Venice 17th Century: The Greek Ethnic Identity in Danger

At the end of the 17th Century the Greek orthodox Archbishop in Venice -Meletios Typaldos- decided to turn the doctrine of the orthodox Greeks into Catholicism. More than 5.000 Greeks were living in Venice then. Their leadership -the Greek confraternity- fought against Meletios. Participants in this conflict were the Pope, the ecumenical Patriarch in Constantinople and Peter the Great of Russia. All the play according to my opinion -which is followed by evidence and theoretical support is a strong conflict between the two actors -the Archbishop and the Confraternity- and the object of conflict is the change of the Greek orthodox beliefs to Catholicism. Ethnicity especially for Greeks of the era is identified with orthodoxy. So this was a conflict of identity. The results of that conflict were of tremendous importance to the Greeks in Venice and affected them for long.

Secret Communications Using Synchronized Sixth-Order Chuas's Circuits

In this paper, we use Generalized Hamiltonian systems approach to synchronize a modified sixth-order Chua's circuit, which generates hyperchaotic dynamics. Synchronization is obtained between the master and slave dynamics with the slave being given by an observer. We apply this approach to transmit private information (analog and binary), while the encoding remains potentially secure.

In Silico Analysis of Quinoxaline Ligand Conformations on 1ZIP: Adenylate Kinase

Adenylate kinase (AK) catalyse the phosphotransferase reaction plays an important role in cellular energy homeostasis. The inhibitors of bacterial AK are useful in the treatment of several bacterial infections. To the novel inhibitors of AK, docking studies performed by using the 3D structure of Bacillus stearothermophilus adenylate kinase from protein data bank (IZIP). 46 Quinoxaline analogues were docked in 1ZIP and selected the highly interacting compounds based on their binding energies, for further studies

Application of a Novel Audio Compression Scheme in Automatic Music Recommendation, Digital Rights Management and Audio Fingerprinting

Rapid progress in audio compression technology has contributed to the explosive growth of music available in digital form today. In a reversal of ideas, this work makes use of a recently proposed efficient audio compression scheme to develop three important applications in the context of Music Information Retrieval (MIR) for the effective manipulation of large music databases, namely automatic music recommendation (AMR), digital rights management (DRM) and audio finger-printing for song identification. The performance of these three applications has been evaluated with respect to a database of songs collected from a diverse set of genres.

Dual-Response Approach to Work Stress: An Investigation of Stressors and Wellbeing Outcomes

This study sought to uncover the complex role of stress in the workplace by investigating both positive (eustress) and negative (distress) stress responses. In particular, the study tested a mediation model in which organisational stressors (person-job fit and role overload) influence employee affective wellbeing, both directly and indirectly through stress responses. Participants were recruited from retail and finance organisations in Australia and New Zealand, and asked to complete an anonymous online questionnaire. A total of 140 individuals returned completed questionnaires. The results show that person-job fit influenced eustress, which in turn had a positive effect on employee affective wellbeing; and role overload impacted distress, which in turn held a negative influence on affective wellbeing. These findings indicate that different organisational stressors have unique relationships with eustress and distress responses. Limitations and implications of the study are discussed.

Strongly Screenableness and its Tychonoff Products

In this paper, we prove that if X is regular strongly screenable DC-like (C-scattered), then X ×Y is strongly screenable for every strongly screenable space Y . We also show that the product i∈ω Yi is strongly screenable if every Yi is a regular strongly screenable DC-like space. Finally, we present that the strongly screenableness are poorly behaved with its Tychonoff products.

Effectiveness of Cellular Phone with Active RFID Tag for Evacuation - The Case of Evacuation from the Underground Shopping Mall of Tenjin

The underground shopping mall has the constructional problem of the fire evacuation. Also, the people sometimes lose their direction and information of current time in the mall. If the emergencies such as terrorist explosions or gas explosions are happened, they have to go out soon. Under such circumstances, inside of the mall has high risk for life. In this research, the authors propose a way that he/she can go out from the underground shopping mall quickly. If the narrow exits are discovered by using active RFID (Radio Frequency Identification) tags and using cellular phones, they can evacuate as soon as possible. To verify this hypothesis, the authors design the model and carry out the agent-based simulation. They treat, as a case study, the Tenjin mall in Fukuoka Prefecture in Japan. The result of the simulation is that the case of the pedestrian with using active RFID tags and cellular phones reduced the amount of time to spend on the evacuation. Even if the diffusion of RFID tags and cellular phones was not perfect, they could show the effectiveness of reducing the time of evacuation.

Real-Coded Genetic Algorithm for Robust Power System Stabilizer Design

Power system stabilizers (PSS) are now routinely used in the industry to damp out power system oscillations. In this paper, real-coded genetic algorithm (RCGA) optimization technique is applied to design robust power system stabilizer for both singlemachine infinite-bus (SMIB) and multi-machine power system. The design problem of the proposed controller is formulated as an optimization problem and RCGA is employed to search for optimal controller parameters. By minimizing the time-domain based objective function, in which the deviation in the oscillatory rotor speed of the generator is involved; stability performance of the system is improved. The non-linear simulation results are presented under wide range of operating conditions; disturbances at different locations as well as for various fault clearing sequences to show the effectiveness and robustness of the proposed controller and their ability to provide efficient damping of low frequency oscillations.

Surface Defects Detection for Ceramic Tiles UsingImage Processing and Morphological Techniques

Quality control in ceramic tile manufacturing is hard, labor intensive and it is performed in a harsh industrial environment with noise, extreme temperature and humidity. It can be divided into color analysis, dimension verification, and surface defect detection, which is the main purpose of our work. Defects detection is still based on the judgment of human operators while most of the other manufacturing activities are automated so, our work is a quality control enhancement by integrating a visual control stage using image processing and morphological operation techniques before the packing operation to improve the homogeneity of batches received by final users.

Multiple-Points Fault Signature's Dynamics Modeling for Bearing Defect Frequencies

Occurrence of a multiple-points fault in machine operations could result in exhibiting complex fault signatures, which could result in lowering fault diagnosis accuracy. In this study, a multiple-points defect model (MPDM) is proposed which can simulate fault signature-s dynamics for n-points bearing faults. Furthermore, this study identifies that in case of multiple-points fault in the rotary machine, the location of the dominant component of defect frequency shifts depending upon the relative location of the fault points which could mislead the fault diagnostic model to inaccurate detections. Analytical and experimental results are presented to characterize and validate the variation in the dominant component of defect frequency. Based on envelop detection analysis, a modification is recommended in the existing fault diagnostic models to consider the multiples of defect frequency rather than only considering the frequency spectrum at the defect frequency in order to incorporate the impact of multiple points fault.

Numerical Analysis of Turbulent Natural Convection in a Square Cavity using Large- Eddy Simulation in Lattice Boltzmann Method

In this paper Lattice Boltzmann simulation of turbulent natural convection with large-eddy simulations (LES) in a square cavity which is filled by water has been investigated. The present results are validated by finds of other investigations which have been done with different numerical methods. Calculations were performed for high Rayleigh numbers of Ra=108 and 109. The results confirm that this method is in acceptable agreement with other verifications of such a flow. In this investigation is tried to present Large-eddy turbulence flow model by Lattice Boltzmann Method (LBM) with a clear and simple statement. Effects of increase in Rayleigh number are displayed on streamlines, isotherm counters and average Nusselt number. Result shows that the average Nusselt number enhances with growth of the Rayleigh numbers.

Design A Situated Learning Environment Using Mixed Reality Technology - A Case Study

Mixed Reality (MR) is one of the newest technologies explored in education. It promises the potential to promote teaching and learning and making learners- experience more “engaging". However, there still lack of research on designing a virtual learning environment using MR technology. In this paper, we describe the Mixed Reality technology, the characteristics of situated learning as instructional design for virtual environment using mixed reality technology. We also explain a case study that implemented those design and also the system overview.

Effects of Drought on Microbial Activity in Rhizosphere, Soil Hydrophobicity and Leaching of Mineral Nitrogen from Arable Soil Depending on Method of Fertilization

This work presents the first results from the long-term laboratory experiment dealing with impact of drought on soil properties. Three groups of the treatment (A, B and C) with different regime of irrigation were prepared. The soil water content was maintained at 70 % of soil water holding capacity in group A, at 40 % in group B. In group C, soil water regime was maintained in the range of wilting point. Each group of the experiment was divided into three variants (A1 = B1, C1; A2 = B2, C2 etc.) with three repetitions: Variants A1 (B1, C1) were a controls without addition of another fertilizer. Variants A2 (B2, C2) were fertilized with mineral nitrogen fertilizer DAM 390 (0.140 Mg of N per ha) and variants A3 (B3, C3) contained 45 g of Cp per a pot. The significant differences (ANOVA, P

Semantic Markup for Web Applications

In this paper we would like to introduce some of the best practices of using semantic markup and its significance in the success of web applications. Search engines are one of the best ways to reach potential customers and are some of the main indicators of web sites' fruitfulness. We will introduce the most important semantic vocabularies which are used by Google and Yahoo. Afterwards, we will explain the process of semantic markup implementation and its significance for search engines and other semantic markup consumers. We will describe techniques for slow conceiving RDFa markup to our web application for collecting Call for papers (CFP) announcements.

Improved C-Fuzzy Decision Tree for Intrusion Detection

As the number of networked computers grows, intrusion detection is an essential component in keeping networks secure. Various approaches for intrusion detection are currently being in use with each one has its own merits and demerits. This paper presents our work to test and improve the performance of a new class of decision tree c-fuzzy decision tree to detect intrusion. The work also includes identifying best candidate feature sub set to build the efficient c-fuzzy decision tree based Intrusion Detection System (IDS). We investigated the usefulness of c-fuzzy decision tree for developing IDS with a data partition based on horizontal fragmentation. Empirical results indicate the usefulness of our approach in developing the efficient IDS.

Environmental Friendly Polyurethane Coatings Based On Hyperbranched Resin

Water borne polyurethane (PU) based on newly prepared hyperbranched poly (amine-ester) (HBPAE) was applied and evaluated as organic coating material. HBPAE was prepared through one-pot synthesis between trimethylol propane as a core and AB2 branched monomer which was obtained via Michal addition of methyl methacrylate (MMA) and diethanol amine (DEA). PU was prepared from HBPAE using different ratios of toluene diisocyanate (TDI) to form cured coating film. The prepared HBPAE was characterized using; GPC, FT-IR and 1H-NMR. The mechanical properties (impact, hardness, adhesion, and flexibility), thermal properties (DSC and TGA) and chemical resistance of the applied film were estimated. The results indicated 50% of TDI is the selected ratio. This formulation represents a promising candidate to be used as coating material.

A Method under Uncertain Information for the Selection of Students in Interdisciplinary Studies

We present a method for the selection of students in interdisciplinary studies based on the hybrid averaging operator. We assume that the available information given in the problem is uncertain so it is necessary to use interval numbers. Therefore, we suggest a new type of hybrid aggregation called uncertain induced generalized hybrid averaging (UIGHA) operator. It is an aggregation operator that considers the weighted average (WA) and the ordered weighted averaging (OWA) operator in the same formulation. Therefore, we are able to consider the degree of optimism of the decision maker and grades of importance in the same approach. By using interval numbers, we are able to represent the information considering the best and worst possible results so the decision maker gets a more complete view of the decision problem. We develop an illustrative example of the proposed scheme in the selection of students in interdisciplinary studies. We see that with the use of the UIGHA operator we get a more complete representation of the selection problem. Then, the decision maker is able to consider a wide range of alternatives depending on his interests. We also show other potential applications that could be used by using the UIGHA operator in educational problems about selection of different types of resources such as students, professors, etc.

Design and Performance of Adaptive Polarized MIMO MC-SS-CDMA System for Downlink Mobile Communications

In this paper, an adaptive polarized Multiple-Input Multiple-Output (MIMO) Multicarrier Spread Spectrum Code Division Multiple Access (MC-SS-CDMA) system is designed for downlink mobile communications. The proposed system will be examined in Frequency Division Duplex (FDD) mode for both macro urban and suburban environments. For the same transmission bandwidth, a performance comparison between both nonoverlapped and orthogonal Frequency Division Multiplexing (FDM) schemes will be presented. Also, the proposed system will be compared with both the closed loop vertical MIMO MC-SS-CDMA system and the synchronous vertical STBC-MIMO MC-SS-CDMA system. As will be shown, the proposed system introduces a significant performance gain as well as reducing the spatial dimensions of the MIMO system and simplifying the receiver implementation. The effect of the polarization diversity characteristics on the BER performance will be discussed. Also, the impact of excluding the cross-polarization MCSS- CDMA blocks in the base station will be investigated. In addition, the system performance will be evaluated under different Feedback Information (FBI) rates for slowly-varying channels. Finally, a performance comparison for vehicular and pedestrian environments will be presented

A Constrained Clustering Algorithm for the Classification of Industrial Ores

In this paper a Pattern Recognition algorithm based on a constrained version of the k-means clustering algorithm will be presented. The proposed algorithm is a non parametric supervised statistical pattern recognition algorithm, i.e. it works under very mild assumptions on the dataset. The performance of the algorithm will be tested, togheter with a feature extraction technique that captures the information on the closed two-dimensional contour of an image, on images of industrial mineral ores.

Nanocomputing Memory Devices Formed from Carbon Nanotubes and Metallofulleres

In this paper, we summarize recent work of the authors on nanocomputing memory devices. We investigate two memory devices, each comprising a charged metallofullerene and carbon nanotubes. The first device involves two open nanotubes of the same radius that are joined by a centrally located nanotube of a smaller radius. A metallofullerene is then enclosed inside the structure. The second device also involves a etallofullerene that is located inside a closed carbon nanotube. Assuming the Lennard-Jones interaction energy and the continuum approximation, for both devices, the metallofullerene has two symmetrically placed equal minimum energy positions. On one side the metallofullerene represents the zero information state and by applying an external electrical field, it can overcome the energy barrier, and pass from one end of the tube to the other, where the metallofullerene then represents the one information state.