{"title":"Analytical solution of an electrokinetic flow in a nano-channel with variable physical properties","authors":"M. Mostofi","doi":"10.1109/ICAICT.2012.6398518","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398518","url":null,"abstract":"In this paper, an electrokinetic flow of a water electrolyte in a nano-channel will be studied. This study will be with existence of the Electric Double Layer (EDL) and fully analytical. Governing equation for the EDL is Poisson-Boltzmann. In addition, Navier-Stokes equations for electrolyte flow, Species and mass conservation equations are in use. Induced electric potential force the electrolyte ions and decrease the mass flow rate. In this paper, effect of temperature rise on the physical properties and consequently, on the velocity and potential distribution will be investigated.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126665756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. T. Celik, B. Hurezeanu, A. Digulescu, M. Mazilu
{"title":"Fetal ECG representation using recurrence plot analysis","authors":"E. T. Celik, B. Hurezeanu, A. Digulescu, M. Mazilu","doi":"10.1109/ICAICT.2012.6398488","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398488","url":null,"abstract":"The field of electrocardiography (ECG) has been in existence for over a century, but the analysis of fetal ECGs is still in its infancy. This is, partly due to a lack of availability of elegant standard databases, partly due to the relatively low signal to noise ratio of the fetal ECG compared to maternal ECG. In this paper we applied recurrence plot analysis method for noninvasively recorded abdominal ECG. This method is based on the analysis of recurrences of the state space trajectory of the system under analysis that has been employed especially for studying chaotic dynamical systems like ECG signals. The method is successfully applied to reduce the effect of noise on the ECG signal and represent fetal component that is not completely hidden by the maternal ECG.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"8 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120822915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Nouri, Z. Zeinolabedini, B. Abdolmaleki, N. Farhangian
{"title":"Analysis of a novel audio hash function based upon stationary wavelet transform","authors":"M. Nouri, Z. Zeinolabedini, B. Abdolmaleki, N. Farhangian","doi":"10.1109/ICAICT.2012.6398472","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398472","url":null,"abstract":"Robust hashing for multimedia authentication is an emerging research area. Audio hash functions provide a tool for fast and reliable identification of content. A different key-dependent robust audio hashing based upon speech construction model is proposed in this article. The proposed audio hash function is based on the essential frequency series. Robust hash is calculated based on linear spectrum frequencies (LSFs) which model the verbal territory. The correlation between LSFs is decoupled by Stationary wavelet transform (SWT). A randomization structure controlled by a secret key is used in hash generation for random feature selection. The audio hash function is key-dependent and collision resistant. Temporarily, it is extremely robust to content protective operations besides having high accuracy of tampering localization. They are found, the first, to perform very adequately in identification and verification tests, and the second, to be very robust to a large range of attacks. Furthermore, it can be addressed the issue of security of hashes and proposed a keying technique, and thereby a key-dependent audio hash function.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121845375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The adaptive method of decision making in problems of motion terminal control","authors":"V. Rodonaia","doi":"10.1109/ICAICT.2012.6398474","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398474","url":null,"abstract":"The new adaptive method of decision making in problems of terminal control is proposed. Unlike the traditional program methods which are characterized by lack of feedback, the proposed method provides a continuous control over the current state of the controlled object. This requires measurements of controlled variables and corresponding corrections of them to provided the desired development of the terminal control process. The adaptive method is completely described by determining control variables and boundary conditions. Three particular cases met in practice are considered.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122852180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rule scheduling methods in active database systems: A brief survey","authors":"H. Firoozy-Najafabadi, A. Navin","doi":"10.1109/ICAICT.2012.6398479","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398479","url":null,"abstract":"Traditional database management systems (DBMS) have static nature. This means that the operations such as query, update, etc. is performed only when asked by the user and DBMS doesn't act initiative in the specific condition. But many applications need to have automated monitoring, till in the occurrence specific event database management system will perform suitable reaction automatically. For this reason, active database systems (ADBS) were designed. One of the key issues in the active database management system is rules scheduling. This paper first introduces active database system and then will be investigated different methods of rules scheduling in the ADBS. Finally, scheduling methods is evaluated using active database system simulator (ADSS).","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123269936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Designing Yagi-Uda antenna fed by microstrip line and simulated by HFSS","authors":"H. Karbalaee, M. Salehifar, S. Soleimany","doi":"10.1109/ICAICT.2012.6398503","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398503","url":null,"abstract":"In this article, we have proposed a novel Yagi antenna that has both compactness of resonant antenna and broadband characteristics of traveling-wave radiators. It is fabricated on dielectric substrate with a microstrip (MS) feed. The top layer consists a microstrip feed, a broadband microstrip-to-coplanar stripline (CPS) transition and two diopole-elements, one of them which is driver element is fed by CPS, and the second is director. The metal underside is a microstrip ground which serves as a reflector element and cancels using reflector dipole. This antenna is constructed on low cost substrate with 1.56mm thickness and εr = 4.12. The simulated bandwidth is about 35% and its gain is more than 5dB.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127858335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the new multistage Fuzzy Technology to Investment Decisions","authors":"G. Sirbiladze, I. Khutsishvili, B. Ghvaberidze","doi":"10.1109/ICAICT.2012.6398510","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398510","url":null,"abstract":"This article proposes a novel Fuzzy Technology to support the Investment Decisions. While choosing among competitive investment projects, this technology provides the selection of projects with minimal crediting risks, makes ranking of chosen projects and then allows to optimally allocate investment amounts between several of them. The technology combines two fuzzy-statistical methods and solution of bicriteria discrete optimization problem, providing three stages of investment projects' evaluation.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126067901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ontology creation for an educational center","authors":"S. Dilek, H. Karacan, N. Jahangiri, S. Afzali","doi":"10.1109/ICAICT.2012.6398465","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398465","url":null,"abstract":"The introduction of the Semantic Web in 2001 lead the way to many new ideas and technologies in computing. Data handling and sharing gained a semantic level rather than structural, facilitating the development of innovative and more helpful end-user applications. Semantics of Web information is formally defined in ontologies, making it possible for machines to interpret data content more effectively. In this study, we aimed to apply this new technology and create a useful application for an educational center. This paper presents our work, issues we encountered, our approach to resolving those issues, as well as our findings and results.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131431457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer modeling of hemokinins using molecular dynamics method: Hemokinin 1 (human)","authors":"N. M. Qodjayev, B. M. Qasimov, U. T. Agayeva","doi":"10.1109/ICAICT.2012.6398538","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398538","url":null,"abstract":"This work dials with computer modeling of human Hemokinin 1 (hHK-1) using the Molecular Dynamics Method to study the spatial structure and structural-functional relationships of the hHK-1 molecule. hHK-1 is a peptide of the tachykinin family, encoded by the TAC 4 gene. Tachykinins interact with specific membrane proteins and exhibit neurotransmitter activity.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131098782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Educational and pedagogical design of a software tool for learning postero-anterior cephalometric landmarking","authors":"F. Maiorana, Rosalia Leonardi","doi":"10.1109/ICAICT.2012.6398526","DOIUrl":"https://doi.org/10.1109/ICAICT.2012.6398526","url":null,"abstract":"One of the key instruments for orthodontic patient evaluation is the cephalometric analysis that is used for diagnosis, treatment planning and evaluation. In clinical practice it is important to train students for a correct cephalometric analysis in order to master both lateral and postero-anterior cephalograms. The combination of lateral and postero-anterior analysis for a multimodal analysis is gaining importance in order to be able to evaluate the anatomical structure also in the frontal plane which allows for a better evaluation of asymmetry and craniofacial widths. In this work we present the educational and pedagogical idea that inspired the design of the software tool for learning postero-anterior cephalometric landmarking. The tool can be used in conjunction with a tool for latero-lateral cephalometric analysis offering a blending of approaches that can offer, in a multimodal way, a broader view and evaluation of the clinical situation.","PeriodicalId":221511,"journal":{"name":"2012 6th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122207520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}