Abstract: Mechanical interaction between endothelial cells (ECs) and the extracellular matrix (or collagen gel) is known to influence the sprouting response of endothelial cells during angiogenesis. This influence is believed to impact on the capability of endothelial cells to sense soluble chemical cues. Quantitative analysis of endothelial-cell-mediated displacement of the collagen gel provides a means to explore this mechanical interaction. Existing analysis in this context is generally limited to 2D settings. In this paper, we investigate the mechanical interaction between endothelial cells and the extracellular matrix in terms of the endothelial-cellmediated displacement of the collagen gel in both 2D and 3D. Digital image correlation and Digital volume correlation are applied on confocal reflectance image stacks to analyze cell-mediated displacement of the gel. The skeleton of the sprout is extracted from phase contrast images and superimposed on the displacement field to further investigate the link between the development of the sprout and the displacement of the gel.
Abstract: The investigating and assessing the effects of
relaxation training on the levels of state anxiety concerning first year
female nursing students at their initial experience in clinical setting.
This research is a quasi experimental study that was carried out in
nursing and midwifery faculty of Tehran university of medical
sciences .The sample of research consists 60 first term female
nursing students were selected through convenience and random
sampling. 30 of them were the experimental group and 30 of them
were in control group. The Instruments of data-collection has been a
questionnaire which consists of 3 parts. The first part includes 10
questions about demographic characteristics .the second part includes
20 question about anxiety (test 'Spielberg' ). The 3rd part includes
physiological indicators of anxiety (BP, P, R, body temperature). The
statistical tests included t-test and and fisher test, Data were
analyzed by SPSS software.
Abstract: Stable nonzero populations without random deaths
caused by the Verhulst factor (Verhulst-free) are a rarity. Majority
either grow without bounds or die of excessive harmful mutations.
To delay the accumulation of bad genes or diseases, a new
environmental parameter Γ is introduced in the simulation. Current
results demonstrate that stability may be achieved by setting Γ = 0.1.
These steady states approach a maximum size that scales inversely
with reproduction age.
Abstract: Network Management Systems have played a great important role in information systems. Management is very important and essential in any fields. There are many managements such as configuration management, fault management, performance management, security management, accounting management and etc. Among them, configuration, fault and security management is more important than others. Because these are essential and useful in any fields. Configuration management is to monitor and maintain the whole system or LAN. Fault management is to detect and troubleshoot the system. Security management is to control the whole system. This paper intends to increase the network management functionalities including configuration management, fault management and security management. In configuration management system, this paper specially can support the USB ports and devices to detect and read devices configuration and solve to detect hardware port and software ports. In security management system, this paper can provide the security feature for the user account setting and user management and proxy server feature. And all of the history of the security such as user account and proxy server history are kept in the java standard serializable file. So the user can view the history of the security and proxy server anytime. If the user uses this system, the user can ping the clients from the network and the user can view the result of the message in fault management system. And this system also provides to check the network card and can show the NIC card setting. This system is used RMI (Remote Method Invocation) and JNI (Java Native Interface) technology. This paper is to implement the client/server network management system using Java 2 Standard Edition (J2SE). This system can provide more than 10 clients. And then this paper intends to show data or message structure of client/server and how to work using TCP/IP protocol.
Abstract: This paper includes a review of three physics simulation packages that can be used to provide researchers with a virtual ground for modeling, implementing and simulating complex models, as well as testing their control methods with less cost and time of development. The inverted pendulum model was used as a test bed for comparing ODE, DANCE and Webots, while Linear State Feedback was used to control its behavior. The packages were compared with respect to model creation, solving systems of differential equation, data storage, setting system variables, control the experiment and ease of use. The purpose of this paper is to give an overview about our experience with these environments and to demonstrate some of the benefits and drawbacks involved in practice for each package.
Abstract: Since 1984 many schemes have been proposed for
digital signature protocol, among them those that based on discrete
log and factorizations. However a new identification scheme based
on iterated function (IFS) systems are proposed and proved to be
more efficient. In this study the proposed identification scheme is
transformed into a digital signature scheme by using a one way hash
function. It is a generalization of the GQ signature schemes. The
attractor of the IFS is used to obtain public key from a private one,
and in the encryption and decryption of a hash function. Our aim is
to provide techniques and tools which may be useful towards
developing cryptographic protocols. Comparisons between the
proposed scheme and fractal digital signature scheme based on RSA
setting, as well as, with the conventional Guillou-Quisquater
signature, and RSA signature schemes is performed to prove that, the
proposed scheme is efficient and with high performance.
Abstract: To investigate the correspondence of theory and
practice, a successfully implemented Knowledge Management
System (KMS) is explored through the lens of Alavi and Leidner-s
proposed KMS framework for the analysis of an information system
in knowledge management (Framework-AISKM). The applied KMS
system was designed to manage curricular knowledge in a distributed
university environment. The motivation for the KMS is discussed
along with the types of knowledge necessary in an academic setting.
Elements of the KMS involved in all phases of capturing and
disseminating knowledge are described. As the KMS matures the
resulting data stores form the precursor to and the potential for
knowledge mining. The findings from this exploratory study indicate
substantial correspondence between the successful KMS and the
theory-based framework providing provisional confirmation for the
framework while suggesting factors that contributed to the system-s
success. Avenues for future work are described.
Abstract: With the advent of inexpensive 32 bit floating point digital signal processor-s availability in market, many computationally intensive algorithms such as Kalman filter becomes feasible to implement in real time. Dynamic simulation of a self excited DC motor using second order state variable model and implementation of Kalman Filter in a floating point DSP TMS320C6713 is presented in this paper with an objective to introduce and implement such an algorithm, for beginners. A fractional hp DC motor is simulated in both Matlab® and DSP and the results are included. A step by step approach for simulation of DC motor in Matlab® and “C" routines in CC Studio® is also given. CC studio® project file details and environmental setting requirements are addressed. This tutorial can be used with 6713 DSK, which is based on floating point DSP and CC Studio either in hardware mode or in simulation mode.
Abstract: In this paper, an estimation accuracy of multiple moving
talker tracking using a microphone array is improved. The tracking
can be achieved by the adaptive method in which two algorithms are integrated, namely, the PAST (Projection Approximation Subspace
Tracking) algorithm and the IPLS (Interior Point Least Square) algorithm. When either talker begins to speak again after a silent
period, an appropriate feasible region for an evaluation function of
the IPLS algorithm might not be set. Then, the tracking fails due to the incorrect updating. Therefore, if an increment of the number of
active talkers is detected, the feasible region must be reset. Then, a low cost realization is required for the high speed tracking and a high
accuracy realization is desired for the precise tracking. In this paper,
the directions roughly estimated using the delayed-sum-array method
are used for the resetting. Several results of experiments performed in
an actual room environment show the effectiveness of the proposed method.
Abstract: With the globalized production and logistics
environment, the need for reducing the product development interval
and lead time, having a faster response to orders, conforming to quality
standards, fair tracking, and boosting information exchanging
activities with customers and partners, and coping with changes in the
management environment, manufacturers are in dire need of an
information management system in their manufacturing environments.
There are lots of information systems that have been designed to
manage the condition or operation of equipment in the field but
existing systems have a decentralized architecture, which is not
unified. Also, these systems cannot effectively handle the status data
extraction process upon encountering a problem related to protocols or
changes in the equipment or the setting. In this regard, this paper will
introduce a system for processing and saving the status info of
production equipment, which uses standard representation formats, to
enable flexible responses to and support for variables in the field
equipment. This system can be used for a variety of manufacturing and
equipment settings and is capable of interacting with higher-tier
systems such as MES.
Abstract: In this work, we perform numerical simulation of fluid
mixing in a floor-grooved micro-channel with wavy sidewalls which
may impose perturbation on the helical flow induced by the slanted
grooves on the channel floor. The perturbation is caused by separation
vortices in the recesses of the wavy-walled channel as the Reynolds
number is large enough. The results show that the effects of the wavy
sidewalls of the present micromixer on the enhancement of fluid
mixing increase with the increase of Reynolds number. The degree of
mixing increases with the increase of the corrugation angle, until the
angle is greater than 45 degrees. Besides, the pumping pressure of the
micromixer increases with the increase of the corrugation angle
monotonically. Therefore, we would suggest setting the corrugation
angle of the wavy sidewalls to be 45 degrees.
Abstract: This paper seeks to explore the actual classroom
setting, to examine its role for students- learning, and attitude in the
class. It presents a theoretical approach of the classroom as system to
be explored and examines the concrete reality of Greek secondary
education students, under the light of the above approach. Based on
the findings of a quantitative and qualitative research, authors
propose a rather ontological approach of the classroom and underline
what the key-elements for such approach should be. The paper
explores extensively the theoretical dimensions for the change of
paradigm required and addresses the new issues to be considered.
Abstract: In this paper we suggest a method for setting
electronic credits for the customers. In this method banks and
market-sites help each other to make doing large shopping through
internet so easy. By developing this system, the people who have less
money to buy most of the things they want, become able to buy all of
them just through a credit. This credit is given by market-sites
through a banking control on it. The method suggested can stop
being imprisoned because of banking debts.
Abstract: A road pricing game is a game where various stakeholders and/or regions with different (and usually conflicting) objectives compete for toll setting in a given transportation network to satisfy their individual objectives. We investigate some classical game theoretical solution concepts for the road pricing game. We establish results for the road pricing game so that stakeholders and/or regions playing such a game will beforehand know what is obtainable. This will save time and argument, and above all, get rid of the feelings of unfairness among the competing actors and road users. Among the classical solution concepts we investigate is Nash equilibrium. In particular, we show that no pure Nash equilibrium exists among the actors, and further illustrate that even “mixed Nash equilibrium" may not be achievable in the road pricing game. The paper also demonstrates the type of coalitions that are not only reachable, but also stable and profitable for the actors involved.
Abstract: Bagging and boosting are among the most popular re-sampling ensemble methods that generate and combine a diversity of regression models using the same learning algorithm as base-learner. Boosting algorithms are considered stronger than bagging on noise-free data. However, there are strong empirical indications that bagging is much more robust than boosting in noisy settings. For this reason, in this work we built an ensemble using an averaging methodology of bagging and boosting ensembles with 10 sub-learners in each one. We performed a comparison with simple bagging and boosting ensembles with 25 sub-learners on standard benchmark datasets and the proposed ensemble gave better accuracy.
Abstract: Theory of Constraints has been emerging as an
important tool for optimization of manufacturing/service systems.
Goldratt in his first book “ The Goal " gave the introduction on
Theory of Constraints and its applications in a factory scenario. A
large number of production managers around the globe read this book
but only a few could implement it in their plants because the book did
not explain the steps to implement TOC in the factory. To overcome
these limitations, Goldratt wrote this book to explain TOC, DBR and
the method to implement it. In this paper, an attempt has been made
to summarize the salient features of TOC and DBR listed in the book
and the correct approach to implement TOC in a factory setting. The
simulator available along with the book was actually used by the
authors and the claim of Goldratt regarding the use of DBR and
Buffer management to ease the work of production managers was
tested and was found to be correct.
Abstract: Industrial surveys shows that manufacturing
companies define the qualities of thermal removing process based on
the dimension and physical appearance of the cutting material
surface. Therefore, the roughness of the surface area of the material
cut by the plasma arc cutting process and the rate of the removed
material by the manual plasma arc cutting machine was importantly
considered. Plasma arc cutter Selco Genesis 90 was used to cut
Standard AISI 1017 Steel of 200 mm x100 mm x 6 mm manually
based on the selected parameters setting. The material removal rate
(MRR) was measured by determining the weight of the specimens
before and after the cutting process. The surface roughness (SR)
analysis was conducted using Mitutoyo CS-3100 to determine the
average roughness value (Ra). Taguchi method was utilized to
achieve optimum condition for both outputs studied. The
microstructure analysis in the region of the cutting surface is
performed using SEM. The results reveal that the SR values are
inversely proportional to the MRR values. The quality of the surface
roughness depends on the dross peak that occurred after the cutting
process.
Abstract: This paper proposes a VPN Accelerator Board
(VPN-AB), a virtual private network (VPN) protocol designed for
trust channel security system (TCSS). TCSS supports safety
communication channel between security nodes in internet. It
furnishes authentication, confidentiality, integrity, and access control
to security node to transmit data packets with IPsec protocol. TCSS
consists of internet key exchange block, security association block,
and IPsec engine block. The internet key exchange block negotiates
crypto algorithm and key used in IPsec engine block. Security
Association blocks setting-up and manages security association
information. IPsec engine block treats IPsec packets and consists of
networking functions for communication. The IPsec engine block
should be embodied by H/W and in-line mode transaction for high
speed IPsec processing. Our VPN-AB is implemented with high speed
security processor that supports many cryptographic algorithms and
in-line mode. We evaluate a small TCSS communication environment,
and measure a performance of VPN-AB in the environment. The
experiment results show that VPN-AB gets a performance throughput
of maximum 15.645Gbps when we set the IPsec protocol with
3DES-HMAC-MD5 tunnel mode.
Abstract: Inventory decisional environment of short life-cycle
products is full of uncertainties arising from randomness and
fuzziness of input parameters like customer demand requiring
modeling under hybrid uncertainty. Prior inventory models
incorporating fuzzy demand have unfortunately ignored stochastic
variation of demand. This paper determines an unambiguous optimal
order quantity from a set of n fuzzy observations in a newsvendor
inventory setting in presence of fuzzy random variable demand
capturing both fuzzy perception and randomness of customer
demand. The stress of this paper is in providing solution procedure
that attains optimality in two steps with demand information
availability in linguistic phrases leading to fuzziness along with
stochastic variation. The first step of solution procedure identifies
and prefers one best fuzzy opinion out of all expert opinions and the
second step determines optimal order quantity from the selected
event that maximizes profit. The model and solution procedure is
illustrated with a numerical example.
Abstract: The purpose is to study the model and characteristic of
participation of the suitable community to lead to develop permanent
water marketing in Bang Noi Floating Market, Bangkonti District,
Samutsongkhram Province. A total of 342 survey questionnaire was
administered to potential respondents. The researchers interviewed
the leader of the community. Appreciation Influence Control (AIC)
was used to talk with 20 villagers on arena. The findings revealed
that overall, most people had the middle level of the participation in
developing the durable Bang Noi Floating Market, Bangkonti,
Samutsongkhram Province and in aspects of gaining benefits from
developing it with atmosphere and a beautiful view for tourism. For
example, the landscape is beautiful with public utilities. The
participation in preserving and developing Bang Noi Floating Market
remains in the former way of life. The basic factor of person affects
to the participation of people such as age, level of education, career,
and income per month. Most participants are the original hosts that
have houses and shops located in the marketing and neighbor. These
people involve with the benefits and have the power to make a water
marketing strategy, the major role to set the information database. It
also found that the leader and the villagers play the important role in
setting a five-physical database. Data include level of information
such as position of village, territory of village, road, river, and
premises. Information of culture consists of a two-level of
information, interesting point, and Itinerary. The information occurs
from presenting and practicing by the leader and villagers in the
community.All of phases are presented for listening and investigating
database together in both the leader and villagers in the process of
participation.