Abstract: In this article, we propose a new surgical device for
circumferentially excision of high anal fistulas in a minimally
invasive manner. The new apparatus works on the basis of axially
rotating and moving a tubular blade along a fistulous tract
straightened using a rigid straight guidewire. As the blade moves
along the tract, its sharp circular cutting edge circumferentially
separates approximately 2.25 mm thickness of tract encircling the
rigid guidewire. We used the new set to excise two anal fistulas in a
62-year-old male patient, an extrasphincteric type and a long tract
with no internal opening. With regard to the results of this test, the
new device can be considered as a sphincter preserving mechanism
for treatment of high anal fistulas. Consequently, a major reduction
in the risk of fecal incontinence, recurrence rate, convalescence
period and patient morbidity may be achieved using the new device
for treatment of fistula-in-ano.
Abstract: This study was conducted to determine the
objectivity, reliability and validity of the 90º push-ups test protocol
among male and female students of Sports Science Program, Faculty
of Sports Science and Coaching Sultan Idris University of Education.
Samples (n = 300), consisted of males (n = 168) and females (n =
132) students were randomly selected for this study. Researchers
tested the 90º push-ups on the sample twice in a single trial, test and
re-test protocol in the bench press test. Pearson-Product Moment
Correlation method's was used to determine the value of objectivity,
reliability and validity testing. The findings showed that the 900 pushups
test protocol showed high consistency between the two testers
with a value of r = .99. Likewise, The reliability value between test
and re-test for the 90º push-ups test for the male (r=.93) and female
(r=.93) students was also high. The results showed a correlation
between 90º push-ups test and bench press test for boys was r = .64
and girls was r = .28. This finding indicates that the use of the 90º
push-ups to test muscular strength and endurance in the upper body
of males has a higher validity values than female students.
Abstract: In present days the area of data migration is very topical. Current tools for data migration in the area of relational database have several disadvantages that are presented in this paper. We propose a methodology for data migration of the database tables and their data between various types of relational database systems (RDBMS). The proposed methodology contains an expert system. The expert system contains a knowledge base that is composed of IFTHEN rules and based on the input data suggests appropriate data types of columns of database tables. The proposed tool, which contains an expert system, also includes the possibility of optimizing the data types in the target RDBMS database tables based on processed data of the source RDBMS database tables. The proposed expert system is shown on data migration of selected database of the source RDBMS to the target RDBMS.
Abstract: In this paper, we propose an approach of unsupervised
segmentation with fuzzy connectedness. Valid seeds are first specified
by an unsupervised method based on scale space theory. A region is
then extracted for each seed with a relative object extraction method of
fuzzy connectedness. Afterwards, regions are merged according to the
values between them of an introduced measure. Some theorems and
propositions are also provided to show the reasonableness of the
measure for doing mergence. Experiment results on a synthetic image,
a color image and a large amount of MR images of our method are
reported.
Abstract: Leonotisleonurus a shrub indigenous to Southern
Africa is widely used in traditional medicine to treat a variety of
conditions ranging from skin diseases and cough to epileptic fits and
‘heart problems’. Studies on the aqueous extract of the leaves have
indicated cycloxegenase enzyme inhibitory activity and an
antihypertensive effect.
Five methanol leaf extract fractions (MLEa - MLEe) of L.
leonurus were tested on anaesthetized normotensive male Wistar rats
(AWR) and isolated perfused working rat hearts (IWH). Fraction
MLEc (0.01mg/kg – 0.05mg/kg) induced significant increases in BP
and HR in AWR and positive chronotropic and inotropic effects in
IWH (1.0mg/ml – 5.0mg/ml). Pre-administration of atenolol
(2.0mg/kg) and prazosin (60μg/kg) significantly inhibited MLEc
effect on HR and MAP respectively in vivo, while atenolol
(7.0mg/ml) pre-perfusion significantly inhibited MLEc effect in vitro.
The hypertensive effect of MLEc is probably via β1agonism.
Results also indicate the presence of multiple cardioactive
compounds in L. leonurus.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: Grid computing is growing rapidly in the distributed
heterogeneous systems for utilizing and sharing large-scale resources
to solve complex scientific problems. Scheduling is the most recent
topic used to achieve high performance in grid environments. It aims
to find a suitable allocation of resources for each job. A typical
problem which arises during this task is the decision of scheduling. It
is about an effective utilization of processor to minimize tardiness
time of a job, when it is being scheduled. This paper, therefore,
addresses the problem by developing a general framework of grid
scheduling using dynamic information and an ant colony
optimization algorithm to improve the decision of scheduling. The
performance of various dispatching rules such as First Come First
Served (FCFS), Earliest Due Date (EDD), Earliest Release Date
(ERD), and an Ant Colony Optimization (ACO) are compared.
Moreover, the benefit of using an Ant Colony Optimization for
performance improvement of the grid Scheduling is also discussed. It
is found that the scheduling system using an Ant Colony
Optimization algorithm can efficiently and effectively allocate jobs
to proper resources.
Abstract: Recently, fast neural networks for object/face
detection were presented in [1-3]. The speed up factor of these
networks relies on performing cross correlation in the frequency
domain between the input image and the weights of the hidden
layer. But, these equations given in [1-3] for conventional and fast
neural networks are not valid for many reasons presented here. In
this paper, correct equations for cross correlation in the spatial and
frequency domains are presented. Furthermore, correct formulas for
the number of computation steps required by conventional and fast
neural networks given in [1-3] are introduced. A new formula for
the speed up ratio is established. Also, corrections for the equations
of fast multi scale object/face detection are given. Moreover,
commutative cross correlation is achieved. Simulation results show
that sub-image detection based on cross correlation in the frequency
domain is faster than classical neural networks.
Abstract: The belief decision tree (BDT) approach is a decision
tree in an uncertain environment where the uncertainty is represented
through the Transferable Belief Model (TBM), one interpretation
of the belief function theory. The uncertainty can appear either in
the actual class of training objects or attribute values of objects to
classify. In this paper, we develop a post-pruning method of belief
decision trees in order to reduce size and improve classification
accuracy on unseen cases. The pruning of decision tree has a
considerable intention in the areas of machine learning.
Abstract: It has been established that microRNAs (miRNAs) play
an important role in gene expression by post-transcriptional regulation
of messengerRNAs (mRNAs). However, the precise relationships
between microRNAs and their target genes in sense of numbers,
types and biological relevance remain largely unclear. Dissecting the
miRNA-target relationships will render more insights for miRNA
targets identification and validation therefore promote the understanding
of miRNA function. In miRBase, miRanda is the key
algorithm used for target prediction for Zebrafish. This algorithm
is high-throughput but brings lots of false positives (noise). Since
validation of a large scale of targets through laboratory experiments
is very time consuming, several computational methods for miRNA
targets validation should be developed. In this paper, we present an
integrative method to investigate several aspects of the relationships
between miRNAs and their targets with the final purpose of extracting
high confident targets from miRanda predicted targets pool. This is
achieved by using the techniques ranging from statistical tests to
clustering and association rules. Our research focuses on Zebrafish.
It was found that validated targets do not necessarily associate with
the highest sequence matching. Besides, for some miRNA families,
the frequency of their predicted targets is significantly higher in the
genomic region nearby their own physical location. Finally, in a case
study of dre-miR-10 and dre-miR-196, it was found that the predicted
target genes hoxd13a, hoxd11a, hoxd10a and hoxc4a of dre-miR-
10 while hoxa9a, hoxc8a and hoxa13a of dre-miR-196 have similar
characteristics as validated target genes and therefore represent high
confidence target candidates.
Abstract: Load forecasting has become in recent years one of the major areas of research in electrical engineering. Most traditional forecasting models and artificial intelligence neural network techniques have been tried out in this task. Artificial neural networks (ANN) have lately received much attention, and a great number of papers have reported successful experiments and practical tests. This article presents the development of an ANN-based short-term load forecasting model with improved generalization technique for the Regional Power Control Center of Saudi Electricity Company, Western Operation Area (SEC-WOA). The proposed ANN is trained with weather-related data and historical electric load-related data using the data from the calendar years 2001, 2002, 2003, and 2004 for training. The model tested for one week at five different seasons, typically, winter, spring, summer, Ramadan and fall seasons, and the mean absolute average error for one hour-ahead load forecasting found 1.12%.
Abstract: The objective of this work is to show a procedure for
mesh generation in a fluidized bed using large eddy simulations
(LES) of a filtered two-fluid model. The experimental data were
obtained by [1] in a laboratory fluidized bed. Results show that it is
possible to use mesh with less cells as compared to RANS turbulence
model with granular kinetic theory flow (KTGF). Also, the numerical
results validate the experimental data near wall of the bed, which
cannot be predicted by RANS.model.
Abstract: As emails communications have no consistent
authentication procedure to ensure the authenticity, we present an
investigation analysis approach for detecting forged emails based on
Random Forests and Naïve Bays classifiers. Instead of investigating
the email headers, we use the body content to extract a unique writing
style for all the possible suspects. Our approach consists of four main
steps: (1) The cybercrime investigator extract different effective
features including structural, lexical, linguistic, and syntactic
evidence from previous emails for all the possible suspects, (2) The
extracted features vectors are normalized to increase the accuracy
rate. (3) The normalized features are then used to train the learning
engine, (4) upon receiving the anonymous email (M); we apply the
feature extraction process to produce a feature vector. Finally, using
the machine learning classifiers the email is assigned to one of the
suspects- whose writing style closely matches M. Experimental
results on real data sets show the improved performance of the
proposed method and the ability of identifying the authors with a
very limited number of features.
Abstract: This study suggests a model of a new set of evaluation criteria that will be used to measure the efficiency of real-world E-commerce websites. Evaluation criteria include design, usability and performance for websites, the Data Envelopment Analysis (DEA) technique has been used to measure the websites efficiency. An efficient Web site is defined as a site that generates the most outputs, using the smallest amount of inputs. Inputs refer to measurements representing the amount of effort required to build, maintain and perform the site. Output is amount of traffic the site generates. These outputs are measured as the average number of daily hits and the average number of daily unique visitors.
Abstract: In this paper we will develop further the sequential
life test approach presented in a previous article by [1] using an
underlying two parameter Weibull sampling distribution. The
minimum life will be considered equal to zero. We will again provide
rules for making one of the three possible decisions as each
observation becomes available; that is: accept the null hypothesis H0;
reject the null hypothesis H0; or obtain additional information by
making another observation. The product being analyzed is a new
type of a low alloy-high strength steel product. To estimate the shape
and the scale parameters of the underlying Weibull model we will use
a maximum likelihood approach for censored failure data. A new
example will further develop the proposed sequential life testing
approach.
Abstract: An effect of rolling temperature on the mechanical properties and microstructural evolution of an Al-Mg-Si alloy was studied. The material was rolled up to a true strain of ~0.7 at three different temperatures viz; room temperature, liquid propanol and liquid nitrogen. The liquid nitrogen rolled sample exhibited superior properties with a yield and tensile strength of 332 MPa and 364 MPa, respectively, with a reasonably good ductility of ~9%. The liquid nitrogen rolled sample showed around 54 MPa increase in tensile strength without much reduction in the ductility as compared to the as received T6 condition alloy. The microstructural details revealed equiaxed grains in the annealed and solutionized sample and elongated grains in the rolled samples. In addition, the cryorolled samples exhibited fine grain structure compared to the room temperature rolled samples.
Abstract: In this paper, gate leakage current has been mitigated
by the use of novel nanoscale MOSFET with Source/Drain-to-Gate
Non-overlapped and high-k spacer structure for the first time. A
compact analytical model has been developed to study the gate
leakage behaviour of proposed MOSFET structure. The result
obtained has found good agreement with the Sentaurus Simulation.
Fringing gate electric field through the dielectric spacer induces
inversion layer in the non-overlap region to act as extended S/D
region. It is found that optimal Source/Drain-to-Gate Non-overlapped
and high-k spacer structure has reduced the gate leakage current to
great extent as compared to those of an overlapped structure. Further,
the proposed structure had improved off current, subthreshold slope
and DIBL characteristic. It is concluded that this structure solves the
problem of high leakage current without introducing the extra series
resistance.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: This paper proposes a novel architecture for At-
Home medical care which enables senior citizens, patients
with chronic ailments and patients requiring post- operative
care to be remotely monitored in the comfort of their homes.
This architecture is implemented using sensors and wireless
networking for transmitting patient data to the hospitals,
health- care centers for monitoring by medical professionals.
Patients are equipped with sensors to measure their
physiological parameters, like blood pressure, pulse rate etc.
and a Wearable Data Acquisition Unit is used to transmit the
patient sensor data. Medical professionals can be alerted to
any abnormal variations in these values for diagnosis and
suitable treatment. Security threats and challenges inherent to
wireless communication and sensor network have been
discussed and a security mechanism to ensure data
confidentiality and source authentication has been proposed.
Symmetric key algorithm AES has been used for encrypting
the data and a patent-free, two-pass block cipher mode CCFB
has been used for implementing semantic security.
Abstract: The current study aims at investigating the
relationship between the learners- integrative and instrumental
motivation and English proficiency among Iranian EFL learners. The
participants in this study consisted of 128 undergraduate university
students including 64 males and 64 females, majoring in English as a
foreign language, from Shiraz Azad University. Two research
instruments were used to gather the needed data for this study: 1)
Language Proficiency Test. 2) A scale on motivation which
determines the type of the EFL learners- motivation. Correlatin
coefficient and t-test were used to analyze the collected data and the
main result was found as follows: There is a significant relationship
between the integrative motivation and instrumental motivation with
English proficiency among EFL learners of Shiraz Azad University.