Abstract: One of the major developments in machine learning in the past decade is the ensemble method, which finds highly accurate classifier by combining many moderately accurate component classifiers. In this research work, new ensemble classification methods are proposed with homogeneous ensemble classifier using bagging and heterogeneous ensemble classifier using arcing and their performances are analyzed in terms of accuracy. A Classifier ensemble is designed using Radial Basis Function (RBF) and Support Vector Machine (SVM) as base classifiers. The feasibility and the benefits of the proposed approaches are demonstrated by the means of standard datasets of intrusion detection. The main originality of the proposed approach is based on three main parts: preprocessing phase, classification phase, and combining phase. A wide range of comparative experiments is conducted for standard datasets of intrusion detection. The performance of the proposed homogeneous and heterogeneous ensemble classifiers are compared to the performance of other standard homogeneous and heterogeneous ensemble methods. The standard homogeneous ensemble methods include Error correcting output codes, Dagging and heterogeneous ensemble methods include majority voting, stacking. The proposed ensemble methods provide significant improvement of accuracy compared to individual classifiers and the proposed bagged RBF and SVM performs significantly better than ECOC and Dagging and the proposed hybrid RBF-SVM performs significantly better than voting and stacking. Also heterogeneous models exhibit better results than homogeneous models for standard datasets of intrusion detection.
Abstract: Negative pressures of liquids have been expected to contribute many kinds of technology. Nevertheless, experiments for subjecting liquids which have not too small volumes to negative pressures are difficult even now. The reason of the difficulties is because the liquids tend to generate cavities easily. In order to remove cavitation nuclei, an apparatus for enclosing water into a metal Berthelot tube under vacuum conditions was developed. By using the apparatus, negative pressures for water rose to ca. -20 MPa. This is the highest value for water in metal Berthelot tubes. Results were explained by a traditional crevice model. Keywords
Abstract: Today, insurers may use the yield curve as an indicator
evaluation of the profit or the performance of their portfolios;
therefore, they modeled it by one class of model that has the ability
to fit and forecast the future term structure of interest rates. This class
of model is the Nelson-Siegel-Svensson model. Unfortunately, many
authors have reported a lot of difficulties when they want to calibrate
the model because the optimization problem is not convex and has
multiple local optima. In this context, we implement a hybrid Particle
Swarm optimization and Nelder Mead algorithm in order to minimize
by least squares method, the difference between the zero-coupon
curve and the NSS curve.
Abstract: This paper presents the trajectory tracking control of a
spatial redundant hybrid manipulator. This manipulator consists of
two parallel manipulators which are a variable geometry truss (VGT)
module. In fact, each VGT module with 3-degress of freedom (DOF)
is a planar parallel manipulator and their operational planes of these
VGT modules are arranged to be orthogonal to each other. Also, the
manipulator contains a twist motion part attached to the top of the
second VGT module to supply the missing orientation of the endeffector.
These three modules constitute totally 7-DOF hybrid
(parallel-parallel) redundant spatial manipulator. The forward
kinematics equations of this manipulator are obtained, then,
according to these equations, the inverse kinematics is solved based
on an optimization with the joint limit avoidance. The dynamic
equations are formed by using virtual work method. In order to test
the performance of the redundant manipulator and the controllers
presented, two different desired trajectories are followed by using the
computed force control method and a switching control method. The
switching control method is combined with the computed force
control method and genetic algorithm. In the switching control
method, the genetic algorithm is only used for fine tuning in the
compensation of the trajectory tracking errors.
Abstract: Introduction: Craniopharyngiomas (CPs) are rare epithelial tumors located mainly in the sellar/parasellar region. CPs have been classified histopathologically, genetically, clinically and prognostically into two distinctive subtypes: adamantinomatous and papillary variants. Aim: To examine the pattern of expression of both the β-catenin and epidermal growth factor receptor (EGFR) in surgically resected samples of adamantinomatous CP, and to asses for the possibility of using anti-EGFR in the management of ACP patients. Materials and methods: β-catenin and EGFR immunostaining was performed on paraffin-embedded tissue sections of 18 ACP cases. Result: 17 out of 18 cases (94%) of ACP exhibited strong nuclear/cytoplasmic expression of β-catenin, 15 (83%) of APC cases were positive for EGFR. Conclusion: Nuclear accumulation of β-catenin is a diagnostic hallmark of ACP. EGFR positivity in most cases of ACP could qualify the use of anti-EGFR therapy.
Abstract: Connected vehicles are equipped with wireless sensors
that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure
(V2I) communication. These vehicles will in the near future
provide road safety, improve transport efficiency, and reduce traffic
congestion. One of the challenges for connected vehicles is how
to ensure that information sent across the network is secure. If
security of the network is not guaranteed, several attacks can occur,
thereby compromising the robustness, reliability, and efficiency of
the network. This paper discusses existing security mechanisms and
unique properties of connected vehicles. The methodology employed
in this work is exploratory. The paper reviews existing security
solutions for connected vehicles. More concretely, it discusses
various cryptographic mechanisms available, and suggests areas
of improvement. The study proposes a combination of symmetric
key encryption and public key cryptography to improve security.
The study further proposes message aggregation as a technique to
overcome message redundancy. This paper offers a comprehensive
overview of connected vehicles technology, its applications, its
security mechanisms, open challenges, and potential areas of future
research.
Abstract: The technological paradigm of the disaster
management field, especially in the case of governmental
intervention strategies, is generally based on rapid and flexible
accommodation solutions. From various technical solution patterns
used to address the immediate housing needs of disaster victims, the
adaptive re-use of existing buildings can be considered to be both
low-cost and practical. However, there is a scarcity of analytical
methods to screen, select and adapt buildings to help decision makers
in cases of emergency. Following an extensive literature review, this
paper aims to highlight key points and problem areas associated with
the adaptive re-use of buildings within the disaster management
context. In other disciplines such as real estate management, the
adaptive re-use potential (ARP) of existing buildings is typically
based on the prioritization of a set of technical and non-technical
criteria which are then weighted to arrive at an economically viable
investment decision. After a disaster, however, the assessment of the
ARP of buildings requires consideration of different/additional layers
of analysis which stem from general disaster management principles
and the peculiarities of different types of disasters, as well as of their
victims. In this paper, a discussion of the development of an adaptive
re-use potential (ARP) assessment model is presented. It is thought
that governmental and non-governmental decision makers who are
required to take quick decisions to accommodate displaced masses
following disasters are likely to benefit from the implementation of
such a model.
Abstract: Classification is an important data mining technique
and could be used as data filtering in artificial intelligence. The
broad application of classification for all kind of data leads to be
used in nearly every field of our modern life. Classification helps us
to put together different items according to the feature items decided
as interesting and useful. In this paper, we compare two
classification methods Naïve Bayes and ADTree use to detect spam
e-mail. This choice is motivated by the fact that Naive Bayes
algorithm is based on probability calculus while ADTree algorithm is
based on decision tree. The parameter settings of the above
classifiers use the maximization of true positive rate and
minimization of false positive rate. The experiment results present
classification accuracy and cost analysis in view of optimal classifier
choice for Spam Detection. It is point out the number of attributes to
obtain a tradeoff between number of them and the classification
accuracy.
Abstract: There is an increasing demand for developing urban
land to provide better living conditions for all citizens in Afghanistan.
Most of the development will involve the acquisition of land. And the
current land acquisition method practiced by central government is
expropriation, which is a cash-based transaction method that imposes
heavy fiscal burden on local municipalities and central government,
and it does not protect ownership rights and social equity of
landowners besides it relocates the urban poor to remote areas with
limited access to jobs and public services. The questionnaire analysis,
backed by observations of different case studies in countries where
land readjustment is used as a collaborative land development tool
indicates that the method plays a key role in valuing landowners’
rights, giving other community members and stakeholders the
opportunity to collaboratively implement urban development
projects. The practice of the method is reducing the heavy fiscal
burden on the local and central governments and is a better option to
deal with the current development challenges in Afghanistan.
Abstract: The development of numerical analysis and its
application to geomechanics problems have provided geotechnical
engineers with extremely powerful tools. One of the most important
problems in geotechnical engineering is the slope stability
assessment. It is a very difficult task due to several aspects such the
nature of the problem, experimental consideration, monitoring,
controlling, and assessment. The main objective of this paper is to
perform a comparative numerical study between the following
methods: The Limit Equilibrium (LEM), Finite Element (FEM),
Limit Analysis (LAM) and Distinct Element (DEM). The comparison
is conducted in terms of the safety factors and the critical slip
surfaces. Through the results, we see the feasibility to analyse slope
stability by many methods.
Abstract: The idea of cropping-system is a method used by
farmers. It is an environmentally-friendly method, protecting the
natural resources (soil, water, air, nutritive substances) and increase
the production at the same time, taking into account some crop
particularities. The combination of this powerful method with the
concepts of genetic algorithms results into a possibility of generating
sequences of crops in order to form a rotation. The usage of this type
of algorithms has been efficient in solving problems related to
optimization and their polynomial complexity allows them to be used
at solving more difficult and various problems. In our case, the
optimization consists in finding the most profitable rotation of
cultures. One of the expected results is to optimize the usage of the
resources, in order to minimize the costs and maximize the profit. In
order to achieve these goals, a genetic algorithm was designed. This
algorithm ensures the finding of several optimized solutions of
cropping-systems possibilities which have the highest profit and,
thus, which minimize the costs. The algorithm uses genetic-based
methods (mutation, crossover) and structures (genes, chromosomes).
A cropping-system possibility will be considered a chromosome and
a crop within the rotation is a gene within a chromosome. Results
about the efficiency of this method will be presented in a special
section. The implementation of this method would bring benefits into
the activity of the farmers by giving them hints and helping them to
use the resources efficiently.
Abstract: The aim of the paper is to investigate the effect of
corporate social responsibility (CSR) CSR on the National
Commercial Bank (NCB) in Saudi Arabia. In order to achieve this, a
case study was made of the CSR activities of this bank from the
perspective of its branch managers. The NCB was chosen as it was
one of the first Saudi banks to engage in CSR and currently has a
wide range of CSR initiatives. A qualitative research method was
used. Open-ended questionnaires were administered to eighty branch
managers of the NCB, with fifty-five usable questionnaires returned
and twenty managers were interviewed as part of the primary
research. Data from both questionnaires and interviews were
analysed using qualitative content analysis. Six themes emerged from
the questionnaire findings were used to develop the interview
questions. These themes are the following: Awareness of employees
about CSR in the NCB; CSR activities as a type of investment;
Government and media support; Increased employee loyalty in the
NCB; Prestige and profit to the NCB; and View of CSR in Islam.
This paper makes a theoretical contribution in that it investigates and
increases understanding of the effect of CSR on the NCB in Saudi
Arabia. In addition, it makes a practical contribution by making
recommendations which can support the development of CSR in the
NCB. A limitation of the paper is that it is a case study of only one
bank. It is therefore recommended that future research could be
conducted with other banks in Saudi Arabia, or indeed, with a range
of other types of firm within the financial services area in Saudi
Arabia. In this way, the same issues could be explored but with a
greater potential generalisability of findings of CSR within the Saudi
Arabian financial services industry. In addition, this paper takes a
qualitative approach and it is suggested that future research be carried
out using mixed methods, which could provide a greater depth of
analysis.
Abstract: This study presents an inverse analysis for predicting the thermal conductivities and the heat flux of a high-temperature metallurgical reactor simultaneously. Once these thermal parameters are predicted, the time-varying thickness of the protective phase-change bank that covers the inside surface of the brick walls of a metallurgical reactor can be calculated. The enthalpy method is used to solve the melting/solidification process of the protective bank. The inverse model rests on the Levenberg-Marquardt Method (LMM) combined with the Broyden method (BM). A statistical analysis for the thermal parameter estimation is carried out. The effect of the position of the temperature sensors, total number of measurements and measurement noise on the accuracy of inverse predictions is investigated. Recommendations are made concerning the location of temperature sensors.
Abstract: This paper empirically investigates the relationship between Sabah state core tourism products and its destination image. Through a descriptive design using a quantitative method with a self-reported and self-administered questionnaire, this research surveyed the individual international tourists who had visited Sabah and experienced the state’s core tourism products. The research findings clearly indicate that Sabah, one of the states in Malaysia has a lot of valuable resources in the eyes of the international tourists. Interestingly, it was found that Sabah’s core tourism products namely unique marine resources, various nature attractions and cultural diversities have undoubtedly contributed to the state’s tourism image. Good feedbacks and the promising insights from the international tourists’ point of view offer varying consequences, repercussion, and implication to the state government and the relevant authorities. Collaboration and cooperation between all responsible authorities are therefore crucial in strengthening the “total tourism experience” among the international tourists in this state.
Abstract: With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.
Abstract: In this paper, x-ray impact of Taguchi method and design of experiment philosophy to project relationship between various factors leading to output yield strength of rebar is studied. In bar mill of an integrated steel plant, there are two production lines called as line 1 and line 2. The metallic properties e.g. yield strength of finished product of the same material is varying for a particular grade material when rolled simultaneously in both the lines. A study has been carried out to set the process parameters at optimal level for obtaining equal value of yield strength simultaneously for both lines.
Abstract: In connected vehicle systems where wireless communication is available among the involved vehicles and intersection controllers, it is possible to design an intersection coordination strategy that leads the connected and automated vehicles (CAVs) travel through the road intersections without the conventional traffic light control. In this paper, we present a distributed coordination strategy for the CAVs at multiple interconnected intersections that aims at improving system fuel efficiency and system mobility. We present a distributed control solution where in the higher level, the intersection controllers calculate the road desired average velocity and optimally assign reference velocities of each vehicle. In the lower level, every vehicle is considered to use model predictive control (MPC) to track their reference velocity obtained from the higher level controller. The proposed method has been implemented on a simulation-based case with two-interconnected intersection network. Additionally, the effects of mixed vehicle types on the coordination strategy has been explored. Simulation results indicate the improvement on vehicle fuel efficiency and traffic mobility of the proposed method.
Abstract: The goal of this work is to develop sustainable and durable ceramic cellular structures using widely available natural resources- clay and milled waste glass. Present paper describes method of obtaining clay ceramic foam (CCF) with addition of milled waste glass in 5, 7 and 10 wt% by direct foaming with high speed mixer-disperser (HSMD). For more efficient clay and waste glass milling and mixing, the high velocity disintegrator was used. The CCF with 5, 7, and 10 wt% were obtained at 900, 950, 1000 and 1050 °C firing temperature and they have demonstrated mechanical compressive strength for all 12 samples ranging from 3.8 to 14.3 MPa and porosity 76-65%. Obtained CCF has compressive strength 14.3 MPa and porosity 65.3%.
Abstract: Wireless Sensor Network (WSN) clustering architecture enables features like network scalability, communication overhead reduction, and fault tolerance. After clustering, aggregated data is transferred to data sink and reducing unnecessary, redundant data transfer. It reduces nodes transmitting, and so saves energy consumption. Also, it allows scalability for many nodes, reduces communication overhead, and allows efficient use of WSN resources. Clustering based routing methods manage network energy consumption efficiently. Building spanning trees for data collection rooted at a sink node is a fundamental data aggregation method in sensor networks. The problem of determining Cluster Head (CH) optimal number is an NP-Hard problem. In this paper, we combine cluster based routing features for cluster formation and CH selection and use Minimum Spanning Tree (MST) for intra-cluster communication. The proposed method is based on optimizing MST using Simulated Annealing (SA). In this work, normalized values of mobility, delay, and remaining energy are considered for finding optimal MST. Simulation results demonstrate the effectiveness of the proposed method in improving the packet delivery ratio and reducing the end to end delay.
Abstract: This paper deals with the accelerated life cycle test method of the motor for home appliances that demand high reliability. Life Cycle of parts in home appliances also should be 10 years because life cycle of the home appliances such as washing machine, refrigerator, TV is at least 10 years. In case of washing machine, the life cycle test method of motor is advanced for 3000 cycle test (1cycle = 2hours). However, 3000 cycle test incurs loss for the time and cost. Objectives of this study are to reduce the life cycle test time and the number of test samples, which could be realized by using acceleration factor for the test time and reduction factor for the number of sample.