Topological Properties of an Exponential Random Geometric Graph Process

In this paper we consider a one-dimensional random geometric graph process with the inter-nodal gaps evolving according to an exponential AR(1) process. The transition probability matrix and stationary distribution are derived for the Markov chains concerning connectivity and the number of components. We analyze the algorithm for hitting time regarding disconnectivity. In addition to dynamical properties, we also study topological properties for static snapshots. We obtain the degree distributions as well as asymptotic precise bounds and strong law of large numbers for connectivity threshold distance and the largest nearest neighbor distance amongst others. Both exact results and limit theorems are provided in this paper.

Minaret of Medieval City Aktobe

In the article the remains of the base of the minaret, found in 2009 at the medieval fortress shakhristan Aktobe, which is located along the courses of the rivers Balta and Aksu. The minaret, which consists of two parts: the stylobate in the pit and base part refers to the XI-XII centuries. The preserved height of the building is 3.6 meters. Volume stylobat quadrangular minaret, the corners of which are aimed at the four corners of the world amounts to 8,65 x8, 5 m, height – 2.6 m. Diameter octagonal upper cap of 7.85 m and a height of preserved – 1 m. This minaret is of particular importance among the historical and architectural monuments of Kazakhstan, as it is so far the only minaret belonging to Karakhanid epoch in which Islam was the state religion.

Microbial Oil Production by Mixed Culture of Microalgae Chlorella sp. KKU-S2 and Yeast Torulaspora maleeae Y30

Compared to oil production from microorganisms, little work has been performed for mixed culture of microalgae and yeast. In this article it is aimed to show high oil accumulation potential of mixed culture of microalgae Chlorella sp. KKU-S2 and oleaginous yeast Torulaspora maleeae Y30 using sugarcane molasses as substrate. The monoculture of T. maleeae Y30 grew faster than that of microalgae Chlorella sp. KKU-S2. In monoculture of yeast, a biomass of 6.4g/L with specific growth rate (m) of 0.265 (1/d) and lipid yield of 0.466g/L were obtained, while 2.53g/L of biomass with m of 0.133 (1/d) and lipid yield of 0.132g/L were obtained for monoculture of Chlorella sp. KKU-S2. The biomass concentration in the mixed culture of T. maleeae Y30 with Chlorella sp. KKU-S2 increased faster and was higher compared with that in the monoculture and mixed culture of microalgae. In mixed culture of microalgae Chlorella sp. KKU-S2 and C. vulgaris TISTR8580, a biomass of 3.47g/L and lipid yield of 0.123 g/L were obtained. In mixed culture of T. maleeae Y30 with Chlorella sp. KKU-S2, a maximum biomass of 7.33 g/L and lipid yield of 0.808g/L were obtained. Maximum cell yield coefficient (YX/S, 0.229g/L), specific yield of lipid (YP/X, 0.11g lipid/g cells) and volumetric lipid production rate (QP, 0.115 g/L/d) were obtained in mixed culture of yeast and microalgae. Clearly, T. maleeae Y30 and Chlorella sp. KKU-S2 use sugarcane molasses as organic nutrients efficiently in mixed culture under mixotrophic growth. The biomass productivity and lipid yield are notably enhanced in comparison with monoculture.

Dynamic Analysis of Porous Media Using Finite Element Method

The mechanical behavior of porous media is governed by the interaction between its solid skeleton and the fluid existing inside its pores. The interaction occurs through the interface of gains and fluid. The traditional analysis methods of porous media, based on the effective stress and Darcy's law, are unable to account for these interactions. For an accurate analysis, the porous media is represented in a fluid-filled porous solid on the basis of the Biot theory of wave propagation in poroelastic media. In Biot formulation, the equations of motion of the soil mixture are coupled with the global mass balance equations to describe the realistic behavior of porous media. Because of irregular geometry, the domain is generally treated as an assemblage of fmite elements. In this investigation, the numerical formulation for the field equations governing the dynamic response of fluid-saturated porous media is analyzed and employed for the study of transient wave motion. A finite element model is developed and implemented into a computer code called DYNAPM for dynamic analysis of porous media. The weighted residual method with 8-node elements is used for developing of a finite element model and the analysis is carried out in the time domain considering the dynamic excitation and gravity loading. Newmark time integration scheme is developed to solve the time-discretized equations which are an unconditionally stable implicit method Finally, some numerical examples are presented to show the accuracy and capability of developed model for a wide variety of behaviors of porous media.

Potential Role of Halophytic Macrophytes in Saline Effluent Treatment

The growth of the aquaculture industry has been associated with negative environmental impacts through the discharge of raw effluents into the adjacent receiving water bodies. Macrophytes from natural saline lakes, which have adaptability to the high salinity, can be suitable for saline effluent treatment. Eight emergent species from natural saline area were planted in an experimental gravel bed hydroponic mesocosm (GBH) which was treated with effluent water from an intensive fish farm using geothermal water. In order to examine the applicability of the halophytes in treatment processes, we tested the relative efficacy of total nitrogen (TN), total phosphorus (TP), potassium (K), sodium (Na), magnesium (Mg) and calcium (Ca) removal for the saline wastewater treatment. Four of the eight species, which were Phragmites australis, Typha angustifolia, Glyceria maxima, Scirpus lacustris spp. tabernaemontani could survive and contribute the experimental treatment.

A National Idea in Conditions of the Islamic Revival

Discussion and development of principles of the uniform nation formation within the limits of the Kazakhstan state obviously became one of the most pressing questions of the day. The fact that this question has not been solved "from above" as many other questions has caused really brisk discussion, shows us increase of civil consciousness in Kazakhstan society, and also the actuality of this theme which can be carried in the category of fatal questions. In any sense, nation building has raised civil society to a much higher level. It would be better to begin with certain definitions. First is the word "nation". The second is the "state". Both of these terms are very closely connected with each other, so that in English language they are in general synonyms. In Russian more shades of these terms exist. For example in Kazakhstan the citizens of the country irrespective of nationality (but mainly with reference to non-kazakhs) are called «kazakhstanians», while the name of the title nation is \"Kazakhs\". The same we can see in Russia, where, for example, the Chechen or the Yakut –are \"Rossiyane\" which means “the citizens of Russian Federation, but not \"Russians\". The paper was written under the research project “Islam in modern Kazakhstan: the nature and outcome of the religious revival”.

Ethics in the Technology Driven Enterprise

Innovations in technology have created new ethical challenges. Essential use of electronic communication in the workplace has escalated at an astronomical rate over the past decade. As such, legal and ethical dilemmas confronted by both the employer and the employee concerning managerial control and ownership of einformation have increased dramatically in the USA. From the employer-s perspective, ownership and control of all information created for the workplace is an undeniable source of economic advantage and must be monitored zealously. From the perspective of the employee, individual rights, such as privacy, freedom of speech, and freedom from unreasonable search and seizure, continue to be stalwart legal guarantees that employers are not legally or ethically entitled to abridge in the workplace. These issues have been the source of great debate and the catalyst for legal reform. The fine line between ethical and legal has been complicated by emerging technologies. This manuscript will identify and discuss a number of specific legal and ethical issues raised by the dynamic electronic workplace and conclude with suggestions that employers should follow to respect the delicate balance between employees- legal rights to privacy and the employer's right to protect its knowledge systems and infrastructure.

Mapping of C* Elements in Finite Element Method using Transformation Matrix

Mapping between local and global coordinates is an important issue in finite element method, as all calculations are performed in local coordinates. The concern arises when subparametric are used, in which the shape functions of the field variable and the geometry of the element are not the same. This is particularly the case for C* elements in which the extra degrees of freedoms added to the nodes make the elements sub-parametric. In the present work, transformation matrix for C1* (an 8-noded hexahedron element with 12 degrees of freedom at each node) is obtained using equivalent C0 elements (with the same number of degrees of freedom). The convergence rate of 8-noded C1* element is nearly equal to its equivalent C0 element, while it consumes less CPU time with respect to the C0 element. The existence of derivative degrees of freedom at the nodes of C1* element along with excellent convergence makes it superior compared with it equivalent C0 element.

The Design of Self-evolving Artificial Immune System II for Permutation Flow-shop Problem

Artificial Immune System is adopted as a Heuristic Algorithm to solve the combinatorial problems for decades. Nevertheless, many of these applications took advantage of the benefit for applications but seldom proposed approaches for enhancing the efficiency. In this paper, we continue the previous research to develop a Self-evolving Artificial Immune System II via coordinating the T and B cell in Immune System and built a block-based artificial chromosome for speeding up the computation time and better performance for different complexities of problems. Through the design of Plasma cell and clonal selection which are relative the function of the Immune Response. The Immune Response will help the AIS have the global and local searching ability and preventing trapped in local optima. From the experimental result, the significant performance validates the SEAIS II is effective when solving the permutation flows-hop problems.

ANN based Multi Classifier System for Prediction of High Energy Shower Primary Energy and Core Location

Cosmic showers, during the transit through space, produce sub - products as a result of interactions with the intergalactic or interstellar medium which after entering earth generate secondary particles called Extensive Air Shower (EAS). Detection and analysis of High Energy Particle Showers involve a plethora of theoretical and experimental works with a host of constraints resulting in inaccuracies in measurements. Therefore, there exist a necessity to develop a readily available system based on soft-computational approaches which can be used for EAS analysis. This is due to the fact that soft computational tools such as Artificial Neural Network (ANN)s can be trained as classifiers to adapt and learn the surrounding variations. But single classifiers fail to reach optimality of decision making in many situations for which Multiple Classifier System (MCS) are preferred to enhance the ability of the system to make decisions adjusting to finer variations. This work describes the formation of an MCS using Multi Layer Perceptron (MLP), Recurrent Neural Network (RNN) and Probabilistic Neural Network (PNN) with data inputs from correlation mapping Self Organizing Map (SOM) blocks and the output optimized by another SOM. The results show that the setup can be adopted for real time practical applications for prediction of primary energy and location of EAS from density values captured using detectors in a circular grid.

A Novel VLSI Architecture for Image Compression Model Using Low power Discrete Cosine Transform

In Image processing the Image compression can improve the performance of the digital systems by reducing the cost and time in image storage and transmission without significant reduction of the Image quality. This paper describes hardware architecture of low complexity Discrete Cosine Transform (DCT) architecture for image compression[6]. In this DCT architecture, common computations are identified and shared to remove redundant computations in DCT matrix operation. Vector processing is a method used for implementation of DCT. This reduction in computational complexity of 2D DCT reduces power consumption. The 2D DCT is performed on 8x8 matrix using two 1-Dimensional Discrete cosine transform blocks and a transposition memory [7]. Inverse discrete cosine transform (IDCT) is performed to obtain the image matrix and reconstruct the original image. The proposed image compression algorithm is comprehended using MATLAB code. The VLSI design of the architecture is implemented Using Verilog HDL. The proposed hardware architecture for image compression employing DCT was synthesized using RTL complier and it was mapped using 180nm standard cells. . The Simulation is done using Modelsim. The simulation results from MATLAB and Verilog HDL are compared. Detailed analysis for power and area was done using RTL compiler from CADENCE. Power consumption of DCT core is reduced to 1.027mW with minimum area[1].

Experimental Investigation of the Maximum Axial Force in the Folding Process of Aluminum Square Columns

In this paper, a semi empirical formula is presented based on the experimental results to predict the first pick (maximum force) value in the instantaneous folding force- axial distance diagram of a square column. To achieve this purpose, the maximum value of the folding force was assumed to be a function of the average folding force. Using the experimental results, the maximum value of the force necessary to initiate the first fold in a square column was obtained with respect to the geometrical quantities and material properties. Finally, the results obtained from the semi empirical relation in this paper, were compared to the experimental results which showed a good correlation.

Easy Shopping by Electronic Credit

In this paper we suggest a method for setting electronic credits for the customers. In this method banks and market-sites help each other to make doing large shopping through internet so easy. By developing this system, the people who have less money to buy most of the things they want, become able to buy all of them just through a credit. This credit is given by market-sites through a banking control on it. The method suggested can stop being imprisoned because of banking debts.

The Tag Authentication Scheme using Self-Shrinking Generator on RFID System

Since communications between tag and reader in RFID system are by radio, anyone can access the tag and obtain its any information. And a tag always replies with the same ID so that it is hard to distinguish between a real and a fake tag. Thus, there are many security problems in today-s RFID System. Firstly, unauthorized reader can easily read the ID information of any Tag. Secondly, Adversary can easily cheat the legitimate reader using the collected Tag ID information, such as the any legitimate Tag. These security problems can be typically solved by encryption of messages transmitted between Tag and Reader and by authentication for Tag. In this paper, to solve these security problems on RFID system, we propose the Tag Authentication Scheme based on self shrinking generator (SSG). SSG Algorithm using in our scheme is proposed by W.Meier and O.Staffelbach in EUROCRYPT-94. This Algorithm is organized that only one LFSR and selection logic in order to generate random stream. Thus it is optimized to implement the hardware logic on devices with extremely limited resource, and the output generating from SSG at each time do role as random stream so that it is allow our to design the light-weight authentication scheme with security against some network attacks. Therefore, we propose the novel tag authentication scheme which use SSG to encrypt the Tag-ID transmitted from tag to reader and achieve authentication of tag.

Modeling of the Process Parameters using Soft Computing Techniques

The design of technological procedures for manufacturing certain products demands the definition and optimization of technological process parameters. Their determination depends on the model of the process itself and its complexity. Certain processes do not have an adequate mathematical model, thus they are modeled using heuristic methods. First part of this paper presents a state of the art of using soft computing techniques in manufacturing processes from the perspective of applicability in modern CAx systems. Methods of artificial intelligence which can be used for this purpose are analyzed. The second part of this paper shows some of the developed models of certain processes, as well as their applicability in the actual calculation of parameters of some technological processes within the design system from the viewpoint of productivity.

Interconnect Analysis of a Novel Multiplexer Based Full-Adder Cell for Power and Propagation Delay Optimizations

The proposed multiplexer-based novel 1-bit full adder cell is schematized by using DSCH2 and its layout is generated by using microwind VLSI CAD tool. The adder cell layout interconnect analysis is performed by using BSIM4 layout analyzer. The adder circuit is compared with other six existing adder circuits for parametric analysis. The proposed adder cell gives better performance than the other existing six adder circuits in terms of power, propagation delay and PDP. The proposed adder circuit is further analyzed for interconnect analysis, which gives better performance than other adder circuits in terms of layout thickness, width and height.

Local Curvelet Based Classification Using Linear Discriminant Analysis for Face Recognition

In this paper, an efficient local appearance feature extraction method based the multi-resolution Curvelet transform is proposed in order to further enhance the performance of the well known Linear Discriminant Analysis(LDA) method when applied to face recognition. Each face is described by a subset of band filtered images containing block-based Curvelet coefficients. These coefficients characterize the face texture and a set of simple statistical measures allows us to form compact and meaningful feature vectors. The proposed method is compared with some related feature extraction methods such as Principal component analysis (PCA), as well as Linear Discriminant Analysis LDA, and independent component Analysis (ICA). Two different muti-resolution transforms, Wavelet (DWT) and Contourlet, were also compared against the Block Based Curvelet-LDA algorithm. Experimental results on ORL, YALE and FERET face databases convince us that the proposed method provides a better representation of the class information and obtains much higher recognition accuracies.

The Game of Synchronized Triomineering and Synchronized Tridomineering

In synchronized games players make their moves simultaneously rather than alternately. Synchronized Triomineering and Synchronized Tridomineering are respectively the synchronized versions of Triomineering and Tridomineering, two variants of a classic two-player combinatorial game called Domineering. Experimental results for small m × n boards (with m + n ≤ 12 for Synchronized Triomineering and m + n ≤ 10 for Synchronized Tridomineering) and some theoretical results for general k×n boards (with k = 3, 4, 5 for Synchronized Triomineering and k = 3 for Synchronized Tridomineering) are presented. Future research is indicated.

Analysis of Plasmids and Restriction Fragment Length Polymorphisms of Acinetobacter baumannii Isolated from Hospitals- AL Jouf Region- KSA

Abstract–The objectives of the current study are to determine the prevalence, etiological agents, drug susceptibility pattern and plasmid profile of Acinetobacter baumannii isolates from Hospital-Acquired Infections (HAI) at Community Hospital, Al Jouf Province, Saudi Arabia. A total of 1890 patients had developed infection during hospital admission and were included in the study. Among those who developed nosocomial infections, 15(9.4), 10(2.7) and 118 (12.7) had respiratory tract infection (RTI), blood stream infections (BSI) and urinary tract (UTI) respectively. A total of 268 bacterial isolates were isolated from nosocomial infection. S. aureus was reported in 23.5% for of the total isolates followed by Klebsiella pneumoniae (17.5%), E. coli (17.2%), P. aeruginosa (11.9%), coagulase negative staphylococcus (9%), A. baumannii (7.1%), Enterobacter spp. (3.4%), Citrobacter freundii (3%), Proteus mirabilis (2.6%), and Proteus vulgaris and Enterococcous faecalis (0.7%). Isolated organisms are multi-drug resistant, predominantly Gram-positive pathogens with a high incidence of methicillin-resistant S. aureus, extended spectrum beta lactamase and vancomycin resistant enterococci organisms. The RFLP (Fragment Length Polymorphisms) patterns of plasmid preparations from isolated A. baumannii isolates had altered RFLP patterns, possibly due to the presence of plasmid(s). Five A. baumannii isolates harbored plasmids all of which were not less than 2.71kbp in molecular weight. Hence, it showed that the gene coding for the isolates were located on the plasmid DNA while the remaining isolates which have no plasmid might showed gene coding for antibiotic resistance being located on chromosomal DNA. Nosocomial infections represent a current problem in Community Hospital, Al Jouf Province, Saudi Arabia. Problems associated with SSI include infection with multidrug resistant pathogens which are difficult to treat and are associated with increased mortality.

Real-time Laser Monitoring based on Pipe Detective Operation

The pipe inspection operation is the difficult detective performance. Almost applications are mainly relies on a manual recognition of defective areas that have carried out detection by an engineer. Therefore, an automation process task becomes a necessary in order to avoid the cost incurred in such a manual process. An automated monitoring method to obtain a complete picture of the sewer condition is proposed in this work. The focus of the research is the automated identification and classification of discontinuities in the internal surface of the pipe. The methodology consists of several processing stages including image segmentation into the potential defect regions and geometrical characteristic features. Automatic recognition and classification of pipe defects are carried out by means of using an artificial neural network technique (ANN) based on Radial Basic Function (RBF). Experiments in a realistic environment have been conducted and results are presented.