Abstract: Automatic keyphrase extraction is useful in efficiently
locating specific documents in online databases. While several
techniques have been introduced over the years, improvement on
accuracy rate is minimal. This research examines attribute scores for
author-supplied keyphrases to better understand how the scores affect
the accuracy rate of automatic keyphrase extraction. Five attributes
are chosen for examination: Term Frequency, First Occurrence, Last
Occurrence, Phrase Position in Sentences, and Term Cohesion
Degree. The results show that First Occurrence is the most reliable
attribute. Term Frequency, Last Occurrence and Term Cohesion
Degree display a wide range of variation but are still usable with
suggested tweaks. Only Phrase Position in Sentences shows a totally
unpredictable pattern. The results imply that the commonly used
ranking approach which directly extracts top ranked potential phrases
from candidate keyphrase list as the keyphrases may not be reliable.
Abstract: Acoustic Imaging based sound localization using microphone
array is a challenging task in digital-signal processing.
Discrete Fourier transform (DFT) based near-field acoustical holography
(NAH) is an important acoustical technique for sound source
localization and provide an efficient solution to the ill-posed problem.
However, in practice, due to the usage of small curtailed aperture
and its consequence of significant spectral leakage, the DFT could
not reconstruct the active-region-of-sound (AROS) effectively, especially
near the edges of aperture. In this paper, we emphasize the
fundamental problems of DFT-based NAH, provide a solution to
spectral leakage effect by the extrapolation based on linear predictive
coding and 2D Tukey windowing. This approach has been tested to
localize the single and multi-point sound sources. We observe that
incorporating extrapolation technique increases the spatial resolution,
localization accuracy and reduces spectral leakage when small curtail
aperture with a lower number of sensors accounts.
Abstract: In this study it is aimed to determine the level of preservice teachers- computer phobia. Whether or not computer phobia meaningfully varies statistically according to gender and computer experience has been tested in the study. The study was performed on 430 pre-service teachers at the Education Faculty in Rize/Turkey. Data in the study were collected through the Computer Phobia Scale consisting of the “Personal Knowledge Questionnaire", “Computer Anxiety Rating Scale", and “Computer Thought Survey". In this study, data were analyzed with statistical processes such as t test, and correlation analysis. According to results of statistical analyses, computer phobia of male pre-service teachers does not statistically vary depending on their gender. Although male preservice teachers have higher computer anxiety scores, they have lower computer thought scores. It was also observed that there is a negative and intensive relation between computer experience and computer anxiety. Meanwhile it was found out that pre-service teachers using computer regularly indicated lower computer anxiety. Obtained results were tried to be discussed in terms of the number of computer classes in the Education Faculty curriculum, hours of computer class and the computer availability of student teachers.
Abstract: Human middle-ear is the key component of the
auditory system. Its function is to transfer the sound waves through
the ear canal to provide sufficient stimulus to the fluids of the inner
ear. Degradation of the ossicles that transmit these sound waves from
the eardrum to the inner ear leads to hearing loss. This problem can
be overcome by replacing one or more of these ossicles by middleear
prosthesis. Designing such prosthesis requires a comprehensive
knowledge of the biomechanics of the middle-ear. There are many
finite element modeling approaches developed to understand the
biomechanics of the middle ear. The available models in the
literature, involve high computation time. In this paper, we propose a
simplified model which provides a reasonably accurate result with
much less computational time. Simulation results indicate a
maximum sound pressure gain of 10 dB at 5500 Hz.
Abstract: The main objective of our study is to collect data
about the profile of the asthmatic patients in Assam and thereby have
a comprehensive knowledge of the factors influencing the asthmatic
patients of the state and their medication pattern. We developed a
search strategy to find any publication about the community based
survey asthma related and used. These to search the MEDLINE
(1996 to current literature) CINAHL DOAJ pubmed databases using
the key phrases, Asthma, Respiratory disorders, Drug therapy of
Asthma, database decision support system and asthma. The
appropriate literature was printed out from the online source and
library (Journal) source. The study was conducted through a set of
structured and non-structured questionnaires targeted on the
asthmatic patients belonging to the rural and urban areas of Assam,
during the month of Dec 2006 to July 2007, 138 cases were studied
in Gauwathi Medical College & Hospital located in Bhangagarh,
Assam in India. The demographic characteristics a factor in 138
patients with asthma with allergic rhinitis (cases) gives the detail
profile of asthmatic patient-s distribution of Assam as classified on
the basis of age and sex. It is evident from the study that male
populations (66%) are more prone to asthma as compared to the
females (34%).Another striking features that emerged from this
survey is the maximum prevalence of asthma in the age group of 20-
30 years followed by infants belonging to the age group of 7 (0.05%)
0-10years among both male and female populations of Assam. The
high incidence of asthma in the age group of 20-30 years may
probably be due to the allergy arising out of sudden exposure to dust
and pollen which the children face while playing and going to the
school. The rural females in the age group of 30-40 years are more
prone to asthma than urban females in the same age group may be
due to sex differentiation among the tribal population of the state.
Pharmacists should educate the asthmatics how to use inhalers
considering growing menace of asthma in the state. Safer drugs
should be produced in the form of aerosol so that easy administration
by the asthmatic patients and physicians of the state is possible for
curing asthma. The health centers should be more equipped with the
medicines to cure asthma in the state like Assam.
Abstract: The main purpose of this research was to study how to communicate the identity of the Bangpoo, Samu tPrakan province for ecotourism. The qualitative data was collected through studying related materials, exploring the area, in-depth interviews with three groups of people: three directly responsible officers who were key informants of the district, twenty foreign tourists and five Thai tourist guides. A content analysis was used to analyze the qualitative data. The two main findings of the study were as follows:
The identity of Bangpoo, Samut Prakan province. This establishment was near the Mouth of the Gulf of Thailand for normal people and tourists, consisting of rest accommodations. There are restaurants where food and drinks are served, rich mangrove forests, Banpoo seaside resort and mangrove trees. Bangpoo seaside resort is characterized by muddy beacheswhere the greatest number of seagulls can be seen from March to May each year.
The communication of the identity of Bangpoo, Samut Prakan province which the researcher could find and design to present in English materials can be summed up in 3 items: 1) The history of Bangpoo, Samut Prakan province 2) The Learning center of Ecotourism: Seagulls and Mangrove forest 3) How to keep Banpoo, Samut Prakran province for ecotourism.
Abstract: Key management represents a major and the most
sensitive part of cryptographic systems. It includes key generation,
key distribution, key storage, and key deletion. It is also considered
the hardest part of cryptography. Designing secure cryptographic
algorithms is hard, and keeping the keys secret is much harder.
Cryptanalysts usually attack both symmetric and public key
cryptosystems through their key management. We introduce a
protocol to exchange cipher keys over insecure communication
channel. This protocol is based on public key cryptosystem,
especially elliptic curve cryptosystem. Meanwhile, it tests the cipher
keys and selects only the good keys and rejects the weak one.
Abstract: Time series forecasting is an important and widely
popular topic in the research of system modeling. This paper
describes how to use the hybrid PSO-RLSE neuro-fuzzy learning
approach to the problem of time series forecasting. The PSO
algorithm is used to update the premise parameters of the
proposed prediction system, and the RLSE is used to update the
consequence parameters. Thanks to the hybrid learning (HL)
approach for the neuro-fuzzy system, the prediction performance
is excellent and the speed of learning convergence is much faster
than other compared approaches. In the experiments, we use the
well-known Mackey-Glass chaos time series. According to the
experimental results, the prediction performance and accuracy in
time series forecasting by the proposed approach is much better
than other compared approaches, as shown in Table IV. Excellent
prediction performance by the proposed approach has been
observed.
Abstract: This research was conducted to determine responses
of chickpeas to drought in different periods (early period, late period,
no-irrigation, two times irrigation as control). The trial was made in
“Randomized Complete Block Design" with three replications on
2010 and 2011 years in Konya-Turkey. Genotypes were consisted
from 7 lines of ICARDA, 2 certified lines and 1 local population. The
results showed that; as means of years and genotypes, early period
stress showed highest (207.47 kg da-1) seed yield and it was followed
by control (202.33 kg da-1), late period (144.64 kg da-1) and normal
(106.93 kg da-1) stress applications. The genotypes were affected too
much by drought and, the lowest seed was taken from non-irrigated
plots. As the means of years and stress applications, the highest
(196.01 kg da-1) yield was taken from genotype 22255. The reason of
yield variation could be derived from different responses of
genotypes to drought.
Abstract: A preliminary evaluation of the urban land system is
presented in the article together with the instruments of land policy in
Serbia. The main reason for the analysis is demand for
definition of reform framework for urban land management in
Serbia in the period of transition towards market-led system. It
is concluded that due to the limitations of the current regulation it
will be impossible in the future to apply market principles in the
urban land policy (supply and demand of land, land capitalization,
investment efficiency, et al.). Based on the estimation that the urban
land system and land policy are key factors of competitiveness
between regions and towns in Serbia, it is necessary to initiate
changes in this field. There are indicated on an option of privatization
of urban public land and possible establishment of leasehold land. A
comparative analysis of the possibilities of the reform urban land
system in Serbia has been carried out in relation to two approaches of
market systems: (a) with dominant private ownership of urban land
(neo/liberal approach) and (b) with dominant public ownership of
urban land (system of leasehold)whose findings can be a basis for
further study of the new system in Serbia.. The attanied results are
part of studies matter for the making of Strategy of territorial
development of Serbia.
Abstract: With the development of technology, the growing
trend of fast and safe passenger transport, air pollution, traffic
congestion, increase in problems such as the increasing population
and the high cost of private vehicle usage made many cities around
the world with a population of more or less, start to build rail systems
as a means of urban transport in order to ensure the economic and
environmental sustainability and more efficient use of land in the
city. The implementation phase of rail systems costs much more than
other public transport systems. However, social and economic returns
in the long term made these systems the most popular investment tool
for planned and developing cities.
In our country, the purpose, goals and policies of transportation
plans are away from integrity, and the problems are not clearly
detected. Also, not defined and incomplete assessment of
transportation systems and insufficient financial analysis are the most
important cause of failure. Rail systems and other transportation
systems to be addressed as a whole is seen as the main factor in
increasing efficiency in applications that are not integrated yet in our
country to come to this point has led to the problem.
Abstract: A lot of Scientific and Engineering problems require the solution of large systems of linear equations of the form bAx in an effective manner. LU-Decomposition offers good choices for solving this problem. Our approach is to find the lower bound of processing elements needed for this purpose. Here is used the so called Omega calculus, as a computational method for solving problems via their corresponding Diophantine relation. From the corresponding algorithm is formed a system of linear diophantine equalities using the domain of computation which is given by the set of lattice points inside the polyhedron. Then is run the Mathematica program DiophantineGF.m. This program calculates the generating function from which is possible to find the number of solutions to the system of Diophantine equalities, which in fact gives the lower bound for the number of processors needed for the corresponding algorithm. There is given a mathematical explanation of the problem as well. Keywordsgenerating function, lattice points in polyhedron, lower bound of processor elements, system of Diophantine equationsand : calculus.
Abstract: Emerging adulthood, between the ages of 18 and 25, as a new developmental stage extending from adolescence to young adulthood. According to Arnett [2004], there are experiments related to identity in three basic fields which are love, work and view of the world in emerging adulthood. When the literature related to identity is examined, it is seen that identity has been studied more with adolescent, and studies were concentrated on the relationship of identity with many demographic variables neglecting important variables such as marital status, parental status and SES. Thus, the main aim of this study is to determine whether identity statuses differenciate with marital status, parental status and SES. A total of 700 emerging adults participated in this study, and the mean age was 22,45 years [SD = 3.76]. The sample was made up of 347 female and 353 male. All participants in the study were students from colleges. Student responses to the Extended Version of the Objective Measure of Ego Identity Status [EOM-EIS-2] used to classify students into one of the four identity statuses. SPSS 15.00 program wasa used to analyse data. Percentage, frequency and X2 analysis were used in the analysis of data. When the findings of the study is viewed as a whole, the most frequently observed identity status in the group is found to be moratorium. Also, identity statuses differenciate with marital status, parental status and SES. Findings were discussed in the context of emerging adulthood.
Abstract: In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false reports during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and overhead. In this paper, we propose a fuzzy logic for determining a security threshold value in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the number of partitions in a global key pool, the number of compromised partitions, and the energy level of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.
Abstract: Attachment theory focuses on the bond that develops between child and caretaker and the consequences that this bond has on the childs future relationships. Adolescents attempt to define their identity by experiencing various risky behaviors. The first aim of the study was whether risk taking behavior differs according to attachment styles. The second was to examine risk taking behavior differences according to gender. The third aim of this study was to examine attachment X gender interaction effect for risk taking behavior. And final was to investigate attachment styles differences according to gender. Data were collected from 218 participants (114 female and 104 male) who are university students. The results of this study showed that attachment styles differentiated by risk taking behavior and males had higher risk taking score than females. It was also found out that there was significant attachment X gender interaction effect for risk taking behavior. And finally, the results showed that attachment styles differentiated according to gender.KeywordsAttachment style, risk taking
Abstract: Many new experimental films which were free from conventional movie forms have appeared since Nubellbak Movement in the late 1950s. Forty years after the movement started, on March 13th, 1995, on the 100th anniversary of the birth of film, the declaration called Dogme 95, was issued in Copenhagen, Denmark. It aimed to create a new style of avant-garde film, and showed a tendency toward being anti-Hollywood and anti-genre, which were against the highly popular Hollywood trend of movies based on large-scale investment. The main idea of Dogme 95 is the opposition to 'the writer's doctrine' that a film should be the artist's individual work and to 'the overuse of technology' in film. The key figures declared ten principles called 'Vow of Chastity', by which new movie forms were to be produced. Interview (2000), directed by Byunhyuk, was made in 2000, five years after Dogme 95 was declared. This movie was dedicated as the first Asian Dogme. This study will survey the relationship between Korean film and the Vow of Chastity through the Korean films released in theaters from a viewpoint of technology and content. It also will call attention to its effects on and significance to Korean film in modern society.
Abstract: The essence of the 21st century is knowledge economy. Knowledge has become the key resource of economic growth and social development. Construction industry is no exception. Because of the characteristic of complexity, project manager can't depend only on information management. The only way to improve the level of construction project management is to set up a kind of effective knowledge accumulation mechanism. This paper first introduced the IFC standard and the concept of ontology. Then put forward the construction method of the architectural engineering domain ontology based on IFC. And finally build up the concepts, properties and the relationship between the concepts of the ontology. The deficiency of this paper is also pointed out.
Abstract: As the new industrial revolution advances in the
nanotechnology have been followed with interest throughout the
world and also in Turkey. Media has an important role in conveying
these advances to public, rising public awareness and creating
attitudes related to nanotechnology. As well as representing how a
subject is treated, media frames determine how public think about
this subject. In literature definite frames related to nanoscience and
nanotechnology such as process, regulation, conflict and risks were
mentioned in studies focusing different countries. So how
nanotechnology news is treated by which frames and in which news
categories in Turkey as a one of developing countries? In this study
examining different variables about nanotechnology that affect
public attitudes such as category, frame, story tone, source in Turkish
media via framing analysis developed in agenda setting studies was
aimed. In the analysis data between 2005 and 2009 obtained from the
first five national newspapers with wide circulation in Turkey will be
used. In this study the direction of the media about nanotechnology,
in which frames nanotechnologic advances brought to agenda were
reported as news, and sectoral, legal, economic and social scenes
reflected by these frames to public related to nanotechnology in
Turkey were planned.
Abstract: Existing experiences indicate that one of the most
prominent reasons that some ERP implementations fail is related to
selecting an improper ERP package. Among those important factors
resulting in inappropriate ERP selections, one is to ignore preliminary
activities that should be done before the evaluation of ERP packages.
Another factor yielding these unsuitable selections is that usually
organizations employ prolonged and costly selection processes in
such extent that sometimes the process would never be finalized
or sometimes the evaluation team might perform many key final
activities in an incomplete or inaccurate way due to exhaustion, lack
of interest or out-of-date data. In this paper, a systematic approach
that recommends some activities to be done before and after the
main selection phase is introduced for choosing an ERP package. On
the other hand, the proposed approach has utilized some ideas that
accelerates the selection process at the same time that reduces the
probability of an erroneous final selection.
Abstract: Clustering techniques have been used by many intelligent software agents to group similar access patterns of the Web users into high level themes which express users intentions and interests. However, such techniques have been mostly focusing on one salient feature of the Web document visited by the user, namely the extracted keywords. The major aim of these techniques is to come up with an optimal threshold for the number of keywords needed to produce more focused themes. In this paper we focus on both keyword and similarity thresholds to generate themes with concentrated themes, and hence build a more sound model of the user behavior. The purpose of this paper is two fold: use distance based clustering methods to recognize overall themes from the Proxy log file, and suggest an efficient cut off levels for the keyword and similarity thresholds which tend to produce more optimal clusters with better focus and efficient size.