Abstract: In this work, we incorporated a quartic bond potential
into a coarse-grained bead-spring model to study lubricant adsorption
on a solid surface as well as depletion instability. The surface tension
density and the number density profiles were examined to verify the
solid-liquid and liquid-vapor interfaces during heat treatment. It was
found that both the liquid-vapor interfacial thickness and the
solid-vapor separation increase with the temperatureT* when T*is
below the phase transition temperature Tc
*. At high temperatures
(T*>Tc
*), the solid-vapor separation decreases gradually as the
temperature increases. In addition, we evaluated the lubricant weight
and bond loss profiles at different temperatures. It was observed that
the lubricant desorption is favored over decomposition and is the main
cause of the lubricant failure at the head disk interface in our
simulations.
Abstract: The design of distributed systems involves dividing the system into partitions (or components) and then allocating these partitions to physical nodes. There have been several techniques proposed for both the partitioning and allocation processes. These existing techniques suffer from a number of limitations including lack of support for replication. Replication is difficult to use effectively but has the potential to greatly improve the performance of a distributed system. This paper presents a new technique technique for allocating objects in order to improve performance in a distributed system that supports replication. The performance of the proposed technique is demonstrated and tested on an example system. The performance of the new technique is compared with the performance of an existing technique in order to demonstrate both the validity and superiority of the new technique when developing a distributed system that can utilise object replication.
Abstract: F-actin fibrils are the cytoskeleton of osteocytes. They react in a dynamic manner to mechanical loading, and strength and
reposition their efforts to reinforce the cells structure. We hypothesize that f-actin is temporarly disrupted after loading and repolymerizes
in a new orientation to oppose the applied load. In vitro studies are conducted to determine f-actin disruption after varying mechanical stimulus parameters that are known to affect bone
formation. Results indicate that the f-actin cytoskeleton is disrupted in vitro as a function of applied mechanical stimulus parameters and
that the f-actin bundles reassemble after loading induced disruption
within 3 minutes after cessation of loading. The disruption of the factin
cytoskeleton depends on the magnitude of stretch, the numbers
of loading cycles, frequency, the insertion of rest between loading
cycles and extracellular calcium. In vivo studies also demonstrate
disruption of the f-actin cytoskeleton in cells embedded in the bone
matrix immediately after mechanical loading. These studies suggest
that adaptation of the f-actin fiber bundles of the cytoskeleton in
response to applied loads occurs by disruption and subsequent repolymerization.
Abstract: Young people have a high prevalence of mental health
problems, yet tend not to seek help. Trusted adults in young people-s
lives, such as teachers and sports coaches, can make a major positive
contribution to the mental health of young people. Teachers and
sports coaches may be in a position to be effective in supporting
young people-s mental health through promotion, prevention and
early intervention. This study reports findings from interviews with
21 teachers and 13 sports coaches of young people aged 12 to 18 in
Canberra, Australia, regarding their perceptions of the relevance and
effectiveness of their role in supporting young people-s mental
health. Both teachers and coaches perceived having influential but
slightly different roles to play in supporting mental health. There may
be potential to elevate the influence of teachers and coaches as
sources of support for young people and their mental health care.
Abstract: The Boundary Representation of a 3D manifold contains
FACES (connected subsets of a parametric surface S : R2 -!
R3). In many science and engineering applications it is cumbersome
and algebraically difficult to deal with the polynomial set and
constraints (LOOPs) representing the FACE. Because of this reason, a
Piecewise Linear (PL) approximation of the FACE is needed, which is
usually represented in terms of triangles (i.e. 2-simplices). Solving the
problem of FACE triangulation requires producing quality triangles
which are: (i) independent of the arguments of S, (ii) sensitive to the
local curvatures, and (iii) compliant with the boundaries of the FACE
and (iv) topologically compatible with the triangles of the neighboring
FACEs. In the existing literature there are no guarantees for the point
(iii). This article contributes to the topic of triangulations conforming
to the boundaries of the FACE by applying the concept of parameterindependent
Gabriel complex, which improves the correctness of the
triangulation regarding aspects (iii) and (iv). In addition, the article
applies the geometric concept of tangent ball to a surface at a point to
address points (i) and (ii). Additional research is needed in algorithms
that (i) take advantage of the concepts presented in the heuristic
algorithm proposed and (ii) can be proved correct.
Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.
Abstract: Most, if not all, public hospitals in Thailand have encountered a common problem regarding the increasing demand for medical services. The increasing number of patients causes so much strain on the hospital-s services, over-crowded, overloaded working hours, staff fatigue, medical error and long waiting time. This research studied the characteristics of operational processes of the medical care services at the medicine department in a large public university hospital. The research focuses on details regarding methods, procedures, processes, resources, and time management in overall processes. The simulation model is used as a tool to analyze the impact of various improvement strategies.
Abstract: Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Abstract: Morgan-s refinement calculus (MRC) is one of the
well-known methods allowing the formality presented in the program
specification to be continued all the way to code. On the other hand,
Object-Z (OZ) is an extension of Z adding support for classes and
objects. There are a number of methods for obtaining code from OZ
specifications that can be categorized into refinement and animation
methods. As far as we know, only one refinement method exists
which refines OZ specifications into code. However, this method
does not have fine-grained refinement rules and thus cannot be
automated. On the other hand, existing animation methods do not
present mapping rules formally and do not support the mapping of
several important constructs of OZ, such as all cases of operation
expressions and most of constructs in global paragraph. In this paper,
with the aim of providing an automatic path from OZ specifications
to code, we propose an approach to map OZ specifications into their
counterparts in MRC in order to use fine-grained refinement rules of
MRC. In this way, having counterparts of our specifications in MRC,
we can refine them into code automatically using MRC tools such as
RED. Other advantages of our work pertain to proposing mapping
rules formally, supporting the mapping of all important constructs of
Object-Z, and considering dynamic instantiation of objects while OZ
itself does not cover this facility.
Abstract: In April 2009, a new variant of Influenza A virus
subtype H1N1 emerged in Mexico and spread all over the world. The
influenza has three subtypes in human (H1N1, H1N2 and H3N2)
Types B and C influenza tend to be associated with local or regional
epidemics. Preliminary genetic characterization of the influenza
viruses has identified them as swine influenza A (H1N1) viruses.
Nucleotide sequence analysis of the Haemagglutinin (HA) and
Neuraminidase (NA) are similar to each other and the majority of
their genes of swine influenza viruses, two genes coding for the
neuraminidase (NA) and matrix (M) proteins are similar to
corresponding genes of swine influenza. Sequence similarity between
the 2009 A (H1N1) virus and its nearest relatives indicates that its
gene segments have been circulating undetected for an extended
period. Nucleic acid sequence Maximum Likelihood (MCL) and
DNA Empirical base frequencies, Phylogenetic relationship amongst
the HA genes of H1N1 virus isolated in Genbank having high
nucleotide sequence homology.
In this paper we used 16 HA nucleotide sequences from NCBI for
computing sequence relationships similarity of swine influenza A
virus using the following method MCL the result is 28%, 36.64% for
Optimal tree with the sum of branch length, 35.62% for Interior
branch phylogeny Neighber – Join Tree, 1.85% for the overall
transition/transversion, and 8.28% for Overall mean distance.
Abstract: Impinging jets are used in various industrial areas as a cooling and drying technique. The current research is concerned with the means of improving the heat transfer for configurations with a minimum distance of the nozzle to the impingement surface. The impingement heat transfer is described using numerical methods over a wide range of parameters for an array of planar jets. These parameters include varying jet flow speed, width of nozzle, distance of nozzle, angle of the jet flow, velocity and geometry of the impingement surface. Normal pressure and shear stress are computed as additional parameters. Using dimensionless characteristic numbers the parameters and the results are correlated to gain generalized equations. The results demonstrate the effect of the investigated parameters on the flow.
Abstract: The new status generated by technological advancements and changes in the global economy raises important issues on how communities and organisations need to innovate upon their traditional processes in order to adapt to the challenges of the Knowledge Society. The DialogoS+ European project aims to study the role of and promote social dialogue in the banking sector, strengthen the link between old and new members and make social dialogue at the European level a force for innovation and change, also given the context of the international crisis emerging in 2008- 2009. Under the scope of DialogoS+, this paper describes how the community of Europe-s banking sector trade unions attempted to adapt to the challenges of the Knowledge Society by exploiting the benefits of new channels of communication, learning, knowledge generation and diffusion focusing on the concept of roadmapping. Important dimensions of social dialogue such as collective bargaining and working conditions are addressed.
Abstract: Vehicle which are turning or maneuvering at high speeds
are susceptible to sliding and subsequently deviate from desired path. In
this paper the dynamics governing the Yaw/Roll behavior of a vehicle
has been simulated. Two different simulations have been used one for
the real vehicle, for which a fuzzy controller is designed to increase its
directional stability property. The other simulation is for a hypothetical
vehicle with much higher tire cornering stiffness which is capable of
developing the required lateral forces at the tire-ground patch contact to
attain the desired lateral acceleration for the vehicle to follow the
desired path without slippage. This simulation model is our reference
model.
The logic for keeping the vehicle on the desired track in the cornering
or maneuvering state is to have some braking forces on the inner or
outer tires based on the direction of vehicle deviation from the desired
path. The inputs to our vehicle simulation model is steer angle δ and
vehicle velocity V , and the outputs can be any kinematical parameters
like yaw rate, yaw acceleration, side slip angle, rate of side slip angle
and so on. The proposed fuzzy controller is a feed forward controller.
This controller has two inputs which are steer angle δ and vehicle
velocity V, and the output of the controller is the correcting moment M,
which guides the vehicle back to the desired track. To develop the
membership functions for the controller inputs and output and the fuzzy
rules, the vehicle simulation has been run for 1000 times and the
correcting moment have been determined by trial and error. Results of
the vehicle simulation with fuzzy controller are very promising
and show the vehicle performance is enhanced greatly over the
vehicle without the controller. In fact the vehicle performance
with the controller is very near the performance of the reference
ideal model.
Abstract: Dengue virus is transmitted from person to person
through the biting of infected Aedes Aegypti mosquitoes. DEN-1,
DEN-2, DEN-3 and DEN-4 are four serotypes of this virus. Infection
with one of these four serotypes apparently produces permanent
immunity to it, but only temporary cross immunity to the others. The
length of time during incubation of dengue virus in human and
mosquito are considered in this study. The dengue patients are
classified into infected and infectious classes. The infectious human
can transmit dengue virus to susceptible mosquitoes but infected
human can not. The transmission model of this disease is formulated.
The human population is divided into susceptible, infected, infectious
and recovered classes. The mosquito population is separated into
susceptible, infected and infectious classes. Only infectious
mosquitoes can transmit dengue virus to the susceptible human. We
analyze this model by using dynamical analysis method. The
threshold condition is discussed to reduce the outbreak of this
disease.
Abstract: Losses reduction initiatives in distribution systems
have been activated due to the increasing cost of supplying
electricity, the shortage in fuel with ever-increasing cost to produce
more power, and the global warming concerns. These initiatives have
been introduced to the utilities in shape of incentives and penalties.
Recently, the electricity distribution companies in Oman have been
incentivized to reduce the distribution technical and non-technical
losses with an equal annual reduction rate for 6 years. In this paper,
different techniques for losses reduction in Mazoon Electricity
Company (MZEC) are addressed. In this company, high numbers of
substation and feeders were found to be non-compliant with the
Distribution System Security Standard (DSSS). Therefore, 33
projects have been suggested to bring non-complying 29 substations
and 28 feeders to meet the planed criteria and to comply with the
DSSS. The largest part of MZEC-s network (South Batinah region)
was modeled by ETAP software package. The model has been
extended to implement the proposed projects and to examine their
effects on losses reduction. Simulation results have shown that the
implementation of these projects leads to a significant improvement
in voltage profile, and reduction in the active and the reactive power
losses. Finally, the economical analysis has revealed that the
implementation of the proposed projects in MZEC leads to an annual
saving of about US$ 5 million.
Abstract: Many researchers are working on information hiding
techniques using different ideas and areas to hide their secrete data.
This paper introduces a robust technique of hiding secret data in
image based on LSB insertion and RSA encryption technique. The
key of the proposed technique is to encrypt the secret data. Then the
encrypted data will be converted into a bit stream and divided it into
number of segments. However, the cover image will also be divided
into the same number of segments. Each segment of data will be
compared with each segment of image to find the best match
segment, in order to create a new random sequence of segments to be
inserted then in a cover image. Experimental results show that the
proposed technique has a high security level and produced better
stego-image quality.
Abstract: The effect of wood vinegar, entomopathogenic
nematodes ((Steinernema thailandensis n. sp.) and fermented organic
substances from four plants such as: Derris elliptica Roxb, Stemona
tuberosa Lour, Tinospora crispa Mier and Azadirachta indica J. were
tested on the five varieties of sweetpotato with potential for
bioethanol production ie. Taiwan, China, PROC No.65-16, Phichit
166-5, and Phichit 129-6. The experimental plots were located at
Faculty of Agriculture, Natural Resources and Environment,
Naresuan University, Phitsanulok, Thailand. The aim of this study
was to compare the efficiency of the five treatments for growth, yield
and insect infestation on the five varieties of sweetpotato. Treatment
with entomopathogenic nematodes gave the highest average weight
of sweetpotato tubers (1.3 kg/tuber), followed by wood vinegar,
fermented organic substances and mixed treatment with yields of
0.88, 0.46 and 0.43 kg/tuber, respectively. Also the
entomopathogenic nematode treatment gave significantly higher
average width and length of sweet potato (9.82 cm and 9.45 cm,
respectively). Additionally, the entomopathogenic nematode
provided the best control of insect infestation on sweetpotato leaves
and tubers. Comparison among the varieties of sweetpotato, PROC
NO.65-16 showed the highest weight and length. However, Phichit
129-6 gave significantly higher weight of 0.94 kg/tuber. Lastly, the
lowest sweet potato weevil infestation on leaves and tubers occurred
on Taiwan and Phichit 129-6.
Abstract: Intelligent deep-drawing is an instrumental research field in sheet metal forming. A set of 28 different experimental data have been employed in this paper, investigating the roles of die radius, punch radius, friction coefficients and drawing ratios for axisymmetric workpieces deep drawing. This paper focuses an evolutionary neural network, specifically, error back propagation in collaboration with genetic algorithm. The neural network encompasses a number of different functional nodes defined through the established principles. The input parameters, i.e., punch radii, die radii, friction coefficients and drawing ratios are set to the network; thereafter, the material outputs at two critical points are accurately calculated. The output of the network is used to establish the best parameters leading to the most uniform thickness in the product via the genetic algorithm. This research achieved satisfactory results based on demonstration of neural networks.
Abstract: In parallel, broadcasting has changed rapidly with the
changing of the world at the same area. Broadcasting is also
influenced and reshaped in terms of the emergence of new
communication technologies. These developments have resulted a lot
of economic and social consequences. The most important
consequences of these results are those of the powers of the
governments to control over the means of communication and control
mechanisms related to the descriptions of the new issues. For this
purpose, autonomous and independent regulatory bodies have been
established by the state. One of these regulatory bodies is the Radio
and Television Supreme Council, which to be established in 1994,
with the Code no 3984. Today’s Radio and Television Supreme
Council which is responsible for the regulation of the radio and
television broadcasts all across Turkey has an important and effective
position as autonomous and independent regulatory body. The Radio
and Television Supreme Council acts as being a remarkable organizer
for a sensitive area of radio and television broadcasting on one hand,
and the area of democratic, liberal and keep in mind the concept of
the public interest by putting certain principles for the functioning of
the Board control, in the context of media policy as one of the central
organs, on the other hand.
In this study, the role of the Radio and Television Supreme
Council is examined in accordance with the Code no 3894 in order to
control over the communication and control mechanisms as well as
the examination of the changes in the duties of the Code No. 6112,
dated 2011.
Abstract: Currently, the Malaysian construction industry is
focusing on transforming construction processes from conventional
building methods to the Industrialized Building System (IBS). Still,
research on the decision making of IBS technology adoption with the
influence of contextual factors is scarce. The purpose of this paper is
to explore how contextual factors influence the IBS decision making
in building projects which is perceived by those involved in
construction industry namely construction stakeholders and IBS
supply chain members. Theoretical background, theoretical
frameworks and literatures which identify possible contextual factors
that influence decision making towards IBS technology adoption are
presented. This paper also discusses the importance of contextual
factors in IBS decision making, highlighting some possible crossover
benefits and making some suggestions as to how these can be
utilized. Conclusions are drawn and recommendations are made with
respect to the perception of socio-economic, IBS policy and IBS
technology associated with building projects.