Abstract: Propagation of solitons in single-mode birefringent fibers is considered under the presence of third-order dispersion (TOD). The behavior of two neighboring solitons and their interaction is investigated under the presence of third-order dispersion with different group velocity dispersion (GVD) parameters. It is found that third-order dispersion makes the resultant soliton to deviate from its ideal position and increases the interaction between adjacent soliton pulses. It is also observed that this deviation due to third-order dispersion is considerably small when the optical pulse propagates at wavelengths relatively far from the zerodispersion. Modified coupled nonlinear Schrödinger-s equations (CNLSE) representing the propagation of optical pulse in single mode fiber with TOD are solved using split-step Fourier algorithm. The results presented in this paper reveal that the third-order dispersion can substantially increase the interaction between the solitons, but large group velocity dispersion reduces the interaction between neighboring solitons.
Abstract: Pearson-s correlation coefficient and sequential path
analysis has been used for determining the interrelationship among
yield, yield components, soil minerals and aroma of Khao Dawk Mali
(KDML) 105 rice grown in the area of Tungkularonghai in Roi-Et
province, located in the northeast of Thailand. Pearson-s correlation
coefficient in this study showed that the number of panicles was the
only factor that had positive significant (0.790**) effect on grain
yield. Sequential path analysis revealed that the number of panicles
followed by the number of fertile spikelets and 100-grain weight
were the first-order factors which had positive direct effects on grain
yield. Whereas, other factors analyzed had indirect effects
influencing grain yield. This study also indicated that no significant
relationship was found between the aroma level and any of the
factors analyzed.
Abstract: Company mergers and acquisitions reached their peak
in the twenty-first century. Mergers and acquisitions have become one
of the competitive strategies for external growth. In general, it is
believed that mergers and acquisitions can create synergies. However,
they require complete information technology system and service
integration, especially in the banking industry. Much of the research
has focused on performance evaluation, shareholder equity allocation,
or even the increase of company market value after the merger and
acquisition, whereas few scholars have focused on information system
integration post merger and acquisition. This study indicates the role
of information systems after a merger and acquisition, explaining the
benefits of information system integration using a merger and
acquisition case in the banking industry as an example. In addition, we
discuss factors that affect the performance of information system
integration, and utilize system dynamics to interpret the relationship
among factors that affect information system integration performance
in the banking industry after a merger and acquisition.
Abstract: Application of neural networks in execution of
programmed pulse width modulation (PPWM) of a voltage source
inverter (VSI) is studied in this paper. Using the proposed method it is
possible to cancel out the desired harmonics in output of VSI in
addition to control the magnitude of fundamental harmonic,
contineously. By checking the non-trained values and a performance
index, the most appropriate neural network is proposed. It is shown
that neural networks may solve the custom difficulties of practical
utilization of PPWM such as large size of memory, complex digital
circuits and controlling the magnitude of output voltage in a discrete
manner.
Abstract: The number of users supported in a DS-CDMA
cellular system is typically less than spreading factor (N), and the
system is said to be underloaded. Overloading is a technique to
accommodate more number of users than the spreading factor N. In
O/O overloading scheme, the first set is assigned to the N
synchronous users and the second set is assigned to the additional
synchronous users. An iterative multistage soft decision interference
cancellation (SDIC) receiver is used to remove high level of
interference between the two sets. Performance is evaluated in terms
of the maximum number acceptable users so that the system
performance is degraded slightly compared to the single user
performance at a specified BER. In this paper, the capacity of CDMA
based O/O overloading scheme is evaluated with SDIC receiver. It is
observed that O/O scheme using orthogonal Gold codes provides
25% channel overloading (N=64) for synchronous DS-CDMA
system on an AWGN channel in the uplink at a BER of 1e-5.For a
Rayleigh faded channel, the critical capacity is 40% at a BER of 5e-5
assuming synchronous users. But in practical systems, perfect chip
timing is very difficult to maintain in the uplink.. We have shown that
the overloading performance reduces to 11% for a timing
synchronization error of 0.02Tc for a BER of 1e-5.
Abstract: Frequently a group of people jointly decide and authorize
a specific person as a representative in some business/poitical
occasions, e.g., the board of a company authorizes the chief executive
officer to close a multi-billion acquisition deal. In this paper, an
integrated proxy multi-signature scheme that allows anonymously
vetoable delegation is proposed. This protocol integrates mechanisms
of private veto, distributed proxy key generation, secure transmission
of proxy key, and existentially unforgeable proxy multi-signature
scheme. First, a provably secure Guillou-Quisquater proxy signature
scheme is presented, then the “zero-sharing" protocol is extended
over a composite modulus multiplicative group, and finally the above
two are combined to realize the GQ proxy multi-signature with
anonymously vetoable delegation. As a proxy signature scheme, this
protocol protects both the original signers and the proxy signer.
The modular design allows simplified implementation with less
communication overheads and better computation performance than
a general secure multi-party protocol.
Abstract: Ratio and regression type estimators have been used by previous authors to estimate a population mean for the principal variable from samples in which both auxiliary x and principal y variable data are available. However, missing data are a common problem in statistical analyses with real data. Ratio and regression type estimators have also been used for imputing values of missing y data. In this paper, six new ratio and regression type estimators are proposed for imputing values for any missing y data and estimating a population mean for y from samples with missing x and/or y data. A simulation study has been conducted to compare the six ratio and regression type estimators with a previous estimator of Rueda. Two population sizes N = 1,000 and 5,000 have been considered with sample sizes of 10% and 30% and with correlation coefficients between population variables X and Y of 0.5 and 0.8. In the simulations, 10 and 40 percent of sample y values and 10 and 40 percent of sample x values were randomly designated as missing. The new ratio and regression type estimators give similar mean absolute percentage errors that are smaller than the Rueda estimator for all cases. The new estimators give a large reduction in errors for the case of 40% missing y values and sampling fraction of 30%.
Abstract: The paper attempts to contribute to the largely
neglected social and anthropological discussion of technology development on the one hand, and to redirecting the emphasis in
anthropology from primitive and exotic societies to problems of high
relevance in contemporary era and how technology is used in
everyday life. It draws upon multidimensional models of intelligence
and ideal type formation. It is argued that the predominance of
computational and cognitive cosmovisions have led to technology alienation. Injection of communicative competence in artificially
intelligent systems and identity technologies in the coming
information society are analyzed
Abstract: The present work is a numerical simulation of
nanofluids flow in a double pipe heat exchanger provided with
porous baffles. The hot nanofluid flows in the inner cylinder, whereas
the cold nanofluid circulates in the annular gap. The Darcy-
Brinkman-Forchheimer model is adopted to describe the flow in the
porous regions, and the governing equations with the appropriate
boundary conditions are solved by the finite volume method. The
results reveal that the addition of metallic nanoparticles enhances the
rate of heat transfer in comparison to conventional fluids but this
augmentation is accompanied by an increase in pressure drop. The
highest heat exchanger performances are obtained when
nanoparticles are added only to the cold fluid.
Abstract: In this paper, frequency offset (FO) estimation schemes
robust to the non-Gaussian noise environments are proposed for
orthogonal frequency division multiplexing (OFDM) systems. First,
a maximum-likelihood (ML) estimation scheme in non-Gaussian
noise environments is proposed, and then, the complexity of the
ML estimation scheme is reduced by employing a reduced set of
candidate values. In numerical results, it is demonstrated that the
proposed schemes provide a significant performance improvement
over the conventional estimation scheme in non-Gaussian noise
environments while maintaining the performance similar to the
estimation performance in Gaussian noise environments.
Abstract: One of the most important problems in production planning of flexible manufacturing system (FMS) is machine tool selection and operation allocation problem that directly influences the production costs and times .In this paper minimizing machining cost, set-up cost and material handling cost as a multi-objective problem in flexible manufacturing systems environment are considered. We present a 0-1 integer linear programming model for the multiobjective machine tool selection and operation allocation problem and due to the large scale nature of the problem, solving the problem to obtain optimal solution in a reasonable time is infeasible, Paretoant colony optimization (P-ACO) approach for solving the multiobjective problem in reasonable time is developed. Experimental results indicate effectiveness of the proposed algorithm for solving the problem.
Abstract: The possibility of intrinsic electromagnetic fields
within living cells and their resonant self-interaction and interaction
with ambient electromagnetic fields is suggested on the basis of a
theoretical and experimental study. It is reported that intrinsic
electromagnetic fields are produced in the form of radio-frequency
and infra-red photons within atoms (which may be coupled or
uncoupled) in cellular structures, such as the cell cytoskeleton and
plasma membrane. A model is presented for the interaction of these
photons among themselves or with atoms under a dipole-dipole
coupling, induced by single-photon or two-photon processes. This
resonance is manifested by conspicuous field amplification and it is
argued that it is possible for these resonant photons to undergo
tunnelling in the form of evanescent waves to a short range (of a few
nanometers to micrometres). This effect, suggested as a resonant
photon tunnelling mechanism in this report, may enable these fields
to act as intracellular signal communication devices and as bridges
between macromolecules or cellular structures in the cell
cytoskeleton, organelles or membrane. A brief overview of an
experimental technique and a review of some preliminary results are
presented, in the detection of these fields produced in living cell
membranes under physiological conditions.
Abstract: The evolutionary tree is an important topic in bioinformation. In 2006, Chen and Lindsay proposed a new method to build the mixture tree from DNA sequences. Mixture tree is a new type evolutionary tree, and it has two additional information besides the information of ordinary evolutionary tree. One of the information is time parameter, and the other is the set of mutated sites. In 2008, Lin and Juan proposed an algorithm to compute the distance between two mixture trees. Their algorithm computes the distance with only considering the time parameter between two mixture trees. In this paper, we proposes a method to measure the similarity of two mixture trees with considering the set of mutated sites and develops two algorithm to compute the distance between two mixture trees. The time complexity of these two proposed algorithms are O(n2 × max{h(T1), h(T2)}) and O(n2), respectively
Abstract: A flow line computational technique based on the D8
method using Mathematica was developed. The technique was
applied to Ron Phibun area, Nakhon Si Thammarat Province. This
area is highly contaminated with arsenic 3 and 5. It was found that
the technique using Mathematica can produce similar results to those
obtained from GRASS v 5.0.2.
Abstract: Mitochondria are dynamic organelles, capable to
interact with each other. While the number of mitochondria in a cell
varies, their quality and functionality depends on the operation of
fusion, fission, motility and mitophagy. Nowadays, several
researches declare as an important factor in neurogenerative diseases
the disruptions in the regulation of mitochondrial dynamics. In this
paper a stochastic model in BioAmbients calculus is presented,
concerning mitochondrial fusion and its distribution in the renewal of
mitochondrial population in a cell. This model describes the
successive and dependent stages of protein synthesis, protein-s
activation and merging of two independent mitochondria.
Abstract: Vitamin A deficiency is a public health problem in
Zimbabwe. Addressing vitamin A deficiency has the potential of
enhancing resistance to disease and reducing mortality especially in
children less than 5 years. We implemented and adapted vitamin A
outreach supplementation strategy within the National Immunization
Days and Extended Programme of Immunization in a rural district in
Zimbabwe. Despite usual operational challenges faced this approach
enabled the district to increase delivery of supplementation coverage.
This paper describes the outreach strategy that was implemented in
the remote rural district. The strategy covered 63 outreach sites with
2 sites being covered per day and visited once per month for the
whole year. Coverage reached 71% in an area of previous coverage
rates of around less than 50%. We recommend further exploration of
this strategy by others working in similar circumstances. This
strategy can be a potential way for use by Scaling-Up-Nutrition
member states.
Abstract: We investigate properties of convective solutions of the
Boussinesq thermal convection in a moderately rotating spherical
shell allowing the inner and outer sphere rotation due to the viscous
torque of the fluid. The ratio of the inner and outer radii of the
spheres, the Prandtl number and the Taylor number are fixed to 0.4,
1 and 5002, respectively. The inertial moments of the inner and outer
spheres are fixed to about 0.22 and 100, respectively. The Rayleigh
number is varied from 2.6 × 104 to 3.4 × 104. In this parameter
range, convective solutions transit from equatorially symmetric quasiperiodic
ones to equatorially asymmetric chaotic ones as the Rayleigh
number is increased. The transition route in the system allowing
rotation of both the spheres is different from that in the co-rotating
system, which means the inner and outer spheres rotate with the
same constant angular velocity: the convective solutions transit as
equatorially symmetric quasi-periodic solution → equatorially symmetric
chaotic solution → equatorially asymmetric chaotic solution
in the system allowing both the spheres rotation, while equatorially
symmetric quasi-periodic solution → equatorially asymmetric quasiperiodic
solution → equatorially asymmetric chaotic solution in the
co-rotating system.
Abstract: Although e-mail is the most efficient and popular communication method, unwanted and mass unsolicited e-mails, also called spam mail, endanger the existence of the mail system. This paper proposes a new algorithm called Dynamic Weighted Majority Concept Drift Detection (DWM-CDD) for content-based filtering. The design purposes of DWM-CDD are first to accurate the performance of the previously proposed algorithms, and second to speed up the time to construct the model. The results show that DWM-CDD can detect both sudden and gradual changes quickly and accurately. Moreover, the time needed for model construction is less than previously proposed algorithms.
Abstract: The main objective of this study was to determine the effects
of vermicompost and amino acids on the qualitative and quantitative yield of
chamomile. The experiment was conducted during the growing season of
2010 at the Alborz Medical Research Center. The Treatment groups consisted
of vermicompost (0, 5, 10, 15 and 20 tons/ha) and the sprays of amino acids
(budding stag, flowering stage, and budding + flowering stage). The
experimental design was a factorial experiment based on Randomized
Complete Block Design (RCBD) with three replications. The present results
have shown that the highest plant height, flower head diameter, fresh and dry
flower yield and significant essential oil content were obtained by using 20-
ton vermicompost per hectare. Effects of amino acids were similar to those
seen in vermicompost treatment and all measured traits were seen to be
significant after the spray of amino acids at the budding + flowering stage).
Abstract: EPC Class-1 Generation-2 UHF tags, one of Radio
frequency identification or RFID tag types, is expected that most
companies are planning to use it in the supply chain in the short term
and in consumer packaging in the long term due to its inexpensive
cost. Because of the very cost, however, its resources are extremely
scarce and it is hard to have any valuable security algorithms in it. It
causes security vulnerabilities, in particular cloning the tags for
counterfeits. In this paper, we propose a product authentication
solution for anti-counterfeiting at application level in the supply chain
and mobile RFID environment. It aims to become aware of
distribution of spurious products with fake RFID tags and to provide a
product authentication service to general consumers with mobile
RFID devices like mobile phone or PDA which has a mobile RFID
reader. We will discuss anti-counterfeiting mechanisms which are
required to our proposed solution and address requirements that the
mechanisms should have.