Abstract: Periventricular Leukomalacia (PVL) is a White Matter
Injury (WMI) of preterm neonatal brain. Objectives of the study were
to assess the neuro-developmental outcome at one year of age and to
determine a good protocol of cranial ultrasonography to detect PVL.
Two hundred and sixty four preterm neonates were included in the
study. Series of cranial ultrasound scans were done by using a
dedicated neonatal head probe 4-10 MHz of Logic e portable
ultrasound scanner. Clinical history of seizures, abnormal head
growth (hydrocephalus or microcephaly) and developmental
milestones were assessed and neurological examinations were done
until one year of age. Among live neonates, 57% who had cystic PVL
(Grades 2 and 3) manifested as cerebral palsy. In conclusion cystic
PVL has permanent neurological disabilities like cerebral palsy.
Good protocol of real time cranial ultrasonography to detect PVL is
to perform scans at least once a week until one month and at term (40
weeks of gestation).
Abstract: In this work, neural networks methods MLP type were
applied to a database from an array of six sensors for the detection of
three toxic gases. The choice of the number of hidden layers and the
weight values are influential on the convergence of the learning
algorithm. We proposed, in this article, a mathematical formula to
determine the optimal number of hidden layers and good weight
values based on the method of back propagation of errors. The results
of this modeling have improved discrimination of these gases and
optimized the computation time. The model presented here has
proven to be an effective application for the fast identification of
toxic gases.
Abstract: Container handling problems at container terminals
are NP-hard problems. This paper presents an approach using
discrete-event simulation modeling to optimize solution for storage
space allocation problem, taking into account all various interrelated
container terminal handling activities. The proposed approach is
applied on a real case study data of container terminal at Alexandria
port. The computational results show the effectiveness of the
proposed model for optimization of storage space allocation in
container terminal where 54% reduction in containers handling time
in port is achieved.
Abstract: In recent years, the compression of date (Phoenix
dactylifera L.) fruit powders (DP) to obtain date tablets (DT) has
been suggested as a promising form of valorization of non
commercial valuable date fruit (DF) varieties. To further improve
and characterize DT, the present study aims to investigate the
influence of the DP particle size and compression force on some
physical properties of DT. The results show that independently of
particle size, the hardness (y) of tablets increases with the increase of
the compression force (x) following a logarithmic law (y = a ln (bx)
where a and b are the constants of model). Further, a full factorial
design (FFD) at two levels, applied to investigate the erosion %,
reveals that the effects of time and particle size are the same in
absolute value and they are beyond the effect of the compression.
Regarding the disintegration time, the obtained results also by means
of a FFD show that the effect of the compression force exceeds 4
times that of the DP particle size. As final stage, the color parameters
in the CIELab system of DT immediately after their obtaining are
differently influenced by the size of the initial powder.
Abstract: E-learning has become an efficient and widespread
means of education at all levels of human activities. Statistics is no
exception. Unfortunately the main focus in statistics teaching is
usually paid to the substitution in formulas. Suitable websites can
simplify and automate calculations and provide more attention and
time to the basic principles of statistics, mathematization of real-life
situations and following interpretation of results. We now introduce
our own web-site for hypothesis testing. Its didactic aspects, the
technical possibilities of the individual tools, the experience of use
and the advantages or disadvantages are discussed in this paper. This
web-site is not a substitute for common statistical software but should
significantly improve the teaching of statistics at universities.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: Medulloblastoma (MB) is one of the most prevalent
brain tumours among paediatrics. Although its management has
evolved over time still there is need to find new therapeutic targets
for MB that can result in less normal tissue toxicity while improving
survival and reducing recurrence. This literature review is aimed at
finding new potential therapeutic targets for MB focusing on viruses
that can be used as potential targets for MB. The review also gives an
over-view of management of paediatric Medulloblastoma focusing on
Radiotherapy management.
Abstract: Real time image and video processing is a demand in
many computer vision applications, e.g. video surveillance, traffic
management and medical imaging. The processing of those video
applications requires high computational power. Thus, the optimal
solution is the collaboration of CPU and hardware accelerators. In
this paper, a Canny edge detection hardware accelerator is proposed.
Edge detection is one of the basic building blocks of video and image
processing applications. It is a common block in the pre-processing
phase of image and video processing pipeline. Our presented
approach targets offloading the Canny edge detection algorithm from
processing system (PS) to programmable logic (PL) taking the
advantage of High Level Synthesis (HLS) tool flow to accelerate the
implementation on Zynq platform. The resulting implementation
enables up to a 100x performance improvement through hardware
acceleration. The CPU utilization drops down and the frame rate
jumps to 60 fps of 1080p full HD input video stream.
Abstract: Logistics distributors face the issue of having to
provide increasing service levels while being forced to reduce costs at
the same time. Same-day delivery, quick order processing and rapidly
growing ranges of articles are only some of the prevailing challenges.
One key aspect of the performance of an intra-logistics system is how
often and in which amplitude congestions and dysfunctions affect the
processing operations. By gaining knowledge of the so called
‘performance availability’ of such a system during the planning stage,
oversizing and wasting can be reduced whereas planning
transparency is increased. State of the art for the determination of this
KPI is simulation studies. However, their structure and therefore their
results may vary unforeseeably. This article proposes a concept for
the establishment of ‘certified’ and hence reliable and comparable
simulation models.
Abstract: The computational fluid dynamics (CFD) study of
stirred tank with the air-water interface are carried out in the presence
of different types of the impeller and with or without baffles. A
multiple reference frame (MRF) approach with the volume of fluid
(VOF) method is used to capture the air-water interface. The RANS
(Reynolds Averaged Navier-Stokes) equations with k-ε turbulence
model are solved to predict the flow behavior of water and air phase
which are treated as a different phases. The predicted results have
shown that the VOF method is able to capture the interface in the
unbaffled tank. While, the VOF method is showing an unfeasible
results in the baffled tank with high rotational impeller speed. For
continuous stirred tank, the air-water interface is disturbed by the
inflow and the level of water is also increased with time.
Abstract: Electricity spot prices are highly volatile under
optimal generation capacity scenarios due to factors such as nonstorability
of electricity, peak demand at certain periods, generator
outages, fuel uncertainty for renewable energy generators, huge
investments and time needed for generation capacity expansion etc.
As a result market participants are exposed to price and volume risk,
which has led to the development of risk management practices. This
paper provides an overview of risk management practices by market
participants in electricity markets using financial derivatives.
Abstract: The classroom of the 21st century is an ever changing
forum for new and innovative thoughts and ideas. With increasing
technology and opportunity, students have rapid access to
information that only decades ago would have taken weeks to obtain.
Unfortunately, new techniques and technology are not the cure for
the fundamental problems that have plagued the classroom ever since
education was established. Class size has been an issue long debated
in academia. While it is difficult to pin point an exact number, it is
clear that in this case more does not mean better. By looking into the
success and pitfalls of classroom size the true advantages of smaller
classes will become clear. Previously, one class was comprised of 50
students. Being seventeen and eighteen- year- old students,
sometimes it was quite difficult for them to stay focused. To help
them understand and gain much knowledge, a researcher introduced
“The Theory of Multiple Intelligence” and this, in fact, enabled
students to learn according to their own learning preferences no
matter how they were being taught. In this lesson, the researcher
designed a cycle of learning activities involving all intelligences so
that everyone had equal opportunities to learn.
Abstract: Several of the practical industrial control processes are
multivariable processes. Due to the relation amid the variables
(interaction), delay in the loops, it is very intricate to design a
controller directly for these processes. So first, the interaction of the
variables is analyzed using Relative Normalized Gain Array
(RNGA), which considers the time constant, static gain and delay
time of the processes. Based on the effect of RNGA, relative gain
array (RGA) and NI, the pair (control configuration) of variables to
be controlled by decentralized control is selected. The equivalent
transfer function (ETF) of the process model is estimated as first
order process with delay using the corresponding elements in the
Relative gain array and Relative average residence time array
(RARTA) of the processes. Secondly, a decentralized Proportional-
Integral (PI) controller is designed for each ETF simply using
frequency response specifications. Finally, the performance and
robustness of the algorithm is comparing with existing related
approaches to validate the effectiveness of the projected algorithm.
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.
Abstract: Now-a-days autonomous mobile robots have found
applications in diverse fields. An autonomous robot system must be
able to behave in an intelligent manner to deal with complex and
changing environment. This work proposes the performance of path
planning and navigation of autonomous mobile robot using
Gravitational Search Algorithm (GSA), Simulated Annealing (SA)
and Particle Swarm optimization (PSO) based intelligent controllers
in an unstructured environment. The approach not only finds a valid
collision free path but also optimal one. The main aim of the work is
to minimize the length of the path and duration of travel from a
starting point to a target while moving in an unknown environment
with obstacles without collision. Finally, a comparison is made
between the three controllers, it is found that the path length and time
duration made by the robot using GSA is better than SA and PSO
based controllers for the same work.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: The inspection of underneath vehicle system has been
given significant attention by governments after the threat of
terrorism become more prevalent. New technologies such as mobile
robots and computer vision are led to have more secure environment.
This paper proposed that a mobile robot like Aria robot can be used
to search and inspect the bombs under parking a lot vehicle. This
robot is using fuzzy logic and subsumption algorithms to control the
robot that movies underneath the vehicle. An OpenCV library and
laser Hokuyo are added to Aria robot to complete the experiment for
under vehicle inspection. This experiment was conducted at the
indoor environment to demonstrate the efficiency of our methods to
search objects and control the robot movements under vehicle. We
got excellent results not only by controlling the robot movement but
also inspecting object by the robot camera at same time. This success
allowed us to know the requirement to construct a new cost effective
robot with more functionality.
Abstract: Ontologies offer a means for representing and sharing
information in many domains, particularly in complex domains. For
example, it can be used for representing and sharing information
of System Requirement Specification (SRS) of complex systems
like the SRS of ERTMS/ETCS written in natural language. Since
this system is a real-time and critical system, generic ontologies,
such as OWL and generic ERTMS ontologies provide minimal
support for modeling temporal information omnipresent in these SRS
documents. To support the modeling of temporal information, one
of the challenges is to enable representation of dynamic features
evolving in time within a generic ontology with a minimal redesign
of it. The separation of temporal information from other information
can help to predict system runtime operation and to properly design
and implement them. In addition, it is helpful to provide a reasoning
and querying techniques to reason and query temporal information
represented in the ontology in order to detect potential temporal
inconsistencies. To address this challenge, we propose a lightweight
3-layer temporal Quality of Service (QoS) ontology for representing,
reasoning and querying over temporal and non-temporal information
in a complex domain ontology. Representing QoS entities in separated
layers can clarify the distinction between the non QoS entities
and the QoS entities in an ontology. The upper generic layer of
the proposed ontology provides an intuitive knowledge of domain
components, specially ERTMS/ETCS components. The separation of
the intermediate QoS layer from the lower QoS layer allows us to
focus on specific QoS Characteristics, such as temporal or integrity
characteristics. In this paper, we focus on temporal information that
can be used to predict system runtime operation. To evaluate our
approach, an example of the proposed domain ontology for handover
operation, as well as a reasoning rule over temporal relations in this
domain-specific ontology, are presented.
Abstract: In wireless communication, space-time block code (STBC), cyclic delay diversity (CDD) and space-time cyclic delay diversity (STCDD)are used as the spatial diversity schemes and have been widely studied for the reliablecommunication. If these schemes are used, the communication system can obtain the improved performance. However,the quality of the system is degraded when the distance between a source and a destination is distant in wireless communication system. In this paper, the cooperative transmission scheme using two sources is proposed and improves the performance of the wireless communication system.