Mobile Phone Usage and the Risk of Brain Tumors

Author(s): Naina Sawal, Amir Hossein Mortazavi Entesab

ABSTRACT
Purpose: This literature review investigated the possible association between the use of mobile phones and brain tumors. Methods: In brief, 11 publications were retrieved from JSTOR, PubMed, Google Scholar and Summon in order to compare the association between the usage of mobile phones in patients with a brain tumor and those without. Papers published in English, and after 2001 were selected for. There was no limit on age, gender, geographical location and type of brain tumor. Results: For regular mobile phone usage, the combined odds ratios (OR) (95% confidence intervals) for three studies are: 1.5 (1.2 – 1.8), 1.3 (0.95 – 1.9), and 1.1 (0.8 – 1.4), respectively. Furthermore, the odds ratio did Continue reading

26 total views, 2 views today

Posted in ODEM | Tagged , , , , , , , , , , , , | Leave a comment

Enhancing Mobile Cloud Computing Security Using Steganography

Author(s): Hassan Reza, Madhuri Sonawane

ABSTRACT
Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Although, there exist variety of security mechanisms to prevent unauthorized access by unauthorized user by the Continue reading

40 total views, 2 views today

Posted in JIS | Tagged , , , , , , | Leave a comment

Corporate Social Responsibility and Family Enterprise

Author(s): Fengjiao Zhang

ABSTRACT
As one of important characteristics of the economic development and social progress, fulfilling corporation social responsibility has attracted wide attention from all sectors of society. We empirically test the influence of family enterprise on the behavior characteristics of corporate social responsibility. We find that the family enterprises fulfill more social responsibility to shareholders, but less social responsibility to employees, suppliers, and the environment than Continue reading

55 total views, 2 views today

Posted in OJBM | Tagged , , , | Leave a comment

Unequal Exchange? Marx’ Solution to the Value Problem on the World Market

Author(s): Guenther Sandleben

ABSTRACT
By drawing on his critically developed labour theory of value, Marx was able to provide a satisfactory answer to the question of unequal exchange—that is, the question of how the law of value regulates exchange between two or more countries. Unlike the proponents of classical political economics, Marx drew an explicit distinction between labour, as expressed in the form of value, and the same labour, as expressed in the form of use value. This twofold character is the key to the correct analysis of magnitude of value and exchange relation. At the heart of Marx’ solution Continue reading

40 total views, no views today

Posted in TEL | Tagged , , , , , | Leave a comment

A Derived Exposure Chart for Computed Radiography in a Negroid Population

Author(s): Thomas Adejoh, Odira C. Ewuzie, Joshua K. Ogbonna, Stanley O. Nwefuru, Nnamdi C. Onuegbu

ABSTRACT
Background: Computed radiography has a wider exposure latitude when compared with film-screen imaging system. Consequently, the risk of dose creep is high. A conscientious effort is there-fore, needed by the radiographer to keep exposure as low as reasonably achievable. Objective: To derive a computed radiography exposure chart for a negroid population using AGFA photostimulable phosphor plates and a GE static X-ray machine. Materials and Method: A static X-ray machine Continue reading

76 total views, 1 views today

Posted in Health | Tagged , , , , , | Leave a comment

Enhancing Mobile Cloud Computing Security Using Steganography

Author(s): Hassan Reza, Madhuri Sonawane

ABSTRACT
Cloud computing is an emerging and popular method of accessing shared and dynamically configurable resources via the computer network on demand. Cloud computing is excessively used by mobile applications to offload data over the network to the cloud. There are some security and privacy concerns using both mobile devices to offload data to the facilities provided by the cloud providers. One of the critical threats facing cloud users is the unauthorized access by the insiders (cloud administrators) or the justification of location where the cloud providers operating. Continue reading

103 total views, no views today

Posted in JIS | Tagged , , , , , , | Leave a comment

Comparison of Three Techniques to Identify and Count Individual Animals in Aerial Imagery

Author(s): Pat A. Terletzky, Robert Douglas Ramsey

ABSTRACT
Whether a species is rare and requires protection or is overabundant and needs control, an accurate estimate of population size is essential for the development of conservation plans and management goals. Current wildlife surveys are logistically difficult, frequently biased, and time consuming. Therefore, there is a need to provide additional techniques to improve survey methods for censusing wildlife species. We examined three methods to enumerate animals in remotely sensed aerial imagery: manual Continue reading

113 total views, no views today

Posted in JSIP | Tagged , , , , | Leave a comment

Neural Network in Computer Vision for RoboCup Middle Size League

Author(s): Paulo Rogério de Almeida Ribeiro, Gil Lopes, Fernando Ribeiro

ABSTRACT
Robot World Cup Initiative (RoboCup) is a worldwide competition proposed to advance research in robotics and artificial intelligence. It has a league called RoboCup soccer devoted for soccer robots, which is a challenge because robots are mobile, fully autonomous, multi-agents, and they play on a dynamic environment. Moreover, robots must recognize the game entities, which is a crucial task during a game. A camera is usually used as an input system to recognize ball, opponents, soccer field, and so on. These elements may be recognized applying Continue reading

126 total views, no views today

Posted in JSEA | Tagged , , | Leave a comment

The Relationship between Happiness and Self-Awareness among Introverts and Extroverts

Author(s): Mandana Bagherian, Adis Kraskian Mojembari, Parviz Naghibian, Sanam Farshad Nik

ABSTRACT
It is commonly believed that extroverts are happy and felicitous, and introversion is usually regarded as the state of having no fun or happiness in life. The present research is intended to investigate the relationship between extroversion (one of the Big Five Personality Traits) and happiness level among individuals to figure out whether there is any significant relationship between extroversion/introversion Continue reading

102 total views, no views today

Posted in Psych | Tagged , , , , | Leave a comment

New Method in Calculating the Trajectory of Sound Waves at Stratified Ocean

Author(s): V. P. Ivanov, G. K. Ivanova

ABSTRACT
There is a new method of calculating the trajectory of sound waves (rays) in layered stratified speed of sound in ocean without dispersion. A sound wave in the fluid is considered as a vector. The amplitudes occurring at the boundary layers of the reflected and refracted waves are calculated according to the law of addition of vectors and using the law of conservation of energy, as well as the laws that determine the angles of reflection and refraction. It is shown that in calculating the trajectories, the reflected wave must be taken into account. The reflecting wave’s value may be about 1 at certain angles of the initial wave output from the sours. Reflecting wave Continue reading

138 total views, no views today

Posted in OJA | Tagged , , , , | Leave a comment