Abstract: The Cluster Dimension of a network is defined as, which is the minimum cardinality of a subset S of the set of nodes having the property that for any two distinct nodes x and y, there exist the node Si, s2 (need not be distinct) in S such that ld(x,s1) — d(y, s1)1 > 1 and d(x,s2) < d(x,$) for all s E S — {s2}. In this paper, strictly non overlap¬ping clusters are constructed. The concept of LandMarks for Unique Addressing and Clustering (LMUAC) routing scheme is developed. With the help of LMUAC routing scheme, It is shown that path length (upper bound)PLN,d < PLD, Maximum memory space requirement for the networkMSLmuAc(Az) < MSEmuAc < MSH3L < MSric and Maximum Link utilization factor MLLMUAC(i=3) < MLLMUAC(z03) < M Lc
Abstract: In this paper we used data mining techniques to
identify outlier patients who are using large amount of drugs over a
long period of time. Any healthcare or health insurance system
should deal with the quantities of drugs utilized by chronic diseases
patients. In Kingdom of Bahrain, about 20% of health budget is spent
on medications. For the managers of healthcare systems, there is no
enough information about the ways of drug utilization by chronic
diseases patients, is there any misuse or is there outliers patients. In
this work, which has been done in cooperation with information
department in the Bahrain Defence Force hospital; we select the data
for Cardiac patients in the period starting from 1/1/2008 to
December 31/12/2008 to be the data for the model in this paper. We
used three techniques for finding the drug utilization for cardiac
patients. First we applied a clustering technique, followed by
measuring of clustering validity, and finally we applied a decision
tree as classification algorithm. The clustering results is divided into
three clusters according to the drug utilization, for 1603 patients, who
received 15,806 prescriptions during this period can be partitioned
into three groups, where 23 patients (2.59%) who received 1316
prescriptions (8.32%) are classified to be outliers. The classification
algorithm shows that the use of average drug utilization and the age,
and the gender of the patient can be considered to be the main
predictive factors in the induced model.
Abstract: The ability to distinguish missense nucleotide
substitutions that contribute to harmful effect from those that do not
is a difficult problem usually accomplished through functional in
vivo analyses. In this study, instead current biochemical methods, the
effects of missense mutations upon protein structure and function
were assayed by means of computational methods and information
from the databases. For this order, the effects of new missense
mutations in exon 5 of PTEN gene upon protein structure and
function were examined. The gene coding for PTEN was identified
and localized on chromosome region 10q23.3 as the tumor
suppressor gene. The utilization of these methods were shown that
c.319G>A and c.341T>G missense mutations that were recognized in
patients with breast cancer and Cowden disease, could be pathogenic.
This method could be use for analysis of missense mutation in others
genes.
Abstract: In this work, the surgical theater of a local hospital in
KSA was analyzed using simulation. The focus was on attempting to
answer questions related to how many Operating Rooms (ORs) to
open and to analyze the performance of the surgical theater in
general and mainly the Post Anesthesia Care Unit (PACU) to assist
making decisions regarding PACU staffing. The surgical theater
consists of ten operating rooms and the PACU unit which has a
maximum capacity of fifteen beds. Different sequencing rules to
sequence the surgical cases were tested and the Longest Case First
(LCF) were superior to others. The results of the different
alternatives developed and tested can be used by the manager as a
tool to plan and manage the OR and PACU
Abstract: The crop rice is the staple food of most Sierra Leone
with no close substitute. However, its cultivation has been on its last
legs over the years. The decline in the domestic rice cultivation has
had vicious socio-economic implications such as hiking consumer
prices, balance of payment dilemmas with debt burden. The objective
of this study is thus, to assess the effect of the shift of rural labour
towards non-agricultural sectors on rice cultivation. The tools utilized
for analyzing the problem under consideration involved a thorough
descriptive statistics and generalized linear model using OLS
technique. Increased rural population was established positive and
significant in affecting rice cultivation. Fertilizer utilization was
insignificant in rice cultivation. For reducing the shift of rural labor
force towards nonagricultural sectors, the government should make
the agricultural sector very lucrative.
Abstract: To investigate the energy performance of solar shading devices, this paper carried out a survey on the current status of solar shading utilization in buildings in Ningbo and performed building simulations to evaluate the energy savings potential by adopting different solar shading devices. Results show that solar shading utilization in this area is not popular and effective, and should be considered firstly in the design stage since the potential for energy savings is up to 6.8% for residential buildings and 9.4% for commercial buildings.
Abstract: All practical real-time scheduling algorithms in multiprocessor systems present a trade-off between their computational complexity and performance. In real-time systems, tasks have to be performed correctly and timely. Finding minimal schedule in multiprocessor systems with real-time constraints is shown to be NP-hard. Although some optimal algorithms have been employed in uni-processor systems, they fail when they are applied in multiprocessor systems. The practical scheduling algorithms in real-time systems have not deterministic response time. Deterministic timing behavior is an important parameter for system robustness analysis. The intrinsic uncertainty in dynamic real-time systems increases the difficulties of scheduling problem. To alleviate these difficulties, we have proposed a fuzzy scheduling approach to arrange real-time periodic and non-periodic tasks in multiprocessor systems. Static and dynamic optimal scheduling algorithms fail with non-critical overload. In contrast, our approach balances task loads of the processors successfully while consider starvation prevention and fairness which cause higher priority tasks have higher running probability. A simulation is conducted to evaluate the performance of the proposed approach. Experimental results have shown that the proposed fuzzy scheduler creates feasible schedules for homogeneous and heterogeneous tasks. It also and considers tasks priorities which cause higher system utilization and lowers deadline miss time. According to the results, it performs very close to optimal schedule of uni-processor systems.
Abstract: Over a million tonnes of cigarette butts (CBs) are produced worldwide annually. These CBs accumulate in the environment due to the poor biodegradability of the cellulose acetate filters and pose a serious environmental risk. This paper presents some of the results from a continuing study on recycling CBs into fired clay bricks. Properties including compressive strength, flexural strength, density, water absorption and thermal conductivity of fired clay bricks are reported and discussed. Furthermore, leaching of heavy metals from the manufactured clay bricks was tested. The results show that the density of fired bricks was reduced by about 8 – 30 %, depending on the percentage of CBs incorporated into the raw materials. The compressive strength of bricks tested was 12.57, 5.22 and 3.00 MPa for 2.5, 5.0 and 10 % CB content respectively. Water absorption and initial rate of absorption values increased as density, and hence porosity, of bricks decreased with increasing CB volume. The leaching test results revealed trace amounts of heavy metals.
Abstract: According as the Architecture, Engineering and Construction (AEC) Industry projects have grown more complex and larger, the number of utilization of BIM for 3D design and simulation is increasing significantly. Therefore, typical applications of BIM such as clash detection and alternative measures based on 3-dimenstional planning are expanded to process management, cost and quantity management, structural analysis, check for regulation, and various domains for virtual design and construction. Presently, commercial BIM software is operated on single-user environment, so initial cost is so high and the investment may be wasted frequently. Cloud computing that is a next-generation internet technology enables simple internet devices (such as PC, Tablet, Smart phone etc) to use services and resources of BIM software. In this paper, we suggested developing method of the BIM software based on cloud computing environment in order to expand utilization of BIM and reduce cost of BIM software. First, for the benchmarking, we surveyed successful case of BIM and cloud computing. And we analyzed needs and opportunities of BIM and cloud computing in AEC Industry. Finally, we suggested main functions of BIM software based on cloud computing environment and developed a simple prototype of cloud computing BIM software for basic BIM model viewing.
Abstract: The resident registration number was adopted for the purposes of enhanced services for resident convenience and effective performance of governmental administrative affairs. However, it has been used for identification purposes customarily and irrationally in line with the development and spread of the Internet. In response to the growing concern about the leakage of collected RRNs and possible abuses of stolen RRNs, e.g. identity theft, for crimes, the Korean Communications Commission began to take legal/regulatory actions in 2011 to minimize the online collection and use of resident registration numbers. As the use of the RRN was limited after the revision of the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc., online business providers were required to have alternatives to the RRN for the purpose of identifying the user's identity and age, in compliance with the law, and settling disputes with customers. This paper presents means of verifying the personal identity by taking advantage of the commonly used infrastructure and simply replacing personal information entered and stored, without requiring users to enter their RRNs.