Abstract: Conventional approaches in the implementation of logic programming applications on embedded systems are solely of software nature. As a consequence, a compiler is needed that transforms the initial declarative logic program to its equivalent procedural one, to be programmed to the microprocessor. This approach increases the complexity of the final implementation and reduces the overall system's performance. On the contrary, presenting hardware implementations which are only capable of supporting logic programs prevents their use in applications where logic programs need to be intertwined with traditional procedural ones, for a specific application. We exploit HW/SW codesign methods to present a microprocessor, capable of supporting hybrid applications using both programming approaches. We take advantage of the close relationship between attribute grammar (AG) evaluation and knowledge engineering methods to present a programmable hardware parser that performs logic derivations and combine it with an extension of a conventional RISC microprocessor that performs the unification process to report the success or failure of those derivations. The extended RISC microprocessor is still capable of executing conventional procedural programs, thus hybrid applications can be implemented. The presented implementation is programmable, supports the execution of hybrid applications, increases the performance of logic derivations (experimental analysis yields an approximate 1000% increase in performance) and reduces the complexity of the final implemented code. The proposed hardware design is supported by a proposed extended C-language called C-AG.
Abstract: Global climate change has become the preeminent
threat to human security in the 21st century. From mitigation perspective, this study aims to evaluate the performance of biogas
renewable project under clean development mechanism activities
(namely Korat-Waste-to-Energy) in Thailand and to assess local perceptions towards the significance of climate change mitigation and
sustainability of such project in their community. Questionnaire was
developed based on the national sustainable development criteria and
was distributed among systematically selected households within
project boundaries (n=260). Majority of the respondents strongly agreed with the reduction of odor problems (81%) and air pollution
(76%). However, they were unsure about greenhouse gas reduction from such project and ignorant about the key issues of climate change. A lesson learned suggested that there is a need to further
investigate the possible socio-psychological barriers may significantly shape public perception and understandings of climate
change in the local context.
Abstract: Dynamic of phytoplankton blooms in the Baltic Sea
has been analyzed applying the numerical ecosystem model 3D
CEMBS. The model consists of the hydrodynamic model (POP,
version 2.1) and the ice model (CICE, version 4.0), which are
imposed by the atmospheric data model (DATM7). The 3D
model has an ecosystem module, activated in 2012 in the operational
mode. The ecosystem model consists of 11 main variables: biomass
of small-size phytoplankton and large-size phytoplankton
and cyanobacteria, zooplankton biomass, dissolved and molecular
detritus, dissolved oxygen concentration, as well as concentrations of
nutrients, including: nitrates, ammonia, phosphates and silicates. The
3D-CEMBS model is an effective tool for solving problems related to
phytoplankton blooms dynamic in the Baltic Sea
Abstract: In this work we present some matrix operators named
circulant operators and their action on square matrices. This study on
square matrices provides new insights into the structure of the space
of square matrices. Moreover it can be useful in various fields as in
agents networking on Grid or large-scale distributed self-organizing
grid systems.
Abstract: The purpose of this research is to study motivation
factors and also to study factors relation to job performance to
compare motivation factors under the personal factor classification
such as gender, age, income, educational level, marital status, and
working duration; and to study the relationship between Motivation
Factors and Job Performance with job satisfactions. The sample
groups utilized in this research were 400 Suan Sunandha Rajabhat
University employees. This research is a quantitative research using
questionnaires as research instrument. The statistics applied for data
analysis including percentage, mean, and standard deviation. In
addition, the difference analysis was conducted by t value computing,
one-way analysis of variance and Pearson’s correlation coefficient
computing. The findings of the study results were as follows the
findings showed that the aspects of job promotion and salary were at
the moderate levels. Additionally, the findings also showed that the
motivations that affected the revenue branch chiefs’ job performance
were job security, job accomplishment, policy and management, job
promotion, and interpersonal relation.
Abstract: A low cost Short Message System (SMS) based Home security system equipped with motion, smoke, temperature, humidity and light sensors has been studied and tested. The sensors are controlled by a microprocessor PIC 18F4520 through the SMS having password protection code for the secure operation. The user is able to switch light and the appliances and get instant feedback. Also in cases of emergencies such as fire or robbery the system will send alert message to occupant and relevant civil authorities. The operation of the home security has been tested on Vodafone- Fiji network and Digicel Fiji Network for emergency and feedback responses for 25 samples. The experiment showed that it takes about 8-10s for the security system to respond in case of emergency. It takes about 18-22s for the occupant to switch and monitor lights and appliances and then get feedback depending upon the network traffic.
Abstract: This paper proposes a method that discovers sequential patterns corresponding to user-s interests from sequential data. This method expresses the interests as constraint patterns. The constraint patterns can define relationships among attributes of the items composing the data. The method recursively decomposes the constraint patterns into constraint subpatterns. The method evaluates the constraint subpatterns in order to efficiently discover sequential patterns satisfying the constraint patterns. Also, this paper applies the method to the sequential data composed of stock price indexes and verifies its effectiveness through comparing it with a method without using the constraint patterns.
Abstract: Software and applications are subjected to serious and damaging security threats, these threats are increasing as a result of increased number of potential vulnerabilities. Security testing is an indispensable process to validate software security requirements and to identify security related vulnerabilities. In this paper we analyze and compare different available vulnerabilities testing techniques based on a pre defined criteria using analytical hierarchy process (AHP). We have selected five testing techniques which includes Source code analysis, Fault code injection, Robustness, Stress and Penetration testing techniques. These testing techniques have been evaluated against five criteria which include cost, thoroughness, Ease of use, effectiveness and efficiency. The outcome of the study is helpful for researchers, testers and developers to understand effectiveness of each technique in its respective domain. Also the study helps to compare the inner working of testing techniques against a selected criterion to achieve optimum testing results.
Abstract: Supplementation of palm vitamin E has been reported
to prevent loss of bone density in ovariectomised female rats. The
mechanism by which palm vitamin E exerts these effects is still
unknown. We hypothesized that palm vitamin E may act by
preventing the protein expression changes. Two dimensional poly
acyrilamide gel electrophoresis (2-D PAGE) and PD Quest software
genomic solutions Investigator (proteomics) was used to analyze the
differential protein expression profile in femoral and humeri bones
harvested from three groups of rats; sham-operated rats (SO),
ovariectomised rats (Ovx) and ovariectomised rats supplemented for
2 months with palm vitamin E. The results showed that there were
over 300 valued spot on each of the groups PVE and OVX as
compared to about 200 in SO. Comparison between the differential
protein expression between OVX and PVE groups showed that ten
spots were down –regulated in OVX but up-regulated in PVE. The
ten differential spots were separately named P1-P10. The
identification and understanding of the pathway of the differential
protein expression among the groups is ongoing and may account for
the molecular mechanism through which palm vitamin E exert its
anti-osteoporotic effect.
Abstract: Acute disseminated encephalomyelitis (ADEM) has
been reported to develop after a hymenoptera sting, but its
pathogenesis is not known in detail. Myelin basic protein (MBP)-
specific T cells have been detected in the blood of patients with
ADEM, and a proportion of these patients develop multiple sclerosis
(MS). In an attempt to understand the mechanisms underlying
ADEM, molecular mimicry between hymenoptera venom peptides
and the human immunodominant MBP peptide was scrutinized,
based on the sequence and structural similarities, whether it was the
root of the disease. The results suggest that the three wasp venom
peptides have low sequence homology with the human
immunodominant MBP residues 85-99. Structural similarity analysis
among the three venom peptides and the MS-related HLA-DR2b
(DRA, DRB1*1501)-associated immunodominant MHC
binding/TCR contact residues 88-93, VVHFFK showed that
hyaluronidase residues 7-12, phospholipase A1 residues 98-103, and
antigen 5 residues 109-114 showed a high degree of similarity
83.3%, 100%, and 83.3% respectively. In conclusion, some wasp
venom peptides, particularly phospholipase A1, may potentially act
as the molecular motifs of the human 3HLA-DR2b-associated
immunodominant MBP88-93, and possibly present a mechanism for
induction of wasp sting-associated ADEM.
Abstract: This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS), coupled with the decoy system to perform intrusion prevention. When NIDS detects an activity of intrusions, it will signal a redirection module to redirect all malicious traffics to attack the decoy system instead, and hence the production system is protected and safe. However, in a normal situation, traffic will be simply forwarded to the production system as usual. Furthermore, we assess the performance of the model with various bandwidths, packet sizes and inter-attack intervals (attacking frequencies).
Abstract: India recognizes the personal laws of the various
religious communities that reside in the country. At the same time all
the institutions of the state in India are committed to the value of
secularism. This paper has been developed on the basis of a case
study that indicates the dynamics of religion in the working of the
lower judiciary in India. Majority of the commentary on religion and
the judiciary has focused on debates surrounding the existence and
application of personal laws. This paper, through a case study in the
lower judiciary, makes an attempt to examine whether the interface
between religion and the judiciary goes beyond personal laws.
The first part of this paper explains the history and application of
personal laws in social, political and legal contexts in India. The
second part examines the case study located in two courts of first
instance, following into the third part which provides an analysis of
the empirical evidence. The fourth part focuses on preliminary
observations about why there is a hesitancy to speak about religion in
relation to the working of the judicial system.
Abstract: A topologically oriented neural network is very
efficient for real-time path planning for a mobile robot in changing
environments. When using a recurrent neural network for this
purpose and with the combination of the partial differential equation
of heat transfer and the distributed potential concept of the network,
the problem of obstacle avoidance of trajectory planning for a
moving robot can be efficiently solved. The related dimensional
network represents the state variables and the topology of the robot's
working space. In this paper two approaches to problem solution are
proposed. The first approach relies on the potential distribution of
attraction distributed around the moving target, acting as a unique
local extreme in the net, with the gradient of the state variables
directing the current flow toward the source of the potential heat. The
second approach considers two attractive and repulsive potential
sources to decrease the time of potential distribution. Computer
simulations have been carried out to interrogate the performance of
the proposed approaches.
Abstract: QoS Routing aims to find paths between senders and
receivers satisfying the QoS requirements of the application which
efficiently using the network resources and underlying routing
algorithm to be able to find low-cost paths that satisfy given QoS
constraints. The problem of finding least-cost routing is known to be
NP-hard or complete and some algorithms have been proposed to
find a near optimal solution. But these heuristics or algorithms either
impose relationships among the link metrics to reduce the complexity
of the problem which may limit the general applicability of the
heuristic, or are too costly in terms of execution time to be applicable
to large networks. In this paper, we concentrate an algorithm that
finds a near-optimal solution fast and we named this algorithm as
optimized Delay Constrained Routing (ODCR), which uses an
adaptive path weight function together with an additional constraint
imposed on the path cost, to restrict search space and hence ODCR
finds near optimal solution in much quicker time.
Abstract: Over the past few years, a number of efforts have
been exerted to build parallel processing systems that utilize the idle
power of LAN-s and PC-s available in many homes and corporations.
The main advantage of these approaches is that they provide cheap
parallel processing environments for those who cannot afford the
expenses of supercomputers and parallel processing hardware.
However, most of the solutions provided are not very flexible in the
use of available resources and very difficult to install and setup.
In this paper, a multi-level web-based parallel processing system
(MWPS) is designed (appendix). MWPS is based on the idea of
volunteer computing, very flexible, easy to setup and easy to use.
MWPS allows three types of subscribers: simple volunteers (single
computers), super volunteers (full networks) and end users. All of
these entities are coordinated transparently through a secure web site.
Volunteer nodes provide the required processing power needed by
the system end users. There is no limit on the number of volunteer
nodes, and accordingly the system can grow indefinitely. Both
volunteer and system users must register and subscribe. Once, they
subscribe, each entity is provided with the appropriate MWPS
components. These components are very easy to install.
Super volunteer nodes are provided with special components that
make it possible to delegate some of the load to their inner nodes.
These inner nodes may also delegate some of the load to some other
lower level inner nodes .... and so on. It is the responsibility of the
parent super nodes to coordinate the delegation process and deliver
the results back to the user.
MWPS uses a simple behavior-based scheduler that takes into
consideration the current load and previous behavior of processing
nodes. Nodes that fulfill their contracts within the expected time get a
high degree of trust. Nodes that fail to satisfy their contract get a
lower degree of trust.
MWPS is based on the .NET framework and provides the minimal
level of security expected in distributed processing environments.
Users and processing nodes are fully authenticated. Communications
and messages between nodes are very secure. The system has been
implemented using C#.
MWPS may be used by any group of people or companies to
establish a parallel processing or grid environment.
Abstract: Although a picture can be automatically a graphic
work, but especially in the field of graphics and images based on the
idea of advertising and graphic design will be prepared and
photographers to realize the design using his own knowledge and
skills to help does. It is evident that knowledge of photography,
photographer and designer of the facilities, fields of reaching a
higher level of quality offers. At the same time do not have a graphic
designer is also skilled photographer, but can execute your idea may
delegate to an expert photographer. Using technology and methods in
all fields of photography, graphic art may be applicable. But most of
its application in Iran, in works such as packaging, posters, Bill
Board, advertising, brochures and catalogs are. In this study, we
review how the images and techniques in the chart should be used in
Iranian graphic photo what impact has left. Using photography
techniques and procedures can be designed and helped advance the
goals graphic. Technique could not determine the idea. But what is
important to think about design and photography and his creativity
can flourish as a tool to be effective graphic designer in mind.
Computer software to help it's very promotes creativity techniques
shall graphic designer but also it is as a tool. Using images in various
fields, especially graphic arts and only because it is not being
documented, but applications are beautiful. As to his photographic
style from today is graphics. Graphic works try to affect impacts on
their audience. Hence the photo as an important factor is attention.
The other hand saw the man with the extent of forgiving and
understanding people's image, instead of using the word to your files,
allows large messages and concepts should be sent in the shortest
time. Posters, advertisements, brochures, catalog and packaging
products very diverse agricultural, industrial and food could not be
self-image. Today, the use of graphic images for a big score and the
photos to richen the role graphic design plays a major.
Abstract: In this paper, we evaluate the choice of suitable
quantization characteristics for both the decoder messages and the
received samples in Low Density Parity Check (LDPC) coded
systems using M-QAM (Quadrature Amplitude Modulation)
schemes. The analysis involves the demapper block that provides
initial likelihood values for the decoder, by relating its quantization
strategy of the decoder. A mapping strategy refers to the grouping of
bits within a codeword, where each m-bit group is used to select a
2m-ary signal in accordance with the signal labels. Further we
evaluate the system with mapping strategies like Consecutive-Bit
(CB) and Bit-Reliability (BR). A new demapper version, based on
approximate expressions, is also presented to yield a low complexity
hardware implementation.
Abstract: It has been shown that pH 7,3 and 37 0C are the optimal condition for the growth of E. coli “ASAP". The cells grow well on Glucose, Lactose, D-Mannitol, D-Sorbitol, (+)-Xylose, L- (+)-Arabinose and Dulcitol. No growth has been observed on Sucrose, Inositol, Phenylalanine, and Tryptophan. The strain is sensitive to a range of antibiotics. The present study has demonstrated that E. coli “ASAP" inhibit the growth of S. enterica ATCC #700931 in vitro. The studies on conjugating activity has revealed no conjugant of E. coli “ASAP" with plasmid strains E. coli G35#59 and S. enterica ATCC #700931. On the other hand, the conjugants with low frequencies were obtained from E. coli “ASAP" with E. coli G35#61, and E. coli “ASAP" with randomly chosen isolate from healthy human gut microflora: E. coli E6. The results of present study have demonstrated improvements in gut microflora condition of patients with different diseases after the administration of “ASAP"
Abstract: Multiparty voice over IP (MVoIP) systems allows a group of people to freely communicate each other via the internet, which have many applications such as online gaming, teleconferencing, online stock trading etc. Peertalk is a peer to peer multiparty voice over IP system (MVoIP) which is more feasible than existing approaches such as p2p overlay multicast and coupled distributed processing. Since the stream mixing and distribution are done by the peers, it is vulnerable to major security threats like nodes misbehavior, eavesdropping, Sybil attacks, Denial of Service (DoS), call tampering, Man in the Middle attacks etc. To thwart the security threats, a security framework called PEERTS (PEEred Reputed Trustworthy System for peertalk) is implemented so that efficient and secure communication can be carried out between peers.
Abstract: The distance protection mainly the impedance relay which is considered as the main protection for transmission lines can be subjected to impedance measurement error which is, mainly, due to the fault resistance and to the power fluctuation. Thus, the impedance relay may not operate for a short circuit at the far end of the protected line (case of the under reach) or operates for a fault beyond its protected zone (case of overreach). In this paper, an approach to fault detection by a distance protection, which distinguishes between the faulty conditions and the effect of overload operation mode, has been developed. This approach is based on the symmetrical components; mainly the negative sequence, and it is taking into account both the effect of fault resistance and the overload situation which both have an effect upon the reliability of the protection in terms of dependability for the former and security for the latter.