Abstract: Composite nanostructures of metal
core/semiconductor shell (Au/CdS) configuration were prepared
using organometalic method. UV-Vis spectra for the Au/CdS colloids
show initially two well separated bands, corresponding to surface
plasmon of the Au core, and the exciton of CdS shell. The absorption
of CdS shell is enhanced, while the Au plasmon band is suppressed
as the shell thickness increases. The shell sizes were estimated from
the optical spectra using the effective mass approximation model
(EMA), and compared to the sizes of the Au core and CdS shell
measured by high resolution transmission electron microscope
(HRTEM). The changes in the absorption features are discussed in
terms of gradual increase in the coupling strength of the Au core
surface plasmon and the exciton in the CdS. leading to charge
transfer and modification of electron oscillation in Au core.
Abstract: Text categorization - the assignment of natural language documents to one or more predefined categories based on their semantic content - is an important component in many information organization and management tasks. Performance of neural networks learning is known to be sensitive to the initial weights and architecture. This paper discusses the use multilayer neural network initialization with decision tree classifier for improving text categorization accuracy. An adaptation of the algorithm is proposed in which a decision tree from root node until a final leave is used for initialization of multilayer neural network. The experimental evaluation demonstrates this approach provides better classification accuracy with Reuters-21578 corpus, one of the standard benchmarks for text categorization tasks. We present results comparing the accuracy of this approach with multilayer neural network initialized with traditional random method and decision tree classifiers.
Abstract: Face authentication for access control is a face
membership authentication which passes the person of the incoming
face if he turns out to be one of an enrolled person based on face
recognition or rejects if not. Face membership authentication belongs
to the two class classification problem where SVM(Support Vector
Machine) has been successfully applied and shows better performance
compared to the conventional threshold-based classification. However,
most of previous SVMs have been trained using image feature vectors
extracted from face images of each class member(enrolled
class/unenrolled class) so that they are not robust to variations in
illuminations, poses, and facial expressions and much affected by
changes in member configuration of the enrolled class
In this paper, we propose an effective face membership
authentication method based on SVM using class discriminating
features which represent an incoming face image-s associability with
each class distinctively. These class discriminating features are weakly
related with image features so that they are less affected by variations
in illuminations, poses and facial expression.
Through experiments, it is shown that the proposed face
membership authentication method performs better than the threshold
rule-based or the conventional SVM-based authentication methods and
is relatively less affected by changes in member size and membership.
Abstract: Gluconic acid is one of interesting chemical products
in industries such as detergents, leather, photographic, textile, and
especially in food and pharmaceutical industries. Fermentation is an
advantageous process to produce gluconic acid. Mathematical
modeling is important in the design and operation of fermentation
process. In fact, kinetic data must be available for modeling. The
kinetic parameters of gluconic acid production by Aspergillus niger
in batch culture was studied in this research at initial substrate
concentration of 150, 200 and 250 g/l. The kinetic models used were
logistic equation for growth, Luedeking-Piret equation for gluconic
acid formation, and Luedeking-Piret-like equation for glucose
consumption. The Kinetic parameters in the model were obtained by
minimizing non linear least squares curve fitting.
Abstract: The use of solar control film on windows as one of
solar passive strategies for building have becoming important and is
gaining recognition. Malaysia located close to equator is having
warm humid climate with long sunshine hours and abundant solar
radiation throughout the year. Hence, befitting solar control on
windows is absolutely necessary to capture the daylight whilst
moderating thermal impact and eliminating glare problems. This is
one of the energy efficient strategies to achieve thermal and visual
comfort in buildings. Therefore, this study was carried out to
investigate the effect of window solar controls on thermal and visual
performance of naturally ventilated buildings. This was conducted via
field data monitoring using a test building facility. Four types of
window glazing systems were used with three types of solar control
films. Data were analysed for thermal and visual impact with
reference to thermal and optical characteristics of the films. Results
show that for each glazing system, the surface temperature of
windows are influenced by the Solar Energy Absorption property, the
indoor air temperature are influenced by the Solar Energy
Transmittance and Solar Energy Reflectance, and the daylighting by
Visible Light Transmission and Shading Coefficient. Further
investigations are underway to determine the mathematical relation
between thermal energy and visual performance with the thermal and
optical characteristics of solar control films.
Abstract: A fault detection and identification (FDI) technique is
presented to create a fault tolerant control system (FTC). The fault
detection is achieved by monitoring the position of the light source
using an array of light sensors. When a decision is made about the
presence of a fault an identification process is initiated to locate the
faulty component and reconfigure the controller signals. The signals
provided by the sensors are predictable; therefore the existence of a
fault is easily identified. Identification of the faulty sensor is based on
the dynamics of the frame. The technique is not restricted to a
particular type of controllers and the results show consistency.
Abstract: In this paper, a novel method for a biometric system based on the ECG signal is proposed, using spectral coefficients computed through linear predictive coding (LPC). ECG biometric systems have traditionally incorporated characteristics of fiducial points of the ECG signal as the feature set. These systems have been shown to contain loopholes and thus a non-fiducial system allows for tighter security. In the proposed system, incorporating non-fiducial features from the LPC spectrum produced a segment and subject recognition rate of 99.52% and 100% respectively. The recognition rates outperformed the biometric system that is based on the wavelet packet decomposition (WPD) algorithm in terms of recognition rates and computation time. This allows for LPC to be used in a practical ECG biometric system that requires fast, stringent and accurate recognition.
Abstract: In this paper, a two-dimensional mathematical model is developed for estimating the extent of inland inundation due to Indonesian tsunami of 2004 along the coastal belts of Peninsular Malaysia and Thailand. The model consists of the shallow water equations together with open and coastal boundary conditions. In order to route the water wave towards the land, the coastal boundary is treated as a time dependent moving boundary. For computation of tsunami inundation, the initial tsunami wave is generated in the deep ocean with the strength of the Indonesian tsunami of 2004. Several numerical experiments are carried out by changing the slope of the beach to examine the extent of inundation with slope. The simulated inundation is found to decrease with the increase of the slope of the orography. Correlation between inundation / recession and run-up are found to be directly proportional to each other.
Abstract: Let T and S be a subspace of Cn and Cm, respectively.
Then for A ∈ Cm×n satisfied AT ⊕ S = Cm, the generalized
inverse A(2)
T,S is given by A(2)
T,S = (PS⊥APT )†. In this paper, a
finite formulae is presented to compute generalized inverse A(2)
T,S
under the concept of restricted inner product, which defined as <
A,B >T,S=< PS⊥APT,B > for the A,B ∈ Cm×n. By this
iterative method, when taken the initial matrix X0 = PTA∗PS⊥, the
generalized inverse A(2)
T,S can be obtained within at most mn iteration
steps in absence of roundoff errors. Finally given numerical example
is shown that the iterative formulae is quite efficient.
Abstract: One of the common problems encountered in software
engineering is addressing and responding to the changing nature of
requirements. While several approaches have been devised to address
this issue, ranging from instilling resistance to changing requirements
in order to mitigate impact to project schedules, to developing an
agile mindset towards requirements, the approach discussed in this
paper is one of conceptualizing the delta in requirement and
modeling it, in order to plan a response to it. To provide some
context here, change is first formally identified and categorized as
either formal change or informal change. While agile methodology
facilitates informal change, the approach discussed in this paper
seeks to develop the idea of facilitating formal change. To collect,
document meta-requirements that represent the phenomena of change
would be a pro-active measure towards building a realistic cognition
of the requirements entity that can further be harnessed in the
software engineering process.
Abstract: The identification and classification of weeds are of
major technical and economical importance in the agricultural
industry. To automate these activities, like in shape, color and
texture, weed control system is feasible. The goal of this paper is to
build a real-time, machine vision weed control system that can detect
weed locations. In order to accomplish this objective, a real-time
robotic system is developed to identify and locate outdoor plants
using machine vision technology and pattern recognition. The
algorithm is developed to classify images into broad and narrow class
for real-time selective herbicide application. The developed
algorithm has been tested on weeds at various locations, which have
shown that the algorithm to be very effectiveness in weed
identification. Further the results show a very reliable performance
on weeds under varying field conditions. The analysis of the results
shows over 90 percent classification accuracy over 140 sample
images (broad and narrow) with 70 samples from each category of
weeds.
Abstract: Fatigue life prediction and evaluation are the key
technologies to assure the safety and reliability of automotive rubber
components. The objective of this study is to develop the fatigue
analysis process for vulcanized rubber components, which is
applicable to predict fatigue life at initial product design step. Fatigue
life prediction methodology of vulcanized natural rubber was
proposed by incorporating the finite element analysis and fatigue
damage parameter of maximum strain appearing at the critical location
determined from fatigue test. In order to develop an appropriate
fatigue damage parameter of the rubber material, a series of
displacement controlled fatigue test was conducted using threedimensional
dumbbell specimen with different levels of mean
displacement. It was shown that the maximum strain was a proper
damage parameter, taking the mean displacement effects into account.
Nonlinear finite element analyses of three-dimensional dumbbell
specimens were performed based on a hyper-elastic material model
determined from the uni-axial tension, equi-biaxial tension and planar
test. Fatigue analysis procedure employed in this study could be used
approximately for the fatigue design.
Abstract: Distributed denial-of-service (DDoS) attacks pose a
serious threat to network security. There have been a lot of
methodologies and tools devised to detect DDoS attacks and reduce
the damage they cause. Still, most of the methods cannot
simultaneously achieve (1) efficient detection with a small number of
false alarms and (2) real-time transfer of packets. Here, we introduce
a method for proactive detection of DDoS attacks, by classifying the
network status, to be utilized in the detection stage of the proposed
anti-DDoS framework. Initially, we analyse the DDoS architecture
and obtain details of its phases. Then, we investigate the procedures
of DDoS attacks and select variables based on these features. Finally,
we apply the k-nearest neighbour (k-NN) method to classify the
network status into each phase of DDoS attack. The simulation result
showed that each phase of the attack scenario is classified well and
we could detect DDoS attack in the early stage.
Abstract: The Navier–Stokes equations for unsteady, incompressible, viscous fluids in the axisymmetric coordinate system are solved using a control volume method. The volume-of-fluid (VOF) technique is used to track the free-surface of the liquid. Model predictions are in good agreement with experimental measurements. It is found that the dynamic processes after impact are sensitive to the initial droplet velocity and the liquid pool depth. The time evolution of the crown height and diameter are obtained by numerical simulation. The critical We number for splashing (Wecr) is studied for Oh (Ohnesorge) numbers in the range of 0.01~0.1; the results compares well with those of the experiments.
Abstract: The incorporation of computational fluid dynamics in the design of modern hydraulic turbines appears to be necessary in order to improve their efficiency and cost-effectiveness beyond the traditional design practices. A numerical optimization methodology is developed and applied in the present work to a Turgo water turbine. The fluid is simulated by a Lagrangian mesh-free approach that can provide detailed information on the energy transfer and enhance the understanding of the complex, unsteady flow field, at very small computing cost. The runner blades are initially shaped according to hydrodynamics theory, and parameterized using Bezier polynomials and interpolation techniques. The use of a limited number of free design variables allows for various modifications of the standard blade shape, while stochastic optimization using evolutionary algorithms is implemented to find the best blade that maximizes the attainable hydraulic efficiency of the runner. The obtained optimal runner design achieves considerably higher efficiency than the standard one, and its numerically predicted performance is comparable to a real Turgo turbine, verifying the reliability and the prospects of the new methodology.
Abstract: In this paper we present simulation results for the
application of a bandwidth efficient algorithm (mapping algorithm)
to an image transmission system. This system considers three
different real valued transforms to generate energy compact
coefficients. First results are presented for gray scale and color image
transmission in the absence of noise. It is seen that the system
performs its best when discrete cosine transform is used. Also the
performance of the system is dominated more by the size of the
transform block rather than the number of coefficients transmitted or
the number of bits used to represent each coefficient. Similar results
are obtained in the presence of additive white Gaussian noise. The
varying values of the bit error rate have very little or no impact on
the performance of the algorithm. Optimum results are obtained for
the system considering 8x8 transform block and by transmitting 15
coefficients from each block using 8 bits.
Abstract: ZnO nanocrystals with mean diameter size 14 nm
have been prepared by precipitation method, and examined as
photocatalyst for the UV-induced degradation of insecticide diazinon
as deputy of organic pollutant in aqueous solution. The effects of
various parameters, such as illumination time, the amount of
photocatalyst, initial pH values and initial concentration of
insecticide on the photocatalytic degradation diazinon were
investigated to find desired conditions. In this case, the desired
parameters were also tested for the treatment of real water containing
the insecticide. Photodegradation efficiency of diazinon was
compared between commercial and prepared ZnO nanocrystals. The
results indicated that UV/ZnO process applying prepared
nanocrystalline ZnO offered electrical energy efficiency and
quantum yield better than commercial ZnO. The present study, on the
base of Langmuir-Hinshelwood mechanism, illustrated a pseudo
first-order kinetic model with rate constant of surface reaction equal
to 0.209 mg l-1 min-1 and adsorption equilibrium constant of 0.124 l
mg-1.
Abstract: Automatic segmentation of skin lesions is the first step
towards the automated analysis of malignant melanoma. Although
numerous segmentation methods have been developed, few studies
have focused on determining the most effective color space for
melanoma application. This paper proposes an automatic segmentation
algorithm based on color space analysis and clustering-based histogram
thresholding, a process which is able to determine the optimal
color channel for detecting the borders in dermoscopy images. The
algorithm is tested on a set of 30 high resolution dermoscopy images.
A comprehensive evaluation of the results is provided, where borders
manually drawn by four dermatologists, are compared to automated
borders detected by the proposed algorithm, applying three previously
used metrics of accuracy, sensitivity, and specificity and a new metric
of similarity. By performing ROC analysis and ranking the metrics,
it is demonstrated that the best results are obtained with the X and
XoYoR color channels, resulting in an accuracy of approximately
97%. The proposed method is also compared with two state-of-theart
skin lesion segmentation methods.
Abstract: The Knowledge Management (KM) Criteria is an
essential foundation to evaluate KM outcomes. Different sets of
criteria were developed and tailored by many researchers to
determine the results of KM initiatives. However, literature review
has emphasized on incomplete set of criteria for evaluating KM
outcomes. Hence, this paper tried to address the problem of
determining the criteria for measuring knowledge management
outcomes among different types of Malaysian organizations.
Successively, this paper was assumed to develop widely accepted
criteria to measure success of knowledge management efforts for
Malaysian organizations. Our analysis approach was based on the
ANOVA procedure to compare a set of criteria among different types
of organizations. This set of criteria was exploited from literature
review. It is hoped that this study provides a better picture for
different types of Malaysian organizations to establish a
comprehensive set of criteria due to measure results of KM programs.
Abstract: In this paper two mathematical models for definition of gas accidental escape localization in the gas pipelines are suggested. The first model was created for leak localization in the horizontal branched pipeline and second one for leak detection in inclined section of the main gas pipeline. The algorithm of leak localization in the branched pipeline did not demand on knowledge of corresponding initial hydraulic parameters at entrance and ending points of each sections of pipeline. For detection of the damaged section and then leak localization in this section special functions and equations have been constructed. Some results of calculations for compound pipelines having two, four and five sections are presented. Also a method and formula for the leak localization in the simple inclined section of the main gas pipeline are suggested. Some results of numerical calculations defining localization of gas escape for the inclined pipeline are presented.