Abstract: One of the ubiquitous routines in medical practice is searching through voluminous piles of clinical documents. In this paper we introduce a distributed system to search and exchange clinical documents. Clinical documents are distributed peer-to-peer. Relevant information is found in multiple iterations of cross-searches between the clinical text and its domain encyclopedia.
Abstract: Travelling salesman problem (TSP) is a combinational
optimization problem and solution approaches have been applied
many real world problems. Pure TSP assumes the cities to visit are
fixed in time and thus solutions are created to find shortest path
according to these point. But some of the points are canceled to visit
in time. If the problem is not time crucial it is not important to
determine new routing plan but if the points are changing rapidly and
time is necessary do decide a new route plan a new approach should
be applied in such cases. We developed a route plan transfer method
based on transfer learning and we achieved high performance against
determining a new model from scratch in every change.
Abstract: Flat double-layer grid is from category of space structures that are formed from two flat layers connected together with diagonal members. Increased stiffness and better seismic resistance in relation to other space structures are advantages of flat double layer space structures. The objective of this study is assessment and calculation of Behavior factor of flat double layer space structures. With regarding that these structures are used widely but Behavior factor used to design these structures against seismic force is not determined and exact, the necessity of study is obvious. This study is theoretical. In this study we used structures with span length of 16m and 20 m. All connections are pivotal. ANSYS software is used to non-linear analysis of structures.
Abstract: S-boxes (Substitution boxes) are keystones of modern
symmetric cryptosystems (block ciphers, as well as stream ciphers).
S-boxes bring nonlinearity to cryptosystems and strengthen their
cryptographic security. They are used for confusion in data security
An S-box satisfies the strict avalanche criterion (SAC), if and only if
for any single input bit of the S-box, the inversion of it changes each
output bit with probability one half. If a function (cryptographic
transformation) is complete, then each output bit depends on all of
the input bits. Thus, if it were possible to find the simplest Boolean
expression for each output bit in terms of the input bits, each of these
expressions would have to contain all of the input bits if the function
is complete. From some important properties of S-box, the most
interesting property SAC (Strict Avalanche Criterion) is presented
and to analyze this property three analysis methods are proposed.
Abstract: The purpose of this study was to measure the maximal
isometric strength and to investigate the effects of different handleheights
and elbow angles with respect to Mid. sagittal plane on the
pushing and pulling strength in vertical direction. Eight male subjects
performed a series of static strength measurement for each subject.
The highest isometric strength was found in pulling at shoulder
height (S.H.) (Mean = 60.29 lb., SD = 16.78 lb.) and the lowest
isometric strength was found also in pulling at elbow height (E.H.)
(Mean = 33.06 lb., SD = 6.56 lb.). Although the isometric strengths
were higher at S.H than at E.H. for both activities, the maximal
isometric strengths were compared statistically. ANOVA was
performed. The results of the experiment revealed that there was a
significant different between handle heights. However, there were no
significant different between angles and activities, also no correlation
between grip strength and activities.
Abstract: Numerical analysis naturally finds applications in all
fields of engineering and the physical sciences, but in the
21st century, the life sciences and even the arts have adopted
elements of scientific computations. The numerical data analysis
became key process in research and development of all the fields [6].
In this paper we have made an attempt to analyze the specified
numerical patterns with reference to the association rule mining
techniques with minimum confidence and minimum support mining
criteria. The extracted rules and analyzed results are graphically
demonstrated. Association rules are a simple but very useful form of
data mining that describe the probabilistic co-occurrence of certain
events within a database [7]. They were originally designed to
analyze market-basket data, in which the likelihood of items being
purchased together within the same transactions are analyzed.
Abstract: The electromagnetic spectrum is a natural resource
and hence well-organized usage of the limited natural resources is the
necessities for better communication. The present static frequency
allocation schemes cannot accommodate demands of the rapidly
increasing number of higher data rate services. Therefore, dynamic
usage of the spectrum must be distinguished from the static usage to
increase the availability of frequency spectrum. Cognitive radio is not
a single piece of apparatus but it is a technology that can incorporate
components spread across a network. It offers great promise for
improving system efficiency, spectrum utilization, more effective
applications, reduction in interference and reduced complexity of
usage for users. Cognitive radio is aware of its environmental,
internal state, and location, and autonomously adjusts its operations
to achieve designed objectives. It first senses its spectral environment
over a wide frequency band, and then adapts the parameters to
maximize spectrum efficiency with high performance. This paper
only focuses on the analysis of Bit-Error-Rate in cognitive radio by
using Particle Swarm Optimization Algorithm. It is theoretically as
well as practically analyzed and interpreted in the sense of
advantages and drawbacks and how BER affects the efficiency and
performance of the communication system.
Abstract: Thirty six samples from each (aerobic and anoxic)
activated sludge were collected from two wastewater treatment plants
with MBRs in Berlin, Germany. The samples were prepared for count
and definition of fungal isolates; these isolates were purified by
conventional techniques and identified by microscopic examination.
Sixty tow species belonging to 28 genera were isolated from
activated sludge samples under aerobic conditions (28 genera and 58
species) and anoxic conditions (26 genera and 52 species). The
obtained data show that, Aspergillus was found at 94.4% followed by
Penicillium 61.1 %, Fusarium (61.1 %), Trichoderma (44.4 %) and
Geotrichum candidum (41.6 %) species were the most prevalent in all
activated sludge samples. The study confirmed that fungi can thrive
in activated sludge and sporulation, but isolated in different numbers
depending on the effect of aeration system. Some fungal species in
our study are saprophytic, and other a pathogenic to plants and
animals.
Abstract: One challenging direction of mobile commerce (mcommerce)
that is getting a great deal of attention globally is mobile
financing. The smart-phone and PDA users all around the world are
facing difficulties to become accustomed and trust in m-commerce.
The main rationale can be the slow variation and lack of trust in
mobile payment systems. Mobile payment systems that are in use
need to be more effective and efficient. This paper proposes: the
interface design is not the only factor affecting the m-commerce
adoption and lack of trust; in fact it is the combined effect of
interface usability and trustworthy mobile payment systems, because
it-s the money that the user has to spend at the end of the day, which
the user requires to get transferred securely. The purpose of this
research is to identify the problems regarding the trust and adaption
of m-commerce applications by mobile users and to provide the best
possible solution with respect to human computer interaction (HCI)
principles.
Abstract: Vehicular Ad-Hoc Networks (VANET) can provide
communications between vehicles or infrastructures. It provides the
convenience of driving and the secure driving to reduce accidents. In
VANET, the security is more important because it is closely related to
accidents. Additionally, VANET raises a privacy issue because it can
track the location of vehicles and users- identity when a security
mechanism is provided. In this paper, we analyze the problem of an
existing solution for security requirements required in VANET, and
resolve the problem of the existing method when a key management
mechanism is provided for the security operation in VANET.
Therefore, we show suitability of the Long Term Evolution (LTE) in
VANET for the solution of this problem.
Abstract: Well-being has been given special emphasis in quality
of life. It involves living a meaningful, life satisfaction, stability and
happiness in life. Well-being also concerns the satisfaction of
physical, psychological, social needs and demands of an individual.
The purpose of this study was to validate three-factor measurement
model of well-being using structural equation modeling (SEM). The
conceptions of well-being measured such dimensions as physical,
psychological and social well-being. This study was done based on a
total sample of 650 adolescents from east-coast of peninsular
Malaysia. The Well-Being Scales which was adapted from [1] was
used in this study. The items were hypothesized a priori to have nonzero
loadings on all dimensions in the model. The findings of the
SEM demonstrated that it is a good fitting model which the proposed
model fits the driving theory; (x2df = 1.268; GFI = .994; CFI = .998;
TLI= .996; p = .255; RMSEA = .021). Composite reliability (CR)
was .93 and average variance extracted (AVE) was 58%. The model
in this study fits with the sample of data and well-being is important
to bring sustainable development to the mainstream.
Abstract: The vertex connectivity of a graph is the smallest number of vertices whose deletion separates the graph or makes it trivial. This work is devoted to the problem of vertex connectivity test of graphs in a distributed environment based on a general and a constructive approach. The contribution of this paper is threefold. First, using a preconstructed spanning tree of the considered graph, we present a protocol to test whether a given graph is 2-connected using only local knowledge. Second, we present an encoding of this protocol using graph relabeling systems. The last contribution is the implementation of this protocol in the message passing model. For a given graph G, where M is the number of its edges, N the number of its nodes and Δ is its degree, our algorithms need the following requirements: The first one uses O(Δ×N2) steps and O(Δ×logΔ) bits per node. The second one uses O(Δ×N2) messages, O(N2) time and O(Δ × logΔ) bits per node. Furthermore, the studied network is semi-anonymous: Only the root of the pre-constructed spanning tree needs to be identified.
Abstract: In this research, Response Surface Methodology (RSM) is used to investigate the effect of four controllable input variables namely: discharge current, pulse duration, pulse off time and applied voltage Surface Roughness (SR) of on Electrical Discharge Machined surface. To study the proposed second-order polynomial model for SR, a Central Composite Design (CCD) is used to estimation the model coefficients of the four input factors, which are alleged to influence the SR in Electrical Discharge Machining (EDM) process. Experiments were conducted on AISI D2 tool steel with copper electrode. The response is modeled using RSM on experimental data. The significant coefficients are obtained by performing Analysis of Variance (ANOVA) at 5% level of significance. It is found that discharge current, pulse duration, and pulse off time and few of their interactions have significant effect on the SR. The model sufficiency is very satisfactory as the Coefficient of Determination (R2) is found to be 91.7% and adjusted R2-statistic (R2 adj ) 89.6%.
Abstract: The aim of the present paper is to investigate the
interdependency among ego-identity status, autobiographical memory
and cultural life story schema. The study shows considerable
differences between autobiographical memory characteristics and
“family script", which is typical for participants (adolescents, M age
years = 17.84, SD = 1.18, N = 58), with different ego-identity
statuses. Participants with diffused ego-identity status recalled fewer
autobiographical memories. Additionally, this group of participants
recalled fewer events from their parents- life. Participants with
moratorium ego-identity status dated their first recollections to a later
age than others, and recalled fewer memories relating to their
childhood. Participants with achieved identity status recalled more
self-defining memories and events from their parents- life. They used
more functions from the autobiographical memory. There weren-t
any significant differences between the foreclosed identity status
group and the others. These findings support the idea of a
bidirectional relation between culture, memory and self.
Abstract: The objective of this project is to produce computer
assisted instruction(CAI) for welding and brazing in order to
determine the efficiency of the instruction package and the study
accomplishment of learner by studying through computer assisted
instruction for welding and brazing it was examined through the
target group surveyed from the 30 students studying in the two year
of 5-year-academic program, department of production technology
education, faculty of industrial education and technology, king
mongkut-s university of technology thonburi. The result of the
research indicated that the media evaluated by experts and subject
matter quality evaluation of computer assisted instruction for welding
and brazing was in line for the good criterion. The mean of score
evaluated before the study, during the study and after the study was
34.58, 83.33 and 83.43, respectively. The efficiency of the lesson was
83.33/83.43 which was higher than the expected value, 80/80. The
study accomplishment of the learner, who utilizes computer assisted
instruction for welding and brazing as a media, was higher and equal
to the significance statistical level of 95%. The value was 1.669
which was equal to 35.36>1.669. It could be summarized that
computer assisted instruction for welding and brazing was the
efficient media to use for studying and teaching.
Abstract: In this paper the authors propose a protocol, which uses Elliptic Curve Cryptography (ECC) based on the ElGamal-s algorithm, for sending small amounts of data via an authentication server. The innovation of this approach is that there is no need for a symmetric algorithm or a safe communication channel such as SSL. The reason that ECC has been chosen instead of RSA is that it provides a methodology for obtaining high-speed implementations of authentication protocols and encrypted mail techniques while using fewer bits for the keys. This means that ECC systems require smaller chip size and less power consumption. The proposed protocol has been implemented in Java to analyse its features and vulnerabilities in the real world.
Abstract: Data mining uses a variety of techniques each of which
is useful for some particular task. It is important to have a deep
understanding of each technique and be able to perform sophisticated
analysis. In this article we describe a tool built to simulate a variation
of the Kohonen network to perform unsupervised clustering and
support the entire data mining process up to results visualization. A
graphical representation helps the user to find out a strategy to
optimize classification by adding, moving or delete a neuron in order
to change the number of classes. The tool is able to automatically
suggest a strategy to optimize the number of classes optimization, but
also support both tree classifications and semi-lattice organizations of
the classes to give to the users the possibility of passing from one
class to the ones with which it has some aspects in common.
Examples of using tree and semi-lattice classifications are given to
illustrate advantages and problems. The tool is applied to classify
macroeconomic data that report the most developed countries- import
and export. It is possible to classify the countries based on their
economic behaviour and use the tool to characterize the commercial
behaviour of a country in a selected class from the analysis of
positive and negative features that contribute to classes formation.
Possible interrelationships between the classes and their meaning are
also discussed.
Abstract: –In this paper the damage in clamped-free, clampedclamped and free-free beam are analyzed considering samples
without and with structural modifications. The damage location is
investigated by the use of the bispectrum and wavelet analysis. The
mathematical models are obtained using 2D elasticity theory and the
Finite Element Method (FEM). The numerical and experimental data
are approximated using the Particle Swarm Optimizer (PSO) method
and this way is possible to adjust the localization and the severity of
the damage. The experimental data are obtained through
accelerometers placed along the sample. The system is excited using
impact hammer.
Abstract: In this paper, the effect of modified clay on the
mechanical efficiency of epoxy resin is examined. Studies by X ray
diffraction and microscopic transient electron method show that
modified clay distribution in polymer area is intercalated kind.
Examination the results of mechanical tests shows that existence of
modified clay in epoxy area increases pressure yield strength, tension
module and nano composite fracture toughness in relate of pure
epoxy. By microscopic examinations it is recognized too that the
action of toughness growth of this kind of nano composite is due to
crack deflection, formation of new surfaces and fracture of clay piles.
Abstract: An information procuring and processing emerging technology wireless sensor network (WSN) Consists of autonomous nodes with versatile devices underpinned by applications. Nodes are equipped with different capabilities such as sensing, computing, actuation and wireless communications etc. based on application requirements. A WSN application ranges from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. The nodes are deployed independently to cooperatively monitor the physical and environmental conditions. The architecture of WSN differs based on the application requirements and focus on low cost, flexibility, fault tolerance capability, deployment process as well as conserve energy. In this paper we have present the characteristics, architecture design objective and architecture of WSN