Abstract: Many natural language expressions are ambiguous, and
need to draw on other sources of information to be interpreted.
Interpretation of the e word تعاون to be considered as a noun or a verb
depends on the presence of contextual cues. To interpret words we
need to be able to discriminate between different usages. This paper
proposes a hybrid of based- rules and a machine learning method for
tagging Arabic words. The particularity of Arabic word that may be
composed of stem, plus affixes and clitics, a small number of rules
dominate the performance (affixes include inflexional markers for
tense, gender and number/ clitics include some prepositions,
conjunctions and others). Tagging is closely related to the notion of
word class used in syntax. This method is based firstly on rules (that
considered the post-position, ending of a word, and patterns), and
then the anomaly are corrected by adopting a memory-based learning
method (MBL). The memory_based learning is an efficient method to
integrate various sources of information, and handling exceptional
data in natural language processing tasks. Secondly checking the
exceptional cases of rules and more information is made available to
the learner for treating those exceptional cases. To evaluate the
proposed method a number of experiments has been run, and in
order, to improve the importance of the various information in
learning.
Abstract: There are a number of different cars for transferring hundreds of close contacts of swine influenza patients to hospital, and we need to carefully assign the passengers to those cars in order to minimize the risk of influenza spreading during transportation. The paper presents an approach to straightforward obtain the optimal solution of the relaxed problems, and develops two iterative improvement algorithms to effectively tackle the general problem.
Abstract: In mechanical and environmental engineering, mixed
convection is a frequently encountered thermal fluid phenomenon
which exists in atmospheric environment, urban canopy flows, ocean
currents, gas turbines, heat exchangers, and computer chip cooling
systems etc... . This paper deals with a numerical investigation of
mixed convection in a vertical heated channel. This flow results from
the mixing of the up-going fluid along walls of the channel with the
one issued from a flat nozzle located in its entry section. The fluiddynamic
and heat-transfer characteristics of vented vertical channels
are investigated for constant heat-flux boundary conditions, a
Rayleigh number equal to 2.57 1010, for two jet Reynolds number
Re=3 103 and 2104 and the aspect ratio in the 8-20 range. The system
of governing equations is solved with a finite volumes method and an
implicit scheme. The obtained results show that the turbulence and
the jet-wall interaction activate the heat transfer, as does the drive of
ambient air by the jet. For low Reynolds number Re=3 103, the
increase of the aspect Ratio enhances the heat transfer of about 3%,
however; for Re=2 104, the heat transfer enhancement is of about
12%. The numerical velocity, pressure and temperature fields are
post-processed to compute the quantities of engineering interest such
as the induced mass flow rate, and average Nusselt number, in terms
of Rayleigh, Reynolds numbers and dimensionless geometric
parameters are presented.
Abstract: Biometric measures of one kind or another have been
used to identify people since ancient times, with handwritten
signatures, facial features, and fingerprints being the traditional
methods. Of late, Systems have been built that automate the task of
recognition, using these methods and newer ones, such as hand
geometry, voiceprints and iris patterns. These systems have different
strengths and weaknesses. This work is a two-section composition. In
the starting section, we present an analytical and comparative study
of common biometric techniques. The performance of each of them
has been viewed and then tabularized as a result. The latter section
involves the actual implementation of the techniques under
consideration that has been done using a state of the art tool called,
MATLAB. This tool aids to effectively portray the corresponding
results and effects.
Abstract: Natural organic matter (NOM) is heterogeneous
mixture of organic compounds that enter the water media from
animal and plant remains, domestic and industrial wastes.
Researches showed that NOM is likely precursor material for
disinfection by products (DBPs). Chlorine very commenly used for
disinfection purposes and NOM and chlorine reacts then
Trihalomethane (THM) and Haloacetic acids (HAAs) which are
cancerogenics for human health are produced. The aim of the study is
to search NOM removal by enhanced coagulation from drinking
water source of Eskisehir which is supplied from Porsuk Dam.
Recently, Porsuk dam water is getting highly polluted and therefore
NOM concentration is increasing. Enhanced coagulation studies were
evaluated by measurement of Dissolved Organic Carbon (DOC), UV
absorbance at 254 nm (UV254), and different trihalomethane
formation potential (THMFP) tests. Results of jar test experiments
showed that NOM can be removed from water about 40-50 % of
efficiency by enhanced coagulation. Optimum coagulant type and
coagulant dosages were determined using FeCl3 and Alum.
Abstract: There are many sources trough which the soil get
enriched and contaminated with REEs. The determination of REEs in
environmental samples has been limited because of the lack of
sensitive analytical techniques. Soil samples were collected from
four sites including open cast coal mine, natural coal burning, coal
washery and control in the coal field located in Dhanbad, India.
Total concentrations of rare earth elements (REEs) were determined
using the inductively coupled plasma atomic absorption spectrometry
in order to assess enrichment status in the coal field. Results showed
that the mean concentrations of La, Pr, Eu, Tb, Ho, and Tm in open
cast mine and natural coal burning sites were elevated compared to
the reference concentrations, while Ce, Nd, Sm, and Gd were
elevated in coal washery site. When compared to reference soil,
heavy REEs (HREEs) were enriched in open cast mines and natural
coal burning affected soils, however, the HREEs were depleted in the
coal washery sites. But, the Chondrite-normalization diagram showed
significant enrichment for light REEs (LREEs) in all the soils. High
concentration of Pr, Eu, Tb, Ho, Tm, and Lu in coal mining and coal
burning sites may pose human health risks. Factor analysis showed
that distribution and relative abundance of REEs of the coal washery
site is comparable with the control. Eventually washing or cleaning
of coal could significantly decrease the emission of REEs from coal
into the environment.
Abstract: The steady-state temperature for one-dimensional transpiration cooling system has been conducted experimentally and numerically to investigate the heat transfer characteristics of combined convection and radiation. The Nickel –Chrome (Ni-Cr) open-cellular porous material having porosity of 0.93 and pores per inch (PPI) of 21.5 was examined. The upper surface of porous plate was heated by the heat flux of incoming radiation varying from 7.7 - 16.6 kW/m2 whereas air injection velocity fed into the lower surface was varied from 0.36 - 1.27 m/s, and was then rearranged as Reynolds number (Re). For the report of the results in the present study, two efficiencies including of temperature and conversion efficiency were presented. Temperature efficiency indicating how close the mean temperature of a porous heat plate to that of inlet air, and increased rapidly with the air injection velocity (Re). It was then saturated and had a constant value at Re higher than 10. The conversion efficiency, which was regarded as the ability of porous material in transferring energy by convection after absorbed from heat radiation, decreased with increasing of the heat flux and air injection velocity. In addition, it was then asymptotic to a constant value at the Re higher than 10. The numerical predictions also agreed with experimental data very well.
Abstract: In this experimental investigation shake table tests
were conducted on two reduced models that represent normal single
room building constructed by Compressed Stabilized Earth Block
(CSEB) from locally available soil. One model was constructed with
earthquake resisting features (EQRF) having sill band, lintel band and
vertical bands to control the building vibration and another one was
without Earthquake Resisting Features. To examine the seismic
capacity of the models particularly when it is subjected to long-period
ground motion by large amplitude by many cycles of repeated
loading, the test specimen was shaken repeatedly until the failure.
The test results from Hi-end Data Acquisition system show that
model with EQRF behave better than without EQRF. This modified
masonry model with new material combined with new bands is used
to improve the behavior of masonry building.
Abstract: This paper focuses on Land Use and Land Cover Changes (LULCC) occurred in the urban coastal regions of the Mediterranean basin in the last thirty years. LULCC were assessed diachronically (1975-2006) in two urban areas, Rome (Italy) and Athens (Greece), by using CORINE land cover maps. In strictly coastal territories a persistent growth of built-up areas at the expenses of both agricultural and forest land uses was found. On the contrary, a different pattern was observed in the surrounding inland areas, where a high conversion rate of the agricultural land uses to both urban and forest land uses was recorded. The impact of city growth on the complex pattern of coastal LULCC is finally discussed.
Abstract: This paper presents a novel genetic algorithm, termed
the Optimum Individual Monogenetic Algorithm (OIMGA) and
describes its hardware implementation. As the monogenetic strategy
retains only the optimum individual, the memory requirement is
dramatically reduced and no crossover circuitry is needed, thereby
ensuring the requisite silicon area is kept to a minimum.
Consequently, depending on application requirements, OIMGA
allows the investigation of solutions that warrant either larger GA
populations or individuals of greater length. The results given in this
paper demonstrate that both the performance of OIMGA and its
convergence time are superior to those of existing hardware GA
implementations. Local convergence is achieved in OIMGA by
retaining elite individuals, while population diversity is ensured by
continually searching for the best individuals in fresh regions of the
search space.
Abstract: The purpose of present paper was to investigate
perceptions of Korean secondary school students about social issues
related to biological sciences. Twenty issues were selected based on
topics of articles in the newspaper from 2005 to 2010. The issues were
categorized into biotechnology, health-disease and environment
domains. Subjects were 541 high school students (male 253 and
female 288). On the survey, students were asked to answer on 5-point
Lickert scales how they thought of the effect of biological phenomena
or events related to biological issues on the individual life and the
society. They perceived that the biological issues would be more
effectible on the society than on the individual life. Female students
had a little more perceptions than males.
Abstract: In recent years image watermarking has become an
important research area in data security, confidentiality and image
integrity. Many watermarking techniques were proposed for medical
images. However, medical images, unlike most of images, require
extreme care when embedding additional data within them because
the additional information must not affect the image quality and
readability. Also the medical records, electronic or not, are linked to
the medical secrecy, for that reason, the records must be confidential.
To fulfill those requirements, this paper presents a lossless
watermarking scheme for DICOM images. The proposed a fragile
scheme combines two reversible techniques based on difference
expansion for patient's data hiding and protecting the region of
interest (ROI) with tamper detection and recovery capability.
Patient's data are embedded into ROI, while recovery data are
embedded into region of non-interest (RONI). The experimental
results show that the original image can be exactly extracted from the
watermarked one in case of no tampering. In case of tampered ROI,
tampered area can be localized and recovered with a high quality
version of the original area.
Abstract: A given polynomial, possibly with multiple roots, is
factored into several lower-degree distinct-root polynomials with
natural-order-integer powers. All the roots, including multiplicities,
of the original polynomial may be obtained by solving these lowerdegree
distinct-root polynomials, instead of the original high-degree
multiple-root polynomial directly.
The approach requires polynomial Greatest Common Divisor
(GCD) computation. The very simple and effective process, “Monic
polynomial subtractions" converted trickily from “Longhand
polynomial divisions" of Euclidean algorithm is employed. It
requires only simple elementary arithmetic operations without any
advanced mathematics.
Amazingly, the derived routine gives the expected results for the
test polynomials of very high degree, such as p( x) =(x+1)1000.
Abstract: Since water resources of desert Naein City are very
limited, a approach which saves water resources and meanwhile
meets the needs of the greenspace for water is to use city-s sewage
wastewater. Proper treatment of Naein-s sewage up to the standards
required for green space uses may solve some of the problems of
green space development of the city. The present paper closely
examines available statistics and information associated with city-s
sewage system, and determines complementary stages of sewage
treatment facilities of the city. In the present paper, population, per
capita water use, and required discharge for various greenspace
pieces including different plants are calculated. Moreover, in order to
facilitate the application of water resources, a Crude water
distribution network apart from drinking water distribution network is
designed, and a plan for mixing municipal wells- water with sewage
wastewater in proposed mixing tanks is suggested. Hence, following
greenspace irrigation reform and complementary plan, per capita
greenspace of the city will be increased from current amount of 13.2
square meters to 32 square meters.
Abstract: Reinforced Concrete (RC) structures strengthened
with fiber reinforced polymer (FRP) lack in thermal resistance under
elevated temperatures in the event of fire. This phenomenon led to
the lining of strengthened concrete with thin high performance
cementitious composites (THPCC) to protect the substrate against
elevated temperature. Elevated temperature effects on THPCC, based
on different cementitious materials have been studied in the past but
high-alumina cement (HAC)-based THPCC have not been well
characterized. This research study will focus on the THPCC based on
HAC replaced by 60%, 70%, 80% and 85% of ground granulated
blast furnace slag (GGBS). Samples were evaluated by the
measurement of their mechanical strength (28 & 56 days of curing)
after exposed to 400°C, 600°C and 28°C of room temperature for
comparison and corroborated by their microstructure study. Results
showed that among all mixtures, the mix containing only HAC
showed the highest compressive strength after exposed to 600°C as
compared to other mixtures. However, the tensile strength of THPCC
made of HAC and 60% GGBS content was comparable to the
THPCC with HAC only after exposed to 600°C. Field emission
scanning electron microscopy (FESEM) images of THPCC
accompanying Energy Dispersive X-ray (EDX) microanalysis
revealed that the microstructure deteriorated considerably after
exposure to elevated temperatures which led to the decrease in
mechanical strength.
Abstract: One of the best ways for achievement of conventional
vehicle changing to hybrid case is trustworthy simulation result and
using of driving realities. For this object, in this paper, at first sevendegree-
of-freedom dynamical model of vehicle will be shown. Then
by using of statically model of engine, gear box, clutch, differential,
electrical machine and battery, the hybrid automobile modeling will
be down and forward simulation of vehicle for pedals to wheels
power transformation will be obtained. Then by design of a fuzzy
controller and using the proper rule base, fuel economy and
regenerative braking will be marked. Finally a series of
MATLAB/SIMULINK simulation results will be proved the
effectiveness of proposed structure.
Abstract: Along with the advances in medicine, providing medical information to individual patient is becoming more important. In Japan such information via Braille is hardly provided to blind and partially sighted people. Thus we are researching and developing a Web-based automatic translation program “eBraille" to translate Japanese text into Japanese Braille. First we analyzed the Japanese transcription rules to implement them on our program. We then added medical words to the dictionary of the program to improve its translation accuracy for medical text. Finally we examined the efficacy of statistical learning models (SLMs) for further increase of word segmentation accuracy in braille translation. As a result, eBraille had the highest translation accuracy in the comparison with other translation programs, improved the accuracy for medical text and is utilized to make hospital brochures in braille for outpatients and inpatients.
Abstract: Previous studies have shown that there are arguments
regarding the reliability and validity of the Ashworth and Modified
Ashworth Scale towards evaluating patients diagnosed with upper
limb disorders. These evaluations depended on the raters’ experiences.
This initiated us to develop an upper limb disorder part-task trainer
that is able to simulate consistent upper limb disorders, such as
spasticity and rigidity signs, based on the Modified Ashworth Scale to
improve the variability occurring between raters and intra-raters
themselves. By providing consistent signs, novice therapists would be
able to increase training frequency and exposure towards various
levels of signs. A total of 22 physiotherapists and occupational
therapists participated in the study. The majority of the therapists
agreed that with current therapy education, they still face problems
with inter-raters and intra-raters variability (strongly agree 54%; n =
12/22, agree 27%; n = 6/22) in evaluating patients’ conditions. The
therapists strongly agreed (72%; n = 16/22) that therapy trainees
needed to increase their frequency of training; therefore believe that
our initiative to develop an upper limb disorder training tool will help
in improving the clinical education field (strongly agree and agree
63%; n = 14/22).
Abstract: Compare to western cultures, women who smoke in Korea are not tolerated. Korean people are prejudiced against women smoking. In spite of the relative prevalence of sexual equality in South Korea, women too often feel obliged to confine their smoking to only a few public spaces, such as designated smoking rooms, coffee shops or pubs. Korean Confucianism classifies people according to gender and social status. According to Confucian culture, cigarettes convey clear social meanings as well as reinforcing status, age and gender, beyond personal preferences. For these reasons, the significant of people smoking in Korea varies according to their gender. This study will determine reasons for the ongoing sexual discrimination against female Korean smokers thorough analyzing Korean films. Since film is a medium reflects social phenomenon. Roland Barthes- Mythology Theory will be used to analyze films.
Abstract: IEEE has designed 802.11i protocol to address the
security issues in wireless local area networks. Formal analysis is
important to ensure that the protocols work properly without having
to resort to tedious testing and debugging which can only show the
presence of errors, never their absence. In this paper, we present
the formal verification of an abstract protocol model of 802.11i.
We translate the 802.11i protocol into the Strand Space Model and
then prove the authentication property of the resulting model using
the Strand Space formalism. The intruder in our model is imbued
with powerful capabilities and repercussions to possible attacks are
evaluated. Our analysis proves that the authentication of 802.11i is
not compromised in the presented model. We further demonstrate
how changes in our model will yield a successful man-in-the-middle
attack.