Abstract: Email has become a fast and cheap means of online
communication. The main threat to email is Unsolicited Bulk Email
(UBE), commonly called spam email. The current work aims at
identification of unigrams in more than 2700 UBE that advertise
body-enhancement drugs. The identification is based on the
requirement that the unigram is neither present in dictionary, nor is a
slang term. The motives of the paper are many fold. This is an
attempt to analyze spamming behaviour and employment of wordmutation
technique. On the side-lines of the paper, we have
attempted to better understand the spam, the slang and their interplay.
The problem has been addressed by employing Tokenization
technique and Unigram BOW model. We found that the non-lexicon
words constitute nearly 66% of total number of lexis of corpus
whereas non-slang words constitute nearly 2.4% of non-lexicon
words. Further, non-lexicon non-slang unigrams composed of 2
lexicon words, form more than 71% of the total number of such
unigrams. To the best of our knowledge, this is the first attempt to
analyze usage of non-lexicon non-slang unigrams in any kind of
UBE.
Abstract: In this paper, we investigated the characteristic of a
clinical dataseton the feature selection and classification
measurements which deal with missing values problem.And also
posed the appropriated techniques to achieve the aim of the activity;
in this research aims to find features that have high effect to mortality
and mortality time frame. We quantify the complexity of a clinical
dataset. According to the complexity of the dataset, we proposed the
data mining processto cope their complexity; missing values, high
dimensionality, and the prediction problem by using the methods of
missing value replacement, feature selection, and classification.The
experimental results will extend to develop the prediction model for
cardiology.
Abstract: A novel behavioral detection framework is proposed
to detect zero day buffer overflow vulnerabilities (based on network
behavioral signatures) using zero-day exploits, instead of the
signature-based or anomaly-based detection solutions currently
available for IDPS techniques. At first we present the detection
model that uses shadow honeypot. Our system is used for the online
processing of network attacks and generating a behavior detection
profile. The detection profile represents the dataset of 112 types of
metrics describing the exact behavior of malware in the network. In
this paper we present the examples of generating behavioral
signatures for two attacks – a buffer overflow exploit on FTP server
and well known Conficker worm. We demonstrated the visualization
of important aspects by showing the differences between valid
behavior and the attacks. Based on these metrics we can detect
attacks with a very high probability of success, the process of
detection is however very expensive.
Abstract: Particle damping is a technique to reduce the
structural vibrations by means of placing small metallic particles
inside a cavity that is attached to the structure at location of high
vibration amplitudes. In this paper, we have presented an analytical
model to simulate the particle damping of two dimensional transient
vibrations in structure operating under high centrifugal loads. The
simulation results show that this technique remains effective as long
as the ratio of the dynamic acceleration of the structure to the applied
centrifugal load is more than 0.1. Particle damping increases with the
increase of particle to structure mass ratio. However, unlike to the
case of particle damping in the absence of centrifugal loads where
the damping efficiency strongly depends upon the size of the cavity,
here this dependence becomes very weak. Despite the simplicity of
the model, the simulation results are considerably in good agreement
with the very scarce experimental data available in the literature for
particle damping under centrifugal loads.
Abstract: An adaptive dynamic cerebellar model articulation
controller (DCMAC) neural network used for solving the prediction
and identification problem is proposed in this paper. The proposed
DCMAC has superior capability to the conventional cerebellar model
articulation controller (CMAC) neural network in efficient learning
mechanism, guaranteed system stability and dynamic response. The
recurrent network is embedded in the DCMAC by adding feedback
connections in the association memory space so that the DCMAC
captures the dynamic response, where the feedback units act as
memory elements. The dynamic gradient descent method is adopted to
adjust DCMAC parameters on-line. Moreover, the analytical method
based on a Lyapunov function is proposed to determine the
learning-rates of DCMAC so that the variable optimal learning-rates
are derived to achieve most rapid convergence of identifying error.
Finally, the adaptive DCMAC is applied in two computer simulations.
Simulation results show that accurate identifying response and
superior dynamic performance can be obtained because of the
powerful on-line learning capability of the proposed DCMAC.
Abstract: The purpose of suspension system in automobiles is to
improve the ride comfort and road handling. In this research the ride
and handling performance of a specific automobile with passive
suspension system is compared to a proposed fuzzy logic semi active
suspension system designed for that automobile. The bodysuspension-
wheel system is modeled as a two degree of freedom
quarter car model. MATLAB/SIMULINK [1] was used for
simulation and controller design. The fuzzy logic controller is based
on two inputs namely suspension velocity and body velocity. The
output of the fuzzy controller is the damping coefficient of the
variable damper. The result shows improvement over passive
suspension method.
Abstract: We investigate sonic cues for binaural sound localization within classrooms and present a structural model for the same. Two of the primary cues for localization, interaural time difference (ITD) and interaural level difference (ILD) created between the two ears by sounds from a particular point in space, are used. Although these cues do not lend any information about the elevation of a sound source, the torso, head, and outer ear carry out elevation dependent spectral filtering of sounds before they reach the inner ear. This effect is commonly captured in head related transfer function (HRTF) which aids in resolving the ambiguity from the ITDs and ILDs alone and helps localize sounds in free space. The proposed structural model of HRTF produces well controlled horizontal as well as vertical effects. The implemented HRTF is a signal processing model which tries to mimic the physical effects of the sounds interacting with different parts of the body. The effectiveness of the method is tested by synthesizing spatial audio, in MATLAB, for use in listening tests with human subjects and is found to yield satisfactory results in comparison with existing models.
Abstract: This document shows a software that shows different chaotic generator, as continuous as discrete time. The software gives the option for obtain the different signals, using different parameters and initial condition value. The program shows then critical parameter for each model. All theses models are capable of encrypter information, this software show it too.
Abstract: Reliable water level forecasts are particularly
important for warning against dangerous flood and inundation. The
current study aims at investigating the suitability of the adaptive
network based fuzzy inference system for continuous water level
modeling. A hybrid learning algorithm, which combines the least
square method and the back propagation algorithm, is used to
identify the parameters of the network. For this study, water levels
data are available for a hydrological year of 2002 with a sampling
interval of 1-hour. The number of antecedent water level that should
be included in the input variables is determined by two statistical
methods, i.e. autocorrelation function and partial autocorrelation
function between the variables. Forecasting was done for 1-hour until
12-hour ahead in order to compare the models generalization at
higher horizons. The results demonstrate that the adaptive networkbased
fuzzy inference system model can be applied successfully and
provide high accuracy and reliability for river water level estimation.
In general, the adaptive network-based fuzzy inference system
provides accurate and reliable water level prediction for 1-hour ahead
where the MAPE=1.15% and correlation=0.98 was achieved. Up to
12-hour ahead prediction, the model still shows relatively good
performance where the error of prediction resulted was less than
9.65%. The information gathered from the preliminary results
provide a useful guidance or reference for flood early warning
system design in which the magnitude and the timing of a potential
extreme flood are indicated.
Abstract: The orthogonal processes to shape the triangle steel plate into a equilateral vertical steel are examined by an incremental elasto-plastic finite-element method based on an updated Lagrangian formulation. The highly non-linear problems due to the geometric changes, the inelastic constitutive behavior and the boundary conditions varied with deformation are taken into account in an incremental manner. On the contact boundary, a modified Coulomb friction mode is specially considered. A weighting factor r-minimum is employed to limit the step size of loading increment to linear relation. In particular, selective reduced integration was adopted to formulate the stiffness matrix. The simulated geometries of verticality could clearly demonstrate the vertical processes until unloading. A series of experiments and simulations were performed to validate the formulation in the theory, leading to the development of the computer codes. The whole deformation history and the distribution of stress, strain and thickness during the forming process were obtained by carefully considering the moving boundary condition in the finite-element method. Therefore, this modeling can be used for judging whether a equilateral vertical steel can be shaped successfully. The present work may be expected to improve the understanding of the formation of the equilateral vertical steel.
Abstract: According to previous studies, some muscles present a non-homogeneous spatial distribution of its muscle fiber types and motor unit types. However, available muscle models only deal with muscles with homogeneous distributions. In this paper, a new architecture muscle model is proposed to permit the construction of non-uniform distributions of muscle fibers within the muscle cross section. The idea behind is the use of a motor unit placement algorithm that controls the spatial overlapping of the motor unit territories of each motor unit type. Results show the capabilities of the new algorithm to reproduce arbitrary muscle fiber type distributions.
Abstract: To derive the fractional flow equation oil
displacement will be assumed to take place under the so-called
diffusive flow condition. The constraints are that fluid saturations at
any point in the linear displacement path are uniformly distributed
with respect to thickness; this allows the displacement to be described
mathematically in one dimension. The simultaneous flow of oil and
water can be modeled using thickness averaged relative permeability,
along the centerline of the reservoir. The condition for fluid potential
equilibrium is simply that of hydrostatic equilibrium for which the
saturation distribution can be determined as a function of capillary
pressure and therefore, height. That is the fluids are distributed in
accordance with capillary-gravity equilibrium.
This paper focused on the fraction flow of water versus
cumulative oil recoveries using Buckley Leverett method. Several
field cases have been developed to aid in analysis. Producing watercut
(at surface conditions) will be compared with the cumulative oil
recovery at breakthrough for the flowing fluid.
Abstract: IVE toolkit has been created for facilitating research,education and development in the ?eld of virtual storytelling andcomputer games. Primarily, the toolkit is intended for modellingaction selection mechanisms of virtual humans, investigating level-of-detail AI techniques for large virtual environments, and for exploringjoint behaviour and role-passing technique (Sec. V). Additionally, thetoolkit can be used as an AI middleware without any changes. Themain facility of IVE is that it serves for prototyping both the AI andvirtual worlds themselves. The purpose of this paper is to describeIVE?s features in general and to present our current work - includingan educational game - on this platform.Keywords? AI middleware, simulation, virtual world.
Abstract: An explicit axisymmetrical FE methodology is
developed here to study the particle temperature arising in WC-Co
particle on an AISI 1045 steel substrate. Parameters of constitutive
Johnson-cook model were used for simulation. The results show that
particle velocity and kinetic energy have important role in
temperature arising of particles.
Abstract: A Space Vector based Pulse Width Modulation
control technique for the three-phase PWM converter is proposed in
this paper. The proposed control scheme is based on a synchronous
reference frame model. High performance and efficiency is obtained
with regards to the DC bus voltage and the power factor
considerations of the PWM rectifier thus leading to low losses.
MATLAB/SIMULINK are used as a platform for the simulations and
a SIMULINK model is presented in the paper. The results show that
the proposed model demonstrates better performance and properties
compared to the traditional SPWM method and the method improves
the dynamic performance of the closed loop drastically.
For the Space Vector based Pulse Width Modulation, Sine signal
is the reference waveform and triangle waveform is the carrier
waveform. When the value sine signal is large than triangle signal,
the pulse will start produce to high. And then when the triangular
signals higher than sine signal, the pulse will come to low. SPWM
output will changed by changing the value of the modulation index
and frequency used in this system to produce more pulse width. The
more pulse width produced, the output voltage will have lower
harmonics contents and the resolution increase.
Abstract: One of the main objectives of order reduction is to
design a controller of lower order which can effectively control the
original high order system so that the overall system is of lower
order and easy to understand. In this paper, a simple method is
presented for controller design of a higher order discrete system.
First the original higher order discrete system in reduced to a lower
order model. Then a Proportional Integral Derivative (PID)
controller is designed for lower order model. An error minimization
technique is employed for both order reduction and controller
design. For the error minimization purpose, Differential Evolution
(DE) optimization algorithm has been employed. DE method is
based on the minimization of the Integral Squared Error (ISE)
between the desired response and actual response pertaining to a
unit step input. Finally the designed PID controller is connected to
the original higher order discrete system to get the desired
specification. The validity of the proposed method is illustrated
through a numerical example.
Abstract: Decentralized Tuple Space (DTS) implements tuple
space model among a series of decentralized hosts and provides the
logical global shared tuple repository. Replication has been introduced
to promote performance problem incurred by remote tuple access. In
this paper, we propose a replication approach of DTS allowing
replication policies self-adapting. The accesses from users or other
nodes are monitored and collected to contribute the decision making.
The replication policy may be changed if the better performance is
expected. The experiments show that this approach suitably adjusts the
replication policies, which brings negligible overhead.
Abstract: Software Reusability is primary attribute of software
quality. There are metrics for identifying the quality of reusable
components but the function that makes use of these metrics to find
reusability of software components is still not clear. These metrics if
identified in the design phase or even in the coding phase can help us
to reduce the rework by improving quality of reuse of the component
and hence improve the productivity due to probabilistic increase in
the reuse level. In this paper, we have devised the framework of
metrics that uses McCabe-s Cyclometric Complexity Measure for
Complexity measurement, Regularity Metric, Halstead Software
Science Indicator for Volume indication, Reuse Frequency metric
and Coupling Metric values of the software component as input
attributes and calculated reusability of the software component. Here,
comparative analysis of the fuzzy, Neuro-fuzzy and Fuzzy-GA
approaches is performed to evaluate the reusability of software
components and Fuzzy-GA results outperform the other used
approaches. The developed reusability model has produced high
precision results as expected by the human experts.
Abstract: This paper presents the use of three-dimensional finite
elements coupled with infinite elements to investigate the ground
vibrations at the surface in terms of the peak particle velocity (PPV)
due to construction of the first bore of the Dublin Port Tunnel. This
situation is analysed using a commercially available general-purpose
finite element package ABAQUS. A series of parametric studies is
carried out to examine the sensitivity of the predicted vibrations to
variations in the various input parameters required by finite element
method, including the stiffness and the damping of ground. The
results of this study show that stiffness has a more significant effect
on the PPV rather than the damping of the ground.
Abstract: Vehicular Ad-hoc Network (VANET) is taking more
attention in automotive industry due to the safety concern of human
lives on roads. Security is one of the safety aspects in VANET. To be
secure, network availability must be obtained at all times since
availability of the network is critically needed when a node sends any
life critical information to other nodes. However, it can be expected
that security attacks are likely to increase in the coming future due to
more and more wireless applications being developed and deployed
onto the well-known expose nature of the wireless medium. In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has
been developed and some possible solutions to overcome the attacks
have been discussed.