Abstract: Text categorization is the problem of classifying text
documents into a set of predefined classes. After a preprocessing
step, the documents are typically represented as large sparse vectors.
When training classifiers on large collections of documents, both the
time and memory restrictions can be quite prohibitive. This justifies
the application of feature selection methods to reduce the
dimensionality of the document-representation vector. In this paper,
we present three feature selection methods: Information Gain,
Support Vector Machine feature selection called (SVM_FS) and
Genetic Algorithm with SVM (called GA_SVM). We show that the
best results were obtained with GA_SVM method for a relatively
small dimension of the feature vector.
Abstract: Superelastic Shape Memory Alloy (SMA) is accepted
when it used as connection in steel structures. The seismic behaviour
of steel frames with SMA is being assessed in this study. Three eightstorey
steel frames with different SMA systems are suggested, the
first one of which is braced with diagonal bracing system, the second
one is braced with nee bracing system while the last one is which the
SMA is used as connection at the plastic hinge regions of beams.
Nonlinear time history analyses of steel frames with SMA subjected
to two different ground motion records have been performed using
Seismostruct software. To evaluate the efficiency of suggested
systems, the dynamic responses of the frames were compared. From
the comparison results, it can be concluded that using SMA element
is an effective way to improve the dynamic response of structures
subjected to earthquake excitations. Implementing the SMA braces
can lead to a reduction in residual roof displacement. The shape
memory alloy is effective in reducing the maximum displacement at
the frame top and it provides a large elastic deformation range. SMA
connections are very effective in dissipating energy and reducing the
total input energy of the whole frame under severe seismic ground
motion. Using of the SMA connection system is more effective in
controlling the reaction forces at the base frame than other bracing
systems. Using SMA as bracing is more effective in reducing the
displacements. The efficiency of SMA is dependant on the input
wave motions and the construction system as well.
Abstract: This paper deals with the formulation of Maxwell-s equations in a cavity resonator in the presence of the gravitational field produced by a blackhole. The metric of space-time due to the blackhole is the Schwarzchild metric. Conventionally, this is expressed in spherical polar coordinates. In order to adapt this metric to our problem, we have considered this metric in a small region close to the blackhole and expressed this metric in a cartesian system locally.
Abstract: In this paper, an automatic system of diagnosis was
developed to detect and locate in real time the defects of the wound
rotor asynchronous machine associated to electronic converter. For
this purpose, we have treated the signals of the measured parameters
(current and speed) to use them firstly, as indicating variables of the
machine defects under study and, secondly, as inputs to the Artificial
Neuron Network (ANN) for their classification in order to detect the
defect type in progress. Once a defect is detected, the interpretation
system of information will give the type of the defect and its place of
appearance.
Abstract: Defect prevention is the most vital but habitually
neglected facet of software quality assurance in any project. If
functional at all stages of software development, it can condense the
time, overheads and wherewithal entailed to engineer a high quality
product. The key challenge of an IT industry is to engineer a
software product with minimum post deployment defects.
This effort is an analysis based on data obtained for five selected
projects from leading software companies of varying software
production competence. The main aim of this paper is to provide
information on various methods and practices supporting defect
detection and prevention leading to thriving software generation. The
defect prevention technique unearths 99% of defects. Inspection is
found to be an essential technique in generating ideal software
generation in factories through enhanced methodologies of abetted
and unaided inspection schedules. On an average 13 % to 15% of
inspection and 25% - 30% of testing out of whole project effort time
is required for 99% - 99.75% of defect elimination.
A comparison of the end results for the five selected projects
between the companies is also brought about throwing light on the
possibility of a particular company to position itself with an
appropriate complementary ratio of inspection testing.
Abstract: In the present study the efficiency of Big Bang-Big
Crunch (BB-BC) algorithm is investigated in discrete structural
design optimization. It is shown that a standard version of the BB-BC
algorithm is sometimes unable to produce reasonable solutions to
problems from discrete structural design optimization. Two
reformulations of the algorithm, which are referred to as modified
BB-BC (MBB-BC) and exponential BB-BC (EBB-BC), are
introduced to enhance the capability of the standard algorithm in
locating good solutions for steel truss and frame type structures,
respectively. The performances of the proposed algorithms are
experimented and compared to its standard version as well as some
other algorithms over several practical design examples. In these
examples, steel structures are sized for minimum weight subject to
stress, stability and displacement limitations according to the
provisions of AISC-ASD.
Abstract: Fine-grained data replication over the Internet allows duplication of frequently accessed data objects, as opposed to entire sites, to certain locations so as to improve the performance of largescale content distribution systems. In a distributed system, agents representing their sites try to maximize their own benefit since they are driven by different goals such as to minimize their communication costs, latency, etc. In this paper, we will use game theoretical techniques and in particular auctions to identify a bidding mechanism that encapsulates the selfishness of the agents, while having a controlling hand over them. In essence, the proposed game theory based mechanism is the study of what happens when independent agents act selfishly and how to control them to maximize the overall performance. A bidding mechanism asks how one can design systems so that agents- selfish behavior results in the desired system-wide goals. Experimental results reveal that this mechanism provides excellent solution quality, while maintaining fast execution time. The comparisons are recorded against some well known techniques such as greedy, branch and bound, game theoretical auctions and genetic algorithms.
Abstract: Calcium oxide (CaO) as carbon dioxide (CO2)
adsorbent at the elevated temperature has been very well-received
thus far. The CaO can be synthesized from natural calcium carbonate
(CaCO3) sources through the reversible calcination-carbonation
process. In the study, cockle shell has been selected as CaO
precursors. The objectives of the study are to investigate the
performance of calcination and carbonation with respect to different
temperature, heating rate, particle size and the duration time. Overall,
better performance is shown at the calcination temperature of 850oC
for 40 minutes, heating rate of 20oC/min, particle size of < 0.125mm
and the carbonation temperature is at 650oC. The synthesized
materials have been characterized by nitrogen physisorption and
surface morphology analysis. The effectiveness of the synthesized
cockle shell in capturing CO2 (0.72 kg CO2/kg adsorbent) which is
comparable to the commercialized adsorbent (0.60 kg CO2/kg
adsorbent) makes them as the most promising materials for CO2
capture.
Abstract: We investigate sonic cues for binaural sound localization within classrooms and present a structural model for the same. Two of the primary cues for localization, interaural time difference (ITD) and interaural level difference (ILD) created between the two ears by sounds from a particular point in space, are used. Although these cues do not lend any information about the elevation of a sound source, the torso, head, and outer ear carry out elevation dependent spectral filtering of sounds before they reach the inner ear. This effect is commonly captured in head related transfer function (HRTF) which aids in resolving the ambiguity from the ITDs and ILDs alone and helps localize sounds in free space. The proposed structural model of HRTF produces well controlled horizontal as well as vertical effects. The implemented HRTF is a signal processing model which tries to mimic the physical effects of the sounds interacting with different parts of the body. The effectiveness of the method is tested by synthesizing spatial audio, in MATLAB, for use in listening tests with human subjects and is found to yield satisfactory results in comparison with existing models.
Abstract: This paper presents an effective technique for harmonic current mitigation using an adaptive notch filter (ANF) to estimate current harmonics. The proposed filter consists of multiple units of ANF connected in parallel structure; each unit is governed by two ordinary differential equations. The frequency estimation is carried out based on the output of these units. The simulation and experimental results show the ability of the proposed tracking scheme to accurately estimate harmonics. The proposed filter was implemented digitally in TMS320F2808 and used in the control of hybrid active power filter (HAPF). The theoretical expectations are verified and demonstrated experimentally.
Abstract: This document shows a software that shows different chaotic generator, as continuous as discrete time. The software gives the option for obtain the different signals, using different parameters and initial condition value. The program shows then critical parameter for each model. All theses models are capable of encrypter information, this software show it too.
Abstract: Ontologies play an important role in semantic web
applications and are often developed by different groups and
continues to evolve over time. The knowledge in ontologies changes
very rapidly that make the applications outdated if they continue to
use old versions or unstable if they jump to new versions. Temporal
frames using frame versioning and slot versioning are used to take
care of dynamic nature of the ontologies. The paper proposes new
tags and restructured OWL format enabling the applications to work
with the old or new version of ontologies. Gene Ontology, a very
dynamic ontology, has been used as a case study to explain the OWL
Ontology with Temporal Tags.
Abstract: This paper presents the experimental results on space charge distribution in cross-linked polyethylene (XLPE) insulating material for 22 kV power distribution system cable by using pulse electroacoustic measurement technique (PEA). Numbers of XLPE insulating material ribbon having thickness 60 μm taken from unused 22 kV high voltage cable were used as specimen in this study. DC electric field stress was applied to test specimen at room temperature (25°C). Four levels of electric field stress, 25 kV/mm, 50 kV/mm, 75 kV/mm and 100 kV/mm, were used. In order to investigate space charge distribution characteristic, space charge distribution characteristics were measured after applying electric field stress 15 min, 30 min and 60 min, respectively. The results show that applied time and magnitude of dc electric field stress play an important role to the formation of space charge.
Abstract: IP networks are evolving from data communication
infrastructure into many real-time applications such as video
conferencing, IP telephony and require stringent Quality of Service
(QoS) requirements. A rudimentary issue in QoS routing is to find a
path between a source-destination pair that satisfies two or more endto-
end constraints and termed to be NP hard or complete. In this
context, we present an algorithm Multi Constraint Path Problem
Version 3 (MCPv3), where all constraints are approximated and
return a feasible path in much quicker time. We present another
algorithm namely Delay Coerced Multi Constrained Routing
(DCMCR) where coerce one constraint and approximate the
remaining constraints. Our algorithm returns a feasible path, if exists,
in polynomial time between a source-destination pair whose first
weight satisfied by the first constraint and every other weight is
bounded by remaining constraints by a predefined approximation
factor (a). We present our experimental results with different
topologies and network conditions.
Abstract: Any use of energy in industrial productive activities is combined with various environment impacts. Withintransportation,
this fact was not only found among land transport, railways and maritime transport, but also in the air transport industry. An effective climate protection requires strategies and measures for reducing all
greenhouses gas emissions, in particular carbon dioxide, and must
take into account the economic, ecologic and social aspects. It seem simperative now to develop and manufacture environmentally
friendly products and systems, to reduce consumption and use less
resource, and to save energy and power. Today-sproducts could
better serve these requirements taking into account the integration of
a power management system into the electrical power system.This
paper gives an overview of an approach ofpower management with
load prioritization in modernaircraft. Load dimensioning and load
management strategies on current civil aircraft will be presented and
used as a basis for the proposed approach.
Abstract: Energy efficiency is the key requirement in wireless sensor network as sensors are small, cheap and are deployed in very large number in a large geographical area, so there is no question of replacing the batteries of the sensors once deployed. Different ways can be used for efficient energy transmission including Multi-Hop algorithms, collaborative communication, cooperativecommunication, Beam- forming, routing algorithm, phase, frequency and time synchronization. The paper reviews the need for time synchronization and proposed a BFS based synchronization algorithm to achieve energy efficiency. The efficiency of our protocol has been tested and verified by simulation
Abstract: This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.
Abstract: The use of neural networks for recognition application is generally constrained by their inherent parameters inflexibility after the training phase. This means no adaptation is accommodated for input variations that have any influence on the network parameters. Attempts were made in this work to design a neural network that includes an additional mechanism that adjusts the threshold values according to the input pattern variations. The new approach is based on splitting the whole network into two subnets; main traditional net and a supportive net. The first deals with the required output of trained patterns with predefined settings, while the second tolerates output generation dynamically with tuning capability for any newly applied input. This tuning comes in the form of an adjustment to the threshold values. Two levels of supportive net were studied; one implements an extended additional layer with adjustable neuronal threshold setting mechanism, while the second implements an auxiliary net with traditional architecture performs dynamic adjustment to the threshold value of the main net that is constructed in dual-layer architecture. Experiment results and analysis of the proposed designs have given quite satisfactory conducts. The supportive layer approach achieved over 90% recognition rate, while the multiple network technique shows more effective and acceptable level of recognition. However, this is achieved at the price of network complexity and computation time. Recognition generalization may be also improved by accommodating capabilities involving all the innate structures in conjugation with Intelligence abilities with the needs of further advanced learning phases.
Abstract: L-asparaginase was extracted from pathogenic
Escherichia coli which was isolated from urinary tract infection
patients. L-asparaginase was purified 96-fold by ultrafiltration, ion
exchange and gel filtration giving 39.19% yield with final specific
activity of 178.57 IU/mg. L-asparaginase showed 138,356±1,000
Dalton molecular weight with 31024±100 Dalton molecular mass.
Kinetic properties of enzyme resulting 1.25×10-5 mM Km and
2.5×10-3 M/min Vmax. L-asparaginase showed a maximum activity
at pH 7.5 when incubated at 37 ºC for 30 min and illustrated its full
activity (100%) after 15 min incubation at 20-37 ºC, while 70% of its
activity was lost when incubated at 60 ºC. L-asparaginase showed
cytotoxicity to U937 cell line with IC50 0.5±0.19 IU/ml, and
selectivity index (SI=7.6) about 8 time higher selectivity over the
lymphocyte cells. Therefore, the local pathogenic E. coli strains may
be used as a source of high yield of L-asparaginase to produce anti
cancer agent with high selectivity.
Abstract: Vehicular Ad-hoc Network (VANET) is taking more
attention in automotive industry due to the safety concern of human
lives on roads. Security is one of the safety aspects in VANET. To be
secure, network availability must be obtained at all times since
availability of the network is critically needed when a node sends any
life critical information to other nodes. However, it can be expected
that security attacks are likely to increase in the coming future due to
more and more wireless applications being developed and deployed
onto the well-known expose nature of the wireless medium. In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has
been developed and some possible solutions to overcome the attacks
have been discussed.