Abstract: Red blood cells (RBC) are the most common types of
blood cells and are the most intensively studied in cell biology. The
lack of RBCs is a condition in which the amount of hemoglobin level
is lower than normal and is referred to as “anemia”. Abnormalities in
RBCs will affect the exchange of oxygen. This paper presents a
comparative study for various techniques for classifying the RBCs as
normal or abnormal (anemic) using WEKA. WEKA is an open
source consists of different machine learning algorithms for data
mining applications. The algorithms tested are Radial Basis Function
neural network, Support vector machine, and K-Nearest Neighbors
algorithm. Two sets of combined features were utilized for
classification of blood cells images. The first set, exclusively consist
of geometrical features, was used to identify whether the tested blood
cell has a spherical shape or non-spherical cells. While the second
set, consist mainly of textural features was used to recognize the
types of the spherical cells. We have provided an evaluation based on
applying these classification methods to our RBCs image dataset
which were obtained from Serdang Hospital - Malaysia, and
measuring the accuracy of test results. The best achieved
classification rates are 97%, 98%, and 79% for Support vector
machines, Radial Basis Function neural network, and K-Nearest
Neighbors algorithm respectively.
Abstract: Lead being a toxic heavy metal that mankind is
exposed to the highest levels of this metal from environmental
pollutants. A total of 180 Male scalp hair samples were collected
from different environments in Greater Cairo (GC), i.e. industrial,
heavy traffic and rural areas (60 samples from each) having different
activities during the period of, 1/5/2010 to 1/11/2012. Hair samples
were collected during five stages. Data proved that the concentration
of lead in male industrial areas of Cairo ranged between 6.2847 to
19.0432 μg/g, with mean value of 12.3288 μg/g. On the other hand,
lead content of hair samples of residential-traffic areas ranged
between 2.8634 to 16.3311 μg/g with mean value of 9.7552 μg/g.
While lead concentration on the hair of the male residents living in
rural area ranged between 1.0499-9.0402μg/g with mean value of
4.7327 μg/g. The Pb concentration in scalp hair of Cairo residents of
residential-traffic and rural traffic areas was observed to follow the
same pattern. The pattern was that of decrease concentration of
summer and its increase in winter. Then, there was a marked increase
in Pb concentration of summer 2012, and this increase was
significant. These were obviously seen for the residential-traffic and
rural areas residents. Pb pollution in residents of industrial areas
showed the same seasonal pattern, but there was marked to decrease
in Pb concentration of summer 2012, and this decrease was
significant. Lead pollution in residents of GC was serious. It is worth
noting that the atmosphere is still contaminated by lead despite a
decade of using unleaded gasoline. Strong seasonal variation in
higher Pb concentration on winter than in summer was found. Major
contributions to the pollution with Pb could include industry
emissions, motor vehicle emissions and long transported dust from
outside Cairo. More attention should be paid to the reduction of Pb
content of the urban aerosol and to the Pb pollution health.
Abstract: Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. In this work the authors propose a new image based steganographic method for hiding information within the complex bit planes of the image. After slicing into bit planes the cover image is analyzed to extract the most complex planes in decreasing order based on their bit plane complexity. The complexity function next determines the complex noisy blocks of the chosen bit plane and finally pixel mapping method (PMM) has been used to embed secret bits into those regions of the bit plane. The novel approach of using pixel mapping method (PMM) in bit plane domain adaptively embeds data on most complex regions of image, provides high embedding capacity, better imperceptibility and resistance to steganalysis attack.
Abstract: The method of introducing the proxy interpretation for
sending and receiving requests increase the capability of the server
and our approach UDIV (User-Data Identity Security) to solve the
data and user authentication without extending size of the data makes
better than hybrid IDS (Intrusion Detection System). And at the same
time all the security stages we have framed have to pass through less
through that minimize the response time of the request. Even though
an anomaly detected, before rejecting it the proxy extracts its identity
to prevent it to enter into system. In case of false anomalies, the
request will be reshaped and transformed into legitimate request for
further response. Finally we are holding the normal and abnormal
requests in two different queues with own priorities.
Abstract: The growth in the volume of text data such as books
and articles in libraries for centuries has imposed to establish
effective mechanisms to locate them. Early techniques such as
abstraction, indexing and the use of classification categories have
marked the birth of a new field of research called "Information
Retrieval". Information Retrieval (IR) can be defined as the task of
defining models and systems whose purpose is to facilitate access to
a set of documents in electronic form (corpus) to allow a user to find
the relevant ones for him, that is to say, the contents which matches
with the information needs of the user.
Most of the models of information retrieval use a specific data
structure to index a corpus which is called "inverted file" or "reverse
index".
This inverted file collects information on all terms over the corpus
documents specifying the identifiers of documents that contain the
term in question, the frequency of each term in the documents of the
corpus, the positions of the occurrences of the word...
In this paper we use an oriented object database (db4o) instead of
the inverted file, that is to say, instead to search a term in the inverted
file, we will search it in the db4o database.
The purpose of this work is to make a comparative study to see if
the oriented object databases may be competing for the inverse index
in terms of access speed and resource consumption using a large
volume of data.
Abstract: Reburning is a useful technology in reducing nitric
oxide through injection of a secondary hydrocarbon fuel. In this paper,
an experimental study has been conducted to evaluate the effect of fuel
lean reburning on NOx/CO reduction in LNG flame. Experiments
were performed in flames stabilized by a co-flow swirl burner, which
was mounted at the bottom of the furnace. Tests were conducted using
LNG gas as the reburn fuel as well as the main fuel. The effects of
reburn fuel fraction and injection manner of the reburn fuel were
studied when the fuel lean reburning system was applied. The paper
reports data on flue gas emissions and temperature distribution in the
furnace for a wide range of experimental conditions. At steady state,
temperature distribution and emission formation in the furnace have
been measured and compared. This paper makes clear that in order to
decrease both NOx and CO concentrations in the exhaust when the
pulsated fuel lean reburning system was adapted, it is important that
the control of some factors such as frequency and duty ratio. Also it
shows the fuel lean reburning is also effective method to reduce NOx
as much as reburning.
Abstract: In this paper a comprehensive review on various
factory layouts has been carried out for designing a lucrative process
layout for medium scale industries. Industry data base reveals that the
end product rejection rate is on the order of 10% amounting large
profit loss. In order to avoid these rejection rates and to increase the
quality product production an intermediate non-destructive testing
facility (INDTF) has been recommended for increasing the overall
profit. We observed through detailed case studies that while
introducing INDTF to medium scale industries the expensive
production process can be avoided to the defective products well
before its final shape. Additionally, the defective products identified
during the intermediate stage can be effectively utilized for other
applications or recycling; thereby the overall wastage of the raw
materials can be reduced and profit can be increased. We concluded
that the prudent design of a factory layout through critical path
method facilitating with INDTF will warrant profitable outcome.
Abstract: This paper reports a structured literature review of the
application of Health Information Technology in developing
countries, defined as the World Bank categories Low-income
countries, Lower-middle-income, and Upper-middle-income
countries. The aim was to identify and classify the various
applications of health information technology to assess its current
state in developing countries and explore potential areas of research.
We offer specific analysis and application of HIT in Libya as one of
the developing countries. A structured literature review was
conducted using the following online databases: IEEE, Science
Direct, PubMed, and Google Scholar. Publication dates were set for
2000-2013. For the PubMed search, publications in English, French,
and Arabic were specified. Using a content analysis approach, 159
papers were analyzed and a total number of 26 factors were identified
that affect the adoption of health information technology. Of the 2681
retrieved articles, 159 met the inclusion criteria which were carefully
analyzed and classified. The implementation of health information
technology across developing countries is varied. Whilst it was
initially expected financial constraints would have severely limited
health information technology implementation, some developing
countries like India have nevertheless dominated the literature and
taken the lead in conducting scientific research. Comparing the
number of studies to the number of countries in each category, we
found that Low-income countries and Lower-middle-income had
more studies carried out than Upper-middle-income countries.
However, whilst IT has been used in various sectors of the economy,
the healthcare sector in developing countries is still failing to benefit
fully from the potential advantages that IT can offer.
Abstract: The investigation on wind turbine degradation was
carried out using the nacelle wind data. The three Vestas V80-2MW
wind turbines of Sungsan wind farm in Jeju Island, South Korea were
selected for this work. The SCADA data of the wind farm for five
years were analyzed to draw power curve of the turbines. It is assumed
that the wind distribution is the Rayleigh distribution to calculate the
normalized capacity factor based on the drawn power curve of the
three wind turbines for each year. The result showed that the reduction
of power output from the three wind turbines occurred every year and
the normalized capacity factor decreased to 0.12%/year on average.
Abstract: This paper aims to represent the commercial activity
of a city taking as source data the social network Foursquare. The
city of Murcia is selected as case study, and the location-based
social network Foursquare is the main source of information. After
carrying out a reorganisation of the user-generated data extracted
from Foursquare, it is possible to graphically display on a map the
various city spaces and venues especially those related to commercial,
food and entertainment sector businesses. The obtained visualisation
provides information about activity patterns in the city of Murcia
according to the people‘s interests and preferences and, moreover,
interesting facts about certain characteristics of the town itself.
Abstract: Recommendation systems are widely used in
e-commerce applications. The engine of a current recommendation
system recommends items to a particular user based on user
preferences and previous high ratings. Various recommendation
schemes such as collaborative filtering and content-based approaches
are used to build a recommendation system. Most of current
recommendation systems were developed to fit a certain domain such
as books, articles, and movies. We propose1 a hybrid framework
recommendation system to be applied on two dimensional spaces
(User × Item) with a large number of Users and a small number
of Items. Moreover, our proposed framework makes use of both
favorite and non-favorite items of a particular user. The proposed
framework is built upon the integration of association rules mining
and the content-based approach. The results of experiments show
that our proposed framework can provide accurate recommendations
to users.
Abstract: Components with sensory properties such as gentelligent components developed at the Collaborative Research Centre 653 offer a new angle in terms of the full utilization of the remaining service life as well as preventive maintenance. The developed methodology of component status driven maintenance analyzes the stress data obtained during the component's useful life and on the basis of this knowledge assesses the type of maintenance required in this case. The procedure is derived from the case-based reasoning method and will be explained in detail. The method's functionality is demonstrated with real-life data obtained during test runs of a racing car prototype.
Abstract: Structured Query Language (SQL) is the standard de facto language to access and manipulate data in a relational database. Although SQL is a language that is simple and powerful, most novice users will have trouble with SQL syntax. Thus, we are presenting SQL generator tool which is capable of translating actions and displaying SQL commands and data sets simultaneously. The tool was developed based on Model-View-Controller (MVC) pattern. The MVC pattern is a widely used software design pattern that enforces the separation between the input, processing, and output of an application. Developers take full advantage of it to reduce the complexity in architectural design and to increase flexibility and reuse of code. In addition, we use White-Box testing for the code verification in the Model module.
Abstract: Urban public spaces are sutured with a range of
surveillance and sensor technologies that claim to enable new forms
of ‘data based citizen participation’, but also increase the tendency
for ‘function-creep’, whereby vast amounts of data are gathered,
stored and analysed in a broad application of urban surveillance. This
kind of monitoring and capacity for surveillance connects with
attempts by civic authorities to regulate, restrict, rebrand and reframe
urban public spaces. A direct consequence of the increasingly
security driven, policed, privatised and surveilled nature of public
space is the exclusion or ‘unfavourable inclusion’ of those considered
flawed and unwelcome in the ‘spectacular’ consumption spaces of
many major urban centres. In the name of urban regeneration,
programs of securitisation, ‘gentrification’ and ‘creative’ and ‘smart’
city initiatives refashion public space as sites of selective inclusion
and exclusion. In this context of monitoring and control procedures,
in particular, children and young people’s use of space in parks,
neighbourhoods, shopping malls and streets is often viewed as a
threat to the social order, requiring various forms of remedial action.
This paper suggests that cities, places and spaces and those who
seek to use them, can be resilient in working to maintain and extend
democratic freedoms and processes enshrined in Marshall’s concept
of citizenship, calling sensor and surveillance systems to account.
Such accountability could better inform the implementation of public
policy around the design, build and governance of public space and
also understandings of urban citizenship in the sensor saturated urban
environment.
Abstract: Creating a database scheme is essentially a manual
process. From a requirement specification the information contained
within has to be analyzed and reduced into a set of tables, attributes
and relationships. This is a time consuming process that has to go
through several stages before an acceptable database schema is
achieved. The purpose of this paper is to implement a Natural
Language Processing (NLP) based tool to produce a relational
database from a requirement specification. The Stanford CoreNLP
version 3.3.1 and the Java programming were used to implement the
proposed model. The outcome of this study indicates that a first draft
of a relational database schema can be extracted from a requirement
specification by using NLP tools and techniques with minimum user
intervention. Therefore this method is a step forward in finding a
solution that requires little or no user intervention.
Abstract: Search engine plays an important role in internet, to
retrieve the relevant documents among the huge number of web
pages. However, it retrieves more number of documents, which are
all relevant to your search topics. To retrieve the most meaningful
documents related to search topics, ranking algorithm is used in
information retrieval technique. One of the issues in data miming is
ranking the retrieved document. In information retrieval the ranking
is one of the practical problems. This paper includes various Page
Ranking algorithms, page segmentation algorithms and compares
those algorithms used for Information Retrieval. Diverse Page Rank
based algorithms like Page Rank (PR), Weighted Page Rank (WPR),
Weight Page Content Rank (WPCR), Hyperlink Induced Topic
Selection (HITS), Distance Rank, Eigen Rumor, Distance Rank Time
Rank, Tag Rank, Relational Based Page Rank and Query Dependent
Ranking algorithms are discussed and compared.
Abstract: An algorithm is a well-defined procedure that takes
some input in the form of some values, processes them and gives the
desired output. It forms the basis of many other algorithms such as
searching, pattern matching, digital filters etc., and other applications
have been found in database systems, data statistics and processing,
data communications and pattern matching. This paper introduces
algorithmic “Enhanced Bidirectional Selection” sort which is
bidirectional, stable. It is said to be bidirectional as it selects two
values smallest from the front and largest from the rear and assigns
them to their appropriate locations thus reducing the number of
passes by half the total number of elements as compared to selection
sort.
Abstract: Learner motivation is considered to be an important
component for the Blended e-Learning (BL) Method. BL is an
effective learning method in multiple domains, which opens several
opportunities for its participants to engage in the learning
environment. This research explores the learners’ perspective of BL
according to the Self-Determination Theory (SDT). It identifies the
opportunities and challenges for using the BL in Logistics Education
(LE) in Egyptian Higher Education (HE). SDT is approached from
different perspectives within the relationship between Intrinsic
Motivation (IM), Extrinsic Motivation (EM) and Amotivation (AM).
A self-administered face-to-face questionnaire was used to collect
data from learners who were geographically widely spread around
three colleges of International Transport and Logistics (CILTs) at the
Arab Academy for Science, Technology and Maritime Transport
(AAST&MT) in Egypt. Six hundred and sixteen undergraduates
responded to a questionnaire survey. Respondents were drawn from
three branches in Greater Cairo, Alexandria, and Port Said. The data
analysis used was SPSS 22 and AMOS 18.
Abstract: This paper aims to analyze the role of natural
language processing (NLP). The paper will discuss the role in the
context of automated data retrieval, automated question answer, and
text structuring. NLP techniques are gaining wider acceptance in real
life applications and industrial concerns. There are various
complexities involved in processing the text of natural language that
could satisfy the need of decision makers. This paper begins with the
description of the qualities of NLP practices. The paper then focuses
on the challenges in natural language processing. The paper also
discusses major techniques of NLP. The last section describes
opportunities and challenges for future research.
Abstract: Underwater acoustic network is one of the rapidly
growing areas of research and finds different applications for
monitoring and collecting various data for environmental studies. The
communication among dynamic nodes and high error probability in
an acoustic medium forced to maximize energy consumption in
Underwater Sensor Networks (USN) than in traditional sensor
networks. Developing energy-efficient routing protocol is the
fundamental and a curb challenge because all the sensor nodes are
powered by batteries, and they cannot be easily replaced in UWSNs.
This paper surveys the various recent routing techniques that mainly
focus on energy efficiency.