Abstract: Vertex configuration for a vertex in an orthogonal
pseudo-polyhedron is an identity of a vertex that is determined by the
number of edges, dihedral angles, and non-manifold properties
meeting at the vertex. There are up to sixteen vertex configurations
for any orthogonal pseudo-polyhedron (OPP). Understanding the
relationship between these vertex configurations will give us insight
into the structure of an OPP and help us design better algorithms for
many 3-dimensional geometric problems. In this paper, 16 vertex
configurations for OPP are described first. This is followed by a
number of formulas giving insight into the relationship between
different vertex configurations in an OPP. These formulas
will be useful as an extension of orthogonal polyhedra usefulness on
pattern analysis in 3D-digital images.
Abstract: Efficient modulo 2n+1 adders are important for
several applications including residue number system, digital signal
processors and cryptography algorithms. In this paper we present a
novel modulo 2n+1 addition algorithm for a recently represented
number system. The proposed approach is introduced for the
reduction of the power dissipated. In a conventional modulo 2n+1
adder, all operands have (n+1)-bit length. To avoid using (n+1)-bit
circuits, the diminished-1 and carry save diminished-1 number
systems can be effectively used in applications. In the paper, we also
derive two new architectures for designing modulo 2n+1 adder, based
on n-bit ripple-carry adder. The first architecture is a faster design
whereas the second one uses less hardware. In the proposed method,
the special treatment required for zero operands in Diminished-1
number system is removed. In the fastest modulo 2n+1 adders in
normal binary system, there are 3-operand adders. This problem is
also resolved in this paper. The proposed architectures are compared
with some efficient adders based on ripple-carry adder and highspeed
adder. It is shown that the hardware overhead and power
consumption will be reduced. As well as power reduction, in some
cases, power-delay product will be also reduced.
Abstract: Value engineering is an efficacious contraption for
administrators to make up their minds. Value perusals proffer the
gaffers a suitable instrument to decrease the expenditures of the life
span, quality amelioration, structural improvement, curtailment of the
construction schedule, longevity prolongation or a merging of the
aforementioned cases. Subjecting organizers to pressures on one
hand and their accountability towards their pertinent fields together
with inherent risks and ambiguities of other options on the other hand
set some comptrollers in a dilemma utilization of risk management
and the value engineering in projects manipulation with regard to
complexities of implementing projects can be wielded as a
contraption to identify and efface each item which wreaks
unnecessary expenses and time squandering sans inflicting any
damages upon the essential project applications. Of course It should
be noted that implementation of risk management and value
engineering with regard to the betterment of efficiency and functions
may lead to the project implementation timing elongation. Here time
revamping does not refer to time diminishing in the whole cases. his
article deals with risk and value engineering conceptualizations at
first. The germane reverberations effectuated due to its execution in
Iran Khodro Corporation are regarded together with the joint features
and amalgamation of the aforesaid entia; hence the proposed
blueprint is submitted to be taken advantage of in engineering and
industrial projects including Iran Khodro Corporation.
Abstract: Customer-supplier collaboration enables firms to
achieve greater success than acting independently. Nevertheless, not
many firms have fully utilized the potential of collaboration. This
paper presents organizational and human related success factors for
collaboration in manufacturing supply chains in casting industry. Our
research approach was a case study including multiple cases. Data
was gathered by interviews and group discussions in two different
research projects. In the first research project we studied seven firms
and in the second five. It was found that the success factors are
interrelated, in other words, organizational and human factors
together enable success but not any of them alone. Some of the found
success factors are a culture of following agreements, and a speed of
informing the partner about changes affecting to the product or the
delivery chain.
Abstract: For improving the efficiency of human 3D tracking, we
present an algorithm to track 3D Arm Motion. First, the Hierarchy
Limb Model (HLM) is proposed based on the human 3D skeleton
model. Second, via graph decomposition, the arm motion state space,
modeled by HLM, can be discomposed into two low dimension
subspaces: root nodes and leaf nodes. Finally, Rao-Blackwellised
Particle Filter is used to estimate the 3D arm motion. The result of
experiment shows that our algorithm can advance the computation
efficiency.
Abstract: A variety of new technology-based services have
emerged with the development of Information and Communication
Technologies (ICTs). Since technology-based services have technology-driven characteristics, the identification of relationships
between technology-based services and ICTs would give meaningful implications. Thus, this paper proposes an approach for identifying the
relationships between technology-based services and ICTs by
analyzing patent documents. First, business model (BM) patents are
classified into relevant service categories. Second, patent citation
analysis is conducted to investigate the technological linkage and impacts between technology-based services and ICTs at macro level.
Third, as a micro level analysis, patent co-classification analysis is
employed to identify the technological linkage and coverage. The
proposed approach could guide and help managers and designers of
technology-based services to discover the opportunity of the development of new technology-based services in emerging service sectors.
Abstract: Recently, permeable breakwaters have been suggested to overcome the disadvantages of fully protection breakwaters. These protection structures have minor impacts on the coastal environment and neighboring beaches where they provide a more economical protection from waves and currents. For regular waves, a numerical model is used (FLOW-3D, VOF) to investigate the hydraulic performance of a permeable breakwater. The model of permeable breakwater consists of a pair of identical vertical slotted walls with an impermeable upper and lower part, where the draft is a decimal multiple of the total depth. The middle part is permeable with a porosity of 50%. The second barrier is located at distant of 0.5 and 1.5 of the water depth from the first one. The numerical model is validated by comparisons with previous laboratory data and semi-analytical results of the same model. A good agreement between the numerical results and both laboratory data and semi-analytical results has been shown and the results indicate the applicability of the numerical model to reproduce most of the important features of the interaction. Through the numerical investigation, the friction factor of the model is carefully discussed.
Abstract: Overloading is a technique to accommodate more
number of users than the spreading factor N. This is a bandwidth
efficient scheme to increase the number users in a fixed bandwidth.
One of the efficient schemes to overload a CDMA system is to use
two sets of orthogonal signal waveforms (O/O). The first set is
assigned to the N users and the second set is assigned to the
additional M users. An iterative interference cancellation technique is
used to cancel interference between the two sets of users. In this
paper, the performance of an overloading scheme in which the first N
users are assigned Walsh-Hadamard orthogonal codes and extra users
are assigned the same WH codes but overlaid by a fixed (quasi) bent
sequence [11] is evaluated. This particular scheme is called Quasi-
Orthogonal Sequence (QOS) O/O scheme, which is a part of
cdma2000 standard [12] to provide overloading in the downlink
using single user detector. QOS scheme are balance O/O scheme,
where the correlation between any set-1 and set-2 users are
equalized. The allowable overload of this scheme is investigated in
the uplink on an AWGN and Rayleigh fading channels, so that the
uncoded performance with iterative multistage interference
cancellation detector remains close to the single user bound. It is
shown that this scheme provides 19% and 11% overloading with
SDIC technique for N= 16 and 64 respectively, with an SNR
degradation of less than 0.35 dB as compared to single user bound at
a BER of 0.00001. But on a Rayleigh fading channel, the channel
overloading is 45% (29 extra users) at a BER of 0.0005, with an SNR
degradation of about 1 dB as compared to single user performance
for N=64. This is a significant amount of channel overloading on a
Rayleigh fading channel.
Abstract: Aims for this study: first, to compare the expertise
level in data analysis, communication and information technologies
in undergraduate psychology students. Second, to verify the factor
structure of E-ETICA (Escala de Experticia en Tecnologias de la Informacion, la Comunicacion y el Análisis or Data Analysis,
Communication and Information'Expertise Scale) which had shown
an excellent internal consistency (α= 0.92) as well as a simple factor
structure. Three factors, Complex, Basic Information and
Communications Technologies and E-Searching and Download
Abilities, explains 63% of variance. In the present study, 260
students (119 juniors and 141 seniors) were asked to respond to
ETICA (16 items Likert scale of five points 1: null domain to 5: total
domain). The results show that both junior and senior students report
having very similar expertise level; however, E-ETICA presents a
different factor structure for juniors and four factors explained also
63% of variance: Information E-Searching, Download and Process;
Data analysis; Organization; and Communication technologies.
Abstract: The effect of plant growth-promoting rhizobacteria
(PGPR) on seed germination, seedling growth and yield of field
grown maize were evaluated in three experiments. In these
experiments six bacterial strains include P.putida strain R-168,
P.fluorescens strain R-93, P.fluorescens DSM 50090, P.putida
DSM291, A.lipoferum DSM 1691, A.brasilense DSM 1690 were
used. Results of first study showed seed Inoculation significantly
enhanced seed germination and seedling vigour of maize. In second
experiment, leaf and shoot dry weight and also leaf surface area
significantly were increased by bacterial inoculation in both sterile
and non-sterile soil. The results showed that inoculation with
bacterial treatments had a more stimulating effect on growth and
development of plants in nonsterile than sterile soil. In the third
experiment, Inoculation of maize seeds with all bacterial strains
significantly increased plant height, 100 seed weight, number of seed
per ear and leaf area .The results also showed significant increase in
ear and shoot dry weight of maize.
Abstract: TTV is an unenveloped circular single-stranded DNA
virus with a diameter of 30-32 nm that first was described in 1997 in
Japan. TTV was detected in various populations without proven
pathology, including blood donors and in patients with chronic HBV
and HCV hepatitis. The aim of this study was to determine the
prevalence of TTV DNA in Iranian patients with chronic hepatitis B
and C. Viral TTV-DNA was studied in 442 samples (202 with HBV,
138 with HCV and 102 controls) collected from west south of Iran.
All extracted serum DNA was amplified by TTV ORF1 gene specific
primers using the semi nested PCR technique. TTV DNA was
detected in the serum of 8.9% and 10.8% patients with chronic
hepatitis B and C, respectively. Prevalence of TTV-DNA in the serum
of 102 controls was 2.9%. Results showed significant relation of TTV
with HBV and HCV in patients by using T test examination (P
Abstract: Protein-protein interactions (PPI) play a crucial role in many biological processes such as cell signalling, transcription, translation, replication, signal transduction, and drug targeting, etc. Structural information about protein-protein interaction is essential for understanding the molecular mechanisms of these processes. Structures of protein-protein complexes are still difficult to obtain by biophysical methods such as NMR and X-ray crystallography, and therefore protein-protein docking computation is considered an important approach for understanding protein-protein interactions. However, reliable prediction of the protein-protein complexes is still under way. In the past decades, several grid-based docking algorithms based on the Katchalski-Katzir scoring scheme were developed, e.g., FTDock, ZDOCK, HADDOCK, RosettaDock, HEX, etc. However, the success rate of protein-protein docking prediction is still far from ideal. In this work, we first propose a more practical measure for evaluating the success of protein-protein docking predictions,the rate of first success (RFS), which is similar to the concept of mean first passage time (MFPT). Accordingly, we have assessed the ZDOCK bound and unbound benchmarks 2.0 and 3.0. We also createda new benchmark set for protein-protein docking predictions, in which the complexes have experimentally determined binding affinity data. We performed free energy calculation based on the solution of non-linear Poisson-Boltzmann equation (nlPBE) to improve the binding mode prediction. We used the well-studied thebarnase-barstarsystem to validate the parameters for free energy calculations. Besides,thenlPBE-based free energy calculations were conducted for the badly predicted cases by ZDOCK and ZRANK. We found that direct molecular mechanics energetics cannot be used to discriminate the native binding pose from the decoys.Our results indicate that nlPBE-based calculations appeared to be one of the promising approaches for improving the success rate of binding pose predictions.
Abstract: In contrast to existing methods which do not take into account multiconnectivity in a broad sense of this term, we develop mathematical models and highly effective combination (BIEM and FDM) numerical methods of calculation of stationary and quasistationary temperature field of a profile part of a blade with convective cooling (from the point of view of realization on PC). The theoretical substantiation of these methods is proved by appropriate theorems. For it, converging quadrature processes have been developed and the estimations of errors in the terms of A.Ziqmound continuity modules have been received. For visualization of profiles are used: the method of the least squares with automatic conjecture, device spline, smooth replenishment and neural nets. Boundary conditions of heat exchange are determined from the solution of the corresponding integral equations and empirical relationships. The reliability of designed methods is proved by calculation and experimental investigations heat and hydraulic characteristics of the gas turbine first stage nozzle blade.
Abstract: In this paper we present a novel error model for
packet loss and subsequent error description. The proposed model
simulates the error performance of wireless communication link. The
model is designed as two independent Markov chains, where the first
one is used for packet generation and the second one generates
correctly and incorrectly transmitted bits for received packets from
the first chain. The statistical analyses of real communication on the
wireless link are used for determination of model-s parameters. Using
the obtained parameters and the implementation of the generator, we
collected generated traffic. The obtained results generated by
proposed model are compared with the real data collection.
Abstract: This study was conducted to examine the effects of ketum extract on development of Chrysomya rufifacies and to analyze the presence of mitragynine in the larvae samples. 110 newly emerged first instar larvae of C. rufifacies were introduced on ketum extract-mixed cow liver at doses of 0, 20, 40 and 60g. Blowfly development rate was determined with 12 hour intervals and
mitragynine in larvae was extracted and quantitated. C. rufifacies in control group took about 192 hours to complete their development from first instar larvae to adult blowfly; meanwhile blowfly form from the highest dose of ketum was 264 hours. Mitragynine was detected in all groups of treatment, except for control. In conclusion, the presence of mitragynine in C. rufifacies is affected in delaying development rates of the blowfly for up to 62 hours or 3 days. Chemical analysis of mitragynine from larvae samples showed that this alkaloid present in all specimens analyzed.
Abstract: P2P Networks are highly dynamic structures since
their nodes – peer users keep joining and leaving continuously. In the
paper, we study the effects of network change rates on query routing
efficiency. First we describe some background and an abstract system
model. The chosen routing technique makes use of cached metadata
from previous answer messages and also employs a mechanism for
broken path detection and metadata maintenance. Several metrics are
used to show that the protocol behaves quite well even with high rate
of node departures, but above a certain threshold it literally breaks
down and exhibits considerable efficiency degradation.
Abstract: This article discusses the problem of estimating the
orientation of inclined ground on which a human subject stands based
on information provided by the vestibular system consisting of the
otolith and semicircular canals. It is assumed that body segments are
not necessarily aligned and thus forming an open kinematic chain.
The semicircular canals analogues to a technical gyrometer provide a
measure of the angular velocity whereas the otolith analogues to a
technical accelerometer provide a measure of the translational
acceleration. Two solutions are proposed and discussed. The first is
based on a stand-alone Kalman filter that optimally fuses the two
measurements based on their dynamic characteristics and their noise
properties. In this case, no body dynamic model is needed. In the
second solution, a central extended disturbance observer that
incorporates a body dynamic model (internal model) is employed.
The merits of both solutions are discussed and demonstrated by
experimental and simulation results.
Abstract: In this study, a novel approach of image embedding is introduced. The proposed method consists of three main steps. First, the edge of the image is detected using Sobel mask filters. Second, the least significant bit LSB of each pixel is used. Finally, a gray level connectivity is applied using a fuzzy approach and the ASCII code is used for information hiding. The prior bit of the LSB represents the edged image after gray level connectivity, and the remaining six bits represent the original image with very little difference in contrast. The proposed method embeds three images in one image and includes, as a special case of data embedding, information hiding, identifying and authenticating text embedded within the digital images. Image embedding method is considered to be one of the good compression methods, in terms of reserving memory space. Moreover, information hiding within digital image can be used for security information transfer. The creation and extraction of three embedded images, and hiding text information is discussed and illustrated, in the following sections.
Abstract: This paper contributes to our knowledge about buyerseller
relations by identifying barriers and conflict situations
associated with maintaining and developing durable business
relationships by small companies. The contribution of prior studies
with regard to negative aspects of marketing relationships is
presented in the first section. The international research results are
discussed with regard to the existing conceptualizations and main
research implications identified at the end.
Abstract: The sequential morphologic changes of rabbit duodenal mucosa-submucosa were studied from primodial stage to birth in 15 fetuses and during the early days of life in 21 rabbit newborns till maturity using light, scanning and transmission electron microscopy. Fetal rabbit duodenum develops from a simple tube of stratified epithelium to a tube containing villus and intervillus regions of simple columnar epithelium. By day 21 of gestation, the first rudimentary villi were appeared and by day 24 the first true villi were appeared. The Crypts of Lieberkuhn did not appear until birth. By the first day of postnatal life the duodenal glands appeared. The histological maturity of the rabbit small intestine occurred one month after birth. In conclusion, at all stages, the sequential morphologic changes of the rabbit small intestine developed to meet the structural and physiological demands during the fetal stage to be prepared to extra uterine life.