Abstract: Genome profiling (GP), a genotype based technology, which exploits random PCR and temperature gradient gel electrophoresis, has been successful in identification/classification of organisms. In this technology, spiddos (Species identification dots) and PaSS (Pattern similarity score) were employed for measuring the closeness (or distance) between genomes. Based on the closeness (PaSS), we can buildup phylogenetic trees of the organisms. We noticed that the topology of the tree is rather robust against the experimental fluctuation conveyed by spiddos. This fact was confirmed quantitatively in this study by computer-simulation, providing the limit of the reliability of this highly powerful methodology. As a result, we could demonstrate the effectiveness of the GP approach for identification/classification of organisms.
Abstract: IPsec has now become a standard information security
technology throughout the Internet society. It provides a well-defined
architecture that takes into account confidentiality, authentication,
integrity, secure key exchange and protection mechanism against
replay attack also. For the connectionless security services on packet
basis, IETF IPsec Working Group has standardized two extension
headers (AH&ESP), key exchange and authentication protocols. It is
also working on lightweight key exchange protocol and MIB's for
security management. IPsec technology has been implemented on
various platforms in IPv4 and IPv6, gradually replacing old
application-specific security mechanisms. IPv4 and IPv6 are not
directly compatible, so programs and systems designed to one
standard can not communicate with those designed to the other. We
propose the design and implementation of controlled Internet security
system, which is IPsec-based Internet information security system in
IPv4/IPv6 network and also we show the data of performance
measurement. With the features like improved scalability and
routing, security, ease-of-configuration, and higher performance of
IPv6, the controlled Internet security system provides consistent
security policy and integrated security management on IPsec-based
Internet security system.
Abstract: This paper presents a comparison between Spectrum-
Sliced Wavelength Division Multiplexing (SS-WDM) and Spectrum
Amplitude Coding Optical Code Division Multiple Access (SAC
Optical CDMA) systems for different light sources. The performance
of the system is shown in the simulated results of the bit error rate
(BER) and the eye diagram of both systems. The comparison results
indicate that the Multiple Access Interference (MAI) effects have a
significant impact on SS-WDM over SAC Optical CDMA systems.
Finally, in terms of spectral efficiency at constant BER of 10-12, SSWDM
offers higher spectral efficiency than optical CDMA since no
bandwidth expansion in needed.
Abstract: As research performance in academia is treated as one of indices for national competency, many countries devote much attention and resources to increasing their research performance. Understand the research trend is the basic step to improve the research performance. The goal of this research is to design an analysis system to evaluate research trends from analyzing data from different countries. In this paper, information system researches in Taiwan and other countries, including Asian countries and prominent countries represented by the Group of Eight (G8) is used as example. Our research found the trends are varied in different countries. Our research suggested that Taiwan-s scholars can pay more attention to interdisciplinary applications and try to increase their collaboration with other countries, in order to increase Taiwan's competency in the area of information science.
Abstract: Digital Video Terrestrial Broadcasting (DVB-T)
allows combining broadcasting, telephone and data services in one
network. It has facilitated mobile TV broadcasting. Mobile TV
broadcasting is dominated by fragmentation of standards in use in
different continents. In Asia T-DMB and ISDB-T are used while
Europe uses mainly DVB-H and in USA it is MediaFLO. Issues of
royalty for developers of these different incompatible technologies,
investments made and differing local conditions shall make it
difficult to agree on a unified standard in a very near future. Despite
this shortcoming, mobile TV has shown very good market potential.
There are a number of challenges that still exist for regulators,
investors and technology developers but the future looks bright.
There is need for mobile telephone operators to cooperate with
content providers and those operating terrestrial digital broadcasting
infrastructure for mutual benefit.
Abstract: As we make progressive products for good works, and
future industries want to get higher speed and resolution from various
developments in the robotics as well as precise control system, the
concept of control feedback is getting more important. Within a range
of industrial developments, the concept is most responsible for the
high reliability of a device. We explain an efficient analyzing method
of a rotary encoder such as an incremental type encoder and absolute
type encoder using the LabVIEW program
Abstract: By systematically applying different engineering
methods, difficult financial problems become approachable. Using a
combination of theory and techniques such as wavelet transform,
time series data mining, Markov chain based discrete stochastic
optimization, and evolutionary algorithms, this work formulated a
strategy to characterize and forecast non-linear time series. It
attempted to extract typical features from the volatility data sets of
S&P100 and S&P500 indices that include abrupt drops, jumps and
other non-linearity. As a result, accuracy of forecasting has reached
an average of over 75% surpassing any other publicly available
results on the forecast of any financial index.
Abstract: This study examined the toxicological effects and
safety of polypeptide k isolated from the seeds of Momordica
charantia in laboratory rats. 30 male Sprague Dawley rats (12 weeks
old, bodyweight 180-200 g) were randomly divided into 3 groups
(1000 mg/kg, 500 mg and 0 mg/kg). Rats were acclimatized to
laboratory conditions for 7 days and at day 8 rats were dosed orally
with polypeptide k (in 2% DMSO/normal saline) and the controls
received the dosed vehicle only. Rats were then observed for 72
hours before sacrificed. Rats were anaesthetized by pentobarbital
(50 mg/kg ip) and 2-3.0 mL of blood was taken by cardiac puncture
and rats were scarified by anaesthetic overdose. Immediately, organs
(heart, lungs, liver, kidneys) were weigh and taken for histology.
Organ sections were then evaluated by a histopathologist. Serum
samples were assayed for liver functions (ALT and γ-GT) and kidney
functions (BUN and creatinine). All rats showed normal behavior
after the dosing and no statistical changes were observed in all blood
parameters and organ weight. Histological examinations revealed
normal organ structures. In conclusion, dosing of rats up to 1000
mg/kg did not have any effects on the rat behavior, liver or kidney
functions nor histology of the selected organs.
Abstract: The low power wireless sensor devices which usually
uses the low power wireless private area network (IEEE 802.15.4)
standard are being widely deployed for various purposes and in
different scenarios. IPv6 low power wireless private area network
(6LoWPAN) was adopted as part of the IETF standard for the
wireless sensor devices so that it will become an open standard
compares to other dominated proprietary standards available in the
market. 6LoWPAN also allows the integration and communication of
sensor nodes with the Internet more viable. This paper presents a
comparative study on different available IPv6 platforms for wireless
sensor networks including open and close sources. It also discusses
about the platforms used by these stacks. Finally it evaluates and
provides appropriate suggestions which can be use for selection of
required IPv6 stack for low power devices.
Abstract: Knowledge and these notions have become more and
more important and we speak about a knowledge based society
today. A lot of small and big companies have reacted upon these new
challenges. But there is a deep abyss about knowledge conception
and practice between the professional researchers and company - life.
The question of this research was: How can small and mediumsized
companies be equal to the demands of new economy?
Questionnaires were used in this research and a special segment of
the native knowledge based on economy was focused on.
Researchers would have liked to know what the sources of success
are and how they can be in connection with questions of knowledge
acquisition, knowledge transfer, knowledge utilization in small and
medium-sized companies. These companies know that they have to
change their behaviour and thinking, but they are not on the suitable
level that they can compete with bigger or multinational companies.
Abstract: This paper provides new ways to explore the old
problem of failure of information systems development in an
organisation. Based on the theory of cognitive dissonance,
information systems (IS) failure is defined as a gap between what the
users expect from an information system and how well these
expectations are met by the perceived performance of the delivered
system. Bridging the expectation-perception gap requires that IS
professionals make a radical change from being the proprietor of
information systems and products to being service providers. In order
to deliver systems and services that IS users perceive as valuable, IS
people must become expert in determining and assessing users-
expectations and perceptions. It is also suggested that the IS
community, in general, has given relatively little attention to the
front-end process of requirements specification for IS development.
There is a simplistic belief that requirements are obtainable from
users, they are then translatable into a formal specification. The
process of information needs analysis is problematic and worthy of
investigation.
Abstract: Fruit drying is a well known process mostly used for
preservation of fruits. Osmotic dehydration of apricot slices were
carried out in three different salt-sucrose concentrations and four
different temperatures. Also three different weight ratios of solution
to sample were conducted to one set of experiments. The dehydration
curves were constructed using Peleg-s model. Increasing the solution
volume increased the mass transfer rate and hence the solid gain
increased rapidly. Increasing the volume of osmotic media caused an
increase in overall mass transfer but a 'solution to sample' ratio of 5:1
gave the best product quality. The best temperature and concentration
that had a high water loss to solid gain ratio and an acceptable taste
were 40°C and 5%, respectively.
Abstract: In this paper, a novel multipurpose audio watermarking
algorithm is proposed based on Vector Quantization (VQ) in Discrete
Cosine Transform (DCT) domain using the codeword labeling and
index-bit constrained method. By using this algorithm, it can fulfill the
requirements of both the copyright protection and content integrity
authentication at the same time for the multimedia artworks. The
robust watermark is embedded in the middle frequency coefficients of
the DCT transform during the labeled codeword vector quantization
procedure. The fragile watermark is embedded into the indices of the
high frequency coefficients of the DCT transform by using the
constrained index vector quantization method for the purpose of
integrity authentication of the original audio signals. Both the robust
and the fragile watermarks can be extracted without the original audio
signals, and the simulation results show that our algorithm is effective
with regard to the transparency, robustness and the authentication
requirements
Abstract: Recently, a vehicular ad-hoc networks(VANETs) for
Intelligent Transport System(ITS) have become able safety and convenience services surpassing the simple services such as
an electronic toll collection system. To provide the proper services,
VANET needs infrastructure over the country infrastructure. Thus, we have to spend a huge sum of
human resources. In this reason, several studies have been made on the
usage of cellular networks instead of new protocols
this study is to assess a performance evaluation of the
cellular network for VANET. In this paper, the result of a
for the suitability of cellular networks for VANET
experiment, The LTE(Long Term Evolution) of cellular networks found to be most suitable among the others cellular networks
Abstract: According to dramatic growth of internet services, an easy and prompt service deployment has been important for internet service providers to successfully maintain time-to-market. Before global service deployment, they have to pay the big cost for service evaluation to make a decision of the proper system location, system scale, service delay and so on. But, intra-Lab evaluation tends to have big gaps in the measured data compared with the realistic situation, because it is very difficult to accurately expect the local service environment, network congestion, service delay, network bandwidth and other factors. Therefore, to resolve or ease the upper problems, we propose multiple cloud based GPES Broker system and use case that helps internet service providers to alleviate the above problems in beta release phase and to make a prompt decision for their service launching. By supporting more realistic and reliable evaluation information, the proposed GPES Broker system saves the service release cost and enables internet service provider to make a prompt decision about their service launching to various remote regions.
Abstract: The Merrifield-Simmons index of a graph G is defined as the total number of its independent sets. A (n, n + 2)-graph is a connected simple graph with n vertices and n + 2 edges. In this paper we characterize the (n, n+2)-graph with the largest Merrifield- Simmons index. We show that its Merrifield-Simmons index i.e. the upper bound of the Merrifield-Simmons index of the (n, n+2)-graphs is 9 × 2n-5 +1 for n ≥ 5.
Abstract: Information and Communications Technologies (ICT) has been integrated in education in many developing and developed countries alike, but the use of ICT in Tanzanian schools is dismal. Many Tanzanian secondary schools have no computers. The few schools with computers use them primarily for secretarial services and computer literacy training. The Tanzanian education system at other levels like secondary school level has to undergo substantial transformation, underscored by the growing application of new information and communication technology. This paper presents the e-readiness survey result from secondary schools in Tanzania. The paper also suggests how Tanzania can make use of the few present ICT resources to support and improve teaching and learning functions to improve performance and acquisition of knowledge by using e-Learning Management System (e-LMS).
Abstract: In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and quasistationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine first stage nozzle blade.
Abstract: Calcium magnesium acetate (CMA) is environmentally
benign deicing chemicals that can replace sodium chloride that is
widely used on roads and highways at present for snow and ice control
to provide safe driving conditions during winter. The price of CMA
from petroleum-derived acetic acid is quite expensive. The bamboo
vinegar is the by-product from bamboo charcoal production. The
bamboo vinegar was used to prepare calcium acetate as raw materials,
and its deicing and corrosive performances were studied in this paper.
The results show that the freezing temperature of calcium acetate is
lower than that of sodium chloride when they have same molar
concentration, the deicing performance of calcium acetate is better
than that of sodium chloride when they have same moles, while the
deicing performance of sodium chloride is better than that of calcium
acetate. The corrosion of sodium chloride on iron-nail and steel-nail is
larger than that of calcium acetate whether they have same mass
concentration or same molar concentration, and the corrosion of
sodium chloride and calcium acetate on iron-nail is larger than that on
steel-nail, and calcium acetate almost hasn't corrosion on steel-nail.
Abstract: Work ethic and labour productivity issues are
extremely important for any society. It has been long proven by the
global practice and various scholars that the country promoting the
labour has always been way forward from the other countries. This
paper studies the thoughts suggested by M.Weber, Confucius, Lee
Kuan Yew, Mahathir Mohammad and other prominent thinkers
concerning the issues of work ethics and labour productivity. The
article analyzes why developed nations are way more advanced in
their development compared to other nations.