Abstract: commercially produced in Malaysia granular
palm shell activated carbon (PSAC) was biomodified with
bacterial biomass (Bacillus subtilis) to produce a hybrid
biosorbent of higher efficiency. The obtained biosorbent was
evaluated in terms of adsorption capacity to remove copper
and zinc metal ions from aqueous solutions. The adsorption
capacity was evaluated in batch adsorption experiments where
concentrations of metal ions varied from 20 to 350 mg/L. A
range of pH from 3 to 6 of aqueous solutions containing metal
ions was tested. Langmuir adsorption model was used to
interpret the experimental data. Comparison of the adsorption
data of the biomodified and original palm shell activated
carbon showed higher uptake of metal ions by the hybrid
biosorbent. A trend in metal ions uptake increase with the
increase in the solution-s pH was observed. The surface
characterization data indicated a decrease in the total surface
area for the hybrid biosorbent; however the uptake of copper
and zinc by it was at least equal to the original PSAC at pH 4
and 5. The highest capacity of the hybrid biosorbent was
observed at pH 5 and comprised 22 mg/g and 19 mg/g for
copper and zinc, respectively. The adsorption capacity at the
lowest pH of 3 was significantly low. The experimental results
facilitated identification of potential factors influencing the
adsorption of copper and zinc onto biomodified and original
palm shell activated carbon.
Abstract: In this paper, a semi-fragile watermarking scheme is proposed for color image authentication. In this particular scheme, the color image is first transformed from RGB to YST color space, suitable for watermarking the color media. Each channel is divided into 4×4 non-overlapping blocks and its each 2×2 sub-block is selected. The embedding space is created by setting the two LSBs of selected sub-block to zero, which will hold the authentication and recovery information. For verification of work authentication and parity bits denoted by 'a' & 'p' are computed for each 2×2 subblock. For recovery, intensity mean of each 2×2 sub-block is computed and encoded upto six to eight bits depending upon the channel selection. The size of sub-block is important for correct localization and fast computation. For watermark distribution 2DTorus Automorphism is implemented using a private key to have a secure mapping of blocks. The perceptibility of watermarked image is quite reasonable both subjectively and objectively. Our scheme is oblivious, correctly localizes the tampering and able to recovery the original work with probability of near one.
Abstract: This paper proposes an Interactive Chinese Character
Learning System (ICCLS) based on pictorial evolution as an
edutainment concept in computer-based learning of language. The
advantage of the language origination itself is taken as a learning
platform due to the complexity in Chinese language as compared to
other types of languages. Users especially children enjoy more by
utilize this learning system because they are able to memories the
Chinese Character easily and understand more of the origin of the
Chinese character under pleasurable learning environment, compares
to traditional approach which children need to rote learning Chinese
Character under un-pleasurable environment. Skeletonization is used
as the representation of Chinese character and object with an animated
pictograph evolution to facilitate the learning of the language. Shortest
skeleton path matching technique is employed for fast and accurate
matching in our implementation. User is required to either write a
word or draw a simple 2D object in the input panel and the matched
word and object will be displayed as well as the pictograph evolution
to instill learning. The target of computer-based learning system is for
pre-school children between 4 to 6 years old to learn Chinese
characters in a flexible and entertaining manner besides utilizing
visual and mind mapping strategy as learning methodology.
Abstract: The prediction of long-term deformations of concrete and reinforced concrete structures has been a field of extensive research and several different creep models have been developed so far. Most of the models were developed for constant concrete stresses, thus, in case of varying stresses a specific superposition principle or time-integration, respectively, is necessary. Nowadays, when modeling concrete creep the engineering focus is rather on the application of sophisticated time-integration methods than choosing the more appropriate creep model. For this reason, this paper presents a method to quantify the uncertainties of creep prediction originating from the selection of creep models or from the time-integration methods. By adapting variance based global sensitivity analysis, a methodology is developed to quantify the influence of creep model selection or choice of time-integration method. Applying the developed method, general recommendations how to model creep behavior for varying stresses are given.
Abstract: this scientific article considers the peculiarities of
ecology of culture and ecological outlook from cultural and
anthropological aspect of Turkic languages speaking peoples in the
Central Asia. The ecology of culture of Turkic languages speaking
peoples in the Central Asia, formed under the influence of climatic,
geographical, economic, religious, ethno cultural and political factors
and defining the originality of traditions which have laid down in its
basis and functioned, as its components, causes an interest and
urgency simultaneously, representing the sample of life of the Person
in the World by which it is necessary to be guided today.
Abstract: The pollution of sediments sampled from the North
Port by polycyclic aromatic hydrocarbons (PAHs) was investigated.
Concentrations of PAHs estimated in the port sediments ranged from
199 to 2851.2 μg/kg dw. The highest concentration was found which
is closed to the Berth line, this locations affected by intensive
shipping activities and Land based runoff and they were dominated
by the high molecular weight PAHs (4–6- rings). Source
identification showed that PAHs originated mostly from the
pyrogenic source either from the combustion of fossil fuels, grass,
wood and coal (majority of the samples). Ecological Risk Assessment
on the port sediments presented that slightly adverse ecological
effects to biological community are expected to occur at the vicinity
of the stations 1 and 4. Thus PAHs are not considered as pollutants of
concern in the North Port.
Abstract: Recently, genetic algorithms (GA) and particle swarm optimization (PSO) technique have attracted considerable attention among various modern heuristic optimization techniques. The GA has been popular in academia and the industry mainly because of its intuitiveness, ease of implementation, and the ability to effectively solve highly non-linear, mixed integer optimization problems that are typical of complex engineering systems. PSO technique is a relatively recent heuristic search method whose mechanics are inspired by the swarming or collaborative behavior of biological populations. In this paper both PSO and GA optimization are employed for finding stable reduced order models of single-input- single-output large-scale linear systems. Both the techniques guarantee stability of reduced order model if the original high order model is stable. PSO method is based on the minimization of the Integral Squared Error (ISE) between the transient responses of original higher order model and the reduced order model pertaining to a unit step input. Both the methods are illustrated through numerical example from literature and the results are compared with recently published conventional model reduction technique.
Abstract: The objective of this paper is to study the electrical
resistivity complexity between field and laboratory measurement, in
order to improve the effectiveness of data interpretation for
geophysical ground resistivity survey. The geological outcrop in
Penang, Malaysia with an obvious layering contact was chosen as the
study site. Two dimensional geoelectrical resistivity imaging were
used in this study to maps the resistivity distribution of subsurface,
whereas few subsurface sample were obtained for laboratory
advance. In this study, resistivity of samples in original conditions is
measured in laboratory by using time domain low-voltage technique,
particularly for granite core sample and soil resistivity measuring set
for soil sample. The experimentation results from both schemes are
studied, analyzed, calibrated and verified, including basis and
correlation, degree of tolerance and characteristics of substance.
Consequently, the significant different between both schemes is
explained comprehensively within this paper.
Abstract: Statistical learning theory was developed by Vapnik. It
is a learning theory based on Vapnik-Chervonenkis dimension. It also
has been used in learning models as good analytical tools. In general, a
learning theory has had several problems. Some of them are local
optima and over-fitting problems. As well, statistical learning theory
has same problems because the kernel type, kernel parameters, and
regularization constant C are determined subjectively by the art of
researchers. So, we propose an evolutionary statistical learning theory
to settle the problems of original statistical learning theory.
Combining evolutionary computing into statistical learning theory,
our theory is constructed. We verify improved performances of an
evolutionary statistical learning theory using data sets from KDD cup.
Abstract: The authors present an algorithm for order reduction of linear dynamic systems using the combined advantages of stability equation method and the error minimization by Genetic algorithm. The denominator of the reduced order model is obtained by the stability equation method and the numerator terms of the lower order transfer function are determined by minimizing the integral square error between the transient responses of original and reduced order models using Genetic algorithm. The reduction procedure is simple and computer oriented. It is shown that the algorithm has several advantages, e.g. the reduced order models retain the steady-state value and stability of the original system. The proposed algorithm has also been extended for the order reduction of linear multivariable systems. Two numerical examples are solved to illustrate the superiority of the algorithm over some existing ones including one example of multivariable system.
Abstract: Digital watermarking has become an important technique for copyright protection but its robustness against attacks remains a major problem. In this paper, we propose a normalizationbased robust image watermarking scheme. In the proposed scheme, original host image is first normalized to a standard form. Zernike transform is then applied to the normalized image to calculate Zernike moments. Dither modulation is adopted to quantize the magnitudes of Zernike moments according to the watermark bit stream. The watermark extracting method is a blind method. Security analysis and false alarm analysis are then performed. The quality degradation of watermarked image caused by the embedded watermark is visually transparent. Experimental results show that the proposed scheme has very high robustness against various image processing operations and geometric attacks.
Abstract: In this study, the locations and areas of commercial
accumulations were detected by using digital yellow page data. An
original buffering method that can accurately create polygons of
commercial accumulations is proposed in this paper.; by using this
method, distribution of commercial accumulations can be easily
created and monitored over a wide area. The locations, areas, and
time-series changes of commercial accumulations in the South Kanto
region can be monitored by integrating polygons of commercial
accumulations with the time-series data of digital yellow page data.
The circumstances of commercial accumulations were shown to vary
according to areas, that is, highly- urbanized regions such as the city
center of Tokyo and prefectural capitals, suburban areas near large
cities, and suburban and rural areas.
Abstract: Bendability is constrained by maximum top roller
load imparting capacity of the machine. Maximum load is
encountered during the edge pre-bending stage of roller bending.
Capacity of 3-roller plate bending machine is specified by
maximum thickness and minimum shell diameter combinations that
can be pre-bend for given plate material of maximum width.
Commercially available plate width or width of the plate that can be
accommodated on machine decides the maximum rolling width.
Original equipment manufacturers (OEM) provide the machine
capacity chart based on reference material considering perfectly
plastic material model. Reported work shows the bendability analysis
of heavy duty 3-roller plate bending machine. The input variables for
the industry are plate thickness, shell diameter and material property
parameters, as it is fixed by the design. Analytical models of
equivalent thickness, equivalent width and maximum width based on
power law material model were derived to study the bendability.
Equation of maximum width provides bendability for designed
configuration i.e. material property, shell diameter and thickness
combinations within the machine limitations. Equivalent thicknesses
based on perfectly plastic and power law material model were
compared for four different materials grades of C-Mn steel in order
to predict the bend-ability. Effect of top roller offset on the
bendability at maximum top roller load imparting capacity is
reported.
Abstract: In this work, we present for the first time in our perception an efficient digital watermarking scheme for mpeg audio layer 3 files that operates directly in the compressed data domain, while manipulating the time and subband/channel domain. In addition, it does not need the original signal to detect the watermark. Our scheme was implemented taking special care for the efficient usage of the two limited resources of computer systems: time and space. It offers to the industrial user the capability of watermark embedding and detection in time immediately comparable to the real music time of the original audio file that depends on the mpeg compression, while the end user/audience does not face any artifacts or delays hearing the watermarked audio file. Furthermore, it overcomes the disadvantage of algorithms operating in the PCMData domain to be vulnerable to compression/recompression attacks, as it places the watermark in the scale factors domain and not in the digitized sound audio data. The strength of our scheme, that allows it to be used with success in both authentication and copyright protection, relies on the fact that it gives to the users the enhanced capability their ownership of the audio file not to be accomplished simply by detecting the bit pattern that comprises the watermark itself, but by showing that the legal owner knows a hard to compute property of the watermark.
Abstract: This work represents the first review paper to explore the relationship between perfectionistic personality and borderline personality organization. The developmental origins, identity diffusion, interpersonal difficulties, and defense mechanisms that are common to both borderline personality and the interpersonal components of perfectionism are explored, and existing research on perfectionism and borderline personality is reviewed. The importance of the link between perfectionism and borderline features is discussed in terms of its contribution to the conceptual understanding of personality pathology as well as to applied clinical practices.
Abstract: Webcam systems now function as the new privileged
vantage points from which to view the city. This transformation of
CCTV technology from surveillance to promotional tool is significant
because its'scopic regime' presents, back to the public, a new virtual
'site' that sits alongside its real-time counterpart. Significantly,
thisraw 'image' data can, in fact,be co-optedand processed so as to
disrupt their original purpose. This paper will demonstrate this
disruptive capacity through an architectural project. It will reveal how
the adaption the webcam image offers a technical springboard by
which to initiate alternate urban form making decisions and subvert
the disciplinary reliance on the 'flat' orthographic plan. In so doing,
the paper will show how this 'digital material' exceeds the imagistic
function of the image; shiftingit from being a vehicle of signification
to a site of affect.
Abstract: Optimization is often a critical issue for most system
design problems. Evolutionary Algorithms are population-based,
stochastic search techniques, widely used as efficient global
optimizers. However, finding optimal solution to complex high
dimensional, multimodal problems often require highly
computationally expensive function evaluations and hence are
practically prohibitive. The Dynamic Approximate Fitness based
Hybrid EA (DAFHEA) model presented in our earlier work [14]
reduced computation time by controlled use of meta-models to
partially replace the actual function evaluation by approximate
function evaluation. However, the underlying assumption in
DAFHEA is that the training samples for the meta-model are
generated from a single uniform model. Situations like model
formation involving variable input dimensions and noisy data
certainly can not be covered by this assumption. In this paper we
present an enhanced version of DAFHEA that incorporates a
multiple-model based learning approach for the SVM approximator.
DAFHEA-II (the enhanced version of the DAFHEA framework) also
overcomes the high computational expense involved with additional
clustering requirements of the original DAFHEA framework. The
proposed framework has been tested on several benchmark functions
and the empirical results illustrate the advantages of the proposed
technique.
Abstract: Intrusion Detection Systems are increasingly a key
part of systems defense. Various approaches to Intrusion Detection
are currently being used, but they are relatively ineffective. Artificial
Intelligence plays a driving role in security services. This paper
proposes a dynamic model Intelligent Intrusion Detection System,
based on specific AI approach for intrusion detection. The
techniques that are being investigated includes neural networks and
fuzzy logic with network profiling, that uses simple data mining
techniques to process the network data. The proposed system is a
hybrid system that combines anomaly, misuse and host based
detection. Simple Fuzzy rules allow us to construct if-then rules that
reflect common ways of describing security attacks. For host based
intrusion detection we use neural-networks along with self
organizing maps. Suspicious intrusions can be traced back to its
original source path and any traffic from that particular source will
be redirected back to them in future. Both network traffic and system
audit data are used as inputs for both.
Abstract: The purpose of this research was to design costume by the inspiration from the configurations, colors and decorations of Thai Royal Barges. The researcher investigated the bibliographies and the important of the Thai Royal Water-Course Procession, configurations and decoration techniques of four Royal Barges history. Furthermore, the researcher combined the contemporary architecture which became part of the four costumes with four patterns in this research. The four costumes designed by applied the physical configuration of the Royal Barge with the fold techniques which create the geometry pattern that are part of the Royal Barge-s decoration and contemporary architecture. Therefore, the researcher united each identity color of the barges with each costume composed with the original patterns by adjusted new layout and resized. Lastly, the new attractive patterns appeared. Nevertheless, the beauty of Thai traditional still remain by using Thai painting figure with black and white color which are the prevalent colors for the contemporary architectures.
Abstract: When it comes to last, it is regarded as the critical
foundation of shoe design and development. A computer aided
methodology for various last form designs is proposed in this study.
The reverse engineering is mainly applied to the process of scanning
for the last form. Then with the minimum energy for revision of
surface continuity, the surface reconstruction of last is rebuilt by the
feature curves of the scanned last. When the surface reconstruction of
last is completed, the weighted arithmetic mean method is applied to
the computation on the shape morphing for the control mesh of last,
thus 3D last form of different sizes is generated from its original form
feature with functions remained. In the end, the result of this study is
applied to an application for 3D last reconstruction system. The
practicability of the proposed methodology is verified through later
case studies.