Abstract: Strict stability can present the rate of decay of the
solution, so more and more investigators are beginning to study the
topic and some results have been obtained. However, there are few
results about strict stability of stochastic differential equations. In
this paper, using Lyapunov functions and Razumikhin technique, we
have gotten some criteria for the strict stability of impulsive stochastic
functional differential equations with markovian switching.
Abstract: Attack graph is an integral part of modeling the
overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine
what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at
the whole network, which makes the process of AGG complex and
non-scalable. In this paper, we propose a new approach which is
simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications
among all the atomic domains. Our approach simplifies the process
of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic
domains which makes the process of AGG scalable.
Abstract: This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.
Abstract: This paper presents a comparative study on dry and wet grinding through experimental investigation in the grinding of CSM glass fibre reinforced polymer laminates using a pink aluminium oxide wheel. Different sets of experiments were performed to study the effects of the independent grinding parameters such as grinding wheel speed, feed and depth of cut on dependent performance criteria such as cutting forces and surface finish. Experimental conditions were laid out using design of experiment central composite design. An effective coolant was sought in this study to minimise cutting forces and surface roughness for GFRP laminates grinding. Test results showed that the use of coolants reduces surface roughness, although not necessarily the cutting forces. These research findings provide useful economic machining solution in terms of optimized grinding conditions for grinding CSM GFRP.
Abstract: In this paper, self-starting block hybrid method of
order (5,5,5,5)T is proposed for the solution of the special second
order ordinary differential equations with associated initial or
boundary conditions. The continuous hybrid formulations enable us
to differentiate and evaluate at some grids and off – grid points to
obtain four discrete schemes, which were used in block form for
parallel or sequential solutions of the problems. The computational
burden and computer time wastage involved in the usual reduction of
second order problem into system of first order equations are avoided
by this approach. Furthermore, a stability analysis and efficiency of
the block method are tested on stiff ordinary differential equations,
and the results obtained compared favorably with the exact solution.
Abstract: The aim of this study the analysis of Turkic culture and their influence on personality. We also discussed the role of history in Turkic folk development. Thereby cultural and anthropological context of ancient Turkic sources reveal concept of the "person". In the article have been analyzed ethnical, cultural, ethnical philosophical content of the world conception of the ancient Turks.
Abstract: The basic aim of our study is to give a possible model for handling uncertain information. This model is worked out in the framework of DATALOG. The concept of multivalued knowledgebase will be defined as a quadruple of any background knowledge; a deduction mechanism; a connecting algorithm, and a function set of the program, which help us to determine the uncertainty levels of the results. At first the concept of fuzzy Datalog will be summarized, then its extensions for intuitionistic- and interval-valued fuzzy logic is given and the concept of bipolar fuzzy Datalog is introduced. Based on these extensions the concept of multivalued knowledge-base will be defined. This knowledge-base can be a possible background of a future agent-model.
Abstract: In studies on psychological health and children-s personality development and in researches on emotional distresses, children-s behavioral disorders associated with mother deprivation, are known as the major cause of mental disorders. Therefore, for identification of children-s attachment styles in nursery-s children are of significant importance. For this purpose, to compare the attachment styles between children of nursery with those provided care by their families, the Separation Anxiety Test (SAT) of Slough and et al was administered on 72 children (36 in nursery and 36 family-cared). The results indicated, almost half of children in both groups have insecure attachment styles. Tendency ratio of both groups of children towards Secure and Ambivalent Insecure styles are almost the same. However the avoidant style of attachment in children of nursery is more than those provided care by their families. The children under family care compared to the children of nursery, in the situations of separation from their mothers in the first day of school and sleeping in their room, have shown more self reliance.
Abstract: In Egypt, the concept of Asset Management (AM) is
new; however, the need for applying it has become crucial because
deteriorating or losing an asset is unaffordable in a developing
country like Egypt. Therefore the current study focuses on
educational buildings as one of the most important assets regarding
planning, building, operating and maintenance expenditures. The
main objective of this study is to develop a SAMF for educational
buildings in Egypt. The General Authority for Educational Buildings
(GAEB) was chosen as a case study of the current research as it
represents the biggest governmental organization responsible for
planning, operating and maintaining schools in Egypt. To achieve the
research objective, structured interviews were conducted with senior
managers of GAEB using a pre designed questionnaire to explore the
current practice of AM. Gab analysis technique was applied against
best practices compounded from a vast literature review to identify
gaps between current practices and the desired one. The previous
steps mainly revealed; limited knowledge about strategic asset
management, no clear goals, no training, no real risk plan and lack of
data, technical and financial resources. Based on the findings, a
SAMF for GAEB was introduced and Framework implementation
steps and assessment techniques were explained in detail.
Abstract: At present the process of formation of corporate
values in Kazakh universities is under the influence of a whole range
of socio-economic and cultural changes: on the one hand universities
must maintain and transmit traditional cultural values of education,
on the other, to improve quality of service and to involve young
people to science, providing thus own competitiveness. Thus, this
article presents some results of two cycles of sociological research
conducted in 2012 and aimed at identifying possible ways to
popularize science and readiness to participate of youth in given
activities, expectations of young scientists and the prospects of future
development of the Kazakh science.
Abstract: Finding suitable non-supersingular elliptic curves for
pairing-based cryptosystems becomes an important issue for the
modern public-key cryptography after the proposition of id-based
encryption scheme and short signature scheme. In previous work
different algorithms have been proposed for finding such elliptic
curves when embedding degree k ∈ {3, 4, 6} and cofactor h ∈ {1, 2, 3,
4, 5}. In this paper a new method is presented to find more
non-supersingular elliptic curves for pairing-based cryptosystems with
general embedding degree k and large values of cofactor h. In
addition, some effective parameters of these non-supersingular elliptic
curves are provided in this paper.
Abstract: In this study integral form and new recursive formulas
for Favard constants and some connected with them numeric and
Fourier series are obtained. The method is based on preliminary
integration of Fourier series which allows for establishing finite
recursive representations for the summation. It is shown that the
derived recursive representations are numerically more effective than
known representations of the considered objects.
Abstract: Tufting carpet is a very suitable substrate for growing
microorganism such as pathogenic microbes, due to the direct touch
with human body, long washing periods and laying on the floor; in
fact there are 3 major problems: To risk human health, Prepare bad
odors and Destruction of the products.. In the presented research, for
investigation of presence most common microbes on polyester
tufting, first goods laid in a public place (in the corridor fair) for 30
days and the existence of some microbes were investigate on it with
two methods of enrichment in nutrient environments such as
thioglycolate and noutrunt brath, and shake the dust off the polyester
tufting onto cultivation mediums such as blood agar and noutrunt
agar. After the microorganism colonics are grown, the colonies were
separated and six microbial tests such as cataloes and sitrat were
carried out in five phases on the colonics for identifying the varieties
of bacteria. As a result of tests, 5 type of bacteria, such as
Escherichia coli, staphylococcus saprophytic as were identified. Each
of the mentioned bacteria can be seriously harmful for the heath of
human.
Abstract: In this paper, a delayed competitive system with the effect of toxic substances is investigated. With the aid of differential equations with piecewise constant arguments, a discrete analogue of continuous non-autonomous delayed competitive system with the effect of toxic substances is proposed. By using Gaines and Mawhin,s continuation theorem of coincidence degree theory, a easily verifiable sufficient condition for the existence of positive solutions of difference equations is obtained.
Abstract: This paper presents an algorithm based on the
wavelet decomposition, for feature extraction from the ECG signal
and recognition of three types of Ventricular Arrhythmias using
neural networks. A set of Discrete Wavelet Transform (DWT)
coefficients, which contain the maximum information about the
arrhythmias, is selected from the wavelet decomposition. After that a
novel clustering algorithm based on nature inspired algorithm (Ant
Colony Optimization) is developed for classifying arrhythmia types.
The algorithm is applied on the ECG registrations from the MIT-BIH
arrhythmia and malignant ventricular arrhythmia databases. We
applied Daubechies 4 wavelet in our algorithm. The wavelet
decomposition enabled us to perform the task efficiently and
produced reliable results.
Abstract: Behavior of dams against the seismic loads has been
studied by many researchers. Most of them proposed new numerical
methods to investigate the dam safety. In this paper, to study the
effect of nonlinear parameters of concrete in gravity dams, a twodimensional
approach was used including the finite element method,
staggered method and smeared crack approach. Effective parameters
in the models are physical properties of concrete such as modulus of
elasticity, tensile strength and specific fracture energy. Two different
models were used in foundation (mass-less and massed) in order to
determine the seismic response of concrete gravity dams. Results
show that when the nonlinear analysis includes the dam- foundation
interaction, the foundation-s mass, flexibility and radiation damping
are important in gravity dam-s response.
Abstract: This paper presents a case study that uses processoriented
simulation to identify bottlenecks in the service delivery
system in an emergency department of a hospital in the United Arab
Emirates. Using results of the simulation, response surface models
were developed to explain patient waiting time and the total time
patients spend in the hospital system. Results of the study could be
used as a service improvement tool to help hospital management in
improving patient throughput and service quality in the hospital
system.
Abstract: The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time secure image processing. In this research, Embedded Zerotree Wavelet (EZW) encoder which specially designs for wavelet compression is examined. With this algorithm, three methods are proposed to reduce the processing time, space and security protection that will be secured enough to protect the data.
Abstract: The technique of k-anonymization has been proposed to obfuscate private data through associating it with at least k identities. This paper investigates the basic tabular structures that
underline the notion of k-anonymization using cell suppression.
These structures are studied under idealized conditions to identify the
essential features of the k-anonymization notion. We optimize data kanonymization
through requiring a minimum number of anonymized
values that are balanced over all columns and rows. We study the
relationship between the sizes of the anonymized tables, the value k, and the number of attributes. This study has a theoretical value through contributing to develop a mathematical foundation of the kanonymization
concept. Its practical significance is still to be
investigated.
Abstract: Fishing has always been an essential component of
the Polynesians- life. Fishhooks, mostly in pearl shell, found during
archaeological excavations are the artifacts related to this activity the
most numerous. Thanks to them, we try to reconstruct the ancient
techniques of resources exploitation, inside the lagoons and offshore.
They can also be used as chronological and cultural indicators. The
shapes and dimensions of these artifacts allow comparisons and
classifications used in both functional approach and chrono-cultural
perspective. Hence it is very important for the ethno-archaeologists
to dispose of reliable methods and standardized measurement of
these artifacts. Such a reliable objective and standardized method
have been previously proposed. But this method cannot be envisaged
manually because of the very important time required to measure
each fishhook manually and the quantity of fishhooks to measure
(many hundreds). We propose in this paper a detailed acquisition
protocol of fishhooks and an automation of every step of this method.
We also provide some experimental results obtained on the fishhooks
coming from three archaeological excavations sites.