Abstract: This paper describes the historical development of
interethnic concord in the Republic of Kazakhstan, and emphasizes
the role of tolerance mentality of the Kazakh people in ethno-political
policy of the country. Moreover, pointing out interethnic concord as a
powerful stabilizing factor, it analyses the specifics of interethnic
policy in multinational Kazakh society. It summarizes that the culture
of interethnic concord can be a model of ethno- political policy of
Kazakhstan.
Abstract: This paper presents the effect of corrugation profile
geometry on the crushing behavior, energy absorption, failure
mechanism, and failure mode of woven roving glass fibre/epoxy
laminated composite tube. Experimental investigations were carried
out on composite tubes with three different profile shapes: sinusoidal,
triangular and trapezoidal. The tubes were subjected to lateral
compressive loading. On the addition to a radial corrugated
composite tube, cylindrical composite tube, were fabricated and
tested under the same condition in order to know the effect of
corrugation geometry. Typical histories of their deformation are
presented. Behavior of tubes as regards the peak crushing load,
energy absorbed and mode of crushing has been discussed. The
results show that the behavior of the tube under lateral compression
load is influenced by the geometry of the tube itself.
Abstract: This study examines the relevance of disclosure
practices in improving the accountability and transparency of
religious nonprofit organizations (RNPOs). The assessment of
disclosure is based on the annual returns of RNPOs for the financial
year 2010. In order to quantify the information disclosed in the
annual returns, partial disclosure indexes of basic information (BI)
disclosure index, financial information (FI) disclosure index and
governance information (GI) disclosure index have been built which
takes into account the content of information items in the annual
returns. The empirical evidence obtained revealed low disclosure
practices among RNPOs in the sample. The multiple regression
results showed that the organizational attribute of the board size
appeared to be the most significant predictor for both partial index on
the extent of BI disclosure index, and FI disclosure index. On the
other hand, the extent of financial information disclosure is related to
the amount of donation received by RNPOs. On GI disclosure index,
the existence of an external audit appeared to be significant variable.
This study has contributed to the academic literature in providing
empirical evidence of the disclosure practices among RNPOs.
Abstract: The solvated electron is self-trapped (polaron) owing
to strong interaction with the quantum polarization field. If the
electron and quantum field are strongly coupled then the collective
localized state of the field and quasi-particle is formed. In such a
formation the electron motion is rather intricate. On the one hand the
electron oscillated within a rather deep polarization potential well
and undergoes the optical transitions, and on the other, it moves
together with the center of inertia of the system and participates in
the thermal random walk. The problem is to separate these motions
correctly, rigorously taking into account the conservation laws. This
can be conveniently done using Bogolyubov-Tyablikov method of
canonical transformation to the collective coordinates. This
transformation removes the translational degeneracy and allows one
to develop the successive approximation algorithm for the energy and
wave function while simultaneously fulfilling the law of conservation
of total momentum of the system. The resulting equations determine
the electron transitions and depend explicitly on the translational
velocity of the quasi-particle as whole. The frequency of optical
transition is calculated for the solvated electron in ammonia, and an
estimate is made for the thermal-induced spectral bandwidth.
Abstract: The error diffusion method generates worm artifacts,
and weakens the edge of the halftone image when the continuous gray
scale image is reproduced by a binary image. First, to enhance the
edges, we propose the edge-enhancing filter by considering the
quantization error information and gradient of the neighboring pixels.
Furthermore, to remove worm artifacts often appearing in a halftone
image, we add adaptively random noise into the weights of an error
filter.
Abstract: In this paper, we evaluate the performance of some wavelet based coding algorithms such as 3D QT-L, 3D SPIHT and JPEG2K. In the first step we achieve an objective comparison between three coders, namely 3D SPIHT, 3D QT-L and JPEG2K. For this purpose, eight MRI head scan test sets of 256 x 256x124 voxels have been used. Results show superior performance of 3D SPIHT algorithm, whereas 3D QT-L outperforms JPEG2K. The second step consists of evaluating the robustness of 3D SPIHT and JPEG2K coding algorithm over wireless transmission. Compressed dataset images are then transmitted over AWGN wireless channel or over Rayleigh wireless channel. Results show the superiority of JPEG2K over these two models. In fact, it has been deduced that JPEG2K is more robust regarding coding errors. Thus we may conclude the necessity of using corrector codes in order to protect the transmitted medical information.
Abstract: Hybrid knowledge model is suggested as an underlying
framework for product development management. It can support such
hybrid features as ontologies and rules. Effective collaboration in
product development environment depends on sharing and reasoning
product information as well as engineering knowledge. Many studies
have considered product information and engineering knowledge.
However, most previous research has focused either on building the
ontology of product information or rule-based systems of engineering
knowledge. This paper shows that F-logic based knowledge model can
support such desirable features in a hybrid way.
Abstract: Wireless sensor networks (WSN) consists of many sensor nodes that are placed on unattended environments such as military sites in order to collect important information. Implementing a secure protocol that can prevent forwarding forged data and modifying content of aggregated data and has low delay and overhead of communication, computing and storage is very important. This paper presents a new protocol for concealed data aggregation (CDA). In this protocol, the network is divided to virtual cells, nodes within each cell produce a shared key to send and receive of concealed data with each other. Considering to data aggregation in each cell is locally and implementing a secure authentication mechanism, data aggregation delay is very low and producing false data in the network by malicious nodes is not possible. To evaluate the performance of our proposed protocol, we have presented computational models that show the performance and low overhead in our protocol.
Abstract: Image processing for capsule endoscopy requires large
memory and it takes hours for diagnosis since operation time is
normally more than 8 hours. A real-time analysis algorithm of capsule
images can be clinically very useful. It can differentiate abnormal
tissue from health structure and provide with correlation information
among the images. Bleeding is our interest in this regard and we
propose a method of detecting frames with potential bleeding in
real-time. Our detection algorithm is based on statistical analysis and
the shapes of bleeding spots. We tested our algorithm with 30 cases of
capsule endoscopy in the digestive track. Results were excellent where
a sensitivity of 99% and a specificity of 97% were achieved in
detecting the image frames with bleeding spots.
Abstract: The application of Neural Network for disease
diagnosis has made great progress and is widely used by physicians.
An Electrocardiogram carries vital information about heart activity and physicians use this signal for cardiac disease diagnosis which
was the great motivation towards our study. In our work, tachycardia
features obtained are used for the training and testing of a Neural
Network. In this study we are using Fuzzy Probabilistic Neural
Networks as an automatic technique for ECG signal analysis. As
every real signal recorded by the equipment can have different
artifacts, we needed to do some preprocessing steps before feeding it
to our system. Wavelet transform is used for extracting the
morphological parameters of the ECG signal. The outcome of the
approach for the variety of arrhythmias shows the represented
approach is superior than prior presented algorithms with an average
accuracy of about %95 for more than 7 tachy arrhythmias.
Abstract: Earlier studies in kinship networks have primarily
focused on observing the social relationships existing between family
relatives. In this study, we pre-identified hubs in the network to
investigate if they could play a catalyst role in the transfer of physical
information. We conducted a case study of a ceremony performed in
one of the families of a small Hindu community – the Uttar Rarhi
Kayasthas. Individuals (n = 168) who resided in 11 geographically
dispersed regions were contacted through our hub-based
representation. We found that using this representation, over 98% of
the individuals were successfully contacted within the stipulated
period. The network also demonstrated a small-world property, with
an average geodesic distance of 3.56.
Abstract: Grid computing is a high performance computing
environment to solve larger scale computational applications. Grid
computing contains resource management, job scheduling, security
problems, information management and so on. Job scheduling is a
fundamental and important issue in achieving high performance in
grid computing systems. However, it is a big challenge to design an
efficient scheduler and its implementation. In Grid Computing, there
is a need of further improvement in Job Scheduling algorithm to
schedule the light-weight or small jobs into a coarse-grained or
group of jobs, which will reduce the communication time,
processing time and enhance resource utilization. This Grouping
strategy considers the processing power, memory-size and
bandwidth requirements of each job to realize the real grid system.
The experimental results demonstrate that the proposed scheduling
algorithm efficiently reduces the processing time of jobs in
comparison to others.
Abstract: Social networking is one of the most successful and popular tools to emerge from the Web 2.0 era. However, the increased interconnectivity and access to peoples- personal lives and information has created a plethora of opportunities for the nefarious side of human nature to manifest. This paper categorizes and describes the major types of anti-social behavior and criminal activity that can arise through undisciplined use and/or misuse of social media. We specifically address identity theft, misrepresentation of information posted, cyber bullying, children and social networking, and social networking in the work place. Recommendations are provided for how to reduce the risk of being the victim of a crime or engaging in embarrassing behavior that could irrevocably harm one-s reputation either professionally or personally. We also discuss what responsibilities social networking companies have to protect their users and also what law enforcement and policy makers can do to help alleviate the problems.
Abstract: The motorway segment between Tangier and Oued
R’mel has experienced, since the beginning of building works,
significant instability and landslides linked to a number of geological,
hydrogeological and geothermic factors affecting the different
formations.
The landslides observed are not fully understood, despite many
studies conducted on this segment. This study aims at producing new
methods to better explain the phenomena behind the landslides,
taking into account the geotechnical and geothermic contexts. This
analysis builds up on previous studies and geotechnical data collected
in the field.
The final body of data collected shall be processed through the
Plaxis software for a better and customizable view of the landslide
problems in the area, which will help tofind solutions and stabilize
land in the area.
Abstract: Future astronomical projects on large space x-ray
imaging telescopes require novel substrates and technologies for the
construction of their reflecting mirrors. The mirrors must be
lightweight and precisely shaped to achieve large collecting area with
high angular resolution. The new materials and technologies must be
cost-effective. Currently, the most promising materials are glass or
silicon foils. We focused on precise shaping these foils by thermal
forming process. We studied free and forced slumping in the
temperature region of hot plastic deformation and compared the
shapes obtained by the different slumping processes. We measured
the shapes and the surface quality of the foils. In the experiments, we
varied both heat-treatment temperature and time following our
experiment design. The obtained data and relations we can use for
modeling and optimizing the thermal forming procedure.
Abstract: Microtomographic images and thin section (TS)
images were analyzed and compared against some parameters of
geological interest such as porosity and its distribution along the
samples. The results show that microtomography (CT) analysis,
although limited by its resolution, have some interesting information
about the distribution of porosity (homogeneous or not) and can also
quantify the connected and non-connected pores, i.e., total porosity.
TS have no limitations concerning resolution, but are limited by the
experimental data available in regards to a few glass sheets for
analysis and also can give only information about the connected
pores, i.e., effective porosity. Those two methods have their own
virtues and flaws but when paired together they are able to
complement one another, making for a more reliable and complete
analysis.
Abstract: In DMVC, we have more than one options of sources available for construction of side information. The newer techniques make use of both the techniques simultaneously by constructing a bitmask that determines the source of every block or pixel of the side information. A lot of computation is done to determine each bit in the bitmask. In this paper, we have tried to define areas that can only be well predicted by temporal interpolation and not by multiview interpolation or synthesis. We predict that all such areas that are not covered by two cameras cannot be appropriately predicted by multiview synthesis and if we can identify such areas in the first place, we don-t need to go through the script of computations for all the pixels that lie in those areas. Moreover, this paper also defines a technique based on KLT to mark the above mentioned areas before any other processing is done on the side view.
Abstract: We present a method to create special domain
collections from news sites. The method only requires a single
sample article as a seed. No prior corpus statistics are needed and the
method is applicable to multiple languages. We examine various
similarity measures and the creation of document collections for
English and Japanese. The main contributions are as follows. First,
the algorithm can build special domain collections from as little as
one sample document. Second, unlike other algorithms it does not
require a second “general" corpus to compute statistics. Third, in our
testing the algorithm outperformed others in creating collections
made up of highly relevant articles.
Abstract: Cloud computing is the innovative and leading
information technology model for enabling convenient, on-demand
network access to a shared pool of configurable computing resources
that can be rapidly provisioned and released with minimal
management effort. This paper presents our development on enabling
an individual user's desktop in a virtualized environment, which is
stored on a remote virtual machine rather than locally. We present the
initial work on the integration of virtual desktop and application
sharing with virtualization technology. Given the development of
remote desktop virtualization, this proposed effort has the potential to
positively provide an efficient, resilience and elastic environment for
online cloud service. Users no longer need to burden the cost of
software licenses and platform maintenances. Moreover, this
development also helps boost user productivity by promoting a
flexible model that lets users access their desktop environments from
virtually anywhere.
Abstract: A scaffold is necessary for tooth regeneration because of its three-dimensional geometry. For restoration of defect, it is necessary for the scaffold to be prepared in the shape of the defect. Sponges made from polyvinyl alcohol with formalin cross-linking (PVF sponge) have been used for scaffolds for bone formation in vivo. To induce osteogenesis within the sponge, methods of growing rat bone marrow cells (rBMCs) among the fiber structures in the sponge might be considered. Storage of rBMCs among the fibers in the sponge coated with dextran (10 kDa) was tried. After seeding of rBMCs to PVF sponge immersed in dextran solution at 2 g/dl concentration, osteogenesis was recognized in subcutaneously implanted PVF sponge as a scaffold in vivo. The level of osteocalcin was 25.28±5.71 ng/scaffold and that of Ca was 129.20±19.69 µg/scaffold. These values were significantly higher than those in sponges without dextran coating (p