Abstract: Two freshwater fishes, Rasbora sumatrana
(Cyprinidae) and Poecilia reticulata (guppy) (Poeciliidae) were
exposed for a four-day period in the laboratory condition to a range
of copper (Cu) and cadmium (Cd) concentrations. Mortality was
assessed and median lethal concentrations (LC50) were calculated.
LC50 increased with decrease in mean exposure times for both metals.
For R. sumatrana, LC50s for 24, 48, 72 and 96 hours for Cu were
54.2, 30.3, 18.9 and 5.6 μg/L and for Cd 1440.2, 459.3, 392.3 and
101.6 μg/L respectively. For P. reticulata, LC50s for 24, 48, 72 and
96 hours for Cu were 348.9, 145.4, 61.3 and 37.9 μg/L and for Cd
8205.6, 2827.1, 405.8 and 168.1 μg/L, respectively. Results indicated
that the Cu was more toxic than Cd to both fishes (Cu>Cd) and R.
sumatrana was more sensitive than P. reticulata to the metals.
Abstract: The fuzzy set theory has been applied in many fields,
such as operations research, control theory, and management
sciences, etc. In particular, an application of this theory in decision
making problems is linear programming problems with fuzzy
numbers. In this study, we present a new method for solving fuzzy
number linear programming problems, by use of linear ranking
function. In fact, our method is similar to simplex method that was
used for solving linear programming problems in crisp environment
before.
Abstract: ICA which is generally used for blind source separation
problem has been tested for feature extraction in Speech recognition
system to replace the phoneme based approach of MFCC. Applying
the Cepstral coefficients generated to ICA as preprocessing has
developed a new signal processing approach. This gives much better
results against MFCC and ICA separately, both for word and speaker
recognition. The mixing matrix A is different before and after MFCC
as expected. As Mel is a nonlinear scale. However, cepstrals
generated from Linear Predictive Coefficient being independent
prove to be the right candidate for ICA. Matlab is the tool used for
all comparisons. The database used is samples of ISOLET.
Abstract: Technology changes have been acknowledged as a
critical factor in determining competitiveness of organization. Under
such environment, the right anticipation of technology change has
been of huge importance in strategic planning. To monitor technology
change, technology forecasting (TF) is frequently utilized. In
academic perspective, TF has received great attention for a long time.
However, few researches have been conducted to provide overview of
the TF literature. Even though some studies deals with review of TF
research, they generally focused on type and characteristics of various
TF, so hardly provides information about patterns of TF research and
which TF method is used in certain technology industry. Accordingly,
this study profile developments in and patterns of scholarly research in
TF over time. Also, this study investigates which technology
industries have used certain TF method and identifies their
relationships. This study will help in understanding TF research trend
and their application area.
Abstract: Public administration institutions in cooperation with
politicians are not the sole policy decision makers in full meaning
any longer. Meanwhile, a special role, namely steering the decision
making process, could be delegated to them.
Despite the wide scientific discussion on different aspects what
has direct impact on policy creation, there is a lack of holistic
practical managerial advice, which could integrate infrastructure of
policy decision making with intellectual capital and with
interconnection of partnership. The proposed harmonized decision
making model of process, people and partnership entitled by
acronym HM-3P is analyzed as a framework for implementation of
public administration steering role seeking the coherent social
involvement in policy decision making.
Abstract: This paper identifies five key design characteristics of
production scheduling software systems in printed circuit board (PCB) manufacturing. The authors consider that, in addition to an effective scheduling engine, a scheduling system should be able to
process a preventative maintenance calendar, to give the user the
flexibility to handle data using a variety of electronic sources, to run
simulations to support decision-making, and to have simple and
customisable graphical user interfaces. These design considerations
were the result of a review of academic literature, the evaluation of
commercial applications and a compilation of requirements of a PCB manufacturer. It was found that, from those systems that were evaluated, those that effectively addressed all five characteristics
outlined in this paper were the most robust of all and could be used in
PCB manufacturing.
Abstract: This paper focuses on the 3D reconstruction of
the architectural design of Darul Ridzuan Museum. It has
concentrated on designing exterior part of the building according
to colored digital photo of the real museum. Besides viewing the
architecture, walkthroughs are generated for the user to control
it in an easier way. User can travel through the museum to get
the feel of the environment and to explore the design of the
museum as a whole; both exterior and interior. The result has
shown positive result in terms of realism, navigation, collision
detection, suitability, usability and user-s acceptance. In brief,
the 3D virtual museum has provided an alternative to present a
real museum.
Abstract: There has been a growing interest in the field of
bio-mimetic robots that resemble the shape of an insect or an aquatic
animal, among many others. One bio-mimetic robot serves the
purpose of exploring pipelines, spotting any troubled areas or
malfunctions and reporting its data. Moreover, the robot is able to
prepare for and react to any abnormal routes in the pipeline. In order
to move effectively inside a pipeline, the robot-s movement will
resemble that of a lizard. When situated in massive pipelines with
complex routes, the robot places fixed sensors in several important
spots in order to complete its monitoring. This monitoring task is to
prevent a major system failure by preemptively recognizing any minor
or partial malfunctions. Areas uncovered by fixed sensors are usually
impossible to provide real-time observation and examination, and thus
are dependant on periodical offline monitoring. This paper provides
the Monitoring System that is able to monitor the entire area of
pipelines–with and without fixed sensors–by using the bio-mimetic
robot.
Abstract: Application of wood in rural construction is diffused
all around the world since remote times. However, its inclusion in
structural design deserves strong support from broad knowledge of
material properties. The pertinent literature reveals the application of
optical methods in determining the complete field displacement on
bodies exhibiting regular as well as irregular surfaces. The use of
moiré techniques in experimental mechanics consists in analyzing the
patterns generated on the body surface before and after deformation.
The objective of this research work is to study the qualitative
deformation behavior of wooden testing specimens under specific
loading situations. The experiment setup follows the literature
description of shadow moiré methods. Results indicate strong
anisotropy influence of the generated displacement field. Important
qualitative as well as quantitative stress and strain distribution were
obtained wooden members which are applicable to rural
constructions.
Abstract: De novo genome assembly is always fragmented. Assembly fragmentation is more serious using the popular next generation sequencing (NGS) data because NGS sequences are shorter than the traditional Sanger sequences. As the data throughput of NGS is high, the fragmentations in assemblies are usually not the result of missing data. On the contrary, the assembled sequences, called contigs, are often connected to more than one other contigs in a complicated manner, leading to the fragmentations. False connections in such complicated connections between contigs, named a contig graph, are inevitable because of repeats and sequencing/assembly errors. Simplifying a contig graph by removing false connections directly improves genome assembly. In this work, we have developed a tool, SIMGraph, to resolve ambiguous connections between contigs using NGS data. Applying SIMGraph to the assembly of a fungus and a fish genome, we resolved 27.6% and 60.3% ambiguous contig connections, respectively. These results can reduce the experimental efforts in resolving contig connections.
Abstract: Construction of tunnels is connected with high
uncertainty in the field of costs, construction period, safety and
impact on surroundings. Risk management became therefore a
common part of tunnel projects, especially after a set of fatal
collapses occurred in 1990's. Such collapses are caused usually by
combination of factors that can be divided into three main groups, i.e.
unfavourable geological conditions, failures in the design and
planning or failures in the execution.
This paper suggests a procedure enabling quantification of the
excavation risk related to extraordinary accidents using FTA and
ETA tools. It will elaborate on a common process of risk analysis and
enable the transfer of information and experience between particular
tunnel construction projects. Further, it gives a guide for designers,
management and other participants, how to deal with risk of such
accidents and how to make qualified decisions based on a
probabilistic approach.
Abstract: This paper presents a semi-supervised learning algorithm called Iterative-Cross Training (ICT) to solve the Web pages classification problems. We apply Inductive logic programming (ILP) as a strong learner in ICT. The objective of this research is to evaluate the potential of the strong learner in order to boost the performance of the weak learner of ICT. We compare the result with the supervised Naive Bayes, which is the well-known algorithm for the text classification problem. The performance of our learning algorithm is also compare with other semi-supervised learning algorithms which are Co-Training and EM. The experimental results show that ICT algorithm outperforms those algorithms and the performance of the weak learner can be enhanced by ILP system.
Abstract: In this work, we experimentally study heat transfer
from exhaust particulate air of detergent spray drying tower to water
by using coiled tube heat exchanger. Water flows in the coiled
tubes, where air loaded with detergent particles of 43 micrometers
in diameter flows within the shell. Four coiled tubes with different
coil pitches are used in a counter-current flow configuration. We
investigate heat transfer coefficients of inside and outside the heat
transfer surfaces through 400 experiments. The correlations between
Nusselt number and Reynolds number, Prandtl number, mass flow
rate of particulates to mass flow rate of air ratio and coiled tube
pitch parameter are proposed. The correlations procured can be used
to predicted heat transfer between tube and shell of the heat
exchanger.
Abstract: Short circuit currents plays a vital role in influencing the design and operation of equipment and power system and could not be avoided despite careful planning and design, good maintenance and thorough operation of the system. This paper discusses the short circuit analysis conducted in KSO briefly comprising of its significances, methods and results. A result sample of the analysis based on a single transformer is detailed in this paper. Furthermore, the results of the analysis and its significances were also discussed and commented.
Abstract: With the advantage of wireless network technology,
there are a variety of mobile applications which make the issue of
wireless sensor networks as a popular research area in recent years.
As the wireless sensor network nodes move arbitrarily with the
topology fast change feature, mobile nodes are often confronted with
the void issue which will initiate packet losing, retransmitting,
rerouting, additional transmission cost and power consumption.
When transmitting packets, we would not predict void problem
occurring in advance. Thus, how to improve geographic routing with
void avoidance in wireless networks becomes an important issue. In
this paper, we proposed a greedy geographical void routing algorithm
to solve the void problem for wireless sensor networks. We use the
information of source node and void area to draw two tangents to
form a fan range of the existence void which can announce voidavoiding
message. Then we use source and destination nodes to draw
a line with an angle of the fan range to select the next forwarding
neighbor node for routing. In a dynamic wireless sensor network
environment, the proposed greedy void avoiding algorithm can be
more time-saving and more efficient to forward packets, and improve
current geographical void problem of wireless sensor networks.
Abstract: In the traditional theory of non-uniform torsion the
axial displacement field is expressed as the product of the unit twist
angle and the warping function. The first one, variable along the
beam axis, is obtained by a global congruence condition; the second
one, instead, defined over the cross-section, is determined by solving
a Neumann problem associated to the Laplace equation, as well as for
the uniform torsion problem.
So, as in the classical theory the warping function doesn-t punctually
satisfy the first indefinite equilibrium equation, the principal aim of
this work is to develop a new theory for non-uniform torsion of
beams with axial symmetric cross-section, fully restrained on both
ends and loaded by a constant torque, that permits to punctually
satisfy the previous equation, by means of a trigonometric expansion
of the axial displacement and unit twist angle functions.
Furthermore, as the classical theory is generally applied with good
results to the global and local analysis of ship structures, two beams
having the first one an open profile, the second one a closed section,
have been analyzed, in order to compare the two theories.
Abstract: In the past years a lot of effort has been made in the
field of face detection. The human face contains important features
that can be used by vision-based automated systems in order to
identify and recognize individuals. Face location, the primary step of
the vision-based automated systems, finds the face area in the input
image. An accurate location of the face is still a challenging task.
Viola-Jones framework has been widely used by researchers in order
to detect the location of faces and objects in a given image. Face
detection classifiers are shared by public communities, such as
OpenCV. An evaluation of these classifiers will help researchers to
choose the best classifier for their particular need. This work focuses
of the evaluation of face detection classifiers minding facial
landmarks.
Abstract: Power-line networks are widely used today for broadband data transmission. However, due to multipaths within the broadband power line communication (BPLC) systems owing to stochastic changes in the network load impedances, branches, etc., network or channel capacity performances are affected. This paper attempts to investigate the performance of typical medium voltage channels that uses Orthogonal Frequency Division Multiplexing (OFDM) techniques with Quadrature Amplitude Modulation (QAM) sub carriers. It has been observed that when the load impedances are different from line characteristic impedance channel performance decreases. Also as the number of branches in the link between the transmitter and receiver increases a loss of 4dB/branch is found in the signal to noise ratio (SNR). The information presented in the paper could be useful for an appropriate design of the BPLC systems.
Abstract: This paper undertakes the problem of optimal
capacitor placement in a distribution system. The problem is how to
optimally determine the locations to install capacitors, the types and
sizes of capacitors to he installed and, during each load level,the
control settings of these capacitors in order that a desired objective
function is minimized while the load constraints,network constraints
and operational constraints (e.g. voltage profile) at different load
levels are satisfied. The problem is formulated as a combinatorial
optimization problem with a nondifferentiable objective function.
Four solution mythologies based on algorithms (GA),tabu search
(TS), and hybrid GA-SA algorithms are presented.The solution
methodologies are preceded by a sensitivity analysis to select the
candidate capacitor installation locations.
Abstract: In today-s competitive environment, the security concerns have grown tremendously. In the modern world, possession is known to be 9/10-ths of the law. Hence, it is imperative for one to be able to safeguard one-s property from worldly harms such as thefts, destruction of property, people with malicious intent etc. Due to the advent of technology in the modern world, the methodologies used by thieves and robbers for stealing have been improving exponentially. Therefore, it is necessary for the surveillance techniques to also improve with the changing world. With the improvement in mass media and various forms of communication, it is now possible to monitor and control the environment to the advantage of the owners of the property. The latest technologies used in the fight against thefts and destruction are the video surveillance and monitoring. By using the technologies, it is possible to monitor and capture every inch and second of the area in interest. However, so far the technologies used are passive in nature, i.e., the monitoring systems only help in detecting the crime but do not actively participate in stopping or curbing the crime while it takes place. Therefore, we have developed a methodology to detect the motion in a video stream environment and this is an idea to ensure that the monitoring systems not only actively participate in stopping the crime, but do so while the crime is taking place. Hence, a system is used to detect any motion in a live streaming video and once motion has been detected in the live stream, the software will activate a warning system and capture the live streaming video.