Abstract: This study analyses store layout among the many
factors that underlie supermarket store design, this; in terms of what to
display in a shop and where to place the items. This report examines
newly-opened stores and evaluates their interior shop floor layouts,
which we then attempt to categorize by various styles. We then
consider the interaction between shop floor layout and customer
behavior from the perspective of the supermarket as the seller. At this
point, we focus on the “store magnets"–the main sections within the
shop likely to attract customers into the store.
Abstract: Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.
Abstract: Biological treatment of secondary effluent wastewater
by two combined denitrification/oxic filtration systems packed with
Lock type(denitrification filter) and ceramic ball (oxic filter) has been
studied for 5months. Two phases of operating conditions were carried
out with an influent nitrate and ammonia concentrations varied from
5.8 to 11.7mg/L and 5.4 to 12.4mg/L,respectively.
Denitrification/oxic filter treatment system were operated under an
EBCT (Empty Bed Contact Time) of 4h at system recirculation ratio in
the range from 0 to 300% (Linear Velocity increased 19.5m/d to
78m/d). The system efficiency of denitrification , nitrification over
95% respectively. Total nitrogen and COD removal range from
54.6%(recirculation 0%) to 92.3%(recirculation 300%) and 10% to
62.5%, respectively.
Abstract: This paper presents the concept and realisation of an
e-learning tool that provides predefined or automatically generated
exercises concerning logistics cost accounting. Students may practise
where and whenever they like to via the Internet. Their solutions are
marked automatically by the tool while considering consecutive
faults and without any intervention of lecturers.
Abstract: As is known, one of the priority directions of research
works of natural sciences is introduction of applied section of
contemporary mathematics as approximate and numerical methods to
solving integral equation into practice. We fare with the solving of
integral equation while studying many phenomena of nature to whose
numerically solving by the methods of quadrature are mainly applied.
Taking into account some deficiency of methods of quadrature for
finding the solution of integral equation some sciences suggested of
the multistep methods with constant coefficients. Unlike these papers,
here we consider application of hybrid methods to the numerical
solution of Volterra integral equation. The efficiency of the suggested
method is proved and a concrete method with accuracy order p = 4
is constructed. This method in more precise than the corresponding
known methods.
Abstract: In this paper we explore the application of a formal proof system to verification problems in cryptography. Cryptographic properties concerning correctness or security of some cryptographic algorithms are of great interest. Beside some basic lemmata, we explore an implementation of a complex function that is used in cryptography. More precisely, we describe formal properties of this implementation that we computer prove. We describe formalized probability distributions (o--algebras, probability spaces and condi¬tional probabilities). These are given in the formal language of the formal proof system Isabelle/HOL. Moreover, we computer prove Bayes' Formula. Besides we describe an application of the presented formalized probability distributions to cryptography. Furthermore, this paper shows that computer proofs of complex cryptographic functions are possible by presenting an implementation of the Miller- Rabin primality test that admits formal verification. Our achievements are a step towards computer verification of cryptographic primitives. They describe a basis for computer verification in cryptography. Computer verification can be applied to further problems in crypto-graphic research, if the corresponding basic mathematical knowledge is available in a database.
Abstract: Nowadays, doping is an intricate dilemma. Wrestling
is the nationally popular sport in Iran. Also the prevalence of doping
may be high, due to its power demanding characteristics. So, we
aimed to assess the knowledge and attitudes toward doping among
the club wrestlers. In a cross sectional study, 426 wrestlers were
studied. For this reason, a researcher made questionnaire was used. In
this study, researchers selected the clubs by randomized clustered
sampling and distributed the questionnaire among wrestlers.
Knowledge of wrestlers in three categories of doping definitions,
recognition of prohibited drugs and side effects was poor or moderate
in 70.8%, 95.8% and 99.5%, respectively. Wrestlers have poor
knowledge in doping. Furthermore, they believe some myths which
are unfavorable. It seems necessary to design a comprehensive
educational program for all of the athletes and coaches.
Abstract: Grid computing is a high performance computing
environment to solve larger scale computational applications. Grid
computing contains resource management, job scheduling, security
problems, information management and so on. Job scheduling is a
fundamental and important issue in achieving high performance in
grid computing systems. However, it is a big challenge to design an
efficient scheduler and its implementation. In Grid Computing, there
is a need of further improvement in Job Scheduling algorithm to
schedule the light-weight or small jobs into a coarse-grained or
group of jobs, which will reduce the communication time,
processing time and enhance resource utilization. This Grouping
strategy considers the processing power, memory-size and
bandwidth requirements of each job to realize the real grid system.
The experimental results demonstrate that the proposed scheduling
algorithm efficiently reduces the processing time of jobs in
comparison to others.
Abstract: Insect pests are the major source of crop
damage, yield and quality reduction in Pakistan and else
where in the world. Cotton crop is the most hit crop in
Pakistan followed by rice and the second most important
foreign exchange earning crop. A wide variety of staple,
horticultural and cash crops grown, reflect serious problems of
many types of insect pests. To overcome the insect pest
problem, pesticide use in Pakistan has increased substantially
which has now been further intensified. Pesticides worth more
than billions of rupees are imported every year. This paper
reviews the over all pesticide use in Pakistan in relation to
pesticide prices, support price of cotton and rice, pesticide use
in different provinces of Pakistan on different crops and their
impact on crop productivity. The environmental pollution
caused by the use of pesticides, contamination of soil and
water resources and the danger associated with the disposal of
their empty containers is also discussed in detail.
Abstract: A theory for optimal filtering of infinite sets of random
signals is presented. There are several new distinctive features of the
proposed approach. First, a single optimal filter for processing any
signal from a given infinite signal set is provided. Second, the filter is
presented in the special form of a sum with p terms where each term
is represented as a combination of three operations. Each operation
is a special stage of the filtering aimed at facilitating the associated
numerical work. Third, an iterative scheme is implemented into the
filter structure to provide an improvement in the filter performance at
each step of the scheme. The final step of the scheme concerns signal
compression and decompression. This step is based on the solution of
a new rank-constrained matrix approximation problem. The solution
to the matrix problem is described in this paper. A rigorous error
analysis is given for the new filter.
Abstract: Longitudinal data typically have the characteristics of
changes over time, nonlinear growth patterns, between-subjects
variability, and the within errors exhibiting heteroscedasticity and
dependence. The data exploration is more complicated than that of
cross-sectional data. The purpose of this paper is to organize/integrate
of various visual-graphical techniques to explore longitudinal data.
From the application of the proposed methods, investigators can
answer the research questions include characterizing or describing the
growth patterns at both group and individual level, identifying the time
points where important changes occur and unusual subjects, selecting
suitable statistical models, and suggesting possible within-error
variance.
Abstract: Having a very many number of pipelines all over the
country, Iran is one of the countries consists of various ecosystems
with variable degrees of fragility and robusticity as well as
geographical conditions. This study presents a state-of-the-art method
to estimate environmental risks of pipelines by recommending
rational equations including FES, URAS, SRS, RRS, DRS, LURS
and IRS as well as FRS to calculate the risks. This study was carried
out by a relative semi-quantitative approach based on land uses and
HVAs (High-Value Areas). GIS as a tool was used to create proper
maps regarding the environmental risks, land uses and distances. The
main logic for using the formulas was the distance-based approaches
and ESI as well as intersections. Summarizing the results of the
study, a risk geographical map based on the ESIs and final risk score
(FRS) was created. The study results showed that the most sensitive
and so of high risk area would be an area comprising of mangrove
forests located in the pipeline neighborhood. Also, salty lands were
the most robust land use units in the case of pipeline failure
circumstances. Besides, using a state-of-the-art method, it showed
that mapping the risks of pipelines out with the applied method is of
more reliability and convenience as well as relative
comprehensiveness in comparison to present non-holistic methods for
assessing the environmental risks of pipelines. The focus of the
present study is “assessment" than that of “management". It is
suggested that new policies are to be implemented to reduce the
negative effects of the pipeline that has not yet been constructed
completely
Abstract: In recent years, rehabilitation has been the subject of extensive research due to increased spending on building work and repair of built works. In all cases, it is absolutely essential to carry out methods of strengthening or repair of structural elements, and that following an inspection analysis and methodology of a correct diagnosis. The reinforced concrete columns are important elements in building structures. They support the vertical loads and provide bracing against the horizontal loads. This research about the behavior of reinforced concrete rectangular columns, rehabilitated by concrete liner, confinement FRP fabric, steel liner or cage formed by metal corners. It allows comparing the contributions of different processes used perspective section resistance elements rehabilitated compared to that is not reinforced or repaired. The different results obtained revealed a considerable gain in bearing capacity failure of reinforced sections cladding concrete, metal bracket, steel plates and a slight improvement to the section reinforced with fabric FRP. The use of FRP does not affect the weight of the structures, but the use of different techniques cladding increases the weight of elements rehabilitated and therefore the weight of the building which requires resizing foundations.
Abstract: European Rail Traffic Management System (ERTMS) is the European reference for interoperable and safer signaling systems to efficiently manage trains running. If implemented, it allows trains cross seamlessly intra-European national borders. ERTMS has defined a secure communication protocol, EURORADIO, based on open communication networks. Its RadioInfill function can improve the reaction of the signaling system to changes in line conditions, avoiding unnecessary braking: its advantages in terms of power saving and travel time has been analyzed. In this paper a software implementation of the EURORADIO protocol with RadioInfill for ERTMS Level 1 using GSM-R is illustrated as part of the SR-Secure Italian project. In this building-blocks architecture the EURORADIO layers communicates together through modular Application Programm Interfaces. Security coding rules and railway industry requirements specified by EN 50128 standard have been respected. The proposed implementation has successfully passed conformity tests and has been tested on a computer-based simulator.
Abstract: This study is about an application of King Bhumibol
Adulyadej’s “Learn Wisely” (LW) concept in instructional design
and management process at the Faculty of Education, Suan Sunahdha
Rajabhat University. The concept suggests four strategies for true
learning. Related literature and significant LW methods in teaching
and learning are also reviewed and then applied in designing a
pedagogy learning module. The design has been implemented in
three classrooms with a total of 115 sophomore student teachers.
After one consecutive semester of managing and adjusting the
process by instructors and experts using collected data from minutes,
assessment of learning management, satisfaction and learning
achievement of the students, it is found that the effective SSRU
model of LW instructional method comprises of five steps.
Abstract: Microtomographic images and thin section (TS)
images were analyzed and compared against some parameters of
geological interest such as porosity and its distribution along the
samples. The results show that microtomography (CT) analysis,
although limited by its resolution, have some interesting information
about the distribution of porosity (homogeneous or not) and can also
quantify the connected and non-connected pores, i.e., total porosity.
TS have no limitations concerning resolution, but are limited by the
experimental data available in regards to a few glass sheets for
analysis and also can give only information about the connected
pores, i.e., effective porosity. Those two methods have their own
virtues and flaws but when paired together they are able to
complement one another, making for a more reliable and complete
analysis.
Abstract: We present a method to create special domain
collections from news sites. The method only requires a single
sample article as a seed. No prior corpus statistics are needed and the
method is applicable to multiple languages. We examine various
similarity measures and the creation of document collections for
English and Japanese. The main contributions are as follows. First,
the algorithm can build special domain collections from as little as
one sample document. Second, unlike other algorithms it does not
require a second “general" corpus to compute statistics. Third, in our
testing the algorithm outperformed others in creating collections
made up of highly relevant articles.
Abstract: As the development of digital technology is increasing,
Digital cinema is getting more spread.
However, content copy and attack against the digital cinema becomes
a serious problem. To solve the above security problem, we propose
“Additional Watermarking" for digital cinema delivery system. With
this proposed “Additional watermarking" method, we protect content
copyrights at encoder and user side information at decoder. It realizes
the traceability of the watermark embedded at encoder.
The watermark is embedded into the random-selected frames using
Hash function. Using it, the embedding position is distributed by Hash
Function so that third parties do not break off the watermarking
algorithm.
Finally, our experimental results show that proposed method is much
better than the convenient watermarking techniques in terms of
robustness, image quality and its simple but unbreakable algorithm.
Abstract: Energy intensity(energy consumption intensity) is a
global index which computes the required energy for producing a
specific value of goods and services in each country. It is computed
in terms of initial energy supply or final energy consumption. In this
study (research) Divisia method is used to decompose energy
consumption and energy intensity. This method decomposes
consumption and energy intensity to production effects, structural
and net intensity and could be done as time series or two-periodical.
This study analytically investigates consumption changes and energy
intensity on economical sectors of Iran and more specific on road
transportation(rail road and road).Our results show that the
contribution of structural effect (change in economical activities
combination) is very low and the effect of net energy consumption
has the higher contribution in consumption changes and energy
intensity. In other words, the high consumption of energy is due to
Intensity of energy consumption and is not to structural effect of
transportation sector.
Abstract: Engineered nanoparticles’ usage rapidly increased in
various applications in the last decade due to their unusual properties.
However, there is an ever increasing concern to understand their
toxicological effect in human health. Particularly, metal and metal
oxide nanoparticles have been used in various sectors including
biomedical, food and agriculture. But their impact on human health is
yet to be fully understood. In this present investigation, we assessed
the toxic effect of engineered nanoparticles (ENPs) including Ag,
MgO and Co3O4 nanoparticles (NPs) on human mesenchymal stem
cells (hMSC) adopting cell viability and cellular morphological
changes as tools The results suggested that silver NPs are more toxic
than MgO and Co3O4NPs. The ENPs induced cytotoxicity and
nuclear morphological changes in hMSC depending on dose. The cell
viability decreases with increase in concentration of ENPs. The
cellular morphology studies revealed that ENPs damaged the cells.
These preliminary findings have implications for the use of these
nanoparticles in food industry with systematic regulations.