Influence of Pressure from Compression Textile Bands: Their Using in the Treatment of Venous Human Leg Ulcers

The aim of study was to evaluate pressure distribution characteristics of the elastic textile bandages using two instrumental techniques: a prototype Instrument and a load Transference. The prototype instrument which simulates shape of real leg has pressure sensors which measure bandage pressure. Using this instrument, the results show that elastic textile bandages presents different pressure distribution characteristics and none produces a uniform distribution around lower limb. The load transference test procedure is used to determine whether a relationship exists between elastic textile bandage structure and pressure distribution characteristics. The test procedure assesses degree of load, directly transferred through a textile when loads series are applied to bandaging surface. A range of weave fabrics was produced using needle weaving machine and a sewing technique. A textile bandage was developed with optimal characteristics far superior pressure distribution than other bandages. From results, we find that theoretical pressure is not consistent exactly with practical pressure. It is important in this study to make a practical application for specialized nurses in order to verify the results and draw useful conclusions for predicting the use of this type of elastic band.

Growth, Population, Exports and Wagner's Law: A Case Study of Pakistan (1972-2007)

The objective of this study is to examine the validity of Wagner-s law and relationship between economic growth, population and export for Pakistan. The ARDL Bounds cointegration and ECM are utilized for long and short run equilibrium for the period of 1972-2007. Population has considerable role in an economy and exports are the main source to raise the GDP. With the increase in GDP, the government expenditures may or may not increase. The empirical results indicate that the Wagner-s Law does hold, as economic growth is significantly and positively correlated with government expenditures. However, population and exports have also significant and positive impact on government expenditures both in short and long run. The significant and negative coefficient of error correction term in ECM indicates that after a shock, the long rum equilibrium will again converge towards equilibrium about 70.82 percent within a year.

Turkish Emerging Adults' Identity Statuses with Respect to Marital and Parental Statuses and SES

Emerging adulthood, between the ages of 18 and 25, as a new developmental stage extending from adolescence to young adulthood. According to Arnett [2004], there are experiments related to identity in three basic fields which are love, work and view of the world in emerging adulthood. When the literature related to identity is examined, it is seen that identity has been studied more with adolescent, and studies were concentrated on the relationship of identity with many demographic variables neglecting important variables such as marital status, parental status and SES. Thus, the main aim of this study is to determine whether identity statuses differenciate with marital status, parental status and SES. A total of 700 emerging adults participated in this study, and the mean age was 22,45 years [SD = 3.76]. The sample was made up of 347 female and 353 male. All participants in the study were students from colleges. Student responses to the Extended Version of the Objective Measure of Ego Identity Status [EOM-EIS-2] used to classify students into one of the four identity statuses. SPSS 15.00 program wasa used to analyse data. Percentage, frequency and X2 analysis were used in the analysis of data. When the findings of the study is viewed as a whole, the most frequently observed identity status in the group is found to be moratorium. Also, identity statuses differenciate with marital status, parental status and SES. Findings were discussed in the context of emerging adulthood.

Liveness Detection for Embedded Face Recognition System

To increase reliability of face recognition system, the system must be able to distinguish real face from a copy of face such as a photograph. In this paper, we propose a fast and memory efficient method of live face detection for embedded face recognition system, based on the analysis of the movement of the eyes. We detect eyes in sequential input images and calculate variation of each eye region to determine whether the input face is a real face or not. Experimental results show that the proposed approach is competitive and promising for live face detection.

Experimental Evaluation of Methane Adsorptionon Granular Activated Carbon (GAC) and Determination of Model Isotherm

This study investigates the capacity of granular activated carbon (GAC) for the storage of methane through the equilibrium adsorption. An experimental apparatus consist of a dual adsorption vessel was set up for the measurement of equilibrium adsorption of methane on GAC using volumetric technique (pressure decay). Experimental isotherms of methane adsorption were determined by the measurement of equilibrium uptake of methane in different pressures (0-50 bar) and temperatures (285.15-328.15°K). The experimental data was fitted to Freundlich and Langmuir equations to determine the model isotherm. The results show that the experimental data is equally well fitted by the both model isotherms. Using the experimental data obtained in different temperatures the isosteric heat of methane adsorption was also calculated by the Clausius-Clapeyron equation from the Sips isotherm model. Results of isosteric heat of adsorption show that decreasing temperature or increasing methane uptake by GAC decrease the isosteric heat of methane adsorption.

Groundwater Contamination due to Bhalaswa Landfill Site in New Delhi

Sampling and analysis of leachate from Bhalaswa landfill and groundwater samples from nearby locations, clearly indicated the likely contamination of groundwater due to landfill leachate. The results of simulation studies carried out for the migration of Chloride from landfill shows that the simulation results are in consonance with the observed concentration of Chloride in the vicinity of landfill facility. The solid waste disposal system presently being practiced in Delhi consists of mere dumping of wastes generated, at three locations Bhalaswa, Ghazipur, and Okhla without any regard to proper care for the protection of surrounding environment. Bhalaswa landfill site in Delhi, which is being operated as a dump site, is expected to become cause of serious groundwater pollution in its vicinity. The leachate from Bhalaswa landfill was found to be having a high concentration of chlorides, as well as DOC, COD. The present study was undertaken to determine the likely concentrations of principle contaminants in the groundwater over a period of time due to the discharge of such contaminants from landfill leachates to the underlying groundwater. The observed concentration of chlorides in the groundwater within 75m of the radius of landfill facility was found to be in consonance with the simulated concentration of chloride in groundwater considering one dimensional transport model, with finite mass of contaminant source. Governing equation of contaminant transport involving advection and diffusion-dispersion was solved in matlab7.0 using finite difference method.

Fuzzy based Security Threshold Determining for the Statistical En-Route Filtering in Sensor Networks

In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false reports during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and overhead. In this paper, we propose a fuzzy logic for determining a security threshold value in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the number of partitions in a global key pool, the number of compromised partitions, and the energy level of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.

Numerical Evaluation of the Aerodynamic Efficiency of the Stevens and Jolly Vertical- Axis Windmill (1895)

This paper presents a numerical investigation of the unsteady flow around an American 19th century vertical-axis windmill: the Stevens & Jolly rotor, patented on April 16, 1895. The computational approach used is based on solving the complete transient Reynolds-Averaged Navier-Stokes (t-RANS) equations: a full campaign of numerical simulation has been performed using the k-ω SST turbulence model. Flow field characteristics have been investigated for several values of tip speed ratio and for a constant unperturbed free-stream wind velocity of 6 m/s, enabling the study of some unsteady flow phenomena in the rotor wake. Finally, the global power generated from the windmill has been determined for each simulated angular velocity, allowing the calculation of the rotor power-curve.

Antioxydant and Antibacterial Activity of Alkaloids and Terpenes Extracts from Euphorbia granulata

In order to enhance the knowledge of certain phytochemical Algerian plants that are widely used in traditional medicine and to exploit their therapeutic potential in modern medicine, we have done a specific extraction of terpenes and alkaloids from the leaves of Euphorbia granulata to evaluate the antioxidant and antibacterial activity of this extracts. After the extraction it was found that the terpene extract gave the highest yield 59.72% compared with alkaloids extracts. The disc diffusion method was used to determine the antibacterial activity against different bacterial strains: Escherichia coli (ATCC25922), Pseudomonas aeruginosa (ATCC27853) and Staphylococcus aureus (ATCC25923). All extracts have shown inhibition of growth bacteria. The different zones of inhibition have varied from (7 -10 mm) according to the concentrations of extract used. Testing the antiradical activity on DPPH-TLC plates indicated the presence of substances that have potent anti-free radical. As against, the BC-TLC revealed that only terpenes extract which was reacted positively. These results can validate the importance of Euphorbia granulata in traditional medicine.

Search Engine Module in Voice Recognition Browser to Facilitate the Visually Impaired in Virtual Learning (MGSYS VISI-VL)

Nowadays, web-based technologies influence in people-s daily life such as in education, business and others. Therefore, many web developers are too eager to develop their web applications with fully animation graphics and forgetting its accessibility to its users. Their purpose is to make their web applications look impressive. Thus, this paper would highlight on the usability and accessibility of a voice recognition browser as a tool to facilitate the visually impaired and blind learners in accessing virtual learning environment. More specifically, the objectives of the study are (i) to explore the challenges faced by the visually impaired learners in accessing virtual learning environment (ii) to determine the suitable guidelines for developing a voice recognition browser that is accessible to the visually impaired. Furthermore, this study was prepared based on an observation conducted with the Malaysian visually impaired learners. Finally, the result of this study would underline on the development of an accessible voice recognition browser for the visually impaired.

Feasible Traits of TV and Web as Media for Advertisements and Their Influences on Buying Behavior– A Comparative Study on Indian Perspective

Advertising is one of the important marketing strategies and the choice of media is an important aspect of effectiveness of advertising media. The two most popular advertising media, TV and web media are highly effective in creating successful advertisements as they influence the purchase decision of the viewers. Although TV and web are electronic media, they are unique in their features and traits of advertising. Hence, the present study attempts to analyze the influence of these two media towards buying behavior of the viewers. The two media are analyzed separately to determine its level of influence towards buying behavior and finally a comparative analysis of these media is attempted to find the difference in their level of influence.

Evaluating the Interactions of Co2-Ionic Liquid Systems through Molecular Modeling

Owing to the stringent environmental legislations, CO2 capture and sequestration is one of the viable solutions to reduce the CO2 emissions from various sources. In this context, Ionic liquids (ILs) are being investigated as suitable absorption media for CO2 capture. Due to their non-evaporative, non-toxic, and non-corrosive nature, these ILs have the potential to replace the existing solvents like aqueous amine solutions for CO2 separation technologies. Thus, the present work aims at studying the important aspects such as the interactions of CO2 molecule with different anions (F-, Br-, Cl-, NO3 -, BF4 -, PF6 -, Tf2N-, and CF3SO3 -) that are commonly used in ILs through molecular modeling. In this, the minimum energy structures have been obtained using Ab initio based calculations at MP2 (Moller-Plesset perturbation) level. Results revealed various degrees of distortion of CO2 molecule (from its linearity) with the anions studied, most likely due to the Lewis acid-base interactions between CO2 and anion. Furthermore, binding energies for the anion-CO2 complexes were also calculated. The implication of anion-CO2 interactions to the solubility of CO2 in ionic liquids is also discussed.

Performance Analysis of QS-CDMA Systems

In the paper, the performance of quasi-synchronous CDMA (QS-CDMA) system, which can allow an increased timing error in synchronized access, is discussed. Average BER performance of the system is analyzed in the condition of different access timing error and different asynchronous users by simulation in AWGN channel. The results show that QS-CDMA system is shown to have great performance gain over the asynchronous system when access timing error is within a few chips and asynchronous users is tolerable. However, with access timing error increasing and asynchronous users increasing, the performance of QS-CDMA will degrade. Also, we can determine the number of tolerable asynchronous users for different access timing error by simulation figures.

Numerical Simulation of Electric and Hydrodynamic Fields Distribution in a Dielectric Liquids Electrofilter Cell

In this paper a numerical simulation of electric and hydrodynamic fields distribution in an electrofilter for dielectric liquids cell is made. The simulation is made with the purpose to determine the trajectory of particles that moves under the action of external force in an electric and hydrodynamic field created inside of an electrofilter for dielectric liquids. Particle trajectory is analyzed for a dielectric liquid-solid particles suspension.

Attachment and Risk Taking: Are They Interrelated?

Attachment theory focuses on the bond that develops between child and caretaker and the consequences that this bond has on the childs future relationships. Adolescents attempt to define their identity by experiencing various risky behaviors. The first aim of the study was whether risk taking behavior differs according to attachment styles. The second was to examine risk taking behavior differences according to gender. The third aim of this study was to examine attachment X gender interaction effect for risk taking behavior. And final was to investigate attachment styles differences according to gender. Data were collected from 218 participants (114 female and 104 male) who are university students. The results of this study showed that attachment styles differentiated by risk taking behavior and males had higher risk taking score than females. It was also found out that there was significant attachment X gender interaction effect for risk taking behavior. And finally, the results showed that attachment styles differentiated according to gender.KeywordsAttachment style, risk taking

How the Kinematic Swimming of European Eel Anguilla Anguilla Changes from Axial to Non-axial Velocity Flow

The aim of this study is to investigate the kinematics of undulatory elongated fish swimming against a velocity flow. We perform the experiments on European eel Anguilla Anguilla swimming in a hydrodynamic re-circulating tank with the velocity flow fixed at 0.2 m/s. We find that the undulating shape of overall eel body changes when it swims slantwise from the flow direction, by comparison to axial undulation shape. We examine this kinematics and we propose a general equation describing the lateral position of undulation body taking into account the direction of the eel-s swimming.

Simulating Discrete Time Model Reference Adaptive Control System with Great Initial Error

This article is based on the technique which is called Discrete Parameter Tracking (DPT). First introduced by A. A. Azab [8] which is applicable for less order reference model. The order of the reference model is (n-l) and n is the number of the adjustable parameters in the physical plant. The technique utilizes a modified gradient method [9] where the knowledge of the exact order of the nonadaptive system is not required, so, as to eliminate the identification problem. The applicability of the mentioned technique (DPT) was examined through the solution of several problems. This article introduces the solution of a third order system with three adjustable parameters, controlled according to second order reference model. The adjustable parameters have great initial error which represent condition. Computer simulations for the solution and analysis are provided to demonstrate the simplicity and feasibility of the technique.

Investigation of 5,10,15,20-Tetrakis(3-,5--Di-Tert-Butylphenyl)Porphyrinatocopper(II) for Electronics Applications

In this work, an organic compound 5,10,15,20- Tetrakis(3,5-di-tertbutylphenyl)porphyrinatocopper(II) (TDTBPPCu) is studied as an active material for thin film electronic devices. To investigate the electrical properties of TDTBPPCu, junction of TDTBPPCu with heavily doped n-Si and Al is fabricated. TDTBPPCu film was sandwiched between Al and n-Si electrodes. Various electrical parameters of TDTBPPCu are determined. The current-voltage characteristics of the junction are nonlinear, asymmetric and show rectification behavior, which gives the clue of formation of depletion region. This behavior indicates the potential of TDTBPPCu for electronics applications. The current-voltage and capacitance-voltage techniques are used to find the different electronic parameters.

Two Stage Control Method Using a Disturbance Observer and a Kalman Filter

This paper describes the two stage control using a disturbance observer and a Kalman filter. The system feedback uses the estimated state when it controls the speed. After the change-over point, its feedback uses the controlled plant output when it controls the position. To change the system continually, a change-over point has to be determined pertinently, and the controlled plant input has to be adjusted by the addition of the appropriate value. The proposed method has noise-reduction effect. It changes the system continually, even if the controlled plant identification has the error. Although the conventional method needs a speed sensor, the proposed method does not need it. The proposed method has a superior robustness compared with the conventional two stage control.

A Review of Coverage and Routing for Wireless Sensor Networks

The special constraints of sensor networks impose a number of technical challenges for employing them. In this review, we study the issues and existing protocols in three areas: coverage and routing. We present two types of coverage problems: to determine the minimum number of sensor nodes that need to perform active sensing in order to monitor a certain area; and to decide the quality of service that can be provided by a given sensor network. While most routing protocols in sensor networks are data-centric, there are other types of routing protocols as well, such as hierarchical, location-based, and QoS-aware. We describe and compare several protocols in each group. We present several multipath routing protocols and single-path with local repair routing protocols, which are proposed for recovering from sensor node crashes. We also discuss some transport layer schemes for reliable data transmission in lossy wireless channels.