Abstract: According to the majority and to stereotypes in a simple everyman religious processes in the world in general, and Kazakhstan in particular, have only negative trends. The main reason for the author's opinion is seen in the fact that the media in the pursuit of ratings and sensation, more inclined to highlight the negative aspects of events in the country and the world of processes forgetting or casually mentioning the positive initiatives and achievements. That is why the article is mainly revealed positive trends in mind that the problems of fanaticism, terrorism and the confrontation of society on various issues, a lot has been written and detailed. This article describes the stages in the development of relations between religion and state, as well as institutionalization, networking and assistance in the correct orientation of religious activities in the country.
Abstract: The study aimed to investigate characteristics of
vegetative tissue for taxonomic purpose and possibly trend of waste
application in industry. Stems and branches of 15 species in Solanum
found in Thailand were prepared for fiber and examined by light
microscopy. Microstructural characteristic data of fiber i.e. fiber
length and width, fiber lumen diameter and fiber cell wall thickness
were recorded. The longest average fiber cell length (>3.9 mm.) were
obtained in S. lycopersicum L. and S. tuberosum L. Fiber cells from
S. lycopersicum also revealed the widest average diameter of whole
cell and its lumen at >45.5 μm and >29 μm respectively. However
fiber cells with thickest wall of > 9.6 μm were belonged to the
ornamental tree species, S. wrightii Benth. The results showed that
the slenderness ratio, Runkel ratio, and flexibility coefficient, with
potentially suitable for feedstock in paper industry fell in 4 exotic
species, i.e. Solanumamericanum L., S. lycopersicum, S.
seaforthianum Andr., and S. tuberosum L
Abstract: Automatic reusability appraisal is helpful in
evaluating the quality of developed or developing reusable software
components and in identification of reusable components from
existing legacy systems; that can save cost of developing the
software from scratch. But the issue of how to identify reusable
components from existing systems has remained relatively
unexplored. In this research work, structural attributes of software
components are explored using software metrics and quality of the
software is inferred by different Neural Network based approaches,
taking the metric values as input. The calculated reusability value
enables to identify a good quality code automatically. It is found that
the reusability value determined is close to the manual analysis used
to be performed by the programmers or repository managers. So, the
developed system can be used to enhance the productivity and
quality of software development.
Abstract: Obstructive sleep apnea in patients, between 70 and 80
percent, can be cured with just a posture correcting. The most import
thing to do this is detection of obstructive sleep apnea. Detection of
obstructive sleep apnea can be performed through heart rate variability
analysis using power spectrum density analysis. After HRV analysis
we needed to know the current position information for correcting the
position. The pressure sensors of the array type were used to obtain
position information. These sensors can obtain information from the
experimenter about position. In addition, air cylinder corrected the
position of the experimenter by lifting the bed. The experimenter can
be changed position without breaking during sleep by the system.
Polysomnograph recording were obtained from 10 patients. The
results of HRV analysis were that NLF and LF/HF ratio increased,
while NHF decreased during OSA. Position change had to be done the
periods.
Abstract: Wireless mesh networks based on IEEE 802.11
technology are a scalable and efficient solution for next generation
wireless networking to provide wide-area wideband internet access to
a significant number of users. The deployment of these wireless mesh
networks may be within different authorities and without any
planning, they are potentially overlapped partially or completely in
the same service area. The aim of the proposed model is design a new
model to Enhancement Throughput of Unplanned Wireless Mesh
Networks Deployment Using Partitioning Hierarchical Cluster
(PHC), the unplanned deployment of WMNs are determinates there
performance. We use throughput optimization approach to model the
unplanned WMNs deployment problem based on partitioning
hierarchical cluster (PHC) based architecture, in this paper the
researcher used bridge node by allowing interworking traffic between
these WMNs as solution for performance degradation.
Abstract: This paper presents an analysis result of relationship
between business and information technology (IT) in business process
reengineering (BPR). 258 Japanese firm-level data collected have been
analyzed using structural equation modeling. This analysis was aimed
to illuminating success factors of achieve effective BPR. Analysis was
focused on management factors (including organizational factors) and
implementing management method (e.g. balanced score card, internal
control, etc.).These results would contribute for achieving effective
BPR by showing effective tasks and environment to be focused.
Abstract: With the exponential rise in the number of multimedia
applications available, the best-effort service provided by the Internet
today is insufficient. Researchers have been working on new
architectures like the Next Generation Network (NGN) which, by
definition, will ensure Quality of Service (QoS) in an all-IP based
network [1]. For this approach to become a reality, reservation of
bandwidth is required per application per user. WiMAX (Worldwide
Interoperability for Microwave Access) is a wireless communication
technology which has predefined levels of QoS which can be
provided to the user [4]. IPv6 has been created as the successor for
IPv4 and resolves issues like the availability of IP addresses and
QoS. This paper provides a design to use the power of WiMAX as an
NSP (Network Service Provider) for NGN using IPv6. The use of the
Traffic Class (TC) field and the Flow Label (FL) field of IPv6 has
been explained for making QoS requests and grants [6], [7]. Using
these fields, the processing time is reduced and routing is simplified.
Also, we define the functioning of the ASN gateway and the NGN
gateway (NGNG) which are edge node interfaces in the NGNWiMAX
design. These gateways ensure QoS management through
built in functions and by certain physical resources and networking
capabilities.
Abstract: Recently, web services to access from many type devices
are often used. We have developed the shortest path planning
system called "Bus-Net" in Tottori prefecture as a web application
to sustain the public transport. And it used the same user interface
for both devices. To support both devices, the interface cannot use
JavaScript and so on.
Thus, we developed the method that use individual user interface
for each device type to improve its convenience. To be concrete,
we defined formats of condition input to the path planning system
and result output from it and separate the system into the request
processing part and user interface parts that depend on device types.
By this method, we have also developed special device for Bus-Net
named "Intelligent-Bus-Stop".
Abstract: Image compression can improve the performance of
the digital systems by reducing time and cost in image storage
and transmission without significant reduction of the image quality.
Furthermore, the discrete cosine transform has emerged as the new
state-of-the art standard for image compression. In this paper, a
hybrid image compression technique based on reversible blockade
transform coding is proposed. The technique, implemented over
regions of interest (ROIs), is based on selection of the coefficients
that belong to different transforms, depending on the coefficients is
proposed. This method allows: (1) codification of multiple kernals
at various degrees of interest, (2) arbitrary shaped spectrum,and (3)
flexible adjustment of the compression quality of the image and the
background. No standard modification for JPEG2000 decoder was
required. The method was applied over different types of images.
Results show a better performance for the selected regions, when
image coding methods were employed for the whole set of images.
We believe that this method is an excellent tool for future image
compression research, mainly on images where image coding can
be of interest, such as the medical imaging modalities and several
multimedia applications. Finally VLSI implementation of proposed
method is shown. It is also shown that the kernal of Hartley and
Cosine transform gives the better performance than any other model.
Abstract: The ε4 allele of the ε2, ε3 and ε4 protein isoform polymorphism in the gene encoding apolipoprotein E (Apo E) has previously been associated with increased cardiac artery disease (CAD); therefore to investigate the significance of this polymorphism in pathogenesis of CAD in Iranian patients with stenosis and control subjects. To investigate the association between
Apo E polymorphism and coronary artery disease we performed a comparative case control study of the frequency of Apo E
polymorphism in One hundred CAD patients with stenosis who underwent coronary angiography (>50% stenosis) and 100 control subjects (
Abstract: Because of the great advance in multimedia
technology, digital multimedia is vulnerable to malicious
manipulations. In this paper, a public key self-recovery block-based
video authentication technique is proposed which can not only
precisely localize the alteration detection but also recover the missing
data with high reliability. In the proposed block-based technique,
multiple description coding MDC is used to generate two codes (two
descriptions) for each block. Although one block code (one
description) is enough to rebuild the altered block, the altered block
is rebuilt with better quality by the two block descriptions. So using
MDC increases the ratability of recovering data. A block signature is
computed using a cryptographic hash function and a doubly linked
chain is utilized to embed the block signature copies and the block
descriptions into the LSBs of distant blocks and the block itself. The
doubly linked chain scheme gives the proposed technique the
capability to thwart vector quantization attacks. In our proposed
technique , anyone can check the authenticity of a given video using
the public key. The experimental results show that the proposed
technique is reliable for detecting, localizing and recovering the
alterations.
Abstract: Today-s Information and Knowledge Society has
placed new demands on education and a new paradigm of education
is required. Learning, facilitated by educational systems and the
pedagogic process, is globally undergoing dramatic changes. The aim
of this paper is the development of a simple Instructional Design tool
for E-Learning, named IDEL (Instructional Design for Electronic
Learning), that provides the educators with facilities to create their
own courses with the essential educational material and manage
communication with students. It offers flexibility in the way of
learning and provides ease in employment and reusability of
resources. IDEL is a web-based Instructional System and is designed
to facilitate course design process in accordance with the ADDIE
model and the instructional design principles with emphasis placed
on the use of technology enhanced learning. An example case of
using the ADDIE model to systematically develop a course and its
implementation with the aid of IDEL is given and some results from
student evaluation of the tool and the course are reported.
Abstract: This research is aimed to describe the application of robust regression and its advantages over the least square regression method in analyzing financial data. To do this, relationship between earning per share, book value of equity per share and share price as price model and earning per share, annual change of earning per share and return of stock as return model is discussed using both robust and least square regressions, and finally the outcomes are compared. Comparing the results from the robust regression and the least square regression shows that the former can provide the possibility of a better and more realistic analysis owing to eliminating or reducing the contribution of outliers and influential data. Therefore, robust regression is recommended for getting more precise results in financial data analysis.
Abstract: Classification is an important topic in machine learning
and bioinformatics. Many datasets have been introduced for
classification tasks. A dataset contains multiple features, and the quality of features influences the classification accuracy of the dataset.
The power of classification for each feature differs. In this study, we
suggest the Classification Influence Index (CII) as an indicator of classification power for each feature. CII enables evaluation of the
features in a dataset and improved classification accuracy by transformation of the dataset. By conducting experiments using CII
and the k-nearest neighbor classifier to analyze real datasets, we confirmed that the proposed index provided meaningful improvement
of the classification accuracy.
Abstract: Recently, lots of researchers are attracted to retrieving
multimedia database by using some impression words and their values.
Ikezoe-s research is one of the representatives and uses eight pairs of
opposite impression words. We had modified its retrieval interface and
proposed '2D-RIB' in the previous work. The aim of the present paper
is to improve his/her satisfaction level to the retrieval result in the
2D-RIB. Our method is to extend the 2D-RIB. One of our extensions is
to define and introduce the following two measures: 'melody
goodness' and 'general acceptance'. Another extension is three types
of customization menus. The result of evaluation using a pilot system
is as follows. Both of these two measures 'melody goodness'
and -general acceptance- can contribute to the improvement.
Moreover, it is effective if we introduce the customization menu
which enables a retrieval person to reduce the strictness level of
retrieval condition in an impression pair based on his/her need.
Abstract: In this paper sensitivity analysis is performed for
reliability evaluation of power systems. When examining the
reliability of a system, it is useful to recognize how results
change as component parameters are varied. This knowledge
helps engineers to understand the impact of poor data, and
gives insight on how reliability can be improved. For these
reasons, a sensitivity analysis can be performed. Finally, a real
network was used for testing the presented method.
Abstract: Indian subcontinent has a plethora of traditional
medicine systems that provide promising solutions to lifestyle
disorders in an 'all natural way'. Spices and oilseeds hold
prominence in Indian cuisine hence the focus of the current study
was to evaluate the bioactive molecules from Linum usitatissinum
(LU), Lepidium sativum (LS), Nigella sativa (NS) and Guizotia
abyssinica (GA) seeds. The seeds were characterized for functional
lipids like omega-3 fatty acid, antioxidant capacity, phenolic
compounds, dietary fiber and anti-nutritional factors. Analysis of the
seeds revealed LU and LS to be a rich source of α-linolenic acid
(41.85 ± 0.33%, 26.71 ± 0.63%), an omega 3 fatty acid (using
GCMS). While studying antioxidant potential NS seeds demonstrated
highest antioxidant ability (61.68 ± 0.21 TEAC/ 100 gm DW) due to
the presence of phenolics and terpenes as assayed by the Mass
spectral analysis. When screened for anti-nutritional factor
cyanogenic glycoside, LS seeds showed content as high as 1674 ± 54
mg HCN / kg. GA is a probable good source of a stable vegetable oil
(SFA: PUFA 1:2.3). The seeds showed diversified bioactive profile
and hence further studies to use different bio molecules in tandem for
the development of a possible 'nutraceutical cocktail' have been
initiated..
Abstract: Psoriasis is a chronic inflammatory skin condition
which affects 2-3% of population around the world. Psoriasis Area
and Severity Index (PASI) is a gold standard to assess psoriasis
severity as well as the treatment efficacy. Although a gold standard,
PASI is rarely used because it is tedious and complex. In practice,
PASI score is determined subjectively by dermatologists, therefore
inter and intra variations of assessment are possible to happen even
among expert dermatologists. This research develops an algorithm to
assess psoriasis lesion for PASI scoring objectively. Focus of this
research is thickness assessment as one of PASI four parameters
beside area, erythema and scaliness. Psoriasis lesion thickness is
measured by averaging the total elevation from lesion base to lesion
surface. Thickness values of 122 3D images taken from 39 patients
are grouped into 4 PASI thickness score using K-means clustering.
Validation on lesion base construction is performed using twelve
body curvature models and show good result with coefficient of
determinant (R2) is equal to 1.
Abstract: In this paper the supersonic ejectors are
experimentally and analytically studied. Ejector is a device that
uses the energy of a fluid to move another fluid. This device works
like a vacuum pump without usage of piston, rotor or any other
moving component. An ejector contains an active nozzle, a passive
nozzle, a mixing chamber and a diffuser. Since the fluid viscosity
is large, and the flow is turbulent and three dimensional in the
mixing chamber, the numerical methods consume long time and
high cost to analyze the flow in ejectors. Therefore this paper
presents a simple analytical method that is based on the precise
governing equations in fluid mechanics. According to achieved
analytical relations, a computer code has been prepared to analyze
the flow in different components of the ejector. An experiment has
been performed in supersonic regime 1.5
Abstract: Many research works are carried out on the analysis of
traces in a digital learning environment. These studies produce large
volumes of usage tracks from the various actions performed by a
user. However, to exploit these data, compare and improve
performance, several issues are raised. To remedy this, several works
deal with this problem seen recently. This research studied a series of
questions about format and description of the data to be shared. Our
goal is to share thoughts on these issues by presenting our experience
in the analysis of trace-based log files, comparing several approaches
used in automatic classification applied to e-learning platforms.
Finally, the obtained results are discussed.