Abstract: An attempt has been made several times to identify
and discuss the U.S. experience on the formation of political nation in
political science. The purpose of this research paper is to identify the
main aspects of the formation of civic identity in the United States
and Kazakhstan, through the identification of similarities and
differences that can get practical application in making decisions of
national policy issues in the context of globalization, as well as to
answer the questions “What should unite the citizens of Kazakhstan
to the nation?" and “What should be the dominant identity: civil or
ethnic (national) one?"
Can Kazakhstan being multiethnic country like America, adopt its
experience in the formation of a civic nation? Since it is believed that
the “multi-ethnic state of the population is a characteristic feature of
most modern countries in the world," it states that “inter-ethnic
integration is one of the most important aspects of the problem of
forming a new social community (metaetnic - Kazakh people,
Kazakh nation" [1].
Abstract: Islam has a general principle of increase in
population. But the Muslims are equally obliged to take care of
health, education and the provisions etc. for their offspring and wives
in the best possible way. The Muslims would have to regulate and
manage the number of children, if any situation affects their duties
regarding their wives or children. Islam accomplishes permissibility
of temporary blockade in human fertility if someone faces any
problem regarding health of mother or children. During the life of the
Holy Prophet (SAW), Azl (coitus interruptus) was the only way for
temporary spacing between the children. In technologically
developed environment, the same can be resort through some
advanced methodology or instrument of temporary blockade. Solid
grounds are available in Islam that the fertility rate should be
managed if any of the aspect of human quality is being affected.
Abstract: Increase in using internet makes some problems that
one of them is "internet anxiety". Internet anxiety is a type of anxious
that people may feel during surfing internet or using internet for their
educational purpose, blogging or streaming to digital libraries. The
goal of this study is evaluating of internet anxiety among the
management students. In this research Ealy's internet anxiety
questionnaire, consists of positive and negative items, is completed
by 310 participants. According to the findings, about 64.7% of them
were equal or below to mean anxiety score (50). The distribution of
internet anxiety scores was normal and there was no meaningful
difference between men-s and women's anxiety level in this sample.
Results also showed that there is no meaningful difference of internet
anxiety level between different fields of study in Management. This
evaluation will help managers to perform gap analysis between the
existent level and the desired one. Future work would be providing
techniques for abating human anxiety while using internet via human
computer interaction techniques.
Abstract: Today modern simulations solutions in the wind turbine industry have achieved a high degree of complexity and detail in result. Limitations exist when it is time to validate model results against measurements. Regarding Model validation it is of special interest to identify mode frequencies and to differentiate them from the different excitations. A wind turbine is a complex device and measurements regarding any part of the assembly show a lot of noise. Input excitations are difficult or even impossible to measure due to the stochastic nature of the environment. Traditional techniques for frequency analysis or features extraction are widely used to analyze wind turbine sensor signals, but have several limitations specially attending to non stationary signals (Events). A new technique based on autoregresive analysis techniques is introduced here for a specific application, a comparison and examples related to different events in the wind turbine operations are presented.
Abstract: The purpose of this paper is to provide an overview on methodological aspects of the information technology outsourcing (ITO) surveys, in an attempt to improve the data quality and reporting in survey research. It is based on a review of thirty articles on ITO surveys and focuses on two commonly explored dimensions of ITO, namely what are outsourced and why should there be ITO. This study highlights weaknesses in ITO surveys including lack of a clear definition of population, lack of information regarding the sampling method used, not citing the response rate, no information pertaining to pilot testing of survey instrument and absence of information on internal validity in the use or reporting of surveys. This study represents an attempt with a limited scope to point to shortfalls in the use survey methodology in ITO, and thus raise awareness among researchers in enhancing the reliability of survey findings.
Abstract: Transition theory has been used to derive the elasticplastic
and transitional stresses. Results obtained have been discussed
numerically and depicted graphically. It is observed that the rotating
disk made of incompressible material with inclusion require higher
angular speed to yield at the internal surface as compared to disk
made of compressible material. It is seen that the radial and
circumferential stresses are maximum at the internal surface with and
without edge load (for flat disk). With the increase in thickness
parameter (k = 2, 4), the circumferential stress is maximum at the
external surface while the radial stress is maximum at the internal
surface. From the figures drawn the disk with exponentially varying
thickness (k = 2), high angular speed is required for initial yielding at
internal surface as compared to flat disk and exponentially varying
thickness for k = 4 onwards. It is concluded that the disk made of
isotropic compressible material is on the safer side of the design as
compared to disk made of isotropic incompressible material as it
requires higher percentage increase in an angular speed to become
fully plastic from its initial yielding.
Abstract: This paper describes an automated event detection and location system for water distribution pipelines which is based upon low-cost sensor technology and signature analysis by an Artificial
Neural Network (ANN). The development of a low cost failure sensor which measures the opacity or cloudiness of the local water
flow has been designed, developed and validated, and an ANN based system is then described which uses time series data produced by
sensors to construct an empirical model for time series prediction and
classification of events. These two components have been installed,
tested and verified in an experimental site in a UK water distribution
system. Verification of the system has been achieved from a series of
simulated burst trials which have provided real data sets. It is concluded that the system has potential in water distribution network
management.
Abstract: This paper presents a design method of self-tuning
Quantitative Feedback Theory (QFT) by using improved deadbeat
control algorithm. QFT is a technique to achieve robust control with
pre-defined specifications whereas deadbeat is an algorithm that
could bring the output to steady state with minimum step size.
Nevertheless, usually there are large peaks in the deadbeat response.
By integrating QFT specifications into deadbeat algorithm, the large
peaks could be tolerated. On the other hand, emerging QFT with
adaptive element will produce a robust controller with wider
coverage of uncertainty. By combining QFT-based deadbeat
algorithm and adaptive element, superior controller that is called selftuning
QFT-based deadbeat controller could be achieved. The output
response that is fast, robust and adaptive is expected. Using a grain
dryer plant model as a pilot case-study, the performance of the
proposed method has been evaluated and analyzed. Grain drying
process is very complex with highly nonlinear behaviour, long delay,
affected by environmental changes and affected by disturbances.
Performance comparisons have been performed between the
proposed self-tuning QFT-based deadbeat, standard QFT and
standard dead-beat controllers. The efficiency of the self-tuning QFTbased
dead-beat controller has been proven from the tests results in
terms of controller’s parameters are updated online, less percentage
of overshoot and settling time especially when there are variations in
the plant.
Abstract: The present study has been taken to explore the
screening of in vitro antimicrobial activities of D-galactose-binding
sponge lectin (HOL-30). HOL-30 was purified from the marine
demosponge Halichondria okadai by affinity chromatography. The
molecular mass of the lectin was determined to be 30 kDa with a
single polypeptide by SDS-PAGE under non-reducing and reducing
conditions. HOL-30 agglutinated trypsinized and glutaraldehydefixed
rabbit and human erythrocytes with preference for type O
erythrocytes. The lectin was subjected to evaluation for inhibition of
microbial growth by the disc diffusion method against eleven human
pathogenic gram-positive and gram-negative bacteria. The lectin
exhibited strong antibacterial activity against gram-positive bacteria,
such as Bacillus megaterium and Bacillus subtilis. However, it did
not affect against gram-negative bacteria such as Salmonella typhi
and Escherichia coli. The largest zone of inhibition was recorded of
Bacillus megaterium (12 in diameter) and Bacillus subtilis (10 mm in
diameter) at a concentration of the lectin (250 μg/disc). On the other
hand, the antifungal activity of the lectin was investigated against six
phytopathogenic fungi based on food poisoning technique. The lectin
has shown maximum inhibition (22.83%) of mycelial growth of
Botrydiplodia theobromae at a concentration of 100 μg/mL media.
These findings indicate that the lectin may be of importance to
clinical microbiology and have therapeutic applications.
Abstract: Evaluation of contact pressure, surface and
subsurface contact stresses are essential to know the functional
response of surface coatings and the contact behavior mainly depends
on surface roughness, material property, thickness of layer and the
manner of loading. Contact parameter evaluation of real rough
surface contacts mostly relies on statistical single asperity contact
approaches. In this work, a three dimensional layered solid rough
surface in contact with a rigid flat is modeled and analyzed using
finite element method. The rough surface of layered solid is
generated by FFT approach. The generated rough surface is exported
to a finite element method based ANSYS package through which the
bottom up solid modeling is employed to create a deformable solid
model with a layered solid rough surface on top. The discretization
and contact analysis are carried by using the same ANSYS package.
The elastic, elastoplastic and plastic deformations are continuous in
the present finite element method unlike many other contact models.
The Young-s modulus to yield strength ratio of layer is varied in the
present work to observe the contact parameters effect while keeping
the surface roughness and substrate material properties as constant.
The contacting asperities attain elastic, elastoplastic and plastic states
with their continuity and asperity interaction phenomena is inherently
included. The resultant contact parameters show that neighboring
asperity interaction and the Young-s modulus to yield strength ratio
of layer influence the bulk deformation consequently affect the
interface strength.
Abstract: Natural gas is the most popular fossil fuel in the
current era and future as well. Natural gas is existed in underground
reservoirs so it may contain many of non-hydrocarbon components
for instance, hydrogen sulfide, nitrogen and water vapor. These
impurities are undesirable compounds and cause several technical
problems for example, corrosion and environment pollution.
Therefore, these impurities should be reduce or removed from natural
gas stream. Khurmala dome is located in southwest Erbil-Kurdistan
region. The Kurdistan region government has paid great attention for
this dome to provide the fuel for Kurdistan region. However, the
Khurmala associated natural gas is currently flaring at the field.
Moreover, nowadays there is a plan to recover and trade this gas and
to use it either as feedstock to power station or to sell it in global
market. However, the laboratory analysis has showed that the
Khurmala sour gas has huge quantities of H2S about (5.3%) and CO2
about (4.4%). Indeed, Khurmala gas sweetening process has been
removed in previous study by using Aspen HYSYS. However,
Khurmala sweet gas still contents some quintets of water about 23
ppm in sweet gas stream. This amount of water should be removed or
reduced. Indeed, water content in natural gas cause several technical
problems such as hydrates and corrosion. Therefore, this study aims
to simulate the prospective Khurmala gas dehydration process by
using Aspen HYSYS V. 7.3 program. Moreover, the simulation
process succeeded in reducing the water content to less than 0.1ppm.
In addition, the simulation work is also achieved process
optimization by using several desiccant types for example, TEG and
DEG and it also study the relationship between absorbents type and
its circulation rate with HCs losses from glycol regenerator tower.
Abstract: Streaming Applications usually run in parallel or in
series that incrementally transform a stream of input data. It poses a
design challenge to break such an application into distinguishable
blocks and then to map them into independent hardware processing
elements. For this, there is required a generic controller that
automatically maps such a stream of data into independent processing
elements without any dependencies and manual considerations. In
this paper, Kahn Process Networks (KPN) for such streaming
applications is designed and developed that will be mapped on
MPSoC. This is designed in such a way that there is a generic Cbased
compiler that will take the mapping specifications as an input
from the user and then it will automate these design constraints and
automatically generate the synthesized RTL optimized code for
specified application.
Abstract: This article describes the aspects of the formation of
the national idea and national identity through the prism of gender
control and its contradistinction to the obsolete, Soviet component.
The role of females in ethnic and national projects is considered from
the point of view of Dr. Nira Yuval-Davis: as biological reproducers
of the ethnic communities- members; as reproducers of the boarders
of ethnic/national groups; as central participants in the ideological
reproduction of community and transducers of its culture; as symbols
in ideology, reproduction and transformation of ethnic/national
categories; and as participants of national, economical, political and
military combats. The society of the transitional type uses the
symbolic resources of the formation of gender component in the
national project. The gender patterns act like cultural codes,
executing the important ideological function in formation of the
national female- image, i.e. the discussion on hijab - it-s not just the
discussion on control over the female body, it-s the discussion on the
metaphor of social order.
Abstract: Air conditioning is mainly use as human comfort
cooling medium. It use more in high temperatures are country such as
Malaysia. Proper estimation of cooling load will archive ideal
temperature. Without proper estimation can lead to over estimation or
under estimation. The ideal temperature should be comfort enough.
This study is to develop a program to calculate an ideal cooling load
demand, which is match with heat gain. Through this study, it is easy
to calculate cooling load estimation. Objective of this study are to
develop user-friendly and easy excess cooling load program. This is
to insure the cooling load can be estimate by any of the individual
rather than them using rule-of-thumb. Developed software is carryout
by using Matlab-GUI. These developments are only valid for
common building in Malaysia only. An office building was select as
case study to verify the applicable and accuracy of develop software.
In conclusion, the main objective has successfully where developed
software is user friendly and easily to estimate cooling load demand.
Abstract: In this paper, genetic algorithm (GA) is proposed for
the design of an optimization algorithm to achieve the bandwidth
allocation of ATM network. In Broadband ISDN, the ATM is a highbandwidth;
fast packet switching and multiplexing technique. Using
ATM it can be flexibly reconfigure the network and reassign the
bandwidth to meet the requirements of all types of services. By
dynamically routing the traffic and adjusting the bandwidth
assignment, the average packet delay of the whole network can be
reduced to a minimum. M/M/1 model can be used to analyze the
performance.
Abstract: Space exploration is a highly visible endeavour of
humankind to seek profound answers to questions about the origins
of our solar system, whether life exists beyond Earth, and how we
could live on other worlds. Different platforms have been utilized in
planetary exploration missions, such as orbiters, landers, rovers, and
penetrators.
Having low mass, good mechanical contact with the surface,
ability to acquire high quality scientific subsurface data, and ability to
be deployed in areas that may not be conducive to landers or rovers,
Penetrators provide an alternative and complimentary solution that
makes possible scientific exploration of hardly accessible sites (icy
areas, gully sites, highlands etc.).
The Canadian Space Agency (CSA) has put space exploration as
one of the pillars of its space program, and established ExCo program
to prepare Canada for future international planetary exploration.
ExCo sets surface mobility as its focus and priority, and invests
mainly in the development of rovers because of Canada's niche space
robotics technology. Meanwhile, CSA is also investigating how
micro-penetrators can help Canada to fulfill its scientific objectives
for planetary exploration.
This paper presents a review of the micro-penetrator technologies,
past missions, and lessons learned. It gives a detailed analysis of the
technical challenges of micro-penetrators, such as high impact
survivability, high precision guidance navigation and control, thermal
protection, communications, and etc. Then, a Canadian perspective of
a possible micro-penetrator mission is given, including Canadian
scientific objectives and priorities, potential instruments, and flight
opportunities.
Abstract: This paper describes new computer vision algorithms
that have been developed to track moving objects as part of a
long-term study into the design of (semi-)autonomous vehicles. We
present the results of a study to exploit variable kernels for tracking in
video sequences. The basis of our work is the mean shift
object-tracking algorithm; for a moving target, it is usual to define a
rectangular target window in an initial frame, and then process the data
within that window to separate the tracked object from the background
by the mean shift segmentation algorithm. Rather than use the
standard, Epanechnikov kernel, we have used a kernel weighted by the
Chamfer distance transform to improve the accuracy of target
representation and localization, minimising the distance between the
two distributions in RGB color space using the Bhattacharyya
coefficient. Experimental results show the improved tracking
capability and versatility of the algorithm in comparison with results
using the standard kernel. These algorithms are incorporated as part of
a robot test-bed architecture which has been used to demonstrate their
effectiveness.
Abstract: Bioinformatics and computational biology involve
the use of techniques including applied mathematics,
informatics, statistics, computer science, artificial intelligence,
chemistry, and biochemistry to solve biological problems
usually on the molecular level. Research in computational
biology often overlaps with systems biology. Major research
efforts in the field include sequence alignment, gene finding,
genome assembly, protein structure alignment, protein structure
prediction, prediction of gene expression and proteinprotein
interactions, and the modeling of evolution. Various
global rearrangements of permutations, such as reversals and
transpositions,have recently become of interest because of their
applications in computational molecular biology. A reversal is
an operation that reverses the order of a substring of a permutation.
A transposition is an operation that swaps two adjacent
substrings of a permutation. The problem of determining the
smallest number of reversals required to transform a given
permutation into the identity permutation is called sorting by
reversals. Similar problems can be defined for transpositions
and other global rearrangements. In this work we perform a
study about some genome rearrangement primitives. We show
how a genome is modelled by a permutation, introduce some
of the existing primitives and the lower and upper bounds
on them. We then provide a comparison of the introduced
primitives.
Abstract: This paper explores the knowledge and attitude of
women and men in decision making on pap smear screening. This
qualitative study recruited 52 respondents with 44 women and 8 men,
using the purposive sampling with snowballing technique through indepth
interviews. This study demonstrates several key findings:
Female respondents have better knowledge compared to male. Most
of the women perceived that pap smear screening is beneficial and
important, but to proceed with the test is still doubtful. Male
respondents were supportive in terms of sending their spouses to the
health facilities or give more freedom to their wives to choose and
making decision on their own health due to prominent reason that
women know best on their own health. It is expected that the results
from this study will provide useful guideline for healthcare providers
to prepare any action/intervention to provide an extensive education
to improve people-s knowledge and attitude towards pap smear.
Abstract: Support vector machines (SVMs) have shown
superior performance compared to other machine learning techniques,
especially in classification problems. Yet one limitation of SVMs is
the lack of an explanation capability which is crucial in some
applications, e.g. in the medical and security domains. In this paper, a
novel approach for eclectic rule-extraction from support vector
machines is presented. This approach utilizes the knowledge acquired
by the SVM and represented in its support vectors as well as the
parameters associated with them. The approach includes three stages;
training, propositional rule-extraction and rule quality evaluation.
Results from four different experiments have demonstrated the value
of the approach for extracting comprehensible rules of high accuracy
and fidelity.