Cross-Search Technique and its Visualization of Peer-to-Peer Distributed Clinical Documents

One of the ubiquitous routines in medical practice is searching through voluminous piles of clinical documents. In this paper we introduce a distributed system to search and exchange clinical documents. Clinical documents are distributed peer-to-peer. Relevant information is found in multiple iterations of cross-searches between the clinical text and its domain encyclopedia.

Transferring Route Plan over Time

Travelling salesman problem (TSP) is a combinational optimization problem and solution approaches have been applied many real world problems. Pure TSP assumes the cities to visit are fixed in time and thus solutions are created to find shortest path according to these point. But some of the points are canceled to visit in time. If the problem is not time crucial it is not important to determine new routing plan but if the points are changing rapidly and time is necessary do decide a new route plan a new approach should be applied in such cases. We developed a route plan transfer method based on transfer learning and we achieved high performance against determining a new model from scratch in every change.

Behavior Factor of Flat Double-Layer Space Structures

Flat double-layer grid is from category of space structures that are formed from two flat layers connected together with diagonal members. Increased stiffness and better seismic resistance in relation to other space structures are advantages of flat double layer space structures. The objective of this study is assessment and calculation of Behavior factor of flat double layer space structures. With regarding that these structures are used widely but Behavior factor used to design these structures against seismic force is not determined and exact, the necessity of study is obvious. This study is theoretical. In this study we used structures with span length of 16m and 20 m. All connections are pivotal. ANSYS software is used to non-linear analysis of structures.

New Analysis Methods on Strict Avalanche Criterion of S-Boxes

S-boxes (Substitution boxes) are keystones of modern symmetric cryptosystems (block ciphers, as well as stream ciphers). S-boxes bring nonlinearity to cryptosystems and strengthen their cryptographic security. They are used for confusion in data security An S-box satisfies the strict avalanche criterion (SAC), if and only if for any single input bit of the S-box, the inversion of it changes each output bit with probability one half. If a function (cryptographic transformation) is complete, then each output bit depends on all of the input bits. Thus, if it were possible to find the simplest Boolean expression for each output bit in terms of the input bits, each of these expressions would have to contain all of the input bits if the function is complete. From some important properties of S-box, the most interesting property SAC (Strict Avalanche Criterion) is presented and to analyze this property three analysis methods are proposed.

Effect of One-Handed Pushing and Puling Strength at Different Handle Heights in Vertical Direction

The purpose of this study was to measure the maximal isometric strength and to investigate the effects of different handleheights and elbow angles with respect to Mid. sagittal plane on the pushing and pulling strength in vertical direction. Eight male subjects performed a series of static strength measurement for each subject. The highest isometric strength was found in pulling at shoulder height (S.H.) (Mean = 60.29 lb., SD = 16.78 lb.) and the lowest isometric strength was found also in pulling at elbow height (E.H.) (Mean = 33.06 lb., SD = 6.56 lb.). Although the isometric strengths were higher at S.H than at E.H. for both activities, the maximal isometric strengths were compared statistically. ANOVA was performed. The results of the experiment revealed that there was a significant different between handle heights. However, there were no significant different between angles and activities, also no correlation between grip strength and activities.

Role of Association Rule Mining in Numerical Data Analysis

Numerical analysis naturally finds applications in all fields of engineering and the physical sciences, but in the 21st century, the life sciences and even the arts have adopted elements of scientific computations. The numerical data analysis became key process in research and development of all the fields [6]. In this paper we have made an attempt to analyze the specified numerical patterns with reference to the association rule mining techniques with minimum confidence and minimum support mining criteria. The extracted rules and analyzed results are graphically demonstrated. Association rules are a simple but very useful form of data mining that describe the probabilistic co-occurrence of certain events within a database [7]. They were originally designed to analyze market-basket data, in which the likelihood of items being purchased together within the same transactions are analyzed.

In Cognitive Radio the Analysis of Bit-Error- Rate (BER) by using PSO Algorithm

The electromagnetic spectrum is a natural resource and hence well-organized usage of the limited natural resources is the necessities for better communication. The present static frequency allocation schemes cannot accommodate demands of the rapidly increasing number of higher data rate services. Therefore, dynamic usage of the spectrum must be distinguished from the static usage to increase the availability of frequency spectrum. Cognitive radio is not a single piece of apparatus but it is a technology that can incorporate components spread across a network. It offers great promise for improving system efficiency, spectrum utilization, more effective applications, reduction in interference and reduced complexity of usage for users. Cognitive radio is aware of its environmental, internal state, and location, and autonomously adjusts its operations to achieve designed objectives. It first senses its spectral environment over a wide frequency band, and then adapts the parameters to maximize spectrum efficiency with high performance. This paper only focuses on the analysis of Bit-Error-Rate in cognitive radio by using Particle Swarm Optimization Algorithm. It is theoretically as well as practically analyzed and interpreted in the sense of advantages and drawbacks and how BER affects the efficiency and performance of the communication system.

Mycoflora of Activated Sludge with MBRs in Berlin, Germany

Thirty six samples from each (aerobic and anoxic) activated sludge were collected from two wastewater treatment plants with MBRs in Berlin, Germany. The samples were prepared for count and definition of fungal isolates; these isolates were purified by conventional techniques and identified by microscopic examination. Sixty tow species belonging to 28 genera were isolated from activated sludge samples under aerobic conditions (28 genera and 58 species) and anoxic conditions (26 genera and 52 species). The obtained data show that, Aspergillus was found at 94.4% followed by Penicillium 61.1 %, Fusarium (61.1 %), Trichoderma (44.4 %) and Geotrichum candidum (41.6 %) species were the most prevalent in all activated sludge samples. The study confirmed that fungi can thrive in activated sludge and sporulation, but isolated in different numbers depending on the effect of aeration system. Some fungal species in our study are saprophytic, and other a pathogenic to plants and animals.

Building Trust of Mobile Users and their Adoption of M-Commerce

One challenging direction of mobile commerce (mcommerce) that is getting a great deal of attention globally is mobile financing. The smart-phone and PDA users all around the world are facing difficulties to become accustomed and trust in m-commerce. The main rationale can be the slow variation and lack of trust in mobile payment systems. Mobile payment systems that are in use need to be more effective and efficient. This paper proposes: the interface design is not the only factor affecting the m-commerce adoption and lack of trust; in fact it is the combined effect of interface usability and trustworthy mobile payment systems, because it-s the money that the user has to spend at the end of the day, which the user requires to get transferred securely. The purpose of this research is to identify the problems regarding the trust and adaption of m-commerce applications by mobile users and to provide the best possible solution with respect to human computer interaction (HCI) principles.

The Possibility to Resolve the Security Problems through the LTE in Vehicular Ad-hoc Networks

Vehicular Ad-Hoc Networks (VANET) can provide communications between vehicles or infrastructures. It provides the convenience of driving and the secure driving to reduce accidents. In VANET, the security is more important because it is closely related to accidents. Additionally, VANET raises a privacy issue because it can track the location of vehicles and users- identity when a security mechanism is provided. In this paper, we analyze the problem of an existing solution for security requirements required in VANET, and resolve the problem of the existing method when a key management mechanism is provided for the security operation in VANET. Therefore, we show suitability of the Long Term Evolution (LTE) in VANET for the solution of this problem.

Well-Being in Adolescence: Fitting Measurement Model

Well-being has been given special emphasis in quality of life. It involves living a meaningful, life satisfaction, stability and happiness in life. Well-being also concerns the satisfaction of physical, psychological, social needs and demands of an individual. The purpose of this study was to validate three-factor measurement model of well-being using structural equation modeling (SEM). The conceptions of well-being measured such dimensions as physical, psychological and social well-being. This study was done based on a total sample of 650 adolescents from east-coast of peninsular Malaysia. The Well-Being Scales which was adapted from [1] was used in this study. The items were hypothesized a priori to have nonzero loadings on all dimensions in the model. The findings of the SEM demonstrated that it is a good fitting model which the proposed model fits the driving theory; (x2df = 1.268; GFI = .994; CFI = .998; TLI= .996; p = .255; RMSEA = .021). Composite reliability (CR) was .93 and average variance extracted (AVE) was 58%. The model in this study fits with the sample of data and well-being is important to bring sustainable development to the mainstream.

Distributed 2-Vertex Connectivity Test of Graphs Using Local Knowledge

The vertex connectivity of a graph is the smallest number of vertices whose deletion separates the graph or makes it trivial. This work is devoted to the problem of vertex connectivity test of graphs in a distributed environment based on a general and a constructive approach. The contribution of this paper is threefold. First, using a preconstructed spanning tree of the considered graph, we present a protocol to test whether a given graph is 2-connected using only local knowledge. Second, we present an encoding of this protocol using graph relabeling systems. The last contribution is the implementation of this protocol in the message passing model. For a given graph G, where M is the number of its edges, N the number of its nodes and Δ is its degree, our algorithms need the following requirements: The first one uses O(Δ×N2) steps and O(Δ×logΔ) bits per node. The second one uses O(Δ×N2) messages, O(N2) time and O(Δ × logΔ) bits per node. Furthermore, the studied network is semi-anonymous: Only the root of the pre-constructed spanning tree needs to be identified.

Modeling and Analysis of Process Parameters on Surface Roughness in EDM of AISI D2 Tool Steel by RSM Approach

In this research, Response Surface Methodology (RSM) is used to investigate the effect of four controllable input variables namely: discharge current, pulse duration, pulse off time and applied voltage Surface Roughness (SR) of on Electrical Discharge Machined surface. To study the proposed second-order polynomial model for SR, a Central Composite Design (CCD) is used to estimation the model coefficients of the four input factors, which are alleged to influence the SR in Electrical Discharge Machining (EDM) process. Experiments were conducted on AISI D2 tool steel with copper electrode. The response is modeled using RSM on experimental data. The significant coefficients are obtained by performing Analysis of Variance (ANOVA) at 5% level of significance. It is found that discharge current, pulse duration, and pulse off time and few of their interactions have significant effect on the SR. The model sufficiency is very satisfactory as the Coefficient of Determination (R2) is found to be 91.7% and adjusted R2-statistic (R2 adj ) 89.6%.

Identity Formation and Autobiographical Memory: Two Interrelated Concepts of Development

The aim of the present paper is to investigate the interdependency among ego-identity status, autobiographical memory and cultural life story schema. The study shows considerable differences between autobiographical memory characteristics and “family script", which is typical for participants (adolescents, M age years = 17.84, SD = 1.18, N = 58), with different ego-identity statuses. Participants with diffused ego-identity status recalled fewer autobiographical memories. Additionally, this group of participants recalled fewer events from their parents- life. Participants with moratorium ego-identity status dated their first recollections to a later age than others, and recalled fewer memories relating to their childhood. Participants with achieved identity status recalled more self-defining memories and events from their parents- life. They used more functions from the autobiographical memory. There weren-t any significant differences between the foreclosed identity status group and the others. These findings support the idea of a bidirectional relation between culture, memory and self.

The Computer Multimedia Instruction Package for Welding and Brazing

The objective of this project is to produce computer assisted instruction(CAI) for welding and brazing in order to determine the efficiency of the instruction package and the study accomplishment of learner by studying through computer assisted instruction for welding and brazing it was examined through the target group surveyed from the 30 students studying in the two year of 5-year-academic program, department of production technology education, faculty of industrial education and technology, king mongkut-s university of technology thonburi. The result of the research indicated that the media evaluated by experts and subject matter quality evaluation of computer assisted instruction for welding and brazing was in line for the good criterion. The mean of score evaluated before the study, during the study and after the study was 34.58, 83.33 and 83.43, respectively. The efficiency of the lesson was 83.33/83.43 which was higher than the expected value, 80/80. The study accomplishment of the learner, who utilizes computer assisted instruction for welding and brazing as a media, was higher and equal to the significance statistical level of 95%. The value was 1.669 which was equal to 35.36>1.669. It could be summarized that computer assisted instruction for welding and brazing was the efficient media to use for studying and teaching.

Implementing Authentication Protocol for Exchanging Encrypted Messages via an Authentication Server Based on Elliptic Curve Cryptography with the ElGamal-s Algorithm

In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on the ElGamal-s algorithm, for sending small amounts of data via an authentication server. The innovation of this approach is that there is no need for a symmetric algorithm or a safe communication channel such as SSL. The reason that ECC has been chosen instead of RSA is that it provides a methodology for obtaining high-speed implementations of authentication protocols and encrypted mail techniques while using fewer bits for the keys. This means that ECC systems require smaller chip size and less power consumption. The proposed protocol has been implemented in Java to analyse its features and vulnerabilities in the real world.

Discovering Complex Regularities: from Tree to Semi-Lattice Classifications

Data mining uses a variety of techniques each of which is useful for some particular task. It is important to have a deep understanding of each technique and be able to perform sophisticated analysis. In this article we describe a tool built to simulate a variation of the Kohonen network to perform unsupervised clustering and support the entire data mining process up to results visualization. A graphical representation helps the user to find out a strategy to optimize classification by adding, moving or delete a neuron in order to change the number of classes. The tool is able to automatically suggest a strategy to optimize the number of classes optimization, but also support both tree classifications and semi-lattice organizations of the classes to give to the users the possibility of passing from one class to the ones with which it has some aspects in common. Examples of using tree and semi-lattice classifications are given to illustrate advantages and problems. The tool is applied to classify macroeconomic data that report the most developed countries- import and export. It is possible to classify the countries based on their economic behaviour and use the tool to characterize the commercial behaviour of a country in a selected class from the analysis of positive and negative features that contribute to classes formation. Possible interrelationships between the classes and their meaning are also discussed.

Study of Damage in Beams with Different Boundary Conditions

–In this paper the damage in clamped-free, clampedclamped and free-free beam are analyzed considering samples without and with structural modifications. The damage location is investigated by the use of the bispectrum and wavelet analysis. The mathematical models are obtained using 2D elasticity theory and the Finite Element Method (FEM). The numerical and experimental data are approximated using the Particle Swarm Optimizer (PSO) method and this way is possible to adjust the localization and the severity of the damage. The experimental data are obtained through accelerometers placed along the sample. The system is excited using impact hammer.

Overall Effect of Nano Clay on the Physical Mechanical Properties of Epoxy Resin

In this paper, the effect of modified clay on the mechanical efficiency of epoxy resin is examined. Studies by X ray diffraction and microscopic transient electron method show that modified clay distribution in polymer area is intercalated kind. Examination the results of mechanical tests shows that existence of modified clay in epoxy area increases pressure yield strength, tension module and nano composite fracture toughness in relate of pure epoxy. By microscopic examinations it is recognized too that the action of toughness growth of this kind of nano composite is due to crack deflection, formation of new surfaces and fracture of clay piles.

Wireless Sensor Network: Characteristics and Architectures

An information procuring and processing emerging technology wireless sensor network (WSN) Consists of autonomous nodes with versatile devices underpinned by applications. Nodes are equipped with different capabilities such as sensing, computing, actuation and wireless communications etc. based on application requirements. A WSN application ranges from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. The nodes are deployed independently to cooperatively monitor the physical and environmental conditions. The architecture of WSN differs based on the application requirements and focus on low cost, flexibility, fault tolerance capability, deployment process as well as conserve energy. In this paper we have present the characteristics, architecture design objective and architecture of WSN