a decimator
filter. This paper addresses usage of CIC (cascaded-integrator-comb)
filter and HB (half band) filter as the decimator filter to reduce the
frequency sample rate by factor of 64 and detail of the
implementation step to realize this design in hardware. Low power
design approach for CIC filter and half band filter will be discussed.
The filter design is implemented through MATLAB system
modeling, ASIC (application specific integrated circuit) design flow
and verified using a FPGA (field programmable gate array) board
and MATLAB analysis.
Abstract: Objective: The objective of this paper is to assess the
hospitals preparedness for emergency using WHO standards.
Method: This is a cross-sectional study, consisted of site visit,
questionnaire survey, 16 health facilities were included. The WHO
standard for emergency preparedness of health facilities was used to
evaluate and assess the hospitals preparedness of health facilities.
Result: 13 hospitals were responded. They scored below average
in all measure >75%), while above average score was in 7 out 9 nine
measure with a range of 8%-25%. Un acceptable below average was
noted in two measures only.
Discussion: The biggest challenge facing the hospitals in their
emergency intervention is the lack of pre-emergency and emergency
preparedness plans as well as the coordination of the hospitals
response mechanisms.
Conclusion: The studied hospitals presently are far from
international disasters preparedness protocols. That necessitates
improvements in emergency preparedness, as well as in physician
skills for injury management.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created