Abstract: One of the main problems of suspended cable structures is initial shape change under the action of non uniform load. The problem can be solved by increasing of weight of construction or by using of prestressing. But this methods cause increasing of materials consumption of suspended cable structure. The cable truss usage is another way how the problem of shape change under the action of non uniform load can be fixed. The cable trusses with the vertical and inclined suspensions, cross web and single cable were analyzed as the main load-bearing structures of suspension bridge. It was shown, that usage of cable truss allows to reduce the vertical displacements up to 32% in comparison with the single cable in case of non uniformly distributed load. In case of uniformly distributed load single cable is preferable.
Abstract: Pummelo is known to be the largest of all citrus fruits, with expected ratio of 2:1 (w/v) of producing juice, is an attractive opportunity for Malaysia to expand pummelo-s influence and marketability over the international market of juices. The purpose of this study is to identify and quantify the phenolic compounds in two Malaysian varieties of pummelo fruit juice: Ledang (PO55) and Tambun (PO52). Identifications of polyphenols composition were done using High Performance Liquid Chromatography Diode Array Detection (HPLC-DAD). The phenolic compounds that were found in both varieties were hydroxycinnamic acids and flavonones. This study proved that Tambun variety has the highest antioxidant and phenolic compounds in comparison to Ledang variety. However, considerations have to be made to suit consumer-s taste bud and the amount of enzyme needed to clarify the juice for its marketability.
Abstract: In this article we explore how computer assisted exercises may allow for bridging the traditional gap between theory and practice in professional education. To educate officers able to master the complexity of the battlefield the Norwegian Military Academy needs to develop a learning environment that allows for creating viable connections between the educational environment and the field of practice. In response to this challenge we explore the conditions necessary to make computer assisted training systems (CATS) a useful tool to create structural similarities between an educational context and the field of military practice. Although, CATS may facilitate work procedures close to real life situations, this case do demonstrate how professional competence also must build on viable learning theories and environments. This paper explores the conditions that allow for using simulators to facilitate professional competence from within an educational setting. We develop a generic didactic model that ascribes learning to participation in iterative cycles of action and reflection. The development of this model is motivated by the need to develop an interdisciplinary professional education rooted in the pattern of military practice.
Abstract: The objective of this research was to identify the
vegetation-soil relationships in Nodushan arid rangelands of Yazd. 5
sites were selected for measuring the cover of plant species and soil
attributes. Soil samples were taken in 0-10 and 10-80 cm layers. The
species studied were Salsola tomentosa, Salsola arbuscula, Peganum
harmala, Zygophylum eurypterum and Eurotia ceratoides. Canonical
correspondence analysis (CCA) was used to analyze the data. Based
on the CCA results, 74.9 % of vegetation-soil variation was explained
by axis 1-3. Axis 1, 2 and 3 accounted for 27.2%, 24.9 % and 22.8%
of variance respectively. Correlation between axis 1, 2, 3 and speciesedaphic
variables were 0.995, 0.989, 0.981 respectively. Soil texture,
lime, salinity and organic matter significantly influenced the
distribution of these plant species. Determination of soil-vegetation
relationships will be useful for managing and improving rangelands
in arid and semi arid environments.
Abstract: The segmentation of mouth and lips is a fundamental
problem in facial image analyisis. In this paper we propose a method
for lip segmentation based on rg-color histogram. Statistical analysis
shows, using the rg-color-space is optimal for this purpose of a pure
color based segmentation. Initially a rough adaptive threshold selects
a histogram region, that assures that all pixels in that region are
skin pixels. Based on that pixels we build a gaussian model which
represents the skin pixels distribution and is utilized to obtain a
refined, optimal threshold. We are not incorporating shape or edge
information. In experiments we show the performance of our lip pixel
segmentation method compared to the ground truth of our dataset and
a conventional watershed algorithm.
Abstract: The study investigated the effects of Teaching Games
for Understanding approach on students ‘cognitive learning outcome.
The study was a quasi-experimental non-equivalent pretest-posttest
control group design whereby 10 year old primary school students
(n=72) were randomly assigned to an experimental and a control
group. The experimental group students were exposed with TGfU
approach and the control group with the Traditional Skill approach of
handball game. Game Performance Assessment Instrument (GPAI)
was used to measure students' tactical understanding and decision
making in 3 versus 3 handball game situations. Analysis of
covariance (ANCOVA) was used to analyze the data. The results
reveal that there was a significant difference between the TGfU
approach group and the traditional skill approach group students on
post test score (F (1, 69) = 248.83, p < .05). The findings of this
study suggested the importance of TGfU approach to improve
primary students’ tactical understanding and decision making in
handball game.
Abstract: Yeast cells live in a constantly changing environment that requires the continuous adaptation of their genomic program in order to sustain their homeostasis, survive and proliferate. Due to the advancement of high throughput technologies, there is currently a large amount of data such as gene expression, gene deletion and protein-protein interactions for S. Cerevisiae under various environmental conditions. Mining these datasets requires efficient computational methods capable of integrating different types of data, identifying inter-relations between different components and inferring functional groups or 'modules' that shape intracellular processes. This study uses computational methods to delineate some of the mechanisms used by yeast cells to respond to environmental changes. The GRAM algorithm is first used to integrate gene expression data and ChIP-chip data in order to find modules of coexpressed and co-regulated genes as well as the transcription factors (TFs) that regulate these modules. Since transcription factors are themselves transcriptionally regulated, a three-layer regulatory cascade consisting of the TF-regulators, the TFs and the regulated modules is subsequently considered. This three-layer cascade is then modeled quantitatively using artificial neural networks (ANNs) where the input layer corresponds to the expression of the up-stream transcription factors (TF-regulators) and the output layer corresponds to the expression of genes within each module. This work shows that (a) the expression of at least 33 genes over time and for different stress conditions is well predicted by the expression of the top layer transcription factors, including cases in which the effect of up-stream regulators is shifted in time and (b) identifies at least 6 novel regulatory interactions that were not previously associated with stress-induced changes in gene expression. These findings suggest that the combination of gene expression and protein-DNA interaction data with artificial neural networks can successfully model biological pathways and capture quantitative dependencies between distant regulators and downstream genes.
Abstract: Breast skin-line estimation and breast segmentation is an important pre-process in mammogram image processing and computer-aided diagnosis of breast cancer. Limiting the area to be processed into a specific target region in an image would increase the accuracy and efficiency of processing algorithms. In this paper we are presenting a new algorithm for estimating skin-line and breast segmentation using fast marching algorithm. Fast marching is a partial-differential equation based numerical technique to track evolution of interfaces. We have introduced some modifications to the traditional fast marching method, specifically to improve the accuracy of skin-line estimation and breast tissue segmentation. Proposed modifications ensure that the evolving front stops near the desired boundary. We have evaluated the performance of the algorithm by using 100 mammogram images taken from mini-MIAS database. The results obtained from the experimental evaluation indicate that this algorithm explains 98.6% of the ground truth breast region and accuracy of the segmentation is 99.1%. Also this algorithm is capable of partially-extracting nipple when it is available in the profile.
Abstract: Heat transfer from two cam shape cylinder in side-byside
arrangement had been studied numerically.
The transverse gap between the centers of cylinders (T) is allowed
to vary to change the pitch ratio (T/Deq). The equivalent diameter of
the cylinder (Deq) is 27.6 mm and pitch ratio varies in range of
1≤T/Deq≤3. The Reynolds numbers based on equivalent circular
cylinder are within 50≤ Reeq≤150. Results show that Nusselt number
of cylinders increases about 1 to 36 percent when pitch ratio
increases from 1 to 3.
Abstract: Biometric measures of one kind or another have been
used to identify people since ancient times, with handwritten
signatures, facial features, and fingerprints being the traditional
methods. Of late, Systems have been built that automate the task of
recognition, using these methods and newer ones, such as hand
geometry, voiceprints and iris patterns. These systems have different
strengths and weaknesses. This work is a two-section composition. In
the starting section, we present an analytical and comparative study
of common biometric techniques. The performance of each of them
has been viewed and then tabularized as a result. The latter section
involves the actual implementation of the techniques under
consideration that has been done using a state of the art tool called,
MATLAB. This tool aids to effectively portray the corresponding
results and effects.
Abstract: In this experimental investigation shake table tests
were conducted on two reduced models that represent normal single
room building constructed by Compressed Stabilized Earth Block
(CSEB) from locally available soil. One model was constructed with
earthquake resisting features (EQRF) having sill band, lintel band and
vertical bands to control the building vibration and another one was
without Earthquake Resisting Features. To examine the seismic
capacity of the models particularly when it is subjected to long-period
ground motion by large amplitude by many cycles of repeated
loading, the test specimen was shaken repeatedly until the failure.
The test results from Hi-end Data Acquisition system show that
model with EQRF behave better than without EQRF. This modified
masonry model with new material combined with new bands is used
to improve the behavior of masonry building.
Abstract: A well balanced numerical scheme based on
stationary waves for shallow water flows with arbitrary topography
has been introduced by Thanh et al. [18]. The scheme was
constructed so that it maintains equilibrium states and tests indicate
that it is stable and fast. Applying the well-balanced scheme for the
one-dimensional shallow water equations, we study the early shock
waves propagation towards the Phuket coast in Southern Thailand
during a hypothetical tsunami. The initial tsunami wave is generated
in the deep ocean with the strength that of Indonesian tsunami of
2004.
Abstract: Case based reasoning (CBR) methodology presents a foundation for a new technology of building intelligent computeraided diagnoses systems. This Technology directly addresses the problems found in the traditional Artificial Intelligence (AI) techniques, e.g. the problems of knowledge acquisition, remembering, robust and maintenance. This paper discusses the CBR methodology, the research issues and technical aspects of implementing intelligent medical diagnoses systems. Successful applications in cancer and heart diseases developed by Medical Informatics Research Group at Ain Shams University are also discussed.
Abstract: Bioleaching of spent catalyst using moderate thermophilic chemolithotrophic acidophiles in growth medium without Fe source was investigated with two different pulp densities and three different size fractions. All the experiments were conducted on shake flasks at a temperature of 65 °C. The leaching yield of Ni and Al was found to be promising with very high leaching yield of 92-96% followed by Al as 41-76%, which means both Ni and Al leaching were favored by the moderate thermophilic bioleaching compared to the mesophilic bioleaching. The acid consumption was comparatively higher for the 10% pulp density experiments. Comparatively minimal difference in the leaching yield with different size fractions and different pulp densities show no requirement of grinding and using low pulp density less than 10%. This process would rather be economical as well as eco-friendly process for future optimization of the recovery of metal values from spent catalyst.
Abstract: Multiport diffusers are the effective engineering
devices installed at the modern marine outfalls for the steady
discharge of effluent streams from the coastal plants, such as
municipal sewage treatment, thermal power generation and seawater
desalination. A mathematical model using a two-dimensional
advection-diffusion equation based on a flat seabed and incorporating
the effect of a coastal tidal current is developed to calculate the
compounded concentration following discharges of desalination
brine from a sea outfall with multiport diffusers. The analytical
solutions are computed graphically to illustrate the merging of
multiple brine plumes in shallow coastal waters, and further
approximation will be made to the maximum shoreline's
concentration to formulate dilution of a multiport diffuser discharge.
Abstract: As the web continues to grow exponentially, the idea
of crawling the entire web on a regular basis becomes less and less
feasible, so the need to include information on specific domain,
domain-specific search engines was proposed. As more information
becomes available on the World Wide Web, it becomes more difficult
to provide effective search tools for information access. Today,
people access web information through two main kinds of search
interfaces: Browsers (clicking and following hyperlinks) and Query
Engines (queries in the form of a set of keywords showing the topic
of interest) [2]. Better support is needed for expressing one's
information need and returning high quality search results by web
search tools. There appears to be a need for systems that do reasoning
under uncertainty and are flexible enough to recover from the
contradictions, inconsistencies, and irregularities that such reasoning
involves. In a multi-view problem, the features of the domain can be
partitioned into disjoint subsets (views) that are sufficient to learn the
target concept. Semi-supervised, multi-view algorithms, which
reduce the amount of labeled data required for learning, rely on the
assumptions that the views are compatible and uncorrelated. This
paper describes the use of semi-structured machine learning approach
with Active learning for the “Domain Specific Search Engines". A
domain-specific search engine is “An information access system that
allows access to all the information on the web that is relevant to a
particular domain. The proposed work shows that with the help of
this approach relevant data can be extracted with the minimum
queries fired by the user. It requires small number of labeled data and
pool of unlabelled data on which the learning algorithm is applied to
extract the required data.
Abstract: One of the essential requirements for the human
beings is the house for living. This is necessary to make the place of
satisfaction for contemporary houses residents by attention to their
culture. In this article represented the relevant theoretical literature
on cultural symbols by use the architecture semiotic to construct the
houses as a better place for living. In fact, make a place for everyday
life with changing the house to the home is one of the most
challengeable subject for architects all around the world. The target
of this article is to find Cypriot houses cultural symbols that assist
architect to design and build contemporary houses, to make more
satisfaction for its residents according to Cypriot life style and their
culture. This paper is based on researching the effect of cultural
symbols on housing, would require various types of methods.
However, this study focuses on two methods, which are quantitative
and qualitative. The purpose of the case-specific study is to finding
the symbols that used in contemporary houses by attention to the
Cypriot cultural symbols in Famagusta houses.
Abstract: Data clustering is an important data exploration technique
with many applications in data mining. We present an enhanced
version of the well known single link clustering algorithm. We will
refer to this algorithm as DCBOR. The proposed algorithm alleviates
the chain effect by removing the outliers from the given dataset.
So this algorithm provides outlier detection and data clustering
simultaneously. This algorithm does not need to update the distance
matrix, since the algorithm depends on merging the most k-nearest
objects in one step and the cluster continues grow as long as possible
under specified condition. So the algorithm consists of two phases;
at the first phase, it removes the outliers from the input dataset. At
the second phase, it performs the clustering process. This algorithm
discovers clusters of different shapes, sizes, densities and requires
only one input parameter; this parameter represents a threshold for
outlier points. The value of the input parameter is ranging from 0 to
1. The algorithm supports the user in determining an appropriate
value for it. We have tested this algorithm on different datasets
contain outlier and connecting clusters by chain of density points,
and the algorithm discovers the correct clusters. The results of
our experiments demonstrate the effectiveness and the efficiency of
DCBOR.
Abstract: Shadoo protein (Sho) was described in 2003 as the newest member of Prion protein superfamily [1]. Sho has similar structural motifs like prion protein (PrP) that is known for its central role in transmissible spongiform enchephalopathies. Although a great number of functions have been proposed, the exact physiological function of PrP is not known yet. Investigation of the function and localization of Sho may help us to understand the function of the Prion protein superfamily. Analyzing the subcellular localization of YFP-tagged forms of Sho, we detected the protein in the plasma membrane and in the nucleus of various cell lines. To reveal the localization of the endogenous protein we generated antibodies against Shadoo as well as employed commercially available anti-Shadoo antibodies: i) EG62 anti-mouse Shadoo antibody generated by Eurogentec Ltd.; ii) S-12 anti-human Shadoo antibody by Santa Cruz Biotechnology Inc.; iii) R-12 anti-mouse Shadoo antibody by Santa Cruz Biotechnology Inc.; iv) SPRN antibody against human Shadoo by Abgent Inc. We carried out immunocytochemistry on non-transfected HeLa, Zpl 2-1, Zw 3-5, GT1-1, GT1-7 and SHSY5Y cells as well as on YFP-Sho, Sho-YFP, and YFP-GPI transfected HeLa cells. Their specificity (in antibody-peptide competition assay) and co-localization (with the YFP signal) were assessed.
Abstract: IEEE has designed 802.11i protocol to address the
security issues in wireless local area networks. Formal analysis is
important to ensure that the protocols work properly without having
to resort to tedious testing and debugging which can only show the
presence of errors, never their absence. In this paper, we present
the formal verification of an abstract protocol model of 802.11i.
We translate the 802.11i protocol into the Strand Space Model and
then prove the authentication property of the resulting model using
the Strand Space formalism. The intruder in our model is imbued
with powerful capabilities and repercussions to possible attacks are
evaluated. Our analysis proves that the authentication of 802.11i is
not compromised in the presented model. We further demonstrate
how changes in our model will yield a successful man-in-the-middle
attack.