Abstract: Global Software Development (GSD) projects are
passing through different boundaries of a company, country and even
in other continents where time zone differs between both sites.
Beside many benefits of such development, research declared plenty
of negative impacts on these GSD projects. It is important to
understand problems which may lie during the execution of GSD
project with different time zones. This research project discussed and
provided different issues related to time delays in GSD projects. In
this paper, authors investigated some of the time delay factors which
usually lie in GSD projects with different time zones. This
investigation is done through systematic review of literature.
Furthermore, the practices to overcome these delay factors which
have already been reported in literature and GSD organizations are
also explored through literature survey and case studies.
Abstract: We present our ongoing work on the development
of a new quadrotor aerial vehicle which has a tilt-wing
mechanism. The vehicle is capable of take-off/landing in vertical flight mode (VTOL) and flying over long distances in horizontal flight mode. Full dynamic model of the vehicle is derived using
Newton-Euler formulation. Linear and nonlinear controllers for
the stabilization of attitude of the vehicle and control of its
altitude have been designed and implemented via simulations. In particular, an LQR controller has been shown to be quite
effective in the vertical flight mode for all possible yaw angles. A sliding mode controller (SMC) with recursive nature has also
been proposed to stabilize the vehicle-s attitude and altitude. Simulation results show that proposed controllers provide
satisfactory performance in achieving desired maneuvers.
Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: Using plug flow model in conjunction with
experimental solute concentration profiles, overall volumetric mass
transfer coefficient based on continuous phase (Koca), in a packed
liquid-liquid extraction column has been optimized. Number of 12
experiments has been done using standard system of water/acid
acetic/toluene in a 6 cm diameter, 120 cm height column. Thorough
consideration of influencing parameters we intended to correlate
dimensionless parameters in term of overall Sherwood number which
has an acceptable average error of about 15.8%.
Abstract: The architecture of Safavid Dynasty can be considered the epitome of Iranian architectural beauty. Safavid dynasty (1501- 1722 AC) along with Ottoman in Turkey and Mughal Empire in India were the three great Islamic nations of their time (1500 AC) often known as the last Islamic countries with international authority up to the 20th Century. This era approximately coincide with Renaissance in Europe. In this era, large European countries begin amassing power thanks to significant scientific, cultural and religious revolutions of that time and colonizing nations such as England, Spain and Portugal began to influence international trends with in an increasing while other non-industrial nations diminished. The main objective of this paper is to give a typological overview of the development of decoration and ornament in the architecture of Safafid Dynasty in Iran. It is expected that it can start a wider discussion to enrich this nation-s heritage and contribute to the development of Islamic ornament in general.
Abstract: The amount of the information being churned out by the field of biology has jumped manifold and now requires the extensive use of computer techniques for the management of this information. The predominance of biological information such as protein sequence similarity in the biological information sea is key information for detecting protein evolutionary relationship. Protein sequence similarity typically implies homology, which in turn may imply structural and functional similarities. In this work, we propose, a learning method for detecting remote protein homology. The proposed method uses a transformation that converts protein sequence into fixed-dimensional representative feature vectors. Each feature vector records the sensitivity of a protein sequence to a set of amino acids substrings generated from the protein sequences of interest. These features are then used in conjunction with support vector machines for the detection of the protein remote homology. The proposed method is tested and evaluated on two different benchmark protein datasets and it-s able to deliver improvements over most of the existing homology detection methods.
Abstract: In this paper, The T-G-action topology on a set acted
on by a fuzzy T-neighborhood (T-neighborhood, for short) group is
defined as a final T-neighborhood topology with respect to a set of
maps. We mainly prove that this topology is a T-regular Tneighborhood
topology.
Abstract: Composite steel shear wall is a lateral load resisting system which consists of a steel plate with concrete wall attached to one or both sides to prevent it from elastic buckling. The composite behavior is ensured by utilizing high-strength bolts. This paper investigates the effect of distance between bolts, and for this purpose 14 one-story one-bay specimens with various bolts spacing were modeled by finite element code which is developed by the authors. To verify the model, numerical results were compared with a valid experiment which illustrate proper agreement. Results depict increasing the distance between bolts would improve the seismic ever, this increase must be limited, because of large distances will cause widespread buckling of the steel plate in free subpanels between bolts and would result in no improvement. By comparing the results in elastic region, it was observed initial stiffness is not affected by changing the distance.
Abstract: According to historical legend, after the revelation of the holy Qur'an, which gave the hijab compulsory and women were required to cover the head and body with a handkerchief, and the general form of clothing in her veil, Muslim women have begun to comply with this worthy tradition. This article discusses the history of the rise and spread of the hijab and its types. And here is described in detail types of hijab and its intended value, style hijab in different regions. Now wearing the hijab, hijab in general the problem is important not only in the Arab world, but also in the world.
Abstract: Memory forensic is important in digital investigation.
The forensic is based on the data stored in physical memory that
involve memory management and processing time. However, the
current forensic tools do not consider the efficiency in terms of
storage management and the processing time. This paper shows the
high redundancy of data found in the physical memory that cause
inefficiency in processing time and memory management. The
experiment is done using Borland C compiler on Windows XP with
512 MB of physical memory.
Abstract: REY area has been located in Tehran Province and several archaeological ruins of this area indicate that the settlement in this area has been started since several thousand years ago. In this paper, the main investigation items consist of analysis of oil components and groundwater quality inside the wells. By finding the contents of oil in the well, it is possible to find out the pollution source by comparing the oil contents of well with other oil products that are used inside and outside of the oil farm. Investigation items consist of analysis of BTEX (Benzene, Toluene, Ethyl-benzene, Xylene), Gas chromatographic distillation characteristics, Water content, Density, Sulfur content, Lead content, Atmospheric distillation, MTBE(Methyl tertiary butyl ether). Analysis of polluting oil components showed that except MW(Monitoring Well)10 and MW 15 that oil with slightly heavy components was detected in them; with a high possibility the polluting oil is light oil.
Abstract: Added stresses due to adjacent structure should be
considered in foundation design and stress control in soil under the structure. This case is considered less than other cases in design and
calculation whereas stresses in implementation are greater than analytical stress.
Structure load are transmitted to earth by foundation and role of foundation is propagation of load on the continuous and half extreme
soil. This act cause that, present stresses lessen to allowable strength
of soil. Some researchers such as Boussinesq and westergaurd by
using of some assumption studied on this issue, theorically. Target of
this paper is study and evaluation of added stresses under structure
due to adjacent structure. For this purpose, by using of assumption, theoric relation and numeral methods, effects of adjacent structure
with 4 to 10 storeys on the main structure with 4 storeys are studied
and effect of parameters and sensitivity of them are evaluated.
Abstract: Approximate tandem repeats in a genomic sequence are
two or more contiguous, similar copies of a pattern of nucleotides.
They are used in DNA mapping, studying molecular evolution
mechanisms, forensic analysis and research in diagnosis of inherited
diseases. All their functions are still investigated and not well
defined, but increasing biological databases together with tools for
identification of these repeats may lead to discovery of their specific
role or correlation with particular features. This paper presents a new
approach for finding approximate tandem repeats in a given sequence,
where the similarity between consecutive repeats is measured using
the Hamming distance. It is an enhancement of a method for finding
exact tandem repeats in DNA sequences based on the Burrows-
Wheeler transform.
Abstract: In the current age, retrieval of relevant information
from massive amount of data is a challenging job. Over the years,
precise and relevant retrieval of information has attained high
significance. There is a growing need in the market to build systems,
which can retrieve multimedia information that precisely meets the
user's current needs. In this paper, we have introduced a framework
for refining query results before showing it to the user, using ambient
intelligence, user profile, group profile, user location, time, day, user
device type and extracted features. A prototypic tool was also
developed to demonstrate the efficiency of the proposed approach.
Abstract: all of religions free towards society in Kazakhstan. Considering that Islam is more widespread religion in the region, Islamic industry is developing sector of Economy. There are some new sectors of Halal (Islamic) industry, which have importance for state developing on the whole. One of the youngest sectors of Halal industry is Islamic tourism, which became an object of disputes and led to dilemma, such as Islamic tourism is a result of a Religious revival and Islamic tourism is a new trend of Tourism. The paper was written under the research project “Islam in modern Kazakhstan: the nature and outcome of the religious revival".
Abstract: On-line handwritten scripts are usually dealt with pen tip traces from pen-down to pen-up positions. Time evaluation of the pen coordinates is also considered along with trajectory information. However, the data obtained needs a lot of preprocessing including filtering, smoothing, slant removing and size normalization before recognition process. Instead of doing such lengthy preprocessing, this paper presents a simple approach to extract the useful character information. This work evaluates the use of the counter- propagation neural network (CPN) and presents feature extraction mechanism in full detail to work with on-line handwriting recognition. The obtained recognition rates were 60% to 94% using the CPN for different sets of character samples. This paper also describes a performance study in which a recognition mechanism with multiple thresholds is evaluated for counter-propagation architecture. The results indicate that the application of multiple thresholds has significant effect on recognition mechanism. The method is applicable for off-line character recognition as well. The technique is tested for upper-case English alphabets for a number of different styles from different peoples.
Abstract: Most real world systems express themselves formally
as a set of nonlinear algebraic equations. As applications grow, the
size and complexity of these equations also increase. In this work, we
highlight the key concepts in using the homotopy analysis method
as a methodology used to construct efficient iteration formulas for
nonlinear equations solving. The proposed method is experimentally
characterized according to a set of determined parameters which
affect the systems. The experimental results show the potential and
limitations of the new method and imply directions for future work.
Abstract: In this paper, Fabless Prototyping Methodology is
introduced for the design and analysis of MEMS devices.
Conventionally Finite Element Analysis (FEA) is performed before
system level simulation. In our proposed methodology, system level
simulation is performed earlier than FEA as it is computationally less
extensive and low cost. System level simulations are based on
equivalent behavioral models of MEMS device. Electrostatic
actuation based MEMS Microgripper is chosen as case study to
implement this methodology. This paper addresses the behavioral
model development and simulation of actuator part of an
electrostatically actuated Microgripper. Simulation results show that
the actuator part of Microgripper works efficiently for a voltage range
of 0-45V with the corresponding jaw displacement of 0-4.5425μm.
With some minor changes in design, this range can be enhanced to
15μm at 85V.
Abstract: To achieve reliable solutions, today-s numerical and
experimental activities need developing more accurate methods and
utilizing expensive facilities, respectfully in microchannels. The analytical
study can be considered as an alternative approach to alleviate
the preceding difficulties. Among the analytical solutions, those with
high robustness and low complexities are certainly more attractive.
The perturbation theory has been used by many researchers to analyze
microflows. In present work, a compressible microflow with constant
heat flux boundary condition is analyzed. The flow is assumed to be
fully developed and steady. The Mach and Reynolds numbers are also
assumed to be very small. For this case, the creeping phenomenon
may have some effect on the velocity profile. To achieve robustness
solution it is assumed that the flow is quasi-isothermal. In this study,
the creeping term which appears in the slip boundary condition
is formulated by different mathematical formulas. The difference
between this work and the previous ones is that the creeping term
is taken into account and presented in non-dimensionalized form.
The results obtained from perturbation theory are presented based
on four non-dimensionalized parameters including the Reynolds,
Mach, Prandtl and Brinkman numbers. The axial velocity, normal
velocity and pressure profiles are obtained. Solutions for velocities
and pressure for two cases with different Br numbers are compared
with each other and the results show that the effect of creeping
phenomenon on the velocity profile becomes more important when
Br number is less than O(ε).
Abstract: In this study, single nozzle method used for
electrospinning technique which composite polymer solution with
cellulose nanowiskers (CNW) was treated by ultrasonic sonificator
have been compared with coaxial (double) nozzle method, in terms of
mechanical, thermal and morphological properties of composite
nanofiber. The effect of water content in composite polymer solution
on properties of nanofiber has also been examined. It has been seen
that single nozzle method which polymer solution does not contain
water has better results than that of coaxial method, in terms of
mechanical, thermal and morphological properties of nanofiber.
However, it is necessary to make an optimization study on setting
condition of ultrasonic treatment to get better dispersion of CNW in
composite nanofiber and to get better mechanical and thermal
properties