Abstract: X-ray mammography is the most effective method for
the early detection of breast diseases. However, the typical diagnostic
signs such as microcalcifications and masses are difficult to detect
because mammograms are of low-contrast and noisy. In this paper, a
new algorithm for image denoising and enhancement in Orthogonal
Polynomials Transformation (OPT) is proposed for radiologists to
screen mammograms. In this method, a set of OPT edge coefficients
are scaled to a new set by a scale factor called OPT scale factor. The
new set of coefficients is then inverse transformed resulting in
contrast improved image. Applications of the proposed method to
mammograms with subtle lesions are shown. To validate the
effectiveness of the proposed method, we compare the results to
those obtained by the Histogram Equalization (HE) and the Unsharp
Masking (UM) methods. Our preliminary results strongly suggest
that the proposed method offers considerably improved enhancement
capability over the HE and UM methods.
Abstract: Self-efficacy, self-reliance, and motivation were
examined in a quasi-experimental study with 178 sophomore
university students. Participants used an interactive cardiovascular
anatomy and physiology CD-ROM, and completed a 15-item
questionnaire. Reliability of the questionnaire was established using
Cronbach-s alpha. Post-tests and course grades were examined using
a t-test, demonstrating no significance. Results of an item-to-item
analysis of the questionnaire showed overall satisfaction with the
teaching methodology and varied results for self-efficacy, selfreliance,
and motivation. Kendall-s Tau was calculated for all items
in the questionnaire.
Abstract: This paper presents a new technique for the optimum
placement of processors to minimize the total effective
communication load under multi-processor communication
dominated environment. This is achieved by placing heavily loaded
processors near each other and lightly loaded ones far away from
one another in the physical grid locations. The results are
mathematically proved for the Algorithms are described.
Abstract: This paper makes an attempt to solve the problem of
searching and retrieving of similar MRI photos via Internet services
using morphological features which are sourced via the original
image. This study is aiming to be considered as an additional tool of
searching and retrieve methods. Until now the main way of the
searching mechanism is based on the syntactic way using keywords.
The technique it proposes aims to serve the new requirements of
libraries. One of these is the development of computational tools for
the control and preservation of the intellectual property of digital
objects, and especially of digital images. For this purpose, this paper
proposes the use of a serial number extracted by using a previously
tested semantic properties method. This method, with its center being
the multi-layers of a set of arithmetic points, assures the following
two properties: the uniqueness of the final extracted number and the
semantic dependence of this number on the image used as the
method-s input. The major advantage of this method is that it can
control the authentication of a published image or its partial
modification to a reliable degree. Also, it acquires the better of the
known Hash functions that the digital signature schemes use and
produces alphanumeric strings for cases of authentication checking,
and the degree of similarity between an unknown image and an
original image.
Abstract: Frequent patterns are patterns such as sets of features or items that appear in data frequently. Finding such frequent patterns has become an important data mining task because it reveals associations, correlations, and many other interesting relationships hidden in a dataset. Most of the proposed frequent pattern mining algorithms have been implemented with imperative programming languages such as C, Cµ, Java. The imperative paradigm is significantly inefficient when itemset is large and the frequent pattern is long. We suggest a high-level declarative style of programming using a functional language. Our supposition is that the problem of frequent pattern discovery can be efficiently and concisely implemented via a functional paradigm since pattern matching is a fundamental feature supported by most functional languages. Our frequent pattern mining implementation using the Haskell language confirms our hypothesis about conciseness of the program. The performance studies on speed and memory usage support our intuition on efficiency of functional language.
Abstract: In this article, a formal specification and verification of the Rabin public-key scheme in a formal proof system is presented. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. A major objective of this article is the presentation of the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Moreover, we explicate a (computer-proven) formalization of correctness as well as a computer verification of security properties using a straight-forward computation model in Isabelle/HOL. The analysis uses a given database to prove formal properties of our implemented functions with computer support. The main task in designing a practical formalization of correctness as well as efficient computer proofs of security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as efficient formal proofs. Consequently, we get reliable proofs with a minimal error rate augmenting the used database, what provides a formal basis for more computer proof constructions in this area.
Abstract: This paper proposes a VPN Accelerator Board
(VPN-AB), a virtual private network (VPN) protocol designed for
trust channel security system (TCSS). TCSS supports safety
communication channel between security nodes in internet. It
furnishes authentication, confidentiality, integrity, and access control
to security node to transmit data packets with IPsec protocol. TCSS
consists of internet key exchange block, security association block,
and IPsec engine block. The internet key exchange block negotiates
crypto algorithm and key used in IPsec engine block. Security
Association blocks setting-up and manages security association
information. IPsec engine block treats IPsec packets and consists of
networking functions for communication. The IPsec engine block
should be embodied by H/W and in-line mode transaction for high
speed IPsec processing. Our VPN-AB is implemented with high speed
security processor that supports many cryptographic algorithms and
in-line mode. We evaluate a small TCSS communication environment,
and measure a performance of VPN-AB in the environment. The
experiment results show that VPN-AB gets a performance throughput
of maximum 15.645Gbps when we set the IPsec protocol with
3DES-HMAC-MD5 tunnel mode.
Abstract: Global competitiveness has recently become the
biggest concern of both manufacturing and service companies.
Electronic commerce, as a key technology enables the firms to reach
all the potential consumers from all over the world. In this study, we
have presented commonly used electronic payment systems, and then
we have shown the evaluation of these systems in respect to different
criteria. The payment systems which are included in this research are
the credit card, the virtual credit card, the electronic money, the
mobile payment, the credit transfer and the debit instruments. We
have realized a systematic comparison of these systems in respect to
three main criteria: Technical, economical and social. We have
conducted a fuzzy multi-criteria decision making procedure to deal
with the multi-attribute nature of the problem. The subjectiveness
and imprecision of the evaluation process are modeled using
triangular fuzzy numbers.
Abstract: One of the important tropical diseases is
Chikunkunya. This disease is transmitted between the human by the
insect-borne virus, of the genus Alphavirus. It occurs in Africa, Asia
and the Indian subcontinent. In Thailand, the incidences due to this
disease are increasing every year. In this study, the transmission of
this disease is studied through dynamical model analysis.
Abstract: In order to monitor the water table depth on soil profile
salinity buildup, a field study was carried out during 2006-07. Wheat
(Rabi) and Sorghum (Kharif) fodder were sown in with three
treatments. The results showed that watertable depth lowered from
1.15m to 2.89 m depth at the end of experiment. With lower of
watertable depth, pH, ECe and SAR decreased under crops both
without and with gypsum and increased in fallowing. Soil moisture
depletion was directly proportional to lowering of watertable. With the
application of irrigation water (58cm) pH, ECe and SAR were reduced
in cropped plots, reduction was higher in gypsum applied plots than
non-gypsum plots. In case of fallowing, there was increase in pH, EC,
while slight reduction occurred in SAR values. However, soil salinity
showed an increasing upward trend under fallowing and its value in
0-30 cm soil layer was the highest amongst the treatments.
Abstract: This study explored the correlates of forgiving
historical racial offenses and the relationship between daily
experiences of racism and forgiving historical racial offenses. 147
African Americans participated to the study. Results indicated that
guilt attribution, distrust, need of reparations, religion, and perception
of apology relate to forgiving past racial offenses. In addition the
more individuals experience racism related events, the less likely
they forgive the past mistreatments of African Americans.
Abstract: Basic objective of this study is to create a regression
analysis method that can estimate the length of a plastic hinge which
is an important design parameter, by making use of the outcomes of
(lateral load-lateral displacement hysteretic curves) the experimental
studies conducted for the reinforced square concrete columns. For
this aim, 170 different square reinforced concrete column tests results
have been collected from the existing literature. The parameters
which are thought affecting the plastic hinge length such as crosssection
properties, features of material used, axial loading level,
confinement of the column, longitudinal reinforcement bars in the
columns etc. have been obtained from these 170 different square
reinforced concrete column tests. In the study, when determining the
length of plastic hinge, using the experimental test results, a
regression analysis have been separately tested and compared with
each other. In addition, the outcome of mentioned methods on
determination of plastic hinge length of the reinforced concrete
columns has been compared to other methods available in the
literature.
Abstract: Artifact rejection plays a key role in many signal processing applications. The artifacts are disturbance that can occur during the signal acquisition and that can alter the analysis of the signals themselves. Our aim is to automatically remove the artifacts, in particular from the Electroencephalographic (EEG) recordings. A technique for the automatic artifact rejection, based on the Independent Component Analysis (ICA) for the artifact extraction and on some high order statistics such as kurtosis and Shannon-s entropy, was proposed some years ago in literature. In this paper we try to enhance this technique proposing a new method based on the Renyi-s entropy. The performance of our method was tested and compared to the performance of the method in literature and the former proved to outperform the latter.
Abstract: augmented reality is a technique used to insert virtual objects in real scenes. One of the most used libraries in the area is the ARToolkit library. It is based on the recognition of the markers that are in the form of squares with a pattern inside. This pattern which is mostly textual is source of confusing. In this paper, we present the results of a classification of Latin characters as a pattern on the ARToolkit markers to know the most distinguishable among them.
Abstract: The purpose of this study was to develop a “teachers’
self-efficacy scale for high school physical education teachers
(TSES-HSPET)” in Taiwan. This scale is based on the self-efficacy
theory of Bandura [1], [2]. This study used exploratory and
confirmatory factor analyses to test the reliability and validity. The
participants were high school physical education teachers in Taiwan.
Both stratified random sampling and cluster sampling were used to
sample participants for the study. 350 teachers were sampled in the
first stage and 234 valid scales (male 133, female 101) returned.
During the second stage, 350 teachers were sampled and 257 valid
scales (male 143, female 110, 4 did not indicate gender) returned. The
exploratory factor analysis was used in the first stage, and it got
60.77% of total variance for construct validity. The Cronbach’s alpha
coefficient of internal consistency was 0.91 for sumscale, and
subscales were 0.84 and 0.90. In the second stage, confirmatory factor
analysis was used to test construct validity. The result showed that the
fit index could be accepted (χ2 (75) =167.94, p
Abstract: The paper presents a part of the results obtained in a
complex research project on Romanian Grey Steppe breed, owner of
some remarkable qualities such as hardiness, longevity, adaptability,
special resistance to ban weather and diseases and included in the
genetic fund (G.D. no. 822/2008.) from Romania.
Following the researches effectuated, we identified alleles of six
loci, codifying the six types of major milk proteins: alpha-casein S1
(α S1-cz); beta-casein (β-cz); kappa-casein (K-cz); beta-lactoglobulin
(β-lg); alpha-lactalbumin (α-la) and alpha-casein S2 (α S2-cz). In
system αS1-cz allele αs1-Cn B has the highest frequency (0.700), in
system β-cz allele β-Cn A2 ( 0.550 ), in system K-cz allele k-CnA2 (
0.583 ) and heterozygote genotype AB ( 0.416 ) and BB (0.375), in
system β-lg allele β-lgA1 has the highest frequency (0.542 ) and
heterozygote genotype AB ( 0.500 ), in system α-la there is
monomorphism for allele α-la B and similarly in system αS2-cz for
allele αs2-Cn A.
The milk analysis by the isoelectric focalization technique (I.E.F.)
allowed the identification of a new allele for locus αS1-casein, for two
of the individuals under analysis, namely allele called αS1-casein
IRV. When experiments were repeated, we noticed that this is not a
proteolysis band and it really was a new allele that has not been
registered in the specialized literature so far. We identified two
heterozygote individuals, carriers of this allele, namely: BIRV and
CIRV. This discovery is extremely important if focus is laid on the
national genetic patrimony.
Abstract: The process of constructing a scale measuring the attitudes of youth toward violence on televisions is reported. A 30-item draft attitude scale was applied to a working group of 232 students attending the Faculty of Educational Sciences at Ankara University between the years 2005-2006. To introduce the construct validity and dimensionality of the scale, exploratory and confirmatory factor analysis was applied to the data. Results of the exploratory factor analysis showed that the scale had three factors that accounted for 58,44% (22,46% for the first, 22,15% for the second and 13,83% for the third factor) of the common variance. It is determined that the first factor considered issues related individual effects of violence on televisions, the second factor concerned issues related social effects of violence on televisions and the third factor concerned issues related violence on television programs. Results of the confirmatory factor analysis showed that all the items under each factor are fitting the concerning factors structure. An alpha reliability of 0,90 was estimated for the whole scale. It is concluded that the scale is valid and reliable.
Abstract: The paper presents a one-dimensional transient
mathematical model of thermal oil-water two-phase emulsion flows
in pipes. The set of the mass, momentum and enthalpy conservation
equations for the continuous fluid and droplet phases are solved. Two
friction correlations for the continuous fluid phase to wall friction are
accounted for in the model and tested. The aerodynamic drag force
between the continuous fluid phase and droplets is modeled, too. The
density and viscosity of both phases are assumed to be constant due
to adiabatic experimental conditions. The proposed mathematical
model is validated on the experimental measurements of oil-water
emulsion flows in horizontal pipe [1,2]. Numerical analysis on
single- and two-phase oil-water flows in a pipe is presented in the
paper. The continuous oil flow having water droplets is simulated.
Predictions, which are performed by using the presented model, show
excellent agreement with the experimental data if the water fraction is
equal or less than 10%. Disagreement between simulations and
measurements is increased if the water fraction is larger than 10%.
Abstract: In article are analyzed value of audiovisual sources which possesses high integrative potential and allows studying movement of information in the history - information movement from generation to the generation, in essence providing continuity of historical development and inheritance of traditions. Information thus fixed in them is considered as a source not only about last condition of society, but also significant for programming of its subsequent activity.
Abstract: The goal of this work is to improve the efficiency and the reliability of the automatic artifact rejection, in particular from the Electroencephalographic (EEG) recordings. Artifact rejection is a key topic in signal processing. The artifacts are unwelcome signals that may occur during the signal acquisition and that may alter the analysis of the signals themselves. A technique for the automatic artifact rejection, based on the Independent Component Analysis (ICA) for the artifact extraction and on some high order statistics such as kurtosis and Shannon-s entropy, was proposed some years ago in literature. In this paper we enhance this technique introducing the Renyi-s entropy. The performance of our method was tested exploiting the Independent Component scalp maps and it was compared to the performance of the method in literature and it showed to outperform it.