Abstract: The γ-turns play important roles in protein folding and
molecular recognition. The prediction and analysis of γ-turn types are
important for both protein structure predictions and better
understanding the characteristics of different γ-turn types. This study
proposed a physicochemical property-based decision tree (PPDT)
method to interpretably predict γ-turn types. In addition to the good
prediction performance of PPDT, three simple and human
interpretable IF-THEN rules are extracted from the decision tree
constructed by PPDT. The identified informative physicochemical
properties and concise rules provide a simple way for discriminating
and understanding γ-turn types.
Abstract: This paper aims to provide a conceptual framework to examine competitive disadvantage of banks that suffer from poor performance. Banks generate revenues mainly from the interest rate spread on taking deposits and making loans while collecting fees in the process. To maximize firm value, banks seek loan growth and expense control while managing risk associated with loans with respect to non-performing borrowers or narrowing interest spread between assets and liabilities. Competitive disadvantage refers to the failure to access imitable resources and to build managing capabilities to gain sustainable return given appropriate risk management. This paper proposes a four-quadrant framework of organizational typology is subsequently proposed to examine the features of competitive disadvantage in the banking sector. A resource configuration model, which is extracted from CAMEL indicators to examine the underlying features of bank failures.
Abstract: Fluid flow and heat transfer of vertical full cone
embedded in porous media is studied in this paper. Nonlinear
differential equation arising from similarity solution of inverted cone
(subjected to wall temperature boundary conditions) embedded in
porous medium is solved using a hybrid neural network- particle
swarm optimization method.
To aim this purpose, a trial solution of the differential equation is
defined as sum of two parts. The first part satisfies the initial/
boundary conditions and does contain an adjustable parameter and
the second part which is constructed so as not to affect the
initial/boundary conditions and involves adjustable parameters (the
weights and biases) for a multi-layer perceptron neural network.
Particle swarm optimization (PSO) is applied to find adjustable
parameters of trial solution (in first and second part). The obtained
solution in comparison with the numerical ones represents a
remarkable accuracy.
Abstract: Chest pain is one of the most prevalent complaints
among adults that cause the people to attend to medical centers. The
aim was to determine the prevalence and risk factors of chest pain
among over 30 years old people in Tehran. In this cross-sectional
study, 787 adults took part from Apr 2005 until Apr 2006. The
sampling method was random cluster sampling and there were 25
clusters. In each cluster, interviews were performed with 32 over 30
years old, people lived in those houses. In cases with chest pain, extra
questions asked. The prevalence of CP was 9% (71 cases). Of them
21 cases (6.5%) were in 41-60 year age ranges and the remainders
were over 61 year old. 19 cases (26.8%) mentioned CP in resting
state and all of the cases had exertion onset CP. The CP duration was
10 minutes or less in all of the cases and in most of them (84.5%), the
location of pain mentioned left anterior part of chest, left anterior part
of sternum and or left arm. There was positive history of myocardial
infarction in 12 cases (17%). There was significant relation between
CP and age, sex and between history of myocardial infarction and
marital state of study people. Our results are similar to other studies-
results in most parts, however it is necessary to perform
supplementary tests and follow up studies to differentiate between
cardiac and non-cardiac CP exactly.
Abstract: Medical image data hiding has strict constrains such
as high imperceptibility, high capacity and high robustness.
Achieving these three requirements simultaneously is highly
cumbersome. Some works have been reported in the literature on
data hiding, watermarking and stegnography which are suitable for
telemedicine applications. None is reliable in all aspects. Electronic
Patient Report (EPR) data hiding for telemedicine demand it blind
and reversible. This paper proposes a novel approach to blind
reversible data hiding based on integer wavelet transform.
Experimental results shows that this scheme outperforms the prior
arts in terms of zero BER (Bit Error Rate), higher PSNR (Peak Signal
to Noise Ratio), and large EPR data embedding capacity with
WPSNR (Weighted Peak Signal to Noise Ratio) around 53 dB,
compared with the existing reversible data hiding schemes.
Abstract: This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent techniques in cryptography. The main aim is the development of recent crypt analysis hash function. We present different approaches to defining security properties more formally and present basic attack on hash function. We recall Merkle-Damgard security properties of iterated hash function. The Main aim of this paper is the development of recent techniques applicable to crypt Analysis hash function, mainly from SHA family. Recent proposed attacks an MD5 & SHA motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks on hash functions.
Abstract: Public awareness towards green energy are on the rise and this can be prove by many product being manufactured or prerequired to be made as energy saving devices mainly to save consumer from spending more on utility billing. These schemes are popular nowadays and many homemade appliances are turned into energy saving gadget which attracts the attention of consumers. Knowing the public demands and pattern towards purchasing home appliances thus the idea of “energy saving suction hood (ESSH)" is proposed. The ESSH can be used in many places that require smoke ventilation or even to reduce the room temperature as many conventional suction hoods (CSH) do, but this device works automatically by the usage of sensors that detects the smoke/temperature and automatically spins the exhaust fan. As it turns, the mechanical rotation rotates the AC generator which is coupled together with the fan and then charges the battery. The innovation of this product is, it does not rely on the utility supply as it is also hook up with a solar panel which also charges the battery, Secondly, it generates energy as the exhaust fan mechanically rotates. Thirdly, an energy loop back feature is introduced to this system which will supply for the ventilator fan. Another major innovation is towards interfacing this device with an in house production of generator. This generator is produced by proper design on stator as well as rotor to reduce the losses. A comparison is made between the ESSH and the CSH and result shows that the ESSH saves 172.8kWh/year of utility supply which is used by CSH. This amount of energy can save RM 3.14 from monthly utility bill and a total of RM 37.67 per year. In fact this product can generate 175 Watt of power from generator(75W) and solar panel(100W) that can be used either to supply other household appliances and/or to loop back to supply the fans motor. The innovation of this system is essential for future production of other equipment by using the loopback power method and turning most equipment into a standalone system.
Abstract: In this study the adsorption of Cu (II) ions from aqueous solutions on synthetic zeolite NaA was evaluated. The effect of solution temperature and the determination of the kinetic parameters of adsorption of Cu(II) from aqueous solution on zeolite NaA is important in understanding the adsorption mechanism. Variables of the system include adsorption time, temperature (293- 328K), initial solution concentration and pH for the system. The sorption kinetics of the copper ions were found to be strongly dependent on pH (the optimum pH 3-5), solute ion concentration and temperature (293 – 328 K). It was found, the pseudo-second-order model was the best choice among all the kinetic models to describe the adsorption behavior of Cu(II) onto ziolite NaA, suggesting that the adsorption mechanism might be a chemisorptions process The activation energy of adsorption (Ea) was determined as Cu(II) 13.5 kJ mol-1. The low value of Ea shows that Cu(II) adsorption process by zeolite NaA may be an activated chemical adsorption. The thermodynamic parameters (ΔG0, ΔH0, and ΔS0) were also determined from the temperature dependence. The results show that the process of adsorption Cu(II) is spontaneous and endothermic process and rise in temperature favors the adsorption.
Abstract: This paper presents a new approach to tackle the problem of recognizing machine-printed Arabic texts. Because of the difficulty of recognizing cursive Arabic words, the text has to be normalized and segmented to be ready for the recognition stage. The new scheme for recognizing Arabic characters depends on multiple parallel neural networks classifier. The classifier has two phases. The first phase categories the input character into one of eight groups. The second phase classifies the character into one of the Arabic character classes in the group. The system achieved high recognition rate.
Abstract: When architecting an application, key nonfunctional requirements such as performance, scalability, availability and security, which influence the architecture of the system, are some times not adequately addressed. Performance of the application may not be looked at until there is a concern. There are several problems with this reactive approach. If the system does not meet its performance objectives, the application is unlikely to be accepted by the stakeholders. This paper suggests an approach for performance modeling for web based J2EE and .Net applications to address performance issues early in the development life cycle. It also includes a Performance Modeling Case Study, with Proof-of-Concept (PoC) and implementation details for .NET and J2EE platforms.
Abstract: The mechanism of microwave heating is essentially
that of dielectric heating. After exposing the emulsion to the
microwave Electromagnetic (EM) field, molecular rotation and ionic
conduction due to the penetration of (EM) into the emulsion are
responsible for the internal heating. To determine the capability of
microwave technology in demulsification of crude oil emulsions,
microwave demulsification method was applied in a 50-50 % and 20-
80 % water-in-oil emulsions with microwave exposure time varied
from 20-180 sec. Transient temperature profiles of water-in-oil
emulsions inside a cylindrical container were measured. The
temperature rise at a given location was almost horizontal (linear).
The average rates of temperature increase of 50-50 % and 20-80 %
water-in-oil emulsions are 0.351 and 0.437 oC/sec, respectively. The
rate of temperature increase of emulsions decreased at higher
temperature due to decreasing dielectric loss of water. These results
indicate that microwave demulsification of water-in-oil emulsions
does not require chemical additions. Microwave has the potential to
be used as an alternative way in the demulsification process.
Abstract: The purpose of this study is to identify the critical success factors (CSFs) for the effective implementation of Six Sigma in non-formal service Sectors.
Based on the survey of literature, the critical success factors (CSFs) for Six Sigma have been identified and are assessed for their importance in Non-formal service sector using Delphi Technique. These selected CSFs were put forth to the panel of expert to cluster them and prepare cognitive map to establish their relationship.
All the critical success factors examined and obtained from the review of literature have been assessed for their importance with respect to their contribution to Six Sigma effectiveness in non formal service sector.
The study is limited to the non-formal service sectors involved in the organization of religious festival only. However, the similar exercise can be conducted for broader sample of other non-formal service sectors like temple/ashram management, religious tours management etc.
The research suggests an approach to identify CSFs of Six Sigma for Non-formal service sector. All the CSFs of the formal service sector will not be applicable to Non-formal services, hence opinion of experts was sought to add or delete the CSFs. In the first round of Delphi, the panel of experts has suggested, two new CSFs-“competitive benchmarking (F19) and resident’s involvement (F28)”, which were added for assessment in the next round of Delphi. One of the CSFs-“fulltime six sigma personnel (F15)” has been omitted in proposed clusters of CSFs for non-formal organization, as it is practically impossible to deploy full time trained Six Sigma recruits.
Abstract: Cryptographic algorithms play a crucial role in the
information society by providing protection from unauthorized
access to sensitive data. It is clear that information technology will
become increasingly pervasive, Hence we can expect the emergence
of ubiquitous or pervasive computing, ambient intelligence. These
new environments and applications will present new security
challenges, and there is no doubt that cryptographic algorithms and
protocols will form a part of the solution. The efficiency of a public
key cryptosystem is mainly measured in computational overheads,
key size and bandwidth. In particular the RSA algorithm is used in
many applications for providing the security. Although the security
of RSA is beyond doubt, the evolution in computing power has
caused a growth in the necessary key length. The fact that most chips
on smart cards can-t process key extending 1024 bit shows that there
is need for alternative. NTRU is such an alternative and it is a
collection of mathematical algorithm based on manipulating lists of
very small integers and polynomials. This allows NTRU to high
speeds with the use of minimal computing power. NTRU (Nth degree
Truncated Polynomial Ring Unit) is the first secure public key
cryptosystem not based on factorization or discrete logarithm
problem. This means that given sufficient computational resources
and time, an adversary, should not be able to break the key. The
multi-party communication and requirement of optimal resource
utilization necessitated the need for the present day demand of
applications that need security enforcement technique .and can be
enhanced with high-end computing. This has promoted us to develop
high-performance NTRU schemes using approaches such as the use
of high-end computing hardware. Peer-to-peer (P2P) or enterprise
grids are proven as one of the approaches for developing high-end
computing systems. By utilizing them one can improve the
performance of NTRU through parallel execution. In this paper we
propose and develop an application for NTRU using enterprise grid
middleware called Alchemi. An analysis and comparison of its
performance for various text files is presented.
Abstract: Employees commonly encounter unpredictable and
unavoidable work related stressors. Exposure to such stressors can
evoke negative appraisals and associated adverse mental, physical,
and behavioral responses. Because Acceptance and Commitment
Therapy (ACT) emphasizes acceptance of unavoidable stressors and
diffusion from negative appraisals, it may be particularly beneficial
for work stress. Forty-five workers were randomly assigned to an
ACT intervention for work stress (n = 21) or a waitlist control group
(n = 24). The intervention consisted of two 3-hour sessions spaced
one week apart. An examination of group process and outcomes was
conducted using the Revised Sessions Rating Scale. Results indicated
that the ACT participants reported that they perceived the
intervention to be supportive, task focused, and without adverse
therapist behaviors (e.g., feelings of being criticized or discounted).
Additionally, the second session (values clarification and
commitment to action) was perceived to be more supportive and task
focused than the first session (mindfulness, defusion). Process ratings
were correlated with outcomes. Results indicated that perceptions of
therapy supportiveness and task focus were associated with reduced
psychological distress and improved perceived physical health.
Abstract: Burnishing is a method of finishing and hardening
machined parts by plastic deformation of the surface. Experimental
work based on central composite second order rotatable design has
been carried out on a lathe machine to establish the effects of ball
burnishing parameters on the surface roughness of brass material.
Analysis of the results by the analysis of variance technique and the
F-test show that the parameters considered, have significant effects
on the surface roughness.
Abstract: In spite of all advancement in software testing,
debugging remains a labor-intensive, manual, time consuming, and
error prone process. A candidate solution to enhance debugging
process is to fuse it with testing process. To achieve this integration,
a possible solution may be categorizing common software tests and
errors followed by the effort on fixing the errors through general
solutions for each test/error pair. Our approach to address this issue is
based on Christopher Alexander-s pattern and pattern language
concepts. The patterns in this language are grouped into three major
sections and connect the three concepts of test, error, and debug.
These patterns and their hierarchical relationship shape a pattern
language that introduces a solution to solve software errors in a
known testing context.
Finally, we will introduce our developed framework ADE as a
sample implementation to support a pattern of proposed language,
which aims to automate the whole process of evolving software
design via evolutionary methods.
Abstract: With the proliferation of World Wide Web,
development of web-based technologies and the growth in web
content, the structure of a website becomes more complex and web
navigation becomes a critical issue to both web designers and users.
In this paper we define the content and web pages as two important
and influential factors in website navigation and paraphrase the
enhancement in the website navigation as making some useful
changes in the link structure of the website based on the
aforementioned factors. Then we suggest a new method for
proposing the changes using fuzzy approach to optimize the website
architecture. Applying the proposed method to a real case of Iranian
Civil Aviation Organization (CAO) website, we discuss the results of
the novel approach at the final section.
Abstract: Proxy signature helps the proxy signer to sign
messages on behalf of the original signer. It is very useful when
the original signer (e.g. the president of a company) is not
available to sign a specific document. If the original signer can
not forge valid proxy signatures through impersonating the proxy
signer, it will be robust in a virtual environment; thus the original
signer can not shift any illegal action initiated by herself to the
proxy signer. In this paper, we propose a new proxy signature
scheme. The new scheme can prevent the original signer from
impersonating the proxy signer to sign messages. The proposed
scheme is based on the regular ElGamal signature. In addition,
the fair privacy of the proxy signer is maintained. That means,
the privacy of the proxy signer is preserved; and the privacy can
be revealed when it is necessary.
Abstract: TELMES project aims to develop a securized
multimedia system devoted to medical consultation teleservices. It
will be finalized with a pilot system for a regional telecenters
network that connects local telecenters, having as support
multimedia platforms. This network will enable the implementation
of complex medical teleservices (teleconsulations, telemonitoring,
homecare, urgency medicine, etc.) for a broader range of patients
and medical professionals, mainly for family doctors and those
people living in rural or isolated regions. Thus, a multimedia,
scalable network, based on modern IT&C paradigms, will result. It
will gather two inter-connected regional telecenters, in Iaşi and
Piteşti, Romania, each of them also permitting local connections of
hospitals, diagnostic and treatment centers, as well as local networks
of family doctors, patients, even educational entities. As
communications infrastructure, we aim to develop a combined fixmobile-
internet (broadband) links. Other possible communication
environments will be GSM/GPRS/3G and radio waves. The
electrocardiogram (ECG) acquisition, internet transmission and
local analysis, using embedded technologies, was already
successfully done for patients- telemonitoring.
Abstract: Ligula intestinalis is a three-host life-cycle
Pseudophyllidean Cestode which in its plerocercoid stage infests a
range of fresh water species. The objective of the present study was
the worm occurrence within planctonic copepods, fishes and
piscivorous birds and examine of parasite-hosts samples in the Lake
of Sattarkhan Dam (near the city of Ahar, East Azerbaijan, Iran).
Fish sample were collected with fyke and gill nets and the abdominal
cavity was examined for the presence of ligula. Zooplanktons were
captured using a planktonic net and occurrence of parasitic larval
form in the body cavity was determined. Piscivorous birds were
selected by telescope, they hunted and dissected for presence of
parasite eggs in their gut. Results indicated that prevalence of
infection was 16% for cyclopid copepoda and majority of infected
cyclopid were female Cyclops. Investigation of 310 fishes specimens
were indicated to infection of five species of cyprinid fishes. In
addition, results indicated to manipulation of six species of migratory
aquatic and semi aquatic birds by ligula. Obtained results are in
agreement by previous studies. Its definite in this study that all of
fishes in Sattarkhan Lake capable to infection, its important for
health because they capture by native people and it is documented
that ligula can be introduce as a zoonose. It's seemed that to prevent
from disperses of parasite and restricted of infection, biological
elimination can be effective and it's necessary to inform native
people about sanitation.