Abstract: A procedural-animation-based approach which rapidly
synthesize the adaptive locomotion for quadruped characters that they
can walk or run in any directions on an uneven terrain within a
dynamic environment was proposed. We devise practical motion
models of the quadruped animals for adapting to a varied terrain in a
real-time manner. While synthesizing locomotion, we choose the
corresponding motion models by means of the footstep prediction of
the current state in the dynamic environment, adjust the key-frames of
the motion models relying on the terrain-s attributes, calculate the
collision-free legs- trajectories, and interpolate the key-frames
according to the legs- trajectories. Finally, we apply dynamic time
warping to each part of motion for seamlessly concatenating all desired
transition motions to complete the whole locomotion. We reduce the
time cost of producing the locomotion and takes virtual characters to
fit in with dynamic environments no matter when the environments are
changed by users.
Abstract: The main objective of the present paper is to derive an easy numerical technique for the analysis of the free vibration through the stepped regions of plates. Based on the utilities of the step by step integration initial values IV and Finite differences FD methods, the present improved Initial Value Finite Differences (IVFD) technique is achieved. The first initial conditions are formulated in convenient forms for the step by step integrations while the upper and lower edge conditions are expressed in finite difference modes. Also compatibility conditions are created due to the sudden variation of plate thickness. The present method (IVFD) is applied to solve the fourth order partial differential equation of motion for stepped plate across two different panels under the sudden step compatibility in addition to different types of end conditions. The obtained results are examined and the validity of the present method is proved showing excellent efficiency and rapid convergence.
Abstract: Tritium activity concentration in Danube river water
in Serbia has been determinate using a liquid scintillation counter
Quantulus 1220. During December 2010, water samples were taken
along the entire course of Danube through Serbia, from Hungarian-
Serbian to Romanian-Serbian border. This investigation is very
important because of the nearness of nuclear reactor Paks in
Hungary. Sample preparation was performed by standard test method
using Optiphase HiSafe 3 scintillation cocktail. We used a rapid
method for the preparation of environmental samples, without
electrolytic enrichment.
Abstract: Microbial contamination, most of which are fecal born in drinking water and food industry is a serious threat to humans. Escherichia coli is one of the most common and prevalent among them. We have developed a sensor for rapid and an early detection of contaminants, taking E.coli as a threat indicator organism. The sensor is based on co-polymerizations of aniline and formaldehyde in form of thin film over glass surface using the vacuum deposition technique. The particular doping combination of thin film with Fe-Al and Fe-Cu in different concentrations changes its non conducting properties to p- type semi conductor. This property is exploited to detect the different contaminants, believed to have the different surface charge. It was found through experiments that different microbes at same OD (0.600 at 600 nm) have different conductivity in solution. Also the doping concentration is found to be specific for attracting microbes on the basis of surface charge. This is a simple, cost effective and quick detection method which not only decreases the measurement time but also gives early warnings for highly contaminated samples.
Abstract: 15 strains of oil-destructing microorganisms were
isolated from oil polluted soil of Western Kazakhstan. Strains 2-A
and 41-3 with the highest oil-destructing activities were chosen from
them. It was shown that these strains oxidized n-alkanes very well,
but isoalkanes, isoparaffin, cycloparaffin and heavy aromatic
compounds were destructed very slowly. These both strains were
tested as preparations for bioremediation of oil-polluted soil in model
and field experiments. The degree of utilizing of soil oil by this
preparation was 79-84 % in field experiments.
Abstract: Modeling the behavior of the dialogue management in
the design of a spoken dialogue system using statistical methodologies
is currently a growing research area. This paper presents a work
on developing an adaptive learning approach to optimize dialogue
strategy. At the core of our system is a method formalizing dialogue
management as a sequential decision making under uncertainty whose
underlying probabilistic structure has a Markov Chain. Researchers
have mostly focused on model-free algorithms for automating the
design of dialogue management using machine learning techniques
such as reinforcement learning. But in model-free algorithms there
exist a dilemma in engaging the type of exploration versus exploitation.
Hence we present a model-based online policy learning
algorithm using interconnected learning automata for optimizing
dialogue strategy. The proposed algorithm is capable of deriving
an optimal policy that prescribes what action should be taken in
various states of conversation so as to maximize the expected total
reward to attain the goal and incorporates good exploration and
exploitation in its updates to improve the naturalness of humancomputer
interaction. We test the proposed approach using the most
sophisticated evaluation framework PARADISE for accessing to the
railway information system.
Abstract: On existing online shopping on the web, SSL and
password are usually used to achieve the secure trades. SSL shields
communication from the third party who is not related with the trade,
and indicates that the trader's web site is authenticated by one of the
certification authority. Password certifies a customer as the same
person who has visited the trader's web site before, and protects the
customer's privacy such as what the customer has bought on the site.
However, there is no forensics for the trades in those cased above.
With existing methods, no one can prove what is ordered by
customers, how many products are ordered and even whether
customers have ordered or not. The reason is that the third party has to
guess what were traded with logs that are held by traders and by
customers. The logs can easily be created, deleted and forged since
they are electronically stored. To enhance security with digital
forensics for electronic commerce on the web, I indicate a secure
method with cellular phones.
Abstract: For today-s and future wireless communications applications,
more and more data traffic has to be transmitted with
growing speed and quality demands. The analog front-end of any
mobile device has to cope with very hard specifications regardless
which transmission standard has to be supported. State-of-the-art
analog front-end implementations are reaching the limit of technical
feasibility. For that reason, alternative front-end architectures could
support a continuing development of mobile communications e.g.,
six-port-based front-ends [1], [2].
In this article we propose an analog front-end with high intermediate
frequency and which utilizes additive mixing instead
of multiplicative mixing. The system architecture is presented and
several spurious effects as well as their influence on the system
dimensioning are discussed. Furthermore, several issues concerning
the technical feasibility are provided and some simulation results
are discussed which show the principle functionality of the proposed
superposition heterodyne receiver.
Abstract: It-s difficult for China-s current land transfer
institutions limited to county-wide to solve the contradiction between
urban-rural development and construction land shortage. On the basis of analyzing China-s construction land transfer system, and evaluation
toward Transfer of development rights (TDR) practices in Anhui and
Chongqing, the passage proposes: (1) we should establish a multi-level
land indicators trade market under the guidance of regional spatial
objectives, and allow land transfer paid across cities and counties
within a specific area following the regulation of both government and
market; (2) it would be better to combine organically the policy ntentions of land plan, regional plan, urban plan and economic plan, and link them with land indicators transfer to promote a wider range of
urban-rural balance and regional coordination.
Abstract: This paper describes interconnection between
technical and economical making decision. The reason of this dealing
could be different: poor technical condition, change of substation
(electrical network) regime, power transformer owner budget deficit
and increasing of tariff on electricity. Establishing of recommended
practice as well as to give general advice and guidance in economical
sector, testing, diagnostic power transformers to establish its
conditions, identify problems and provide potential remedies.
Abstract: The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures
with multiple protocols, codecs, software and hardware–based
distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This
paper analyzes the VoIP throughput and the QoS parameters with
different commercial encryption methods. The measurement–based
approach uses lab scenarios to simulate LAN and WAN
environments. Security mechanisms such as TLS, SIAX2, SRTP,
IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.
Abstract: The use of Quantum dots is a promising emerging
Technology for implementing digital system at the nano level. It is
effecient for attractive features such as faster speed , smaller size and
low power consumption than transistor technology. In this paper,
various Combinational and sequential logical structures - HALF
ADDER, SR Latch and Flip-Flop, D Flip-Flop preceding NAND,
NOR, XOR,XNOR are discussed based on QCA design, with
comparatively less number of cells and area. By applying these
layouts, the hardware requirements for a QCA design can be reduced.
These structures are designed and simulated using QCA Designer
Tool. By taking full advantage of the unique features of this
technology, we are able to create complete circuits on a single layer
of QCA. Such Devices are expected to function with ultra low
power Consumption and very high speeds.
Abstract: The physiological effects of physical exercise on
human body are relatively well known in literature, which describes
in detail the changes that occur in the cardiovascular system, the
respiratory one, in bones and other systems, both during exercise
and after its delivery. However, the effects of exercise on mental
processes are less treated. From the literature reviews discussed in
this study, it can be detached the idea that we can not exactly say that
physical exercise has beneficial effects on mental processes, but
neither that it would have potentially negative effects. This
uncertainty, reflected in the inability to indicate precise and
unequivocal meaning, favorable-unfavorable physical effort in acting
on mental processes, is a prime reason to undertake a study of the
phenomenon influence effort administered physical education classes
on the dynamics of mental processes like attention and memory.
Abstract: Lighting is not only important for the safety of traffic,
but also it is very important for the protection of pedestrians.
Improvement on visibility in a long distance, lighting, signing,
reduces considerably the risk of accidents in crosswalks. This paper
evaluates different aspects of crosswalks including signing and
lighting to improve road safety.
Abstract: This paper explores oil prices changes impact on energy policy of Kazakhstan in 2001-2009. It involves the role of oil income to the economic development, process of diversification of internal and external energy policy of Kazakhstan, and the changes in oil law towards subsoil users.
Abstract: Culture and family structure provide a sense security.
Further, the chrono, macro and micro contexts of development
influence developmental transitions and timetable particularly owing
to variations in the macrosystem associated with non normative life
events like migration. Migration threatens family links, security and
attachment bonds. Rising migratory trends have prompted an
increased interest in migration consequences on familial bonds,
developmental autonomy, socialization process, and sense of
security. This paper takes a narrative approach and applies the
attachment paradigm from a lifespan perspective, to examine the
settlement experiences of an India-born migrant student in Sydney,
Australia. It focuses on her quest to preserve family ties; her remote
secure base; her continual struggle to balance dependency and
autonomy, a major developmental milestone. As positional parental
power is culturally more potent in the Indian society, the paper
therefore raises some important concerns related to cultural
expectations, adaptation, acculturative stress and sense of security.
Abstract: Design Patterns have gained more and more
acceptances since their emerging in software development world last
decade and become another de facto standard of essential knowledge
for Object-Oriented Programming developers nowadays.
Their target usage, from the beginning, was for regular computers,
so, minimizing power consumption had never been a concern.
However, in this decade, demands of more complicated software for
running on mobile devices has grown rapidly as the much higher
performance portable gadgets have been supplied to the market
continuously. To get along with time to market that is business
reason, the section of software development for power conscious,
battery, devices has shifted itself from using specific low-level
languages to higher level ones. Currently, complicated software
running on mobile devices are often developed by high level
languages those support OOP concepts. These cause the trend of
embracing Design Patterns to mobile world.
However, using Design Patterns directly in software development
for power conscious systems is not recommended because they were
not originally designed for such environment. This paper
demonstrates the adapted Design Pattern for power limitation system.
Because there are numerous original design patterns, it is not possible
to mention the whole at once. So, this paper focuses only in creating
Energy Conscious version of existing regular "Builder Pattern" to be
appropriated for developing low power consumption software.
Abstract: High building constructions are increasing in south
beaches of the Caspian Sea because of tourist attractions and limitation of residential areas. According to saturated alluvial fields transfer of load from high structures to the soil by piles is inevitable.
In spite of most of these piles are under compression forces, tension piles are used in special conditions. Few studies have been conducted
because of the limited use of these piles. Tension capacity of openended pipe piles in full scale was tested in this study. The length of the bored piles was 420 up to 480 cm and all were in 120 cm
diameter. The results of testing 7 piles were compared with the results of relations given by researches.
Abstract: Both image steganography and image encryption have
advantages and disadvantages. Steganograhy allows us to hide a
desired image containing confidential information in a covered or
host image while image encryption is decomposing the desired image
to a non-readable, non-comprehended manner. The encryption
methods are usually much more robust than the steganographic ones.
However, they have a high visibility and would provoke the attackers
easily since it usually is obvious from an encrypted image that
something is hidden! The combination of steganography and
encryption will cover both of their weaknesses and therefore, it
increases the security. In this paper an image encryption method
based on sinc-convolution along with using an encryption key of 128
bit length is introduced. Then, the encrypted image is covered by a
host image using a modified version of JSteg steganography
algorithm. This method could be applied to almost all image formats
including TIF, BMP, GIF and JPEG. The experiment results show
that our method is able to hide a desired image with high security and
low visibility.
Abstract: Plant tissue culture is an important in vitro technology applied for agricultural and industrial production. A sterile condition of culture medium is one of the main aspects. The alternative technique for medium sterilization to replace autoclaving was carried out. For sterilization of plant tissue culture medium without autoclaving, ten commercial pure essential oils and 5 disinfectants were tested. Each essential oil or disinfectant was added to a 20-mL Murashige and Skoog (MS) medium before medium was solidified in a 120-mL container, kept for 2 weeks before evaluating sterile conditions. Treated media, supplemented with essential oils or disinfectants, were compared to control medium, autoclaved at 121 degree Celsius for 15 min. Sterile conditions of MS medium were found 100% from betel oil or clove oil (18 mL/20 mL medium), cinnamon oil (36 mL/20 mL medium), lavender oil or holy basil oil (108 mL/20 mL medium), and lemon oil or tea tree oil or turmeric oil (252 mL/20 mL medium), compared to 100% sterile condition from autoclaved medium. For disinfectants, 2% iodine + 2.4% potassium iodide, 2% merbromine solution, 10% povidone-iodine, 6% sodium hypochlorite or 0.1% thimerosal at 36 mL/20 mL medium provided 100% sterile conditions. Furthermore, growth of new shoots from chrysanthemum node explants on treated media (fresh weight, shoot length, root length and number of node) were also reported and discussed in the comparison of those on autoclaved medium.