Abstract: Using the idea of prime and semiprime bi-ideals of
rings, the concept of prime and semiprime generalized bi-ideals of
rings is introduced, which is an extension of the concept of prime and
semiprime bi-ideals of rings and some interesting characterizations
of prime and semiprime generalized bi-ideals are obtained. Also,
we give the relationship between the Baer radical and prime and
semiprime generalized bi-ideals of rings in the same way as of biideals
of rings which was studied by Roux.
Abstract: Most of researches for conventional simulations were
studied focusing on flocks with a single species. While there exist the
flocking behaviors with a single species in nature, the flocking
behaviors are frequently observed with multi-species. This paper
studies on the flocking simulation for heterogeneous agents. In order
to simulate the flocks for heterogeneous agents, the conventional
method uses the identifier of flock, while the proposed method defines
the feature vector of agent and uses the similarity between agents by
comparing with those feature vectors. Based on the similarity, the
paper proposed the attractive force and repulsive force and then
executed the simulation by applying two forces. The results of
simulation showed that flock formation with heterogeneous agents is
very natural in both cases. In addition, it showed that unlike the
existing method, the proposed method can not only control the density
of the flocks, but also be possible for two different groups of agents to
flock close to each other if they have a high similarity.
Abstract: The impact of rain attenuation on wireless communication signals is predominant because of the used high frequency (above 10 GHz). The knowledge of statistics of attenuation is very important for planning point-to-point microwave links operating in high frequency band. Describing the statistics of attenuation is possible for instance with fade duration or level crossing rate. In our examination we determine these statistics from one year measured data for a given microwave link, and we are going to make an attempt to transform the level crossing rate statistic to fade duration statistic.
Abstract: In this paper the authors present the framework of a
system for assisting users through counseling on personal health, the
Personal Health Assistance Service Expert System (PHASES).
Personal health assistance systems need Personal Health Records
(PHR), which support wellness activities, improve the understanding
of personal health issues, enable access to data from providers of
health services, strengthen health promotion, and in the end improve
the health of the population. This is especially important in societies
where the health costs increase at a higher rate than the overall
economy. The most important elements of a healthy lifestyle are
related to food (such as balanced nutrition and diets), activities for
body fitness (such as walking, sports, fitness programs), and other
medical treatments (such as massage, prescriptions of drugs). The
PHASES framework uses an ontology of food, which includes
nutritional facts, an expert system keeping track of personal health
data that are matched with medical treatments, and a comprehensive
data transfer between patients and the system.
Abstract: The persistent nature of perfluorochemicals (PFCs) has attracted global concern in recent years. Perfluorooctanesulfonate (PFOS) and perfluorooctanoate (PFOA) are the most commonly found PFC compounds, and thus their fate and transport play key roles in PFC distribution in the natural environment. The kinetic behavior of PFOS or PFOA on boehmite consists of a fast adsorption process followed by a slow adsorption process which may be attributed to the slow transport of PFOS or PFOA into the boehmite pore surface. The adsorption isotherms estimated the maximum adsorption capacities of PFOS and PFOA on boehmite as 0.877 μg/m2 and 0.633 μg/m2, with the difference primarily due to their different functional groups. The increase of solution pH led to a moderate decrease of PFOS and PFOA adsorption, owing to the increase of ligand exchange reactions and the decrease of electrostatic interactions. The presence of NaCl in solution demonstrated negative effects for PFOS and PFOA adsorption on boehmite surfaces, with potential mechanisms being electrical double layer compression, competitive adsorption of chloride.
Abstract: In this paper we present a substantiation of a new
Laguerre-s type iterative method for solving of a nonlinear
polynomial equations systems with real coefficients. The problems of
its implementation, including relating to the structural choice of
initial approximations, were considered. Test examples demonstrate
the effectiveness of the method at the solving of many practical
problems solving.
Abstract: Liners are made to protect the groundwater table from
the infiltration of leachate which normally carries different kinds of
toxic materials from landfills. Although these liners are engineered to
last for long period of time; unfortunately these liners fail; therefore,
toxic materials pass to groundwater. This paper focuses on the
changes of the hydraulic conductivity of a sand-bentonite liner due to
the infiltration of biofuel and ethanol fuel. Series of laboratory tests
were conducted in 20-cm-high PVC columns. Several compositions
of sand-bentonite liners were tested: 95% sand: 5% bentonite; 90%
sand: 10% bentonite; and 100% sand (passed mesh #40). The
columns were subjected to extreme pressures of 40 kPa, and 100 kPa
to evaluate the transport of alternative fuels (biofuel and ethanol
fuel). For comparative studies, similar tests were carried out using
water. Results showed that hydraulic conductivity increased due to
the infiltration of alternative fuels through the liners. Accordingly,
the increase in the hydraulic conductivity showed significant
dependency on the type of liner mixture and the characteristics of the
liquid. The hydraulic conductivity of a liner (subjected to biofuel
infiltration) consisting of 5% bentonite: 95% sand under pressure of
40 kPa and 100 kPa had increased by one fold. In addition, the
hydraulic conductivity of a liner consisting of 10% bentonite: 90%
sand under pressure of 40 kPa and 100 kPa and infiltrated by biofuel
had increased by three folds. On the other hand, the results obtained
by water infiltration under 40 kPa showed lower hydraulic
conductivities of 1.50×10-5 and 1.37×10-9 cm/s for 5% bentonite:
95% sand, and 10% bentonite: 90% sand, respectively. Similarly,
under 100 kPa, the hydraulic conductivities were 2.30×10-5 and
1.90×10-9 cm/s for 5% bentonite: 95% sand, and 10% bentonite: 90%
sand, respectively.
Abstract: Together with the industrialization, women began to
be included in business life by peeling off of the tasks given them by
society and they have become a factor of production creating value in
economic and social sense. Thus, women have taken place in the
labor market, majority of which has been formed by men. In this
study, the experiences of women entrepreneurs, who succeed in
business activities, will be analyzed. By the study, current state of the
women entrepreneurs in the labor market of Turkey will be put down,
as a result of interferences obtained from the shared experiences of
women entrepreneurs. Findings obtained at the end of the study are
thought to light the way of future studies for increasing women
entrepreneurship.
Abstract: Metrics is the process by which numbers or symbols
are assigned to attributes of entities in the real world in such a way as
to describe them according to clearly defined rules. Software metrics
are instruments or ways to measuring all the aspect of software
product. These metrics are used throughout a software project to
assist in estimation, quality control, productivity assessment, and
project control. Object oriented software metrics focus on
measurements that are applied to the class and other characteristics.
These measurements convey the software engineer to the behavior of
the software and how changes can be made that will reduce
complexity and improve the continuing capability of the software.
Object oriented software metric can be classified in two types static
and dynamic. Static metrics are concerned with all the aspects of
measuring by static analysis of software and dynamic metrics are
concerned with all the measuring aspect of the software at run time.
Major work done before, was focusing on static metric. Also some
work has been done in the field of dynamic nature of the software
measurements. But research in this area is demanding for more work.
In this paper we give a set of dynamic metrics specifically for
polymorphism in object oriented system.
Abstract: In the present work the internal sulfate attack on
pastes made from pure clinker phases was studied. Two binders were
produced: (a) a binder with 2% C3A and 18% C4AF content; (b) a
binder with 10% C3A and C4AF content each. Gypsum was used as
the sulfate bearing compound, while calcium carbonate added to
differentiate the binders produced. The phases formed were identified
by XRD analysis. The results showed that ettringite was the
deterioration phase detected in the case of the low C3A content
binder. Carbonation occurred in the specimen without calcium
carbonate addition, while portlandite was observed in the one
containing calcium carbonate. In the case of the high C3A content
binder, traces of thaumasite were detected when calcium carbonate
was not incorporated in the binder. A solid solution of thaumasite and
ettringite was found when calcium carbonate was added. The amount
of C3A had not fully reacted with sulfates, since its corresponding
peaks were detected.
Abstract: ZnO nanostructure were synthesized via microwave
method using zinc acetate as starting material, guanidinium as
structure directing agents, and water as solvent.. This work
investigates the photodegradation of azo dyes using the ZnO Flowerlike
in aqueous solutions. As synthesized ZnO samples were
characterized using X-Ray powder diffraction (XRD), scanning
electron microscopy (SEM), and FTIR spectroscopy.In this work
photodecolorization of congored azo dye under UV irradiation by
nano ZnO was studied.
Abstract: Language Reforms and potential use of ICTs has been a focal area of Higher Education Commission of Pakistan. Efforts are being accelerated to incorporate fast expanding ICTs to bring qualitative improvement in language instruction in higher education. This paper explores how university teachers are benefitting from ICTs to make their English class effective and what type of problems they face in practicing ICTs during their lectures. An in-depth qualitative study was employed to understand why language teachers tend to use ICTs in their instruction and how they are practicing it. A sample of twenty teachers from five universities located in Islamabad, three from public sector and two from private sector, was selected on non-random (Snowball) sampling basis. An interview with 15 semi-structured items was used as research instruments to collect data. The findings reveal that business English teaching is facilitated and improved through the use of ICTs. The language teachers need special training regarding the practices and implementation of ICTs. It is recommended that initiatives might be taken to equip university language teachers with modern methodology incorporating ICTs as focal area and efforts might be made to remove barriers regarding the training of language teachers and proper usage of ICTs.
Abstract: Intrusion detection systems (IDS)are crucial components
of the security mechanisms of today-s computer systems.
Existing research on intrusion detection has focused on sequential
intrusions. However, intrusions can also be formed by concurrent
interactions of multiple processes. Some of the intrusions caused
by these interactions cannot be detected using sequential intrusion
detection methods. Therefore, there is a need for a mechanism that
views the distributed system as a whole. L-BIDS (Lattice-Based
Intrusion Detection System) is proposed to address this problem. In
the L-BIDS framework, a library of intrusions and distributed traces
are represented as lattices. Then these lattices are compared in order
to detect intrusions in the distributed traces.
Abstract: The fast growth in complexity coupled with requests for shorter development periods for embedded systems are bringing demands towards a more effective, i.e. higher-abstract, design process for hardaware/software integrated design. In Software Engineering area, Model Driven Architecture (MDA) and Executable UML (xUML) has been accepted to bring further improvement in software design. This paper constructs MDA and xUML stepwise transformations from an abstract specification model to a more concrete implementation model using the refactoring technique for hardaware/software integrated design. This approach provides clear and structured models which enables quick exploration and synthesis, and early stage verification.
Abstract: Based on different experiences in the historic centers
of Spain, we propose an global strategy for the regeneration of the
pre-tertiary fabrics and its application to the specific case of San
Mateo neighborhood, in Jerez de la Frontera (Andalusia), through a
diagnosis that focus particularly on the punishments the last-decade
economic situation (building boom and crisis) and shows the tragic
transition from economic center to an imminent disappearance with
an image similar to the ruins of war, due to the loss of their
traditional roles. From it we will learn their historically-tested
mechanisms of environment adaptation, which distill the vernacular
architecture essence and that we will apply to our strategy of action
based on a dotacional-and-free-space rhizome which rediscovers its
hidden character. The architectural fact will be crystallized in one of
the example-pieces proposed: The Artistic Revitalization Center.
Abstract: In this paper we apply one of approaches in category of heuristic methods as Genetic Algorithms for obtaining approximate solution of optimal control problems. The firs we convert optimal control problem to a quasi Assignment Problem by defining some usual characters as defined in Genetic algorithm applications. Then we obtain approximate optimal control function as an piecewise constant function. Finally the numerical examples are given.
Abstract: There are multiple ways to implement a decimator
filter. This paper addresses usage of CIC (cascaded-integrator-comb)
filter and HB (half band) filter as the decimator filter to reduce the
frequency sample rate by factor of 64 and detail of the
implementation step to realize this design in hardware. Low power
design approach for CIC filter and half band filter will be discussed.
The filter design is implemented through MATLAB system
modeling, ASIC (application specific integrated circuit) design flow
and verified using a FPGA (field programmable gate array) board
and MATLAB analysis.
Abstract: In this paper, we consider a two-neuron system with time-delayed connections between neurons. By analyzing the associated characteristic transcendental equation, its linear stability is investigated and Hopf bifurcation is demonstrated. Some explicit formulae for determining the stability and the direction of the Hopf bifurcation periodic solutions bifurcating from Hopf bifurcations are obtained by using the normal form theory and center manifold theory. Some numerical simulation results are given to support the theoretical predictions. Finally, main conclusions are given.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created
Abstract: Chinese Idioms are a type of traditional Chinese idiomatic
expressions with specific meanings and stereotypes structure
which are widely used in classical Chinese and are still common in
vernacular written and spoken Chinese today. Currently, Chinese
Idioms are retrieved in glossary with key character or key word in
morphology or pronunciation index that can not meet the need of
searching semantically. OCIRS is proposed to search the desired
idiom in the case of users only knowing its meaning without any key
character or key word. The user-s request in a sentence or phrase will
be grammatically analyzed in advance by word segmentation, key
word extraction and semantic similarity computation, thus can be
mapped to the idiom domain ontology which is constructed to provide
ample semantic relations and to facilitate description logics-based
reasoning for idiom retrieval. The experimental evaluation shows that
OCIRS realizes the function of searching idioms via semantics, obtaining
preliminary achievement as requested by the users.