The Strict Stability of Impulsive Stochastic Functional Differential Equations with Markovian Switching

Strict stability can present the rate of decay of the solution, so more and more investigators are beginning to study the topic and some results have been obtained. However, there are few results about strict stability of stochastic differential equations. In this paper, using Lyapunov functions and Razumikhin technique, we have gotten some criteria for the strict stability of impulsive stochastic functional differential equations with markovian switching.

An Atomic-Domains-Based Approach for Attack Graph Generation

Attack graph is an integral part of modeling the overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at the whole network, which makes the process of AGG complex and non-scalable. In this paper, we propose a new approach which is simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications among all the atomic domains. Our approach simplifies the process of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic domains which makes the process of AGG scalable.

A New Algorithm for Enhanced Robustness of Copyright Mark

This paper discusses a new heavy tailed distribution based data hiding into discrete cosine transform (DCT) coefficients of image, which provides statistical security as well as robustness against steganalysis attacks. Unlike other data hiding algorithms, the proposed technique does not introduce much effect in the stegoimage-s DCT coefficient probability plots, thus making the presence of hidden data statistically undetectable. In addition the proposed method does not compromise on hiding capacity. When compared to the generic block DCT based data-hiding scheme, our method found more robust against a variety of image manipulating attacks such as filtering, blurring, JPEG compression etc.

Effect of Coolant on Cutting Forces and Surface Roughness in Grinding of CSM GFRP

This paper presents a comparative study on dry and wet grinding through experimental investigation in the grinding of CSM glass fibre reinforced polymer laminates using a pink aluminium oxide wheel. Different sets of experiments were performed to study the effects of the independent grinding parameters such as grinding wheel speed, feed and depth of cut on dependent performance criteria such as cutting forces and surface finish. Experimental conditions were laid out using design of experiment central composite design. An effective coolant was sought in this study to minimise cutting forces and surface roughness for GFRP laminates grinding. Test results showed that the use of coolants reduces surface roughness, although not necessarily the cutting forces. These research findings provide useful economic machining solution in terms of optimized grinding conditions for grinding CSM GFRP.

An Accurate Computation of Block Hybrid Method for Solving Stiff Ordinary Differential Equations

In this paper, self-starting block hybrid method of order (5,5,5,5)T is proposed for the solution of the special second order ordinary differential equations with associated initial or boundary conditions. The continuous hybrid formulations enable us to differentiate and evaluate at some grids and off – grid points to obtain four discrete schemes, which were used in block form for parallel or sequential solutions of the problems. The computational burden and computer time wastage involved in the usual reduction of second order problem into system of first order equations are avoided by this approach. Furthermore, a stability analysis and efficiency of the block method are tested on stiff ordinary differential equations, and the results obtained compared favorably with the exact solution.

The Role of Person and his Psychological Portrait in Turkic Philosophy of Culture

The aim of this study the analysis of Turkic culture and their influence on personality. We also discussed the role of history in Turkic folk development. Thereby cultural and anthropological context of ancient Turkic sources reveal concept of the "person". In the article have been analyzed ethnical, cultural, ethnical philosophical content of the world conception of the ancient Turks.

Multivalued Knowledge-Base based on Multivalued Datalog

The basic aim of our study is to give a possible model for handling uncertain information. This model is worked out in the framework of DATALOG. The concept of multivalued knowledgebase will be defined as a quadruple of any background knowledge; a deduction mechanism; a connecting algorithm, and a function set of the program, which help us to determine the uncertainty levels of the results. At first the concept of fuzzy Datalog will be summarized, then its extensions for intuitionistic- and interval-valued fuzzy logic is given and the concept of bipolar fuzzy Datalog is introduced. Based on these extensions the concept of multivalued knowledge-base will be defined. This knowledge-base can be a possible background of a future agent-model.

Attachment Styles of Children Raised in Nursery vs. Those Who are Raised in the Family in Iran

In studies on psychological health and children-s personality development and in researches on emotional distresses, children-s behavioral disorders associated with mother deprivation, are known as the major cause of mental disorders. Therefore, for identification of children-s attachment styles in nursery-s children are of significant importance. For this purpose, to compare the attachment styles between children of nursery with those provided care by their families, the Separation Anxiety Test (SAT) of Slough and et al was administered on 72 children (36 in nursery and 36 family-cared). The results indicated, almost half of children in both groups have insecure attachment styles. Tendency ratio of both groups of children towards Secure and Ambivalent Insecure styles are almost the same. However the avoidant style of attachment in children of nursery is more than those provided care by their families. The children under family care compared to the children of nursery, in the situations of separation from their mothers in the first day of school and sleeping in their room, have shown more self reliance.

Asset Management for Educational Buildings in Egypt

In Egypt, the concept of Asset Management (AM) is new; however, the need for applying it has become crucial because deteriorating or losing an asset is unaffordable in a developing country like Egypt. Therefore the current study focuses on educational buildings as one of the most important assets regarding planning, building, operating and maintenance expenditures. The main objective of this study is to develop a SAMF for educational buildings in Egypt. The General Authority for Educational Buildings (GAEB) was chosen as a case study of the current research as it represents the biggest governmental organization responsible for planning, operating and maintaining schools in Egypt. To achieve the research objective, structured interviews were conducted with senior managers of GAEB using a pre designed questionnaire to explore the current practice of AM. Gab analysis technique was applied against best practices compounded from a vast literature review to identify gaps between current practices and the desired one. The previous steps mainly revealed; limited knowledge about strategic asset management, no clear goals, no training, no real risk plan and lack of data, technical and financial resources. Based on the findings, a SAMF for GAEB was introduced and Framework implementation steps and assessment techniques were explained in detail.

Scientific Orientation of Youth as the Basis of Formation of a New University Culture

At present the process of formation of corporate values in Kazakh universities is under the influence of a whole range of socio-economic and cultural changes: on the one hand universities must maintain and transmit traditional cultural values of education, on the other, to improve quality of service and to involve young people to science, providing thus own competitiveness. Thus, this article presents some results of two cycles of sociological research conducted in 2012 and aimed at identifying possible ways to popularize science and readiness to participate of youth in given activities, expectations of young scientists and the prospects of future development of the Kazakh science.

Finding More Non-Supersingular Elliptic Curves for Pairing-Based Cryptosystems

Finding suitable non-supersingular elliptic curves for pairing-based cryptosystems becomes an important issue for the modern public-key cryptography after the proposition of id-based encryption scheme and short signature scheme. In previous work different algorithms have been proposed for finding such elliptic curves when embedding degree k ∈ {3, 4, 6} and cofactor h ∈ {1, 2, 3, 4, 5}. In this paper a new method is presented to find more non-supersingular elliptic curves for pairing-based cryptosystems with general embedding degree k and large values of cofactor h. In addition, some effective parameters of these non-supersingular elliptic curves are provided in this paper.

New Recursive Representations for the Favard Constants with Application to the Summation of Series

In this study integral form and new recursive formulas for Favard constants and some connected with them numeric and Fourier series are obtained. The method is based on preliminary integration of Fourier series which allows for establishing finite recursive representations for the summation. It is shown that the derived recursive representations are numerically more effective than known representations of the considered objects.

Identification Common Microbes Observed on Polyester Tufting

Tufting carpet is a very suitable substrate for growing microorganism such as pathogenic microbes, due to the direct touch with human body, long washing periods and laying on the floor; in fact there are 3 major problems: To risk human health, Prepare bad odors and Destruction of the products.. In the presented research, for investigation of presence most common microbes on polyester tufting, first goods laid in a public place (in the corridor fair) for 30 days and the existence of some microbes were investigate on it with two methods of enrichment in nutrient environments such as thioglycolate and noutrunt brath, and shake the dust off the polyester tufting onto cultivation mediums such as blood agar and noutrunt agar. After the microorganism colonics are grown, the colonies were separated and six microbial tests such as cataloes and sitrat were carried out in five phases on the colonics for identifying the varieties of bacteria. As a result of tests, 5 type of bacteria, such as Escherichia coli, staphylococcus saprophytic as were identified. Each of the mentioned bacteria can be seriously harmful for the heath of human.

Positive Periodic Solutions in a Discrete Competitive System with the Effect of Toxic Substances

In this paper, a delayed competitive system with the effect of toxic substances is investigated. With the aid of differential equations with piecewise constant arguments, a discrete analogue of continuous non-autonomous delayed competitive system with the effect of toxic substances is proposed. By using Gaines and Mawhin,s continuation theorem of coincidence degree theory, a easily verifiable sufficient condition for the existence of positive solutions of difference equations is obtained.

ECG Analysis using Nature Inspired Algorithm

This paper presents an algorithm based on the wavelet decomposition, for feature extraction from the ECG signal and recognition of three types of Ventricular Arrhythmias using neural networks. A set of Discrete Wavelet Transform (DWT) coefficients, which contain the maximum information about the arrhythmias, is selected from the wavelet decomposition. After that a novel clustering algorithm based on nature inspired algorithm (Ant Colony Optimization) is developed for classifying arrhythmia types. The algorithm is applied on the ECG registrations from the MIT-BIH arrhythmia and malignant ventricular arrhythmia databases. We applied Daubechies 4 wavelet in our algorithm. The wavelet decomposition enabled us to perform the task efficiently and produced reliable results.

Effect of Concrete Nonlinear Parameters on the Seismic Response of Concrete Gravity Dams

Behavior of dams against the seismic loads has been studied by many researchers. Most of them proposed new numerical methods to investigate the dam safety. In this paper, to study the effect of nonlinear parameters of concrete in gravity dams, a twodimensional approach was used including the finite element method, staggered method and smeared crack approach. Effective parameters in the models are physical properties of concrete such as modulus of elasticity, tensile strength and specific fracture energy. Two different models were used in foundation (mass-less and massed) in order to determine the seismic response of concrete gravity dams. Results show that when the nonlinear analysis includes the dam- foundation interaction, the foundation-s mass, flexibility and radiation damping are important in gravity dam-s response.

Application of Simulation and Response Surface to Optimize Hospital Resources

This paper presents a case study that uses processoriented simulation to identify bottlenecks in the service delivery system in an emergency department of a hospital in the United Arab Emirates. Using results of the simulation, response surface models were developed to explain patient waiting time and the total time patients spend in the hospital system. Results of the study could be used as a service improvement tool to help hospital management in improving patient throughput and service quality in the hospital system.

Enhance Performance of Secure Image Using Wavelet Compression

The increase popularity of multimedia application especially in image processing places a great demand on efficient data storage and transmission techniques. Network communication such as wireless network can easily be intercepted and cause of confidential information leaked. Unfortunately, conventional compression and encryption methods are too slow; it is impossible to carry out real time secure image processing. In this research, Embedded Zerotree Wavelet (EZW) encoder which specially designs for wavelet compression is examined. With this algorithm, three methods are proposed to reduce the processing time, space and security protection that will be secured enough to protect the data.

Balanced k-Anonymization

The technique of k-anonymization has been proposed to obfuscate private data through associating it with at least k identities. This paper investigates the basic tabular structures that underline the notion of k-anonymization using cell suppression. These structures are studied under idealized conditions to identify the essential features of the k-anonymization notion. We optimize data kanonymization through requiring a minimum number of anonymized values that are balanced over all columns and rows. We study the relationship between the sizes of the anonymized tables, the value k, and the number of attributes. This study has a theoretical value through contributing to develop a mathematical foundation of the kanonymization concept. Its practical significance is still to be investigated.

Automation of Fishhooks Objective Measures

Fishing has always been an essential component of the Polynesians- life. Fishhooks, mostly in pearl shell, found during archaeological excavations are the artifacts related to this activity the most numerous. Thanks to them, we try to reconstruct the ancient techniques of resources exploitation, inside the lagoons and offshore. They can also be used as chronological and cultural indicators. The shapes and dimensions of these artifacts allow comparisons and classifications used in both functional approach and chrono-cultural perspective. Hence it is very important for the ethno-archaeologists to dispose of reliable methods and standardized measurement of these artifacts. Such a reliable objective and standardized method have been previously proposed. But this method cannot be envisaged manually because of the very important time required to measure each fishhook manually and the quantity of fishhooks to measure (many hundreds). We propose in this paper a detailed acquisition protocol of fishhooks and an automation of every step of this method. We also provide some experimental results obtained on the fishhooks coming from three archaeological excavations sites.