Abstract: Many studies have applied the Theory of Planned
Behavior (TPB) in predicting health behaviors among unique
populations. However, a new paradigm is emerging where focus is
now directed to modification and expansion of the TPB model rather
than utilization of the traditional theory. This review proposes new
models modified from the Theory of Planned Behavior and suggest
an appropriate study design that can be used to test the models within
physical activity and dietary practice domains among Type 2
diabetics in Kenya. The review was conducted by means of literature
search in the field of nutrition behavior, health psychology and
mixed methods using predetermined key words. The results identify
pre-intention and post intention gaps within the TPB model that need
to be filled. Additional psychosocial factors are proposed to be
included in the TPB model to generate new models and the efficacy
of these models tested using mixed methods design.
Abstract: XML is becoming a de facto standard for online data exchange. Existing XML filtering techniques based on a publish/subscribe model are focused on the highly structured data marked up with XML tags. These techniques are efficient in filtering the documents of data-centric XML but are not effective in filtering the element contents of the document-centric XML. In this paper, we propose an extended XPath specification which includes a special matching character '%' used in the LIKE operation of SQL in order to solve the difficulty of writing some queries to adequately filter element contents using the previous XPath specification. We also present a novel technique for filtering a collection of document-centric XMLs, called Pfilter, which is able to exploit the extended XPath specification. We show several performance studies, efficiency and scalability using the multi-query processing time (MQPT).
Abstract: Human pose estimation can be executed using Active Shape Models. The existing techniques for applying to human-body research using Active Shape Models, such as human detection, primarily take the form of silhouette of human body. This technique is not able to estimate accurately for human pose to concern two arms and legs, as the silhouette of human body represents the shape as out of round. To solve this problem, we applied the human body model as stick-figure, “skeleton". The skeleton model of human body can give consideration to various shapes of human pose. To obtain effective estimation result, we applied background subtraction and deformed matching algorithm of primary Active Shape Models in the fitting process. The images which were used to make the model were 600 human bodies, and the model has 17 landmark points which indicate body junction and key features of human pose. The maximum iteration for the fitting process was 30 times and the execution time was less than .03 sec.
Abstract: This paper presents the robust stability criteria for uncertain genetic regulatory networks with time-varying delays. One key point of the criterion is that the decomposition of the matrix ˜D into ˜D = ˜D1 + ˜D2. This decomposition corresponds to a decomposition of the delayed terms into two groups: the stabilizing ones and the destabilizing ones. This technique enables one to take the stabilizing effect of part of the delayed terms into account. Meanwhile, by choosing an appropriate new Lyapunov functional, a new delay-dependent stability criteria is obtained and formulated in terms of linear matrix inequalities (LMIs). Finally, numerical examples are presented to illustrate the effectiveness of the theoretical results.
Abstract: Advertising today has already become an integral part
of human life as a building block of the consumer community. A
component of the value chain of the media, advertising sector is
struggling increasingly harder to find new methods to reach
consumers. The tendency towards experimental marketing practices
is increasing day by day, especially to divert consumers from the idea
“They are selling something to me.” It is therefore considered a good
idea to investigate the trust in ad media of consumers, who are today
exposed to a great bulk of information from advertising sector.
In this study, the current value of ad media for the young
consumer will be investigated. Data on various ad media reliability
will be comparatively analyzed and young consumers will be traced
by including university students in the study. In this research, which
will be performed on students studying at the Selçuk University
(Turkey) by random sampling method, data will be obtained by
survey technique and evaluated by a statistical analysis.
Abstract: This paper reports a new application of material accounting techniques to characterise and quantify material stocks and flows at the “neighbourhood" scale. The study area is the main campus of the University of New South Wales in Sydney, Australia. The system boundary is defined by the urban structural unit (USU), a typological construct devised to facilitate assessment of the metabolism of urban systems. A streamlined material flow analysis (MFA) was applied to quantify the stocks and flows of key construction materials within the campus USU over time, drawing on empirical data from a major campus development project. The results are reviewed to assess the efficacy of the method in supporting urban environmental evaluation and design practice, for example to facilitate estimation of significant impacts such as greenhouse gas emissions. It is concluded that linking a service (in this case, teaching students) enabled by a given product (university buildings) to the amount of materials used in creating that product offers a potential way to reduce the environmental impact of that service, through more efficient use of materials.
Abstract: A procedural-animation-based approach which rapidly
synthesize the adaptive locomotion for quadruped characters that they
can walk or run in any directions on an uneven terrain within a
dynamic environment was proposed. We devise practical motion
models of the quadruped animals for adapting to a varied terrain in a
real-time manner. While synthesizing locomotion, we choose the
corresponding motion models by means of the footstep prediction of
the current state in the dynamic environment, adjust the key-frames of
the motion models relying on the terrain-s attributes, calculate the
collision-free legs- trajectories, and interpolate the key-frames
according to the legs- trajectories. Finally, we apply dynamic time
warping to each part of motion for seamlessly concatenating all desired
transition motions to complete the whole locomotion. We reduce the
time cost of producing the locomotion and takes virtual characters to
fit in with dynamic environments no matter when the environments are
changed by users.
Abstract: Both image steganography and image encryption have
advantages and disadvantages. Steganograhy allows us to hide a
desired image containing confidential information in a covered or
host image while image encryption is decomposing the desired image
to a non-readable, non-comprehended manner. The encryption
methods are usually much more robust than the steganographic ones.
However, they have a high visibility and would provoke the attackers
easily since it usually is obvious from an encrypted image that
something is hidden! The combination of steganography and
encryption will cover both of their weaknesses and therefore, it
increases the security. In this paper an image encryption method
based on sinc-convolution along with using an encryption key of 128
bit length is introduced. Then, the encrypted image is covered by a
host image using a modified version of JSteg steganography
algorithm. This method could be applied to almost all image formats
including TIF, BMP, GIF and JPEG. The experiment results show
that our method is able to hide a desired image with high security and
low visibility.
Abstract: The objective of the paper was to understand the use
of an important element of design, namely color in a Semiotic
system. Semiotics is the study of signs and sign processes, it is often
divided into three branches namely (i) Semantics that deals with the
relation between signs and the things to which they refer to mean, (ii)
Syntactics which addresses the relations among signs in formal
structures and (iii) Pragmatics that relates between signs and its
effects on they have on the people who use them to create a plan for
an object or a system referred to as design. Cubism with its versatility
was the key design tool prevalent across the 20th century. In order to
analyze the user's understanding of interaction and appreciation of
color through the movement of Cubism, an exercise was undertaken
in Dept. of Design, IIT Guwahati. This included tasks to design a
composition using color and sign process to the theme 'Between the
Lines' on a given tessellation where the users relate their work to the
world they live in, which in this case was the college campus of IIT
Guwahati. The findings demonstrate impact of the key design
element color on the principles of visual perception based on image
analysis of specific compositions.
Abstract: Active network was developed to solve the problem of
the current sharing-based network–difficulty in applying new
technology, service or standard, and duplicated operation at several
protocol layers. Active network can transport the packet loaded with
the executable codes, which enables to change the state of the network
node. However, if the network node is placed in the sharing-based
network, security and safety issues should be resolved. To satisfy this
requirement, various security aspects are required such as
authentication, authorization, confidentiality and integrity. Among
these security components, the core factor is the encryption key. As a
result, this study is designed to propose the scheme that manages the
encryption key, which is used to provide security of the
comprehensive active directory, based on the domain.
Abstract: Innovations, especially technological, are considered
key-drivers for sustainable economic growth and competitiveness in
the globalised world. As such they should also play an important role
in the process of economical convergence inside the EU.
Unfortunately, the problem of insufficient innovation performance
concerns around half of the EU countries. Poland shows that a lack of
a consistent high-tech financing system constitutes a serious obstacle
for the development of innovative firms. In this article we will
evaluate these questions referring to the example of Ammono S.A., a
Polish company established to develop and commercialise an original
technology for the production of bulk GaN crystals. We will focus on
its efforts to accumulate the financial resources necessary at different
stages of its development. The purpose of this article is to suggest
possible ways to improve the national innovative system, which
would make it more competent in generating high-tech leaders.
Abstract: This paper reports on a survey of state-of-the-art
application scenarios for smart office environments. Based on an
analysis of ongoing research activities and industry projects,
functionalities and services of future office systems are extracted. In
a second step, these results are used to identify the key characteristics
of emerging products.
Abstract: In this paper, we study the application of Extreme
Learning Machine (ELM) algorithm for single layered feedforward
neural networks to non-linear chaotic time series problems. In this
algorithm the input weights and the hidden layer bias are randomly
chosen. The ELM formulation leads to solving a system of linear
equations in terms of the unknown weights connecting the hidden
layer to the output layer. The solution of this general system of
linear equations will be obtained using Moore-Penrose generalized
pseudo inverse. For the study of the application of the method we
consider the time series generated by the Mackey Glass delay
differential equation with different time delays, Santa Fe A and
UCR heart beat rate ECG time series. For the choice of sigmoid,
sin and hardlim activation functions the optimal values for the
memory order and the number of hidden neurons which give the
best prediction performance in terms of root mean square error are
determined. It is observed that the results obtained are in close
agreement with the exact solution of the problems considered
which clearly shows that ELM is a very promising alternative
method for time series prediction.
Abstract: This study was aimed for investigating of
manufacturing high aluminum content Mg alloys using a horizontal
twin roll caster. Recently, weight saving has been key issues for lighter
transport equipments as well as electronic component parts. As
alternative materials to aluminum alloys, developing magnesium alloy
with higher strength has been expected. Normally high Aluminum
content Mg alloy has poor ductility and is difficult to be rolled because
of its high strength. However, twin roll casting process is suitable for
manufacturing wrought Mg alloys because materials can be cast
directly from molten metal. In this study, manufacturing of high
aluminum content magnesium alloy sheet using the roll casting
process has been carried out. Effects of manufacturing parameter, such
as roll velocity, pouring temperature and roll gap, on casting was
investigated. A microscopic observation of the crystals of cross section
of as cast strip as well as rolled strip was conducted.
Abstract: The important issue considered in the widespread deployment of Wireless Sensor Networks (WSNs) is an efficiency of the energy consumption. In this paper, we present a study of the optimal relay station planning problems using Binary Integer Linear Programming (BILP) model to minimize the energy consumption in WSNs. Our key contribution is that the proposed model not only ensures the required network lifetime but also guarantees the radio connectivity at high level of communication quality. Specially, we take into account effects of noise, signal quality limitation and bit error rate characteristics. Numerical experiments were conducted in various network scenarios. We analyzed the effects of different sensor node densities and distribution on the energy consumption.
Abstract: Since atmosphere pressure field is an actual envoy of
climatic signal the atmospheric Highs and Lows should be attributed
to the key active focal points within the ocean-atmosphere interplay
system. Here we were set a task to determine how the dynamics of
those centres of action relates to the climate change both on regional
and global scales. For this target the near-surface temperature and
atmospheric pressure differences between the Icelandic Low and the
Azores High were considered. The secular term of phase states of the
system under consideration was found divided into three
nonintersecting subsets. Each of that was put in consequence with
one of three climatic scenarios related to the periods of 1905-1935
(relatively warm phase), 1940-1970 (cold phase) and 1980-2000
(warm phase).
Abstract: A major goal of any enterprise is to create a ratings
system of customer satisfaction, goods and services. It is obvious that
the company cannot change what is not measured. In order to get a
clearer picture of the preferences of the major consumer groups, this
stage should be based on extensive research, including a variety of
interviews and surveys. It is necessary to know the key benefits,
which determine customer satisfaction in the market segment, of the
properties of certain goods and services. It is important to estimate
the terms of these preferences from the viewpoint of the client. This
article discusses the importance of customer satisfaction, and ways of
assessing it.
Abstract: The adverse effects of Clindamycin (Clind.) /
Ibuprofen (Ibu.) combination on liver, kidney, blood elements and the
significances of antioxidants (N-acetylcysteine and Zinc) against
these effects were evaluated. The study includes: Group I; control
n=30, Group II; patients on Clind.300mg/Ibu.400mg twice daily for a
week n=30, Group III; patients on Clind.300mg/Ibu.400mg+Nacetylcysteine
200mg twice daily for a week n=15 and Group IV;
patients on Clind.300mg/Ibu.400mg+Zinc50mg twice daily for a
week n=15. Serum malondialdehyde (MDA), alanine transferase
(ALT), aspartate transferase (AST), γ glutamyl transferase (GGT),
creatinine, blood urea nitrogen (BUN) were measured. Applying one
way ANOVA followed by Tuckey Kramer post test, Group II showed
significant increase in ALT, AST, GGT, BUN and decrease in Hb,
RBCs, platelets than Group I. Group III showed significant decrease
in ALT, AST, GGT, BUN than Group II. Moreover, Group IV
showed significant decrease in ALT, AST, GGT and increase in Hb,
RBCs, and platelets than Group II. Conclusively, Adding Zinc or Nacetylcysteine
buffer the oxidative stress and improve the therapeutic
outcome of Clindamycin/Ibuprofen combination.
Abstract: Many artificial intelligence (AI) techniques are inspired
by problem-solving strategies found in nature. Robustness is a key
feature in many natural systems. This paper studies robustness in
artificial neural networks (ANNs) and proposes several novel, nature
inspired ANN architectures. The paper includes encouraging results
from experimental studies on these networks showing increased
robustness.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.