Abstract: We proposed a technique to identify road traffic
congestion levels from velocity of mobile sensors with high accuracy
and consistent with motorists- judgments. The data collection utilized
a GPS device, a webcam, and an opinion survey. Human perceptions
were used to rate the traffic congestion levels into three levels: light,
heavy, and jam. Then the ratings and velocity were fed into a
decision tree learning model (J48). We successfully extracted vehicle
movement patterns to feed into the learning model using a sliding
windows technique. The parameters capturing the vehicle moving
patterns and the windows size were heuristically optimized. The
model achieved accuracy as high as 99.68%. By implementing the
model on the existing traffic report systems, the reports will cover
comprehensive areas. The proposed method can be applied to any
parts of the world.
Abstract: Background: Widespread use of chemotherapeutic
drugs in the treatment of cancer has lead to higher health hazards
among employee who handle and administer such drugs, so nurses
should know how to protect themselves, their patients and their work
environment against toxic effects of chemotherapy. Aim of this study
was carried out to examine the effect of chemotherapy safety protocol
for oncology nurses on their protective measure practices. Design: A
quasi experimental research design was utilized. Setting: The study
was carried out in oncology department of Menoufia university
hospital and Tanta oncology treatment center. Sample: A
convenience sample of forty five nurses in Tanta oncology treatment
center and eighteen nurses in Menoufiya oncology department.
Tools: 1. an interviewing questionnaire that covering sociodemographic
data, assessment of unit and nurses' knowledge about
chemotherapy. II: Obeservational check list to assess nurses' actual
practices of handling and adminestration of chemotherapy. A base
line data were assessed before implementing Chemotherapy Safety
protocol, then Chemotherapy Safety protocol was implemented, and
after 2 monthes they were assessed again. Results: reveled that 88.9%
of study group I and 55.6% of study group II improved to good total
knowledge scores after educating on the safety protocol, also 95.6%
of study group I and 88.9% of study group II had good total practice
score after educating on the safety protocol. Moreover less than half
of group I (44.4%) reported that heavy workload is the most barriers
for them, while the majority of group II (94.4%) had many barriers
for adhering to the safety protocol such as they didn’t know the
protocol, the heavy work load and inadequate equipment.
Conclusions: Safety protocol for Oncology Nurses seemed to have
positive effect on improving nurses' knowledge and practice.
Recommendation: chemotherapy safety protocol should be instituted
for all oncology nurses who are working in any oncology unit and/ or
center to enhance compliance, and this protocol should be done at
frequent intervals.
Abstract: Overcurrent (OC) relays are the major protection
devices in a distribution system. The operating time of the OC relays
are to be coordinated properly to avoid the mal-operation of the
backup relays. The OC relay time coordination in ring fed
distribution networks is a highly constrained optimization problem
which can be stated as a linear programming problem (LPP). The
purpose is to find an optimum relay setting to minimize the time of
operation of relays and at the same time, to keep the relays properly
coordinated to avoid the mal-operation of relays.
This paper presents two phase simplex method for optimum time
coordination of OC relays. The method is based on the simplex
algorithm which is used to find optimum solution of LPP. The
method introduces artificial variables to get an initial basic feasible
solution (IBFS). Artificial variables are removed using iterative
process of first phase which minimizes the auxiliary objective
function. The second phase minimizes the original objective function
and gives the optimum time coordination of OC relays.
Abstract: Chua’s circuit is one of the most important electronic devices that are used for Chaos and Bifurcation studies. A central role of secure communication is devoted to it. Since the adaptive control is used vastly in the linear systems control, here we introduce a new trend of application of adaptive method in the chaos controlling field. In this paper, we try to derive a new adaptive control scheme for Chua’s circuit controlling because control of chaos is often very important in practical operations. The novelty of this approach is for sake of its robustness against the external perturbations which is simulated as an additive noise in all measured states and can be generalized to other chaotic systems. Our approach is based on Lyapunov analysis and the adaptation law is considered for the feedback gain. Because of this, we have named it NAFT (Nonlinear Adaptive Feedback Technique). At last, simulations show the capability of the presented technique for Chua’s circuit.
Abstract: IP multicasting is a key technology for many existing and emerging applications on the Internet. Furthermore, with increasing popularity of wireless devices and mobile equipment, it is necessary to determine the best way to provide this service in a wireless environment. IETF Mobile IP, that provides mobility for hosts in IP networks, proposes two approaches for mobile multicasting, namely, remote subscription (MIP-RS) and bi-directional tunneling (MIP-BT). In MIP-RS, a mobile host re-subscribes to the multicast groups each time it moves to a new foreign network. MIP-RS suffers from serious packet losses while mobile host handoff occurs. In MIP-BT, mobile hosts send and receive multicast packets by way of their home agents (HAs), using Mobile IP tunnels. Therefore, it suffers from inefficient routing and wastage of system resources. In this paper, we propose a protocol called Mobile Multicast support using Old Foreign Agent (MMOFA) for Mobile Hosts. MMOFA is derived from MIP-RS and with the assistance of Mobile host's Old foreign agent, routes the missing datagrams due to handoff in adjacent network via tunneling. Also, we studied the performance of the proposed protocol by simulation under ns-2.27. The results demonstrate that MMOFA has optimal routing efficiency and low delivery cost, as compared to other approaches.
Abstract: The purpose of this study was to explore the
relationship between Burnout, Negative Affectivity, and
Organizational Citizenship Behavior (OCB) for social service
workers at two agencies serving homeless populations. Thirty two
subjects completed surveys. Significant correlations between major
variables and subscales were found.
Abstract: Several models have been introduced so far for single
electron box, SEB, which all of them were restricted to DC response
and or low temperature limit. In this paper we introduce a new time
dependent, high temperature analytical model for SEB for the first
time. DC behavior of the introduced model will be verified against
SIMON software and its time behavior will be verified against a
newly published paper regarding step response of SEB.
Abstract: The paper is concerned with relationships between
SSME and ICTs and focuses on the role of Web 2.0 tools in
the service development process. The research presented aims at
exploring how collaborative technologies can support and improve
service processes, highlighting customer centrality and value coproduction.
The core idea of the paper is the centrality of user
participation and the collaborative technologies as enabling factors;
Wikipedia is analyzed as an example. The result of such analysis is
the identification and description of a pattern characterising specific
services in which users collaborate by means of web tools with value
co-producers during the service process. The pattern of collaborative
co-production concerning several categories of services including
knowledge based services is then discussed.
Abstract: Shear-layer instabilities of a pulsed stack-issued
transverse jet were studied experimentally in a wind tunnel. Jet
pulsations were induced by means of acoustic excitation. Streak
pictures of the smoke-flow patterns illuminated by the laser-light sheet
in the median plane were recorded with a high-speed digital camera.
Instantaneous velocities of the shear-layer instabilities in the flow were
digitized by a hot-wire anemometer. By analyzing the streak pictures
of the smoke-flow visualization, three characteristic flow modes,
synchronized flapping jet, transition, and synchronized shear-layer
vortices, are identified in the shear layer of the pulsed stack-issued
transverse jet at various excitation Strouhal numbers. The shear-layer
instabilities of the pulsed stack-issued transverse jet are synchronized
by acoustic excitation except for transition mode. In transition flow
mode, the shear-layer vortices would exhibit a frequency that would be
twice as great as the acoustic excitation frequency.
Abstract: Bluetooth is a personal wireless communication
technology and is being applied in many scenarios. It is an emerging
standard for short range, low cost, low power wireless access
technology. Current existing MAC (Medium Access Control)
scheduling schemes only provide best-effort service for all masterslave
connections. It is very challenging to provide QoS (Quality of
Service) support for different connections due to the feature of
Master Driven TDD (Time Division Duplex). However, there is no
solution available to support both delay and bandwidth guarantees
required by real time applications. This paper addresses the issue of
how to enhance QoS support in a Bluetooth piconet. The Bluetooth
specification proposes a Round Robin scheduler as possible solution
for scheduling the transmissions in a Bluetooth Piconet. We propose
an algorithm which will reduce the bandwidth waste and enhance the
efficiency of network. We define token counters to estimate traffic of
real-time slaves. To increase bandwidth utilization, a back-off
mechanism is then presented for best-effort slaves to decrease the
frequency of polling idle slaves. Simulation results demonstrate that
our scheme achieves better performance over the Round Robin
scheduling.
Abstract: In this paper we study a system composed by carbon
nanotube (CNT) and bundle of carbon nanotube (BuCNT) interacting
with a specific fatty acid as molecular probe. Full system is
represented by open nanotube (or nanotubes) and the linoleic acid
(LA) relaxing due the interaction with CNT and BuCNT. The LA has
in his form an asymmetric shape with COOH termination provoking
a close BuCNT interaction mainly by van der Waals force field. The
simulations were performed by classical molecular dynamics with
standard parameterizations.
Our results show that these BuCNT and CNT are dynamically
stable and it shows a preferential interaction position with LA
resulting in three features: (i) when the LA is interacting with CNT
and BuCNT (including both termination, CH2 or COOH), the LA is
repelled; (ii) when the LA terminated with CH2 is closer to open
extremity of BuCNT, the LA is also repelled by the interaction
between them; and (iii) when the LA terminated with COOH is
closer to open extremity of BuCNT, the LA is encapsulated by the
BuCNT. These simulations are part of a more extensive work on
searching efficient selective molecular devices and could be useful to
reach this goal.
Abstract: The development of the signal compression
algorithms is having compressive progress. These algorithms are
continuously improved by new tools and aim to reduce, an average,
the number of bits necessary to the signal representation by means of
minimizing the reconstruction error. The following article proposes
the compression of Arabic speech signal by a hybrid method
combining the wavelet transform and the linear prediction. The
adopted approach rests, on one hand, on the original signal
decomposition by ways of analysis filters, which is followed by the
compression stage, and on the other hand, on the application of the
order 5, as well as, the compression signal coefficients. The aim of
this approach is the estimation of the predicted error, which will be
coded and transmitted. The decoding operation is then used to
reconstitute the original signal. Thus, the adequate choice of the
bench of filters is useful to the transform in necessary to increase the
compression rate and induce an impercevable distortion from an
auditive point of view.
Abstract: In policy discourse of 1990s, more inclusive spaces
have been constructed for realizing full and meaningful participation
of common people in education. These participatory spaces provide
an alternative possibility for universalizing elementary education
against the backdrop of a history of entrenched forms of social and
economical exclusion; inequitable education provisions; and
shrinking role of the state in today-s neo-liberal times. Drawing on
case-studies of bottom-up approaches to school governance, the study
examines an array of innovative ways through which poor people
gained a sense of identity and agency by evolving indigenous
solutions to issues regarding schooling of their children. In the
process, state-s institutions and practices became more accountable
and responsive to educational concerns of the marginalized people.
The deliberative participation emerged as an active way of
experiencing deeper forms of empowerment and democracy than its
passive realization as mere bearers of citizen rights.
Abstract: Internet today has a huge impact on all aspects of life,
and also in the area of the broader context of democracy, politics and
politicians. If democracy is freedom of choice, there are a number of
conditions that can ensure in practice the freedom to be achieved and
realized. These preconditions must be achieved regardless of the
manner of voting. The key contribution of ICT to achieve freedom of
choice is that technology enables the correlation of the citizens and
elected representatives on the better way than it was possible without
the Internet. In this sense, we can say that the Internet and ICT are
changing significantly, and potentially improving the environment in
which democratic processes are taking place. This paper aims to
describe trends in use of ICT in democratic processes, and analyzes
the challenges for implementation of e-Democracy in Montenegro
Abstract: The Siemens Healthcare Sector is one of the world's
largest suppliers to the healthcare industry and a trendsetter in
medical imaging and therapy, laboratory diagnostics, medical
information technology, and hearing aids.
Siemens offers its customers products and solutions for the entire
range of patient care from a single source – from prevention and
early detection to diagnosis, and on to treatment and aftercare. By
optimizing clinical workflows for the most common diseases,
Siemens also makes healthcare faster, better, and more cost effective.
The optimization of clinical workflows requires a
multidisciplinary focus and a collaborative approach of e.g. medical
advisors, researchers and scientists as well as healthcare economists.
This new form of collaboration brings together experts with deep
technical experience, physicians with specialized medical knowledge
as well as people with comprehensive knowledge about health
economics.
As Charles Darwin is often quoted as saying, “It is neither the
strongest of the species that survive, nor the most intelligent, but the
one most responsive to change," We believe that those who can
successfully manage this change will emerge as winners, with
valuable competitive advantage.
Current medical information and knowledge are some of the core
assets in the healthcare industry. The main issue is to connect
knowledge holders and knowledge recipients from various
disciplines efficiently in order to spread and distribute knowledge.
Abstract: Combined experimental and computational analysis of
hygrothermal performance of an interior thermal insulation system
applied on a brick wall is presented in the paper. In the experimental
part, the functionality of the insulation system is tested at simulated
difference climate conditions using a semi-scale device. The
measured temperature and relative humidity profiles are used for the
calibration of computer code HEMOT that is finally applied for a
long-term hygrothermal analysis of the investigated structure.
Abstract: Workload and resource management are two essential functions provided at the service level of the grid software infrastructure. To improve the global throughput of these software environments, workloads have to be evenly scheduled among the available resources. To realize this goal several load balancing strategies and algorithms have been proposed. Most strategies were developed in mind, assuming homogeneous set of sites linked with homogeneous and fast networks. However for computational grids we must address main new issues, namely: heterogeneity, scalability and adaptability. In this paper, we propose a layered algorithm which achieve dynamic load balancing in grid computing. Based on a tree model, our algorithm presents the following main features: (i) it is layered; (ii) it supports heterogeneity and scalability; and, (iii) it is totally independent from any physical architecture of a grid.
Abstract: This paper examines many mathematical methods for
molding the hourly price forward curve (HPFC); the model will be
constructed by numerous regression methods, like polynomial
regression, radial basic function neural networks & a furrier series.
Examination the models goodness of fit will be done by means of
statistical & graphical tools. The criteria for choosing the model will
depend on minimize the Root Mean Squared Error (RMSE), using the
correlation analysis approach for the regression analysis the optimal
model will be distinct, which are robust against model
misspecification. Learning & supervision technique employed to
determine the form of the optimal parameters corresponding to each
measure of overall loss. By using all the numerical methods that
mentioned previously; the explicit expressions for the optimal model
derived and the optimal designs will be implemented.
Abstract: MBMS is a unidirectional point-to-multipoint bearer
service in which data are transmitted from a single source entity to
multiple recipients. For a mobile to support the MBMS, MBMS client
functions as well as MBMS radio protocols should be designed and
implemented. In this paper, we analyze the MBMS client functions
and describe the implementation of them in our mobile test-bed. User
operations and signaling flows between protocol entities to control the
MBMS functions are designed in detail. Service announcement
utilizing the file download MBMS service and four MBMS user
services are demonstrated in the test-bed to verify the MBMS client
functions.