Abstract: This paper objects to extend Jon Kleinberg-s research. He introduced the structure of small-world in a grid and shows with a greedy algorithm using only local information able to find route between source and target in delivery time O(log2n). His fundamental model for distributed system uses a two-dimensional grid with longrange random links added between any two node u and v with a probability proportional to distance d(u,v)-2. We propose with an additional information of the long link nearby, we can find the shorter path. We apply the ant colony system as a messenger distributed their pheromone, the long-link details, in surrounding area. The subsequence forwarding decision has more option to move to, select among local neighbors or send to node has long link closer to its target. Our experiment results sustain our approach, the average routing time by Color Pheromone faster than greedy method.
Abstract: B2E portals represent a new class of web-based
information technologies which many organisations are introducing
in recent years to stay in touch with their distributed workforces and
enable them to perform value added activities for organisations.
However, actual usage of these emerging systems (measured using
suitable instruments) has not been reported in the contemporary
scholarly literature. We argue that many of the instruments to
measure usage of various types of IT-enabled information systems
are not directly applicable for B2E portals because they were
developed for the context of traditional mainframe and PC-based
information systems. It is therefore important to develop a new
instrument for web-based portal technologies aimed at employees. In
this article, we report on the development and initial qualitative
evaluation of an instrument that seeks to operationaise a set of
independent factors affecting the usage of portals by employees. The
proposed instrument is useful to IT/e-commerce researchers and
practitioners alike as it enhances their confidence in predicting
employee usage of portals in organisations.
Abstract: Hydrocyclones flow field study is conducted by performing a parametric study. Effect of cone angle on deoiling hydrocyclones flow behaviour is studied in this research. Flow field of hydrocyclone is obtained by three-dimensional simulations with OpenFOAM code. Because of anisotropic behaviour of flow inside hydrocyclones LES is a suitable method to predict the flow field since it resolves large scales and model isotropic small scales. Large eddy simulation is used to predict the flow behavior of three different cone angles. Differences in tangential velocity and pressure distribution are reported in some figures.
Abstract: Developments in communication technologies
especially in wireless have enabled the progress of low-cost and lowpower
wireless sensor networks (WSNs). The features of such WSN
are holding minimal energy, weak computational capabilities,
wireless communication and an open-medium nature where sensors
are deployed. WSN is underpinned by application driven such as
military applications, the health sector, etc. Due to the intrinsic nature
of the network and application scenario, WSNs are vulnerable to
many attacks externally and internally. In this paper we have focused
on the types of internal attacks of WSNs based on OSI model and
discussed some security requirements, characterizers and challenges
of WSNs, by which to contribute to the WSN-s security research.
Abstract: Authentication plays a vital role in many secure
systems. Most of these systems require user to log in with his or her
secret password or pass phrase before entering it. This is to ensure all
the valuables information is kept confidential guaranteeing also its
integrity and availability. However, to achieve this goal, users are
required to memorize high entropy passwords or pass phrases.
Unfortunately, this sometimes causes difficulty for user to remember
meaningless strings of data. This paper presents a new scheme which
assigns a weight to each personal question given to the user in
revealing the encrypted secrets or password. Concentration of this
scheme is to offer fault tolerance to users by allowing them to forget
the specific password to a subset of questions and still recover the
secret and achieve successful authentication. Comparison on level of
security for weight-based and weightless secret recovery scheme is
also discussed. The paper concludes with the few areas that requires
more investigation in this research.
Abstract: Visfatin and apelin are two new adipokines that recently gained a special interest in diabetes research. This study was conducted to study the interplay between these two adipokines and their correlation with other inflammatory and biochemical parameters in type 2 diabetic (T2D) postmenopausal women with CAD. Visfatin and apelin were measured by enzyme-linked immunoassay (ELISA). Visfatin was found to be significantly higher in the following groups: T2D patients without CAD, non-obese and obese T2D patients with CAD when compared to control group. Apelin was found to be significantly lower in non-obese and obese T2D patients with CAD when compared to control group. Visfatin and apelin were found to be significantly associated with each other and with other biochemical parameters. The current study provides evidence for the interplay between visfatin and apelin through the inflammatory milieu characteristic of T2D and their possible role in the pathogenesis of CAD complication of T2D.
Abstract: The assessment of the efficacy of devised Mobile-
Assisted Instructional Modes in Mobile Learning was the focus of
this research. The study adopted pre-test, post-test, control group
quasi-experimental design. Research instruments were developed,
validated and used for collecting data. Findings revealed that the
students exposed to Mobile Task Based Learning Mode (MTBLM) in
using Mobile-Assisted Instruction (MAI) performed significantly
better. The implication of these findings is that, the Audio tutorial
and Practice Mode (ATPM) (Stimulus instruments) of MAI had been
found better over the other modes used in the study.
Abstract: The simulation of external aerodynamics is one of the most challenging and important automotive CFD applications. With the rapid developments of digital computers, CFD is used as a practical tool in modern fluid dynamics research. It integrates fluid mechanics disciplines, mathematics and computer science. In this study, two different types of simulations were made, one for the flow around a simplified high speed passenger car with a rear-spoiler and the other for the flow without a rear-spoiler. The standard k-ε model is selected to numerically simulate the external flow field of the simplified Camry model with or without a rear-spoiler. Through an analysis of the simulation results, a new rear spoiler is designed and it shows a mild reduction of the vehicle aerodynamics drag. This leads to less vehicle fuel consumption on the road.
Abstract: The Emergency Department of a medical center in
Taiwan cooperated to conduct the research. A predictive model of
triage system is contracted from the contract procedure, selection of
parameters to sample screening. 2,000 pieces of data needed for the
patients is chosen randomly by the computer. After three
categorizations of data mining (Multi-group Discriminant Analysis,
Multinomial Logistic Regression, Back-propagation Neural
Networks), it is found that Back-propagation Neural Networks can
best distinguish the patients- extent of emergency, and the accuracy
rate can reach to as high as 95.1%. The Back-propagation Neural
Networks that has the highest accuracy rate is simulated into the triage
acuity expert system in this research. Data mining applied to the
predictive model of the triage acuity expert system can be updated
regularly for both the improvement of the system and for education
training, and will not be affected by subjective factors.
Abstract: Opinion extraction about products from customer
reviews is becoming an interesting area of research. Customer
reviews about products are nowadays available from blogs and
review sites. Also tools are being developed for extraction of opinion
from these reviews to help the user as well merchants to track the
most suitable choice of product. Therefore efficient method and
techniques are needed to extract opinions from review and blogs. As
reviews of products mostly contains discussion about the features,
functions and services, therefore, efficient techniques are required to
extract user comments about the desired features, functions and
services. In this paper we have proposed a novel idea to find features
of product from user review in an efficient way. Our focus in this
paper is to get the features and opinion-oriented words about
products from text through auxiliary verbs (AV) {is, was, are, were,
has, have, had}. From the results of our experiments we found that
82% of features and 85% of opinion-oriented sentences include AVs.
Thus these AVs are good indicators of features and opinion
orientation in customer reviews.
Abstract: Hidden Markov Model (HMM) is a stochastic method
which has been used in various signal processing and character
recognition. This study proposes to use HMM to recognize Javanese
characters from a number of different handwritings, whereby HMM
is used to optimize the number of state and feature extraction. An
85.7 % accuracy is obtained as the best result in 16-stated vertical
model using pure HMM. This initial result is satisfactory for
prompting further research.
Abstract: This article is devoted to the analysis of results of
sociological researches carried out by authors directed on studying of
opinion of representatives of small, medium and big business on
formation of the Customs Union, Common Free Market Zone with
participation of Kazakhstan, Russia and Belarus.
It-s forecasted that companies, their branches will interpenetrate
with registration and moving their businesses to regions with more
beneficial conditions. They say that in Kazakhstan there are more
profitable geo-strategic operating environment for business and lower
taxes. Russia using this opportunity will create new conditions for
expansion into other countries of Central Asia and China. Opinions
of participants of questionnaire and expert poll different in estimation
of value of these two integration mechanisms since market segments
on the one hand extend, but also on the other hand - loss of exclusive
influence in certain fields of activity.
Abstract: The purpose of this study is to determine the
circumstances affecting elementary school students in their family
and school lives and what kind of emotions children may feel
because of these circumstances. The study was carried out according
to the survey model. Four Turkish elementary schools provided 123
fourth grade students for participation in the study. The study-s data
were collected by using worksheets for the activity titled “Important
Days in Our Lives", which was part of the Elementary School Social
Sciences Course 4th Grade Education Program. Data analysis was
carried out according to the content analysis technique used in
qualitative research. The study detected that circumstances of their
family and school lives caused children to feel emotions such as
happiness, sadness, anger, fear and jealousy. The circumstances and
the emotions caused by these circumstances were analyzed according
to gender and interpreted by presenting them with their frequencies.
Abstract: These Nowadays the explosion of bombs or explosive
materials such as gas and oil near or inside the buildings cause some
losses in installations and building components. This has made the
engineers to make the buildings and their components resistance
against the effects of explosion. These activities lead to provide
regulations and different methods. The above regulations are mostly
focused on the explosion effects resulting from the vehicles around
the buildings. Therefore, the explosion resulting from the vehicles
outside the buildings will be studied in this research.
In the present study, the main goals are to investigate the
explosion load effects on the structures located on the piles with the
specific quantity of plasticity and observing the permissible response
of these structures. The concentrated mass system and the spring with
two degree of freedom will be used to study the structural system.
Abstract: The Chinese Postman Problem (CPP) is one of the
classical problems in graph theory and is applicable in a wide range
of fields. With the rapid development of hybrid systems and model
based testing, Chinese Postman Problem with Time Dependent Travel
Times (CPPTDT) becomes more realistic than the classical problems.
In the literature, we have proposed the first integer programming
formulation for the CPPTDT problem, namely, circuit formulation,
based on which some polyhedral results are investigated and a cutting
plane algorithm is also designed. However, there exists a main drawback:
the circuit formulation is only available for solving the special
instances with all circuits passing through the origin. Therefore, this
paper proposes a new integer programming formulation for solving
all the general instances of CPPTDT. Moreover, the size of the circuit
formulation is too large, which is reduced dramatically here. Thus, it
is possible to design more efficient algorithm for solving the CPPTDT
in the future research.
Abstract: Lossless compression schemes with secure
transmission play a key role in telemedicine applications that helps in
accurate diagnosis and research. Traditional cryptographic algorithms
for data security are not fast enough to process vast amount of data.
Hence a novel Secured lossless compression approach proposed in
this paper is based on reversible integer wavelet transform, EZW
algorithm, new modified runlength coding for character
representation and selective bit scrambling. The use of the lifting
scheme allows generating truly lossless integer-to-integer wavelet
transforms. Images are compressed/decompressed by well-known
EZW algorithm. The proposed modified runlength coding greatly
improves the compression performance and also increases the
security level. This work employs scrambling method which is fast,
simple to implement and it provides security. Lossless compression
ratios and distortion performance of this proposed method are found
to be better than other lossless techniques.
Abstract: The main purpose of the research is to address the role of psychological harassment behaviors (mobbing) to which employees are exposed and personality characteristics over work alienation. Research population was composed of the employees of Provincial Special Administration. A survey with four sections was created to measure variables and reach out the basic goals of the research. Correlation and step-wise regression analyses were performed to investigate the separate and overall effects of sub-dimensions of psychological harassment behaviors and personality characteristic on work alienation of employees. Correlation analysis revealed significant but weak relationships between work alienation and psychological harassment and personality characteristics. Step-wise regression analysis revealed also significant relationships between work alienation variable and assault to personality, direct negative behaviors (sub dimensions of mobbing) and openness (sub-dimension of personality characteristics). Each variable was introduced into the model step by step to investigate the effects of significant variables in explaining the variations in work alienation. While the explanation ratio of the first model was 13%, the last model including three variables had an explanation ratio of 24%.
Abstract: This research intends to introduce a new usage of Artificial Intelligent (AI) approaches in Stepping Stone Detection (SSD) fields of research. By using Self-Organizing Map (SOM) approaches as the engine, through the experiment, it is shown that SOM has the capability to detect the number of connection chains that involved in a stepping stones. Realizing that by counting the number of connection chain is one of the important steps of stepping stone detection and it become the research focus currently, this research has chosen SOM as the AI techniques because of its capabilities. Through the experiment, it is shown that SOM can detect the number of involved connection chains in Network-based Stepping Stone Detection (NSSD).
Abstract: 'Secure routing in Mobile Ad hoc networks' and
'Internet connectivity to Mobile Ad hoc networks' have been dealt
separately in the past research. This paper proposes a light weight
solution for secure routing in integrated Mobile Ad hoc Network
(MANET)-Internet. The proposed framework ensures mutual
authentication of Mobile Node (MN), Foreign Agent (FA) and Home
Agent (HA) to avoid various attacks on global connectivity and
employs light weight hop-by-hop authentication and end-to-end
integrity to protect the network from most of the potential security
attacks. The framework also uses dynamic security monitoring
mechanism to monitor the misbehavior of internal nodes. Security
and performance analysis show that our proposed framework
achieves good security while keeping the overhead and latency
minimal.
Abstract: Missing data is a persistent problem in almost all
areas of empirical research. The missing data must be treated very
carefully, as data plays a fundamental role in every analysis.
Improper treatment can distort the analysis or generate biased results.
In this paper, we compare and contrast various imputation techniques
on missing data sets and make an empirical evaluation of these
methods so as to construct quality software models. Our empirical
study is based on NASA-s two public dataset. KC4 and KC1. The
actual data sets of 125 cases and 2107 cases respectively, without
any missing values were considered. The data set is used to create
Missing at Random (MAR) data Listwise Deletion(LD), Mean
Substitution(MS), Interpolation, Regression with an error term and
Expectation-Maximization (EM) approaches were used to compare
the effects of the various techniques.