Abstract: F-actin fibrils are the cytoskeleton of osteocytes. They react in a dynamic manner to mechanical loading, and strength and
reposition their efforts to reinforce the cells structure. We hypothesize that f-actin is temporarly disrupted after loading and repolymerizes
in a new orientation to oppose the applied load. In vitro studies are conducted to determine f-actin disruption after varying mechanical stimulus parameters that are known to affect bone
formation. Results indicate that the f-actin cytoskeleton is disrupted in vitro as a function of applied mechanical stimulus parameters and
that the f-actin bundles reassemble after loading induced disruption
within 3 minutes after cessation of loading. The disruption of the factin
cytoskeleton depends on the magnitude of stretch, the numbers
of loading cycles, frequency, the insertion of rest between loading
cycles and extracellular calcium. In vivo studies also demonstrate
disruption of the f-actin cytoskeleton in cells embedded in the bone
matrix immediately after mechanical loading. These studies suggest
that adaptation of the f-actin fiber bundles of the cytoskeleton in
response to applied loads occurs by disruption and subsequent repolymerization.
Abstract: A self-evolution algorithm for optimizing neural networks using a combination of PSO and JPSO is proposed. The algorithm optimizes both the network topology and parameters simultaneously with the aim of achieving desired accuracy with less complicated networks. The performance of the proposed approach is compared with conventional back-propagation networks using several synthetic functions, with better results in the case of the former. The proposed algorithm is also implemented on slope stability problem to estimate the critical factor of safety. Based on the results obtained, the proposed self evolving network produced a better estimate of critical safety factor in comparison to conventional BPN network.
Abstract: Teachers form the backbone of any educational system, hence selecting qualified candidates is very crucial. In Malaysia, the decision making in the selection process involves a few stages: Initial filtering through academic achievement, taking entry examination and going through an interview session. The last stage is the most challenging since it highly depends on human judgment. Therefore, this study sought to identify the selection criteria for teacher candidates that form the basis for an efficient multi-criteria teacher-candidate selection model for that last stage. The relevant criteria were determined from the literature and also based on expert input that is those who were involved in interviewing teacher candidates from a public university offering the formal training program. There are three main competency criteria that were identified which are content of knowledge, communication skills and personality. Further, each main criterion was divided into a few subcriteria. The Analytical Hierarchy Process (AHP) technique was employed to allocate weights for the criteria and later, integrated a Simple Weighted Average (SWA) scoring approach to develop the selection model. Subsequently, a web-based Decision Support System was developed to assist in the process of selecting the qualified teacher candidates. The Teacher-Candidate Selection (TeCaS) system is able to assist the panel of interviewers during the selection process which involves a large amount of complex qualitative judgments.
Abstract: A suspension bridge is the most suitable type of structure for a long-span bridge due to rational use of structural materials. Increased deformability, which is conditioned by appearance of the elastic and kinematic displacements, is the major disadvantage of suspension bridges. The problem of increased kinematic displacements under the action of non-symmetrical load can be solved by prestressing. The prestressed suspension bridge with the span of 200 m was considered as an object of investigations. The cable truss with the cross web was considered as the main load carrying structure of the prestressed suspension bridge. The considered cable truss was optimized by 47 variable factors using Genetic algorithm and FEM program ANSYS. It was stated, that the maximum total displacements are reduced up to 29.9% by using of the cable truss with the rational characteristics instead of the single cable in the case of the worst situated load.
Abstract: The tray/multi-tray distillation process is a topic that
has been investigated to great detail over the last decade by many
teams such as Jubran et al. [1], Adhikari et al. [2], Mowla et al. [3],
Shatat et al. [4] and Fath [5] to name a few. A significant amount of
work and effort was spent focusing on modeling and/simulation of
specific distillation hardware designs. In this work, we have focused
our efforts on investigating and gathering experimental data on
several engineering and design variables to quantify their influence
on the yield of the multi-tray distillation process. Our goals are to
generate experimental performance data to bridge some existing gaps
in the design, engineering, optimization and theoretical modeling
aspects of the multi-tray distillation process.
Abstract: This paper deals with a novel approach of power
transformers diagnostics. This approach identifies the exact location
and the range of a fault in the transformer and helps to reduce
operation costs related to handling of the faulty transformer, its
disassembly and repair. The advantage of the approach is a
possibility to simulate healthy transformer and also all faults, which
can occur in transformer during its operation without its
disassembling, which is very expensive in practice. The approach is
based on creating frequency dependent impedance of the transformer
by sweep frequency response analysis measurements and by 3D FE
parametrical modeling of the fault in the transformer. The parameters
of the 3D FE model are the position and the range of the axial short
circuit. Then, by comparing the frequency dependent impedances of
the parametrical models with the measured ones, the location and the
range of the fault is identified. The approach was tested on a real
transformer and showed high coincidence between the real fault and
the simulated one.
Abstract: Engineered nanoparticles’ usage rapidly increased in
various applications in the last decade due to their unusual properties.
However, there is an ever increasing concern to understand their
toxicological effect in human health. Particularly, metal and metal
oxide nanoparticles have been used in various sectors including
biomedical, food and agriculture. But their impact on human health is
yet to be fully understood. In this present investigation, we assessed
the toxic effect of engineered nanoparticles (ENPs) including Ag,
MgO and Co3O4 nanoparticles (NPs) on human mesenchymal stem
cells (hMSC) adopting cell viability and cellular morphological
changes as tools The results suggested that silver NPs are more toxic
than MgO and Co3O4NPs. The ENPs induced cytotoxicity and
nuclear morphological changes in hMSC depending on dose. The cell
viability decreases with increase in concentration of ENPs. The
cellular morphology studies revealed that ENPs damaged the cells.
These preliminary findings have implications for the use of these
nanoparticles in food industry with systematic regulations.
Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.
Abstract: Video watermarking is usually considered as watermarking of a set of still images. In frame-by-frame watermarking approach, each video frame is seen as a single watermarked image, so collusion attack is more critical in video watermarking. If the same or redundant watermark is used for embedding in every frame of video, the watermark can be estimated and then removed by watermark estimate remodolulation (WER) attack. Also if uncorrelated watermarks are used for every frame, these watermarks can be washed out with frame temporal filtering (FTF). Switching watermark system or so-called SS-N system has better performance against WER and FTF attacks. In this system, for each frame, the watermark is randomly picked up from a finite pool of watermark patterns. At first SS-N system will be surveyed and then a new collusion attack for SS-N system will be proposed using a new algorithm for separating video frame based on watermark pattern. So N sets will be built in which every set contains frames carrying the same watermark. After that, using WER attack in every set, N different watermark patterns will be estimated and removed later.
Abstract: Most, if not all, public hospitals in Thailand have encountered a common problem regarding the increasing demand for medical services. The increasing number of patients causes so much strain on the hospital-s services, over-crowded, overloaded working hours, staff fatigue, medical error and long waiting time. This research studied the characteristics of operational processes of the medical care services at the medicine department in a large public university hospital. The research focuses on details regarding methods, procedures, processes, resources, and time management in overall processes. The simulation model is used as a tool to analyze the impact of various improvement strategies.
Abstract: In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and quasi-stationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine first stage nozzle blade.
Abstract: Until recently, energy security and climate change
were considered separate issues to be dealt with by policymakers.
The two issues are now converging, challenging the security and
climate communities to develop a better understanding of how to deal
with both issues simultaneously. Although Egypt is not a major
contributor to the world's total GHG emissions, it is particularly
vulnerable to the potential effects of global climate change such as
rising sea levels and changed patterns of rainfall in the Nile Basin.
Climate change is a major threat to sustainable growth and
development in Egypt, and the achievement of the Millennium
Development Goals. Egypt-s capacity to respond to the challenges of
climate instability will be expanded by improving overall resilience,
integrating climate change goals into sustainable development
strategies, increasing the use of modern energy systems with reduced
carbon intensity, and strengthening international initiatives. This
study seeks to establish a framework for considering the complex and
evolving links between energy security and climate change,
applicable to Egypt.
Abstract: Cheating on standardized tests has been a major
concern as it potentially minimizes measurement precision. One
major way to reduce cheating by collusion is to administer multiple
forms of a test. Even with this approach, potential collusion is still
quite large. A Latin-square treatment structure for distributing
multiple forms is proposed to further reduce the colluding potential.
An index to measure the extent of colluding potential is also
proposed. Finally, with a simple algorithm, the various Latin-squares
were explored to find the best structure to keep the colluding
potential to a minimum.
Abstract: Because of architectural condition and structure application, sometimes mass source and stiffness source are not coincidence, and the structure is irregular. The structure is also might be asymmetric as an asymmetric bracing in plan which leads to unbalance distribution of stiffness or because of unbalance distribution of the mass. Both condition lead to eccentricity and torsion in the structure. The deficiency of ordinary code to evaluate the performance of steel structures against earthquake has been caused designing based on performance level or capacity spectrum be used. By using the mentioned methods it is possible to design a structure that its behavior against different earthquakes be predictive. In this article 5- story buildings with different percentage of asymmetric which is because of stiffness changes have been designed. The static and dynamic nonlinear analysis under three acceleration recording has been done. Finally performance level of the structure has been evaluated.
Abstract: To study the impact of the inter-module ventilation (IMV) on the space station, the Computational Fluid Dynamic (CFD) model under the influence of IMV, the mathematical model, boundary conditions and calculation method are established and determined to analyze the influence of IMV on cabin air flow characteristics and velocity distribution firstly; and then an integrated overall thermal mathematical model of the space station is used to consider the impact of IMV on thermal management. The results show that: the IMV has a significant influence on the cabin air flow, the flowrate of IMV within a certain range can effectively improve the air velocity distribution in cabin, if too much may lead to its deterioration; IMV can affect the heat deployment of the different modules in space station, thus affecting its thermal management, the use of IMV can effectively maintain the temperature levels of the different modules and help the space station to dissipate the waste heat.
Abstract: This study carried out in order to investigate the
effects of salinity on carbon isotope discrimination (Δ) of shoots and
roots of four sugar beet cultivars (cv) including Madison (British
origin) and three Iranian culivars (7233-P12, 7233-P21 and 7233-P29).
Plants were grown in sand culture medium in greenhouse conditions.
Plants irrigated with saline water (tap water as control, 50 mM, 150
mM, 250 mM and 350 mM of NaCl + CaCl2 in 5 to 1 molar ratio)
from 4 leaves stage for 16 weeks. Carbon isotope discrimination
significantly decreased with increasing salinity. Significant
differences of Δ between shoot and root were observed in all cvs and
all levels of salinity. Madison cv showed lower Δ in shoot and root
than other three cvs at all levels of salinity expect control, but cv
7233-P29 had significantly higher Δ values at saline conditions of 150
mM and above. Therefore, Δ might be applicable, as a useful tool, for
study of salinity tolerance of sugar beet genotypes.
Abstract: Morgan-s refinement calculus (MRC) is one of the
well-known methods allowing the formality presented in the program
specification to be continued all the way to code. On the other hand,
Object-Z (OZ) is an extension of Z adding support for classes and
objects. There are a number of methods for obtaining code from OZ
specifications that can be categorized into refinement and animation
methods. As far as we know, only one refinement method exists
which refines OZ specifications into code. However, this method
does not have fine-grained refinement rules and thus cannot be
automated. On the other hand, existing animation methods do not
present mapping rules formally and do not support the mapping of
several important constructs of OZ, such as all cases of operation
expressions and most of constructs in global paragraph. In this paper,
with the aim of providing an automatic path from OZ specifications
to code, we propose an approach to map OZ specifications into their
counterparts in MRC in order to use fine-grained refinement rules of
MRC. In this way, having counterparts of our specifications in MRC,
we can refine them into code automatically using MRC tools such as
RED. Other advantages of our work pertain to proposing mapping
rules formally, supporting the mapping of all important constructs of
Object-Z, and considering dynamic instantiation of objects while OZ
itself does not cover this facility.
Abstract: In this paper, we consider the design of pulse shaping
filter using orthogonal Hermite-Rodriguez basis functions. The pulse
shaping filter design problem has been formulated and solved as a
quadratic programming problem with linear inequality constraints.
Compared with the existing approaches reported in the literature, the
use of Hermite-Rodriguez functions offers an effective alternative to
solve the constrained filter synthesis problem. This is demonstrated
through a numerical example which is concerned with the design of
an equalization filter for a digital transmission channel.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: The optimal bisection width of r-dimensional N×
· · ·× N grid is known to be Nr-1 when N is even, but when
N is odd, only approximate values are available. This paper
shows that the exact bisection width of grid is Nr
-1
N-1 when N is odd.