Abstract: Osteoarthritis (OA) is the most prevalent and far common debilitating form of arthritis which can be defined as a degenerative condition affecting synovial joint. Patients suffering from osteoarthritis often complain of dull ache pain on movement.
Physical agents can fight the painful process when correctly indicated and used such as heat or cold therapy Aim. This study was carried out to: Compare the effect of cold, warm and contrast therapy on controlling knee osteoarthritis associated problems. Setting: The study was carried out in orthopedic outpatient clinics of Menoufia University and teaching Hospitals, Egypt. Sample: A convenient sample of 60 adult patients with unilateral knee osteoarthritis. Tools: three tools were utilized to collect the data. Tool I : An interviewing questionnaire. It comprised of three parts covering sociodemographic data, medical data and adverse effects of the treatment protocol. Tool II : Knee Injury and Osteoarthritis Outcome Score (KOOS) It consists of five main parts. Tool II1 : 0-10 Numeric pain rating scale. Results: reveled that the total knee symptoms score was decreased from moderate symptoms pre intervention to mild symptoms after warm and contrast method of therapy, but the contrast therapy had significant effect in reducing the knee symptoms and pain than the other symptoms. Conclusions: all of the three
methods of therapy resulted in improvement in all knee symptoms and pain but the most appropriate protocol of treatment to relive symptoms and pain was contrast therapy.
Abstract: In recent past, the Unified Modeling Language (UML) has become the de facto industry standard for object-oriented modeling of the software systems. The syntax and semantics rich UML has encouraged industry to develop several supporting tools including those capable of generating deployable product (code) from the UML models. As a consequence, ensuring the correctness of the model/design has become challenging and extremely important task. In this paper, we present an approach for automatic verification of protocol model/design. As a case study, Session Initiation Protocol (SIP) design is verified for the property, “the CALLER will not converse with the CALLEE before the connection is established between them ". The SIP is modeled using UML statechart diagrams and the desired properties are expressed in temporal logic. Our prototype verifier “UML-SMV" is used to carry out the verification. We subjected an erroneous SIP model to the UML-SMV, the verifier could successfully detect the error (in 76.26ms) and generate the error trace.
Abstract: This paper proposes a new decision making structure
to determine the appropriate product delivery strategy for different products in a manufacturing system among make-to-stock, make-toorder,
and hybrid strategy. Given product delivery strategies for all products in the manufacturing system, the position of the Order
Penetrating Point (OPP) can be located regarding the delivery strategies among which location of OPP in hybrid strategy is a
cumbersome task. In this regard, we employ analytic network process, because there are varieties of interrelated driving factors
involved in choosing the right location. Moreover, the proposed structure is augmented with fuzzy sets theory in order to cope with
the uncertainty of judgments. Finally, applicability of the proposed structure is proven in practice through a real industrial case company.
The numerical results demonstrate the efficiency of the proposed decision making structure in order partitioning and OPP location.
Abstract: This work aims to test the application of computational fluid dynamics (CFD) modeling to fixed bed catalytic cracking reactors. Studies of CFD with a fixed bed design commonly use a regular packing with N=2 to define bed geometry. CFD allows us to obtain a more accurate view of the fluid flow and heat transfer mechanisms present in fixed bed equipment. Naphtha was used as feedstock and the reactor length was 80cm. It is divided in three sections that catalyst bed packed in the middle section of the reactor. The reaction scheme was involved one primary reaction and 24 secondary reactions. Because of high CPU times in these simulations, parallel processing have been used. In this study the coke formation process in fixed bed and empty tube reactor was simulated and coke in these reactors are compared. In addition, the effect of steam ratio and feed flow rate on coke formation was investigated.
Abstract: Key management represents a major and the most
sensitive part of cryptographic systems. It includes key generation,
key distribution, key storage, and key deletion. It is also considered
the hardest part of cryptography. Designing secure cryptographic
algorithms is hard, and keeping the keys secret is much harder.
Cryptanalysts usually attack both symmetric and public key
cryptosystems through their key management. We introduce a
protocol to exchange cipher keys over insecure communication
channel. This protocol is based on public key cryptosystem,
especially elliptic curve cryptosystem. Meanwhile, it tests the cipher
keys and selects only the good keys and rejects the weak one.
Abstract: Stochastic models of biological networks are well established in systems biology, where the computational treatment of such models is often focused on the solution of the so-called chemical master equation via stochastic simulation algorithms. In contrast to this, the development of storage-efficient model representations that are directly suitable for computer implementation has received significantly less attention. Instead, a model is usually described in terms of a stochastic process or a "higher-level paradigm" with graphical representation such as e.g. a stochastic Petri net. A serious problem then arises due to the exponential growth of the model-s state space which is in fact a main reason for the popularity of stochastic simulation since simulation suffers less from the state space explosion than non-simulative numerical solution techniques. In this paper we present transition class models for the representation of biological network models, a compact mathematical formalism that circumvents state space explosion. Transition class models can also serve as an interface between different higher level modeling paradigms, stochastic processes and the implementation coded in a programming language. Besides, the compact model representation provides the opportunity to apply non-simulative solution techniques thereby preserving the possible use of stochastic simulation. Illustrative examples of transition class representations are given for an enzyme-catalyzed substrate conversion and a part of the bacteriophage λ lysis/lysogeny pathway.
Abstract: The full length mitochondrial small subunit ribosomal
(mt-rns) gene has been characterized for Ophiostoma novo-ulmi
subspecies americana. The gene was also characterized for
Ophiostoma ulmi and a group II intron was noted in the mt-rns gene
of O. ulmi. The insertion in the mt-rns gene is at position S952 and it
is a group IIB1 intron that encodes a double motif LAGLIDADG
homing endonuclease from an open reading frame located within a
loop of domain III. Secondary structure models for the mt-rns RNA
of O. novo-ulmi subsp. americana and O. ulmi were generated to
place the intron within the context of the ribosomal RNA. The in vivo
splicing of the O.ul-mS952 group II intron was confirmed with
reverse transcription-PCR. A survey of 182 strains of Dutch Elm
Diseases causing agents showed that the mS952 intron was absent in
what is considered to be the more aggressive species O. novo-ulmi
but present in strains of the less aggressive O. ulmi. This observation
suggests that the O.ul-mS952 intron can be used as a PCR-based
molecular marker to discriminate between O. ulmi and O. novo-ulmi
subsp. americana.
Abstract: In order to enhance the knowledge of certain
phytochemical Algerian plants that are widely used in traditional
medicine and to exploit their therapeutic potential in modern
medicine, we have done a specific extraction of terpenes and
alkaloids from the leaves of Euphorbia granulata to evaluate the
antioxidant and antibacterial activity of this extracts. After the
extraction it was found that the terpene extract gave the highest yield
59.72% compared with alkaloids extracts.
The disc diffusion method was used to determine the antibacterial
activity against different bacterial strains: Escherichia coli
(ATCC25922), Pseudomonas aeruginosa (ATCC27853) and
Staphylococcus aureus (ATCC25923). All extracts have shown
inhibition of growth bacteria. The different zones of inhibition have
varied from (7 -10 mm) according to the concentrations of extract
used.
Testing the antiradical activity on DPPH-TLC plates indicated the
presence of substances that have potent anti-free radical. As against,
the BC-TLC revealed that only terpenes extract which was reacted
positively. These results can validate the importance of Euphorbia
granulata in traditional medicine.
Abstract: One of the most importance of intelligence in-car and
roadside systems is the cooperative vehicle-infrastructure system. In
Thailand, ITS technologies are rapidly growing and real-time vehicle
information is considerably needed for ITS applications; for example,
vehicle fleet tracking and control and road traffic monitoring
systems. This paper defines the communication protocols and
software design for middleware components of B-VIS (Burapha
Vehicle-Infrastructure System). The proposed B-VIS middleware architecture serves the needs of a distributed RFID sensor network and simplifies some intricate details of several communication standards.
Abstract: In this work, an organic compound 5,10,15,20-
Tetrakis(3,5-di-tertbutylphenyl)porphyrinatocopper(II) (TDTBPPCu)
is studied as an active material for thin film electronic devices. To
investigate the electrical properties of TDTBPPCu, junction of
TDTBPPCu with heavily doped n-Si and Al is fabricated.
TDTBPPCu film was sandwiched between Al and n-Si electrodes.
Various electrical parameters of TDTBPPCu are determined. The
current-voltage characteristics of the junction are nonlinear,
asymmetric and show rectification behavior, which gives the clue of
formation of depletion region. This behavior indicates the potential
of TDTBPPCu for electronics applications. The current-voltage and
capacitance-voltage techniques are used to find the different
electronic parameters.
Abstract: The special constraints of sensor networks impose a
number of technical challenges for employing them. In this review,
we study the issues and existing protocols in three areas: coverage
and routing. We present two types of coverage problems: to
determine the minimum number of sensor nodes that need to perform
active sensing in order to monitor a certain area; and to decide the
quality of service that can be provided by a given sensor network.
While most routing protocols in sensor networks are data-centric,
there are other types of routing protocols as well, such as
hierarchical, location-based, and QoS-aware. We describe and
compare several protocols in each group. We present several multipath
routing protocols and single-path with local repair routing
protocols, which are proposed for recovering from sensor node
crashes. We also discuss some transport layer schemes for reliable
data transmission in lossy wireless channels.
Abstract: The aim of the study was to investigate phytochemical
properties, antimicrobial activity and cytotoxicity of Aloe vera. The
phytochemical screening of the extracts of leaves of A. vera revealed
the presence of bioactive compounds such as alkaloids, tannins,
flavonoids phenolic compounds, and etc. with absence of cyanogenic
glycosides. Three different solvents such as methanol, ethanol and
Di-Methyl sulfoxide were used to screen the antimicrobial activity of
A. vera leaves against four human clinical pathogens by agar well
diffusion method. The maximum antibacterial activities were
observed in methanol extract followed by ethanol and Di-Methyl
sulfoxide. It was also found that remarkable antibacterial activities
with methanolic and ethanolic extracts of A. vera compared with the
standard antibiotic, tetracycline that was not active against E. coli
and S. boydii and supported the view that A. vera is a potent
antimicrobial agent compared with the conventional antibiotic.
Moreover, the brine shrimps (Artemia salina) toxicity test exhibited
LC50 value was 569.52 ppm. The resulting data indicated that the A.
vera plant have less toxic effects on brine shrimp. Hence, it is
signified that Aloe vera plant extract is safe to be used as an
antimicrobial agent.
Abstract: WLAN Positioning has been presented by many
approaches in literatures using the characteristics of Received Signal
Strength (RSS), Time of Arrival (TOA) or Time Difference of
Arrival (TDOA), Angle of Arrival (AOA) and cell ID. Among these,
RSS approach is the simplest method to implement because there is
no need of modification on both access points and client devices
whereas its accuracy is terrible due to physical environments. For
TOA or TDOA approach, the accuracy is quite acceptable but most
researches have to modify either software or hardware on existing
WLAN infrastructure. The scales of modifications are made on only
access card up to the changes in protocol of WLAN. Hence, it is an
unattractive approach to use TOA or TDOA for positioning system.
In this paper, the new concept of merging both RSS and TOA
positioning techniques is proposed. In addition, the method to
achieve TOA characteristic for positioning WLAN user without any
extra modification necessarily appended in the existing system is
presented. The measurement results confirm that the proposed
technique using both RSS and TOA characteristics provides better
accuracy than using only either RSS or TOA approach.
Abstract: In recent years asymmetric cross section aluminum
alloy stock has been finding increasing use in various industrial manufacturing areas such as general structures and automotive
components. In these areas, components are generally required to have
complex curved configuration and, as such, a bending process is required during manufacture. Undesirable deformation in bending
processes such as flattening or wrinkling can easily occur when thin-walled sections are bent. Hence, a thorough understanding of the
bending behavior of such sections is needed to prevent these undesirable deformations. In this study, the bending behavior of
asymmetric channel section was examined using finite element analysis (FEA). Typical methods of preventing undesirable
deformation, such as asymmetric laminated elastic mandrels were included in FEA model of draw bending. Additionally, axial tension
was applied to prevent wrinkling. By utilizing the FE simulations effect of restriction dies and axial tension on undesirable deformation during the process was clarified.
Abstract: The speculative locking (SL) protocol extends the twophase locking (2PL) protocol to allow for parallelism among conflicting transactions. The adaptive speculative locking (ASL) protocol provided further enhancements and outperformed SL protocols under most conditions. Neither of these protocols consider the impact of network latency on the performance of the distributed database systems. We have studied the performance of ASL protocol taking into account the communication overhead. The results indicate that though system load can counter network latency, it can still become a bottleneck in many situations. The impact of latency on performance depends on many factors including the system resources. A flexible discrete event simulator was used as the testbed for this study.
Abstract: In this paper we have proposed a novel dynamic least cost multicast routing protocol using hybrid genetic algorithm for IP networks. Our protocol finds the multicast tree with minimum cost subject to delay, degree, and bandwidth constraints. The proposed protocol has the following features: i. Heuristic local search function has been devised and embedded with normal genetic operation to increase the speed and to get the optimized tree, ii. It is efficient to handle the dynamic situation arises due to either change in the multicast group membership or node / link failure, iii. Two different crossover and mutation probabilities have been used for maintaining the diversity of solution and quick convergence. The simulation results have shown that our proposed protocol generates dynamic multicast tree with lower cost. Results have also shown that the proposed algorithm has better convergence rate, better dynamic request success rate and less execution time than other existing algorithms. Effects of degree and delay constraints have also been analyzed for the multicast tree interns of search success rate.
Abstract: At present, web Service is the first choice to reuse the
legacy system for the implementation of SOA. According to the status
of the implementation of SOA and the status of the legacy systems, we propose four encapsulating strategies. Base on the strategies, we
proposal the service-oriented encapsulating framework, the legacy system can be encapsulated by the service-oriented encapsulating
layer in three aspects, communication protocols, data and program.
The reuse rate of the legacy systems can be increased by using this framework
Abstract: Corporate social responsibility (CSR) can be defined as the management of social, environmental, economical and ethical concepts and firms sensivities to the expectations of the social stakeholders. CSR is seen as an important competitive advantage in the textile sector because this sector has an important impact on the environment and it is labor extensive. Textile sector has a strong advantage when compared with other sectors in Turkey due to its low labor costs and abundancy of raw materials. Turkey was a producer and an exporter of cotton, and an importer of fiber, clothes and dresses until 1950s. After 1950s, Turkey has begun to export fiber, ready-made clothes and become one of the most important textile producers in the world recently. CSR practices of the textile firms that are quoted in Istanbul Stock Exchange and these firms sensivities to their internal and external stakeholders and environment will be presented in this study.
Abstract: Microwave energy is a superior alternative to several other thermal treatments. Extraction techniques are widely employed for the isolation of bioactive compounds and vegetable oils from oil seeds. Among the different and new available techniques, microwave pretreatment of seeds is a simple and desirable method for production of high quality vegetable oils. Microwave pretreatment for oil extraction has many advantages as follow: improving oil extraction yield and quality, direct extraction capability, lower energy consumption, faster processing time and reduced solvent levels compared with conventional methods. It allows also for better retention and availability of desirable nutraceuticals, such as phytosterols and tocopherols, canolol and phenolic compounds in the extracted oil such as rapeseed oil. This can be a new step to produce nutritional vegetable oils with improved shelf life because of high antioxidant content.
Abstract: Support Vector Machine (SVM) is a recent class of statistical classification and regression techniques playing an increasing role in applications to detection problems in various engineering problems, notably in statistical signal processing, pattern recognition, image analysis, and communication systems. In this paper, SVM is applied to an infrared (IR) binary communication system with different types of channel models including Ricean multipath fading and partially developed scattering channel with additive white Gaussian noise (AWGN) at the receiver. The structure and performance of SVM in terms of the bit error rate (BER) metric is derived and simulated for these channel stochastic models and the computational complexity of the implementation, in terms of average computational time per bit, is also presented. The performance of SVM is then compared to classical binary signal maximum likelihood detection using a matched filter driven by On-Off keying (OOK) modulation. We found that the performance of SVM is superior to that of the traditional optimal detection schemes used in statistical communication, especially for very low signal-to-noise ratio (SNR) ranges. For large SNR, the performance of the SVM is similar to that of the classical detectors. The implication of these results is that SVM can prove very beneficial to IR communication systems that notoriously suffer from low SNR at the cost of increased computational complexity.