Abstract: Support vector machines (SVMs) have shown
superior performance compared to other machine learning techniques,
especially in classification problems. Yet one limitation of SVMs is
the lack of an explanation capability which is crucial in some
applications, e.g. in the medical and security domains. In this paper, a
novel approach for eclectic rule-extraction from support vector
machines is presented. This approach utilizes the knowledge acquired
by the SVM and represented in its support vectors as well as the
parameters associated with them. The approach includes three stages;
training, propositional rule-extraction and rule quality evaluation.
Results from four different experiments have demonstrated the value
of the approach for extracting comprehensible rules of high accuracy
and fidelity.
Abstract: The main goal of this paper is to establish a
methodology for testing and optimizing GPRS performance over
Libya GSM network as well as to propose a suitable optimization
technique to improve performance. Some measurements of
download, upload, throughput, round-trip time, reliability, handover,
security enhancement and packet loss over a GPRS access network
were carried out. Measured values are compared to the theoretical
values that could be calculated beforehand. This data should be
processed and delivered by the server across the wireless network to
the client. The client on the fly takes those pieces of the data and
process immediately. Also, we illustrate the results by describing the
main parameters that affect the quality of service. Finally, Libya-s
two mobile operators, Libyana Mobile Phone and Al-Madar al-
Jadeed Company are selected as a case study to validate our
methodology.
Abstract: Characterized as rich mineral substances, low
temperature, few bacteria, and stability with numerous implementation
aspects on aquaculture, food, drinking, and leisure, the deep sea water
(DSW) development has become a new industry in the world. It has
been report that marine algae contain various biologically active
compounds. This research focued on the affections in cultivating
Sagrassum cristaefolium with different concentration of deep sea
water(DSW) and surface sea water(SSW). After two and four weeks,
the total phenolic contents were compared in Sagrassum cristaefolium
culturing with different ways, and the reductive activity of them was
also be tried with potassium ferricyanide. Those fresh seaweeds were
dried with oven and were ground to powder. Progressively, the marine
algae we cultured was extracted by water under the condition with
heating them at 90Ôäâ for 1hr.The total phenolic contents were be
executed using Folin–Ciocalteu method. The results were explaining
as follows: the highest total phenolic contents and the best reductive
ability of all could be observed on the 1/4 proportion of DSW to SSW
culturing in two weeks. Furthermore, the 1/2 proportion of DSW to
SSW also showed good reductive ability and plentiful phenolic
compositions. Finally, we confirmed that difference proportion of
DSW and SSW is the major point relating to ether the total phenolic
components or the reductive ability in the Sagrassum cristaefolium. In
the future, we will use this way to mass production the marine algae or
other micro algae on industry applications.
Abstract: Most paddy rice fields in East Asia are small parcels,
and the weather conditions during the growing season are usually
cloudy. FORMOSAT-2 multi-spectral images have an 8-meter
resolution and one-day recurrence, ideal for mapping paddy rice fields
in East Asia. To map rice fields, this study first determined the
transplanting and the most active tillering stages of paddy rice and
then used multi-temporal images to distinguish different growing
characteristics between paddy rice and other ground covers. The
unsupervised ISODATA (iterative self-organizing data analysis
techniques) and supervised maximum likelihood were both used to
discriminate paddy rice fields, with training areas automatically
derived from ten-year cultivation parcels in Taiwan. Besides original
bands in multi-spectral images, we also generated normalized
difference vegetation index and experimented with object-based
pre-classification and post-classification. This paper discusses results
of different image classification methods in an attempt to find a
precise and automatic solution to mapping paddy rice in Taiwan.
Abstract: Traffic density, an indicator of traffic
conditions, is one of the most critical characteristics to
Intelligent Transport Systems (ITS). This paper investigates
recursive traffic density estimation using the information
provided from inductive loop detectors. On the basis of the
phenomenological relationship between speed and density, the
existing studies incorporate a state space model and update the
density estimate using vehicular speed observations via the
extended Kalman filter, where an approximation is made
because of the linearization of the nonlinear observation
equation. In practice, this may lead to substantial estimation
errors. This paper incorporates a suitable transformation to
deal with the nonlinear observation equation so that the
approximation is avoided when using Kalman filter to
estimate the traffic density. A numerical study is conducted. It
is shown that the developed method outperforms the existing
methods for traffic density estimation.
Abstract: An electronic portal image device (EPID) has become
a method of patient-specific IMRT dose verification for radiotherapy.
Research studies have focused on pre and post-treatment verification,
however, there are currently no interventional procedures using EPID
dosimetry that measure the dose in real time as a mechanism to
ensure that overdoses do not occur and underdoses are detected as
soon as is practically possible. As a result, an EPID-based real time
dose verification system for dynamic IMRT was developed and was
implemented with MATLAB/Simulink. The EPID image acquisition
was set to continuous acquisition mode at 1.4 images per second. The
system defined the time constraint gap, or execution gap at the image
acquisition time, so that every calculation must be completed before
the next image capture is completed. In addition, the
Abstract: Developing a supply chain management (SCM) system is costly, but important. However, because of its complicated nature, not many of such projects are considered successful. Few research publications directly relate to key success factors (KSFs) for implementing a SCM system. Motivated by the above, this research proposes a hierarchy of KSFs for SCM system implementation in the semiconductor industry by using a two-step approach. First, the literature review indicates the initial hierarchy. The second step includes a focus group approach to finalize the proposed KSF hierarchy by extracting valuable experiences from executives and managers that actively participated in a project, which successfully establish a seamless SCM integration between the world's largest semiconductor foundry manufacturing company and the world's largest assembly and testing company. Future project executives may refer the resulting KSF hierarchy as a checklist for SCM system implementation in semiconductor or related industries.
Abstract: Approximate tandem repeats in a genomic sequence are
two or more contiguous, similar copies of a pattern of nucleotides.
They are used in DNA mapping, studying molecular evolution
mechanisms, forensic analysis and research in diagnosis of inherited
diseases. All their functions are still investigated and not well
defined, but increasing biological databases together with tools for
identification of these repeats may lead to discovery of their specific
role or correlation with particular features. This paper presents a new
approach for finding approximate tandem repeats in a given sequence,
where the similarity between consecutive repeats is measured using
the Hamming distance. It is an enhancement of a method for finding
exact tandem repeats in DNA sequences based on the Burrows-
Wheeler transform.
Abstract: This paper presented the technique of robot control by event-related potentials (ERPs) of brain waves. Based on the proposed technique, severe physical disabilities can free browse outside world. A specific component of ERPs, N2P3, was found and used to control the movement of robot and the view of camera on the designed brain-computer interface (BCI). Users only required watching the stimuli of attended button on the BCI, the evoked potentials of brain waves of the target button, N2P3, had the greatest amplitude among all control buttons. An experimental scene had been constructed that the robot required walking to a specific position and move the view of camera to see the instruction of the mission, and then completed the task. Twelve volunteers participated in this experiment, and experimental results showed that the correct rate of BCI control achieved 80% and the average of execution time was 353 seconds for completing the mission. Four main contributions included in this research: (1) find an efficient component of ERPs, N2P3, for BCI control, (2) embed robot's viewpoint image into user interface for robot control, (3) design an experimental scene and conduct the experiment, and (4) evaluate the performance of the proposed system for assessing the practicability.
Abstract: In this paper, we propose a novel adaptive
spatiotemporal filter that utilizes image sequences in order to remove
noise. The consecutive frames include: current, previous and next
noisy frames. The filter proposed in this paper is based upon the
weighted averaging pixels intensity and noise variance in image
sequences. It utilizes the Appropriate Number of Consecutive Frames
(ANCF) based on the noisy pixels intensity among the frames. The
number of consecutive frames is adaptively calculated for each
region in image and its value may change from one region to another
region depending on the pixels intensity within the region. The
weights are determined by a well-defined mathematical criterion,
which is adaptive to the feature of spatiotemporal pixels of the
consecutive frames. It is experimentally shown that the proposed
filter can preserve image structures and edges under motion while
suppressing noise, and thus can be effectively used in image
sequences filtering. In addition, the AWA filter using ANCF is
particularly well suited for filtering sequences that contain segments
with abruptly changing scene content due to, for example, rapid
zooming and changes in the view of the camera.
Abstract: Resistance of denial of service attacks is a key security requirement in voting protocols. Acquisti protocol plays an important role in development of internet voting protocols and claims its security without strong physical assumptions. In this study firstly Acquisti protocol is modeled in extended applied pi calculus, and then resistance of denial of service attacks is proved with ProVerif. The result is that it is not resistance of denial of service attacks because two denial of service attacks are found. Finally we give the method against the denial of service attacks.
Abstract: In this study, a robust intelligent backstepping tracking control (RIBTC) system combined with adaptive output recurrent cerebellar model articulation control (AORCMAC) and H∞ control technique is proposed for wheeled inverted pendulums (WIPs) real-time control with exact system dynamics unknown. Moreover, a robust H∞ controller is designed to attenuate the effect of the residual approximation errors and external disturbances with desired attenuation level. The experimental results indicate that the WIPs can stand upright stably when using the proposed RIBTC.
Abstract: In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS ÔèÑ T , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overlapping blocks and the two LSBs are set to zero. The object that is to be authenticated is also divided into 2×2 nonoverlapping blocks and each block-s intensity mean is computed followed by eight bit encoding. The generated watermark is then embedded into T channel randomly selected 2×2 block-s LSBs using 2D-Torus Automorphism. Selection of block size is paramount for exact localization and recovery of work. The proposed scheme is blind, efficient and secure with ability to detect and locate even minor tampering applied to the image with full recovery of original work. The quality of watermarked media is quite high both subjectively and objectively. The technique is suitable for class of images with format such as gif, tif or bitmap.
Abstract: A number of mass spectrometry applications are already available as web-based and windows-based systems to calculate isotope pattern and to display the mass spectrum based on the specific molecular formula besides providing necessary information. These applications were evaluated and compared with our new alternative application called Theoretical Isotope Generator (TIG) in terms of its functionality and features provided to prove this new application is working better and performing well. TIG provides extra features than others, complete with several functionality such as drawing, normalizing and zooming the generated graph that convey with the molecular information in a number of formats by providing the details of the calculation and molecules. Thus, any chemist, students, lecturers and researchers from anywhere could use TIG to gain related information on molecules and their relative intensity.
Abstract: We propose a novel prioritized limited
processor-sharing (PS) rule and a simulation algorithm for the performance evaluation of this rule. The performance measures of practical interest are evaluated using this algorithm. Suppose that there
are two classes and that an arriving (class-1 or class-2) request encounters n1 class-1 and n2 class-2 requests (including the arriving
one) in a single-server system. According to the proposed rule, class-1
requests individually and simultaneously receive m / (m * n1+ n2) of the service-facility capacity, whereas class-2 requests receive 1 / (m *n1 + n2) of it, if m * n1 + n2 ≤ C. Otherwise (m * n1 + n2 > C), the arriving request will be queued in the corresponding class waiting
room or rejected. Here, m (1) denotes the priority ratio, and C ( ∞), the service-facility capacity. In this rule, when a request arrives at [or
departs from] the system, the extension [shortening] of the remaining
sojourn time of each request receiving service can be calculated using
the number of requests of each class and the priority ratio. Employing
a simulation program to execute these events and calculations enables
us to analyze the performance of the proposed prioritized limited PS
rule, which is realistic in a time-sharing system (TSS) with a
sufficiently small time slot. Moreover, this simulation algorithm is
expanded for the evaluation of the prioritized limited PS system with
N 3 priority classes.
Abstract: Various mechanisms providing mutual exclusion and
thread synchronization can be used to support parallel processing
within a single computer. Instead of using locks, semaphores, barriers
or other traditional approaches in this paper we focus on alternative
ways for making better use of modern multithreaded architectures
and preparing hash tables for concurrent accesses. Hash structures
will be used to demonstrate and compare two entirely different
approaches (rule based cooperation and hardware synchronization
support) to an efficient parallel implementation using traditional
locks. Comparison includes implementation details, performance
ranking and scalability issues. We aim at understanding the effects
the parallelization schemes have on the execution environment with
special focus on the memory system and memory access
characteristics.
Abstract: A study of various turbulent inflow generation methods
was performed to compare their relative effectiveness for LES
computations of turbulent boundary layers. This study confirmed
the quality of the turbulent information produced by the family of
recycling and rescaling methods which take information from within
the computational domain. Furthermore, more general inflow methods
also proved applicable to such simulations, with a precursor-like
inflow and a random inflow augmented with forcing planes showing
promising results.
Abstract: The basis of this paper is the assumption, that graviton
is a measurable entity of molecular gravitational acceleration and this
is not a hypothetical entity. The adoption of this assumption as an
axiom is tantamount to fully opening the previously locked door to
the boundary theory between laminar and turbulent flows. It leads to
the theorem, that the division of flows of Newtonian (viscous) fluids
into laminar and turbulent is true only, if the fluid is influenced by a
powerful, external force field. The mathematical interpretation of this
theorem, presented in this paper shows, that the boundary between
laminar and turbulent flow can be determined theoretically. This is a
novelty, because thus far the said boundary was determined
empirically only and the reasons for its existence were unknown.
Abstract: Microorganisms isolated from water and soil of
Kazakhstan to identify potential high-effective producers of the
arachidonic acid, exhibiting a wide range of physiological activity
and having practical applications were screened. Based on the results
of two independent tests (the test on the sensitivity of the growth
processes of microorganisms to acetylsalicylic acid - an irreversible
inhibitor of PGH-synthase involved in the metabolism of arachidonic
acid and its derivatives, the test for inhibition of peroxidase activity
of membrane-bounding fraction of PGH - synthase by acetylsalicylic
acid) were selected microbial cultures which are potential highproducer
of arachidonic acid. They are characterized by a stable
strong growth in the laboratory conditions. Identification of
microorganism cultures based on morphological, physiological,
biochemical and molecular genetic characteristics was performed.
Abstract: The aim of this study was to synthesize the single
walled carbon nanotubes (SWCNTs) and determine their hydrogen
storage capacities. SWCNTs were firstly synthesized by chemical
vapor deposition (CVD) of acetylene (C2H2) on a magnesium oxide
(MgO) powder impregnated with an iron nitrate (Fe(NO3)3·9H2O)
solution. The synthesis parameters were selected as: the synthesis
temperature of 800°C, the iron content in the precursor of 5% and the
synthesis time of 30 min. Purification process of SWCNTs was
fulfilled by microwave digestion at three different temperatures (120,
150 and 200 °C), three different acid concentrations (0.5, 1 and 1.5
M) and for three different time intervals (15, 30 and 60 min). Nitric
acid (HNO3) was used in the removal of the metal catalysts. The
hydrogen storage capacities of the purified materials were measured
using volumetric method at the liquid nitrogen temperature and gas
pressure up to 100 bar. The effects of the purification conditions such
as temperature, time and acid concentration on hydrogen adsorption
were investigated.