Abstract: Shoots, with three leaves, of Paphiopedilum 'Delrosi'
were used as explants for multiple shoot induction. Modified
Hyponex medium was supplemented with thidiazuron (TDZ), N6-
benzyladenine (BA) or kinetin (Kn) alone and in combinations with
2,4-dichlorophenoxyacetic acid (2,4-D). All explants were cultured
for 15 weeks. It was found that TDZ alone at the concentration of
0.45μM or in combination with 4.52μM 2,4-D and 8.88μM BA in
combination with 13.56μM 2,4-D promoted multiple shoots. The
highest shoot sprouting efficiencies (80.0, 90.0 and 80.0%) and new
shoot numbers (1.5, 1.3 and 1.1) were obtained, respectively. Fresh
weight, height, numbers of leaf and root of new shoots and initial
explants were discussed.
Abstract: This work focuses on analysis of classical heat transfer equation regularized with Maxwell-Cattaneo transfer law. Computer simulations are performed in MATLAB environment. Numerical experiments are first developed on classical Fourier equation, then Maxwell-Cattaneo law is considered. Corresponding equation is regularized with a balancing diffusion term to stabilize discretizing scheme with adjusted time and space numerical steps. Several cases including a convective term in model equations are discussed, and results are given. It is shown that limiting conditions on regularizing parameters have to be satisfied in convective case for Maxwell-Cattaneo regularization to give physically acceptable solutions. In all valid cases, uniform convergence to solution of initial heat equation with Fourier law is observed, even in nonlinear case.
Abstract: Mel Frequency Cepstral Coefficient (MFCC) features
are widely used as acoustic features for speech recognition as well
as speaker recognition. In MFCC feature representation, the Mel frequency
scale is used to get a high resolution in low frequency region,
and a low resolution in high frequency region. This kind of processing
is good for obtaining stable phonetic information, but not suitable
for speaker features that are located in high frequency regions. The
speaker individual information, which is non-uniformly distributed
in the high frequencies, is equally important for speaker recognition.
Based on this fact we proposed an admissible wavelet packet based
filter structure for speaker identification. Multiresolution capabilities
of wavelet packet transform are used to derive the new features.
The proposed scheme differs from previous wavelet based works,
mainly in designing the filter structure. Unlike others, the proposed
filter structure does not follow Mel scale. The closed-set speaker
identification experiments performed on the TIMIT database shows
improved identification performance compared to other commonly
used Mel scale based filter structures using wavelets.
Abstract: Using steelmaking slag as a raw material, aragonite superstructure product had been synthesized via an indirect CO2 mineral sequestration rout. It mainly involved two separate steps, in which the element of calcium is first selectively leached from steelmaking slag by a novel leaching media consisting of organic solvent Tributyl phosphate (TBP), acetic acid, and ultra-purity water, followed by enhanced carbonation in a separate step for aragonite superstructure production as well as efficiency recovery of leaching media. Based on the different leaching medium employed in the steelmaking slag leaching process, two typical products were collected from the enhanced carbonation step. The products were characterized by X-ray powder diffraction (XRD) and scanning electron microscopy (SEM), respectively. It reveals that the needle-like aragonite crystals self-organized into aragonite superstructure particles including aragonite microspheres as well as dumbbell-like spherical particles, can be obtained from the steelmaking slag with the purity over 99%.
Abstract: Fast forecasting of stock market prices is very important for
strategic planning. In this paper, a new approach for fast forecasting of
stock market prices is presented. Such algorithm uses new high speed
time delay neural networks (HSTDNNs). The operation of these
networks relies on performing cross correlation in the frequency
domain between the input data and the input weights of neural
networks. It is proved mathematically and practically that the number
of computation steps required for the presented HSTDNNs is less
than that needed by traditional time delay neural networks
(TTDNNs). Simulation results using MATLAB confirm the
theoretical computations.
Abstract: The service sector continues to grow and the percentage
of GDP accounted for by service industries keeps increasing. The
growth and importance of service to an economy is not just a
phenomenon of advanced economies, service is now a majority of the
world gross domestic products. However, the performance evaluation
process of new service development problems generally involves
uncertain and imprecise data. This paper presents a 2-tuple fuzzy
linguistic computing approach to dealing with heterogeneous
information and information loss problems while the processes of
subjective evaluation integration. The proposed method based on group
decision-making scenario to assist business managers in measuring
performance of new service development manipulates the
heterogeneity integration processes and avoids the information loss
effectively.
Abstract: This paper discusses applications of a revolutionary
information technology, Geographic Information Systems (GIS), in
the field of the history of cartography by examples, including
assessing accuracy of early maps, establishing a database of places
and historical administrative units in history, integrating early maps
in GIS or digital images, and analyzing social, political, and
economic information related to production of early maps. GIS
provides a new mean to evaluate the accuracy of early maps. Four
basic steps using GIS for this type of study are discussed. In addition,
several historical geographical information systems are introduced.
These include China Historical Geographic Information Systems
(CHGIS), the United States National Historical Geographic
Information System (NHGIS), and the Great Britain Historical
Geographical Information System. GIS also provides digital means to
display and analyze the spatial information on the early maps or to
layer them with modern spatial data. How GIS relational data
structure may be used to analyze social, political, and economic
information related to production of early maps is also discussed in
this paper. Through discussion on these examples, this paper reveals
value of GIS applications in this field.
Abstract: In this research saffron samples were prepared from
farms and sampling was done in four states contain : sampling from
fresh saffron of petal with forceps , sampling from fresh saffron of
petal by hands, sampling from dried sample by warm air in shadow,
sampling from dried sample which dried by dryer. Samples collected
and kept in sterile tubes and containers and carried to laboratory and
maintained until experiment. Microbial experiments were performed
to determine microbial load such as total count, Staphylococcus
aureus, coli form, E.coli, mold and yeast. Results showed that in
picking and drying stages the contamination amount increases in
saffron samples. There was a significant difference between the
microbial load of picked up saffron by forceps and by hands, and
also between dried saffron by warm air in shadow and by dryer.
Abstract: The last Assessment Report of the Intergovernmental
Panel on Climate Change, stating that the greatest risk in climate
change affects sustainability is now widely known and accepted.
However, it has not provoked substantial reaction and attention in
Hungary, while international and national efforts have also not
achieved expected results so far. Still, there are numerous examples
on different levels (national, regional, local, household) making
considerable progress in limiting their own emissions and making
steps toward mitigation of and adaptation to climate change. The
local level is exceptionally important in sustainability adaptation, as
local communities are often able to adapt more flexibly to changes in
the natural environment.The aim of this paper is to attempt a review
of the national climate policy and the local climate change strategies
in Hungary considering sustainable development.
Abstract: A state of the art Speaker Identification (SI) system requires a robust feature extraction unit followed by a speaker modeling scheme for generalized representation of these features. Over the years, Mel-Frequency Cepstral Coefficients (MFCC) modeled on the human auditory system has been used as a standard acoustic feature set for SI applications. However, due to the structure of its filter bank, it captures vocal tract characteristics more effectively in the lower frequency regions. This paper proposes a new set of features using a complementary filter bank structure which improves distinguishability of speaker specific cues present in the higher frequency zone. Unlike high level features that are difficult to extract, the proposed feature set involves little computational burden during the extraction process. When combined with MFCC via a parallel implementation of speaker models, the proposed feature set outperforms baseline MFCC significantly. This proposition is validated by experiments conducted on two different kinds of public databases namely YOHO (microphone speech) and POLYCOST (telephone speech) with Gaussian Mixture Models (GMM) as a Classifier for various model orders.
Abstract: This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes are assumed to know their coordinates, the straight line distance between each pair of them can be calculated and then compared with the corresponding hop distance, which in this paper equals hop counts × node-s transmission range R. Dramatic difference may emerge because of an existing wormhole. Our detection mechanism is based on this. The approximate location of the wormhole can also be derived in further steps based on this information. To the best of our knowledge, our method is much easier than other wormhole detecting schemes which also use beacon nodes, and to those have special requirements on each nodes (e.g., GPS receivers or tightly synchronized clocks or directional antennas), ours is more economical. Simulation results show that the algorithm is successful in detecting and locating wormholes when the density of beacon nodes reaches 0.008 per m2.
Abstract: Web intelligence, if made personal, can fuel the process of building communications around the interests and preferences of each individual customer or prospect, by providing specific behavioral insights about each individual. To become fully efficient, Web intelligence must reach a stage of a high-level maturity, passing throughout a process that involves five steps: (1) Web site analysis; (2) Web site and advertising optimization; (3) Segment targeting; (4) Interactive marketing (online only); and (5) Interactive marketing (online and offline). Discussing these steps in detail, the paper uncovers the real gold mine that is personal-level Web intelligence.
Abstract: Recently, fast neural networks for object/face
detection were presented in [1-3]. The speed up factor of these
networks relies on performing cross correlation in the frequency
domain between the input image and the weights of the hidden
layer. But, these equations given in [1-3] for conventional and fast
neural networks are not valid for many reasons presented here. In
this paper, correct equations for cross correlation in the spatial and
frequency domains are presented. Furthermore, correct formulas for
the number of computation steps required by conventional and fast
neural networks given in [1-3] are introduced. A new formula for
the speed up ratio is established. Also, corrections for the equations
of fast multi scale object/face detection are given. Moreover,
commutative cross correlation is achieved. Simulation results show
that sub-image detection based on cross correlation in the frequency
domain is faster than classical neural networks.
Abstract: As emails communications have no consistent
authentication procedure to ensure the authenticity, we present an
investigation analysis approach for detecting forged emails based on
Random Forests and Naïve Bays classifiers. Instead of investigating
the email headers, we use the body content to extract a unique writing
style for all the possible suspects. Our approach consists of four main
steps: (1) The cybercrime investigator extract different effective
features including structural, lexical, linguistic, and syntactic
evidence from previous emails for all the possible suspects, (2) The
extracted features vectors are normalized to increase the accuracy
rate. (3) The normalized features are then used to train the learning
engine, (4) upon receiving the anonymous email (M); we apply the
feature extraction process to produce a feature vector. Finally, using
the machine learning classifiers the email is assigned to one of the
suspects- whose writing style closely matches M. Experimental
results on real data sets show the improved performance of the
proposed method and the ability of identifying the authors with a
very limited number of features.
Abstract: This paper presents the visual control flow support of Visual Modeling and Transformation System (VMTS), which facilitates composing complex model transformations out of simple transformation steps and executing them. The VMTS Visual Control Flow Language (VCFL) uses stereotyped activity diagrams to specify control flow structures and OCL constraints to choose between different control flow branches. This work discusses the termination properties of VCFL and provides an algorithm to support the termination analysis of VCFL transformations.
Abstract: Carbon fibers are fabricated from different materials,
such as special polyacrylonitrile (PAN) fibers, rayon fibers and pitch.
Among these three groups of materials, PAN fibers are the most
widely used precursor for the manufacture of carbon fibers. The
process of fabrication carbon fibers from special PAN fibers includes
two steps; oxidative stabilization at low temperature and
carbonization at high temperatures in an inert atmosphere. Due to the
high price of raw materials (special PAN fibers), carbon fibers are
still expensive.
In the present work the main goal is making carbon fibers from
low price commercial PAN fibers with modified chemical
compositions. The results show that in case of conducting completes
stabilization process, it is possible to produce carbon fibers with
desirable tensile strength from this type of PAN fibers. To this
matter, thermal characteristics of commercial PAN fibers were
investigated and based upon the obtained results, with some changes
in conventional procedure of stabilization in terms of temperature
and time variables; the desirable conditions of complete stabilization
is achieved.
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.
Abstract: Here, a new idea to speed up the operation of
complex valued time delay neural networks is presented. The whole
data are collected together in a long vector and then tested as a one
input pattern. The proposed fast complex valued time delay neural
networks uses cross correlation in the frequency domain between the
tested data and the input weights of neural networks. It is proved
mathematically that the number of computation steps required for
the presented fast complex valued time delay neural networks is less
than that needed by classical time delay neural networks. Simulation
results using MATLAB confirm the theoretical computations.
Abstract: This study defines a methodology to compute unitary costs for freight transportation modes. The main objective was to gather relevant costs data to support the formulation and evaluation of railway, road, pipelines and port projects. This article will concentrate on the following steps: Compilation and analysis of relevant modal cost studies, Methodological adjustments to make cost figures comparable between studies, Definition of typology and scope of transportation modes, Analysis and validation of cost values for relevant freight transportation modes in Chile. In order to define the comparison methodology for the costs between the different transportation modes, it was necessary to consider that the relevant cost depends on who performs the comparison. Thus, for the transportation user (e.g. exporter) the pertinent costs are the mode tariffs, whereas from the operators perspective (e.g. rail manager), the pertinent costs are the operating costs of each mode.
Abstract: For sterilization of Phalaenopsis culture medium without autoclaving, selected single sterilizing agents and in combinations were added to a 25ml Hyponex medium in a 120ml glass container. Treated liquid and solid media, supplemented with sterilizing agents, were compared to a control medium, autoclaved at 121°C for 15min. It was found that 90(L of 10% povidone-iodine, 150(L of 5.25% sodium hypochlorite, 150(L of 2% mercurochrome, 90(L of 2.5% iodine + 2.5% potassium iodine in combination with 10% providone-iodine (1:3) and 30(L of 2.5% iodine + 2.5% potassium iodide in combination with 2% mercurochrome showed 100% sterile conditions in liquid medium but provided 75, 100, 50, 75 and 80% sterile conditions, respectively, in solid medium. For growth of Phalaenopsis protocorms, 90(L of 10% povidone-iodine in liquid Hyponex medium gave the comparable growth of protocorms to control medium while 150(L of 5.25% sodium hypochlorite in solid medium provided the promising growth of protocorms. Growth of protocorms, whole fresh weight, numbers of leaf and root, root length and number of protocorm-like bodies, was discussed.