Abstract: The noteworthy point in the advancement of Brain Machine Interface (BMI) research is the ability to accurately extract features of the brain signals and to classify them into targeted control action with the easiest procedures since the expected beneficiaries are of disabled. In this paper, a new feature extraction method using the combination of adaptive band pass filters and adaptive autoregressive (AAR) modelling is proposed and applied to the classification of right and left motor imagery signals extracted from the brain. The introduction of the adaptive bandpass filter improves the characterization process of the autocorrelation functions of the AAR models, as it enhances and strengthens the EEG signal, which is noisy and stochastic in nature. The experimental results on the Graz BCI data set have shown that by implementing the proposed feature extraction method, a LDA and SVM classifier outperforms other AAR approaches of the BCI 2003 competition in terms of the mutual information, the competition criterion, or misclassification rate.
Abstract: Prickly pear (Opuntia spp) fruit has received renewed
interest since it contains a betalain pigment that has an attractive
purple colour for the production of juice. Prickly pear juice was
prepared by homogenizing the fruit and treating the pulp with 48 g of
pectinase from Aspergillus niger. Titratable acidity was determined
by diluting 10 ml prickly pear juice with 90 ml deionized water and
titrating to pH 8.2 with 0.1 N NaOH. Brix was measured using a
refractometer and ascorbic acid content assayed
spectrophotometrically. Colour variation was determined
colorimetrically (Hunter L.a.b.). Hunter L.a.b. analysis showed that
the red purple colour of prickly pear juice had been affected by juice
treatments. This was indicated by low light values of colour
difference meter (CDML*), hue, CDMa* and CDMb* values. It was
observed that non-treated prickly pear juice had a high (colour
difference meter of light) CDML* of 3.9 compared to juice
treatments (range 3.29 to 2.14). The CDML* significantly (p
Abstract: This paper presents a model for an unreliable
production line, which is operated according to demand with constant
work-in-process (CONWIP). A simulation model is developed based
on the discrete model and several case problems are analyzed using
the model. The model is utilized to optimize storage space capacities
at intermediate stages and the number of kanbans at the last stage,
which is used to trigger the production at the first stage. Furthermore,
effects of several line parameters on production rate are analyzed
using design of experiments.
Abstract: Managers as the key employees have a very important role in maintaining the workforce performance which is critical to the
construction companies- success in the future. If motivated employees start with motivated managers probably it would seem
plausible if the de-motivated ones start with de-motivated managers. This study aims to analyze the importance of motivated managers to
their successes and construction companies- successes. In this study,
a quantitative method was used and the study area was in Medan, North Sumatera. Questionnaire survey was distributed directly to
construction companies in Medan which are listed in the
Construction Services Development Board. A total of 60 managers responded and the completed questionnaires were analyzed using the
descriptive analysis. The results indicated that the respondents acknowledge the importance of motivation among themselves to the
projects and construction companies- success, implying that it is vital o maintain the motivation and good performance of the workforce.
Abstract: Checkpointing is one of the commonly used techniques to provide fault-tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence, checkpointing protocols having lesser number of synchronization messages and fewer checkpoints are preferred in mobile environment. There are two different approaches, although not orthogonal, to checkpoint mobile computing systems namely, time-based and index-based. Our protocol is a fusion of these two approaches, though not first of its kind. In the present exposition, an index-based checkpointing protocol has been developed, which uses time to indirectly coordinate the creation of consistent global checkpoints for mobile computing systems. The proposed algorithm is non-blocking, adaptive, and does not use any control message. Compared to other contemporary checkpointing algorithms, it is computationally more efficient because it takes lesser number of checkpoints and does not need to compute dependency relationships. A brief account of important and relevant works in both the fields, time-based and index-based, has also been included in the presentation.
Abstract: Dill (Anethum graveolens L.) is a popular herb used in
many regions, including Baltic countries. Dill is widely used for
flavoring foods and beverages due to its pleasant spicy aroma. The
aim of this work was to determine the best blanching method for
processing of dill prior to microwave vacuum drying based on
sensory properties, color and volatile compounds in dried product.
Two blanching mediums were used – water and steam, and for part of
samples microwave pretreatment was additionally used. Evaluation of
dried dill volatile aroma compounds, color changes and sensory
attributes was performed. Results showed that blanching significantly
influences the quality of dried dill. After evaluation of volatile aroma
compounds, color and sensory properties of microwave vacuum dried
dill, as the best method for dill pretreatment was established
blanching at 90 °C for 30 s.
Abstract: In this paper we present our results on the performance analysis of a multi-product manufacturing line. We study the influence of external perturbations, intermediate buffer content and the number of manufacturing stages on the production tracking error of each machine in the multi-product line operated under a surplusbased production control policy. Starting by the analysis of a single machine with multiple production stages (one for each product type), we provide bounds on the production error of each stage. Then, we extend our analysis to a line of multi-stage machines, where similarly, bounds on each production tracking error for each product type, as well as buffer content are obtained. Details on performance of the closed-loop flow line model are illustrated in numerical simulations.
Abstract: Security management has changed from the
management of security equipments and useful interface to manager.
It analyzes the whole security conditions of network and preserves the
network services from attacks. Secure router technology has security
functions, such as intrusion detection, IPsec(IP Security) and access
control, are applied to legacy router for secure networking. It controls
an unauthorized router access and detects an illegal network intrusion.
This paper relates to a security engine management of router based on
a security policy, which is the definition of security function against a
network intrusion. This paper explains the security policy and designs
the structure of security engine management framework.
Abstract: This paper describes a new algorithm of arrangement
in parallel, based on Odd-Even Mergesort, called division and
concurrent mixes. The main idea of the algorithm is to achieve that
each processor uses a sequential algorithm for ordering a part of the
vector, and after that, for making the processors work in pairs in
order to mix two of these sections ordered in a greater one, also
ordered; after several iterations, the vector will be completely
ordered. The paper describes the implementation of the new
algorithm on a Message Passing environment (such as MPI). Besides,
it compares the obtained experimental results with the quicksort
sequential algorithm and with the parallel implementations (also on
MPI) of the algorithms quicksort and bitonic sort. The comparison
has been realized in an 8 processors cluster under GNU/Linux which
is running on a unique PC processor.
Abstract: This paper introduces our first efforts of developing a
new team for RoboCup Middle Size Competition. In our robots we
have applied omni directional based mobile system with omnidirectional
vision system and fuzzy control algorithm to navigate
robots. The control architecture of MRL middle-size robots is a three
layered architecture, Planning, Sequencing, and Executing. It also
uses Blackboard system to achieve coordination among agents.
Moreover, the architecture should have minimum dependency on low
level structure and have a uniform protocol to interact with real
robot.
Abstract: This paper presents a new and efficient approach for
capacitor placement in radial distribution systems that determine
the optimal locations and size of capacitor with an objective of
improving the voltage profile and reduction of power loss. The
solution methodology has two parts: in part one the loss sensitivity
factors are used to select the candidate locations for the capacitor
placement and in part two a new algorithm that employs Plant growth
Simulation Algorithm (PGSA) is used to estimate the optimal size
of capacitors at the optimal buses determined in part one. The main
advantage of the proposed method is that it does not require any
external control parameters. The other advantage is that it handles the
objective function and the constraints separately, avoiding the trouble
to determine the barrier factors. The proposed method is applied to 9
and 34 bus radial distribution systems. The solutions obtained by the
proposed method are compared with other methods. The proposed
method has outperformed the other methods in terms of the quality
of solution.
Abstract: Low power consumption is a major constraint for battery-powered system like computer notebook or PDA. In the past, specialists usually designed both specific optimized equipments and codes to relief this concern. Doing like this could work for quite a long time, however, in this era, there is another significant restraint, the time to market. To be able to serve along the power constraint while can launch products in shorter production period, objectoriented programming (OOP) has stepped in to this field. Though everyone knows that OOP has quite much more overhead than assembly and procedural languages, development trend still heads to this new world, which contradicts with the target of low power consumption. Most of the prior power related software researches reported that OOP consumed much resource, however, as industry had to accept it due to business reasons, up to now, no papers yet had mentioned about how to choose the best OOP practice in this power limited boundary. This article is the pioneer that tries to specify and propose the optimized strategy in writing OOP software under energy concerned environment, based on quantitative real results. The language chosen for studying is C# based on .NET Framework 2.0 which is one of the trendy OOP development environments. The recommendation gotten from this research would be a good roadmap that can help developers in coding that well balances between time to market and time of battery.
Abstract: This paper explores the changing trend in citizenship
norms among young citizens from various ethnic groups in Malaysia
and the extent to which it influences the participation of young
citizens in political and civil issues. Embedded in democratic
constitutions are the rights and freedoms that accompany citizenship,
and these rights and freedoms include participation. Participation in
democracies should go beyond voting; it should include taking part in
the governance process. The political process is not at risk even
though politics does not work as it did in the past. A national sample
of 1697 respondents between the ages of 21 and 40 years were
interviewed in January 2011. The findings show that respondents
embrace an engaged-citizenship norm more than they do the
traditional duty-citizen norm. Among the ethnic groups, the Chinese
show lower means in both citizenship norms compared with other
ethnic groups, namely, the Malays and the Indians. The duty-citizen
norm correlates higher with political participation than with civic
participation. On the other hand, the engaged-citizen norm correlates
higher with civic participation than with political participation.
Abstract: In order to encourage the construction of green homes
(GH) in Malaysia, a simple and attainable framework for designing
and building GHs is needed. This can be achieved by aligning GH
principles against Cole-s 'Sustainable Building Criteria' (SBC). This
set of considerations was used to categorize the GH features of three
case studies from Malaysia. Although the categorization of building
features is useful at exploring the presence of sustainability
inclinations of each house, the overall impact of building features in
each of the five SBCs are unknown. Therefore, this paper explored
the possibility of quantifying the impact of building features
categorized in SBC1 – “Buildings will have to adapt to the new
environment and restore damaged ecology while mitigating resource
use" based on existing GH assessment tools and methods and other
literature. This process as reported in this paper could lead to a new
dimension in green home rating and assessment methods.
Abstract: We decribe a formal specification and verification of the Rabin public-key scheme in the formal proof system Is-abelle/HOL. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. The analysis presented uses a given database to prove formal properties of our implemented functions with computer support. Thema in task in designing a practical formalization of correctness as well as security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as eficient formal proofs. This yields the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Consequently, we get reliable proofs with a minimal error rate augmenting the used database. This provides a formal basis for more computer proof constructions in this area.
Abstract: Diagnostic and detection of the arterial stiffness is
very important; which gives indication of the associated increased risk of cardiovascular diseases. To make a cheap and easy method for general screening technique to avoid the future cardiovascular
complexes , due to the rising of the arterial stiffness ; a proposed algorithm depending on photoplethysmogram to be used. The
photoplethysmograph signals would be processed in MATLAB. The
signal will be filtered, baseline wandering removed, peaks and
valleys detected and normalization of the signals should be achieved
.The area under the catacrotic phase of the photoplethysmogram
pulse curve is calculated using trapezoidal algorithm ; then will used
in cooperation with other parameters such as age, height, blood
pressure in neural network for arterial stiffness detection. The Neural
network were implemented with sensitivity of 80%, accuracy 85%
and specificity of 90% were got from the patients data. It is
concluded that neural network can detect the arterial STIFFNESS
depending on risk factor parameters.
Abstract: The dynamic speckle or biospeckle is an interference
phenomenon generated at the reflection of a coherent light by an
active surface or even by a particulate or living body surface. The
above mentioned phenomenon gave scientific support to a method
named biospeckle which has been employed to study seed viability,
biological activity, tissue senescence, tissue water content, fruit
bruising, etc. Since the above mentioned method is not invasive and
yields numerical values, it can be considered for possible automation
associated to several processes, including selection and sorting.
Based on these preliminary considerations, this research work
proposed to study the interaction of a laser beam with vegetative
samples by measuring the incident light intensity and the transmitted
light beam intensity at several vegetative slabs of varying thickness.
Tests were carried on fifteen slices of apple tissue divided into three
thickness groups, i.e., 4 mm, 5 mm, 18 mm and 22 mm. A diode laser
beam of 10mW and 632 nm wavelength and a Samsung digital
camera were employed to carry the tests. Outgoing images were
analyzed by comparing the gray gradient of a fixed image column of
each image to obtain a laser penetration scale into the tissue,
according to the slice thickness.
Abstract: The history of money is described in relationship to the history of computing. With the transformation and acceptance of money as information, major challenges to the security of money have involved engineering, computer science, and management. Research opportunities and challenges are described as money continues its transformation into information.
Abstract: As a result of traffic congestion caused by sightseeing
and shuttle buses using park-and-ride parking lot near sightseeing spot,
the waiting time for tourist increases. In this paper, when bus parking
lot near sightseeing spot are overcrowded and full, a model for tourists
getting off a bus on a congested road and transfer to the sightseeing
spot by foot is proposed and verified. A model of getting off a bus on a
congested road when the sightseeing parking lot is overcrowded was
considered by the case analysis. As a result, effectiveness of the model
of getting off a bus on a congested road could be quantitatively
verified for times when parking capacity is exceeded and the bus
parking lot next to the sightseeing spot is overcrowded.
Abstract: Identifying parameters in an epidemic model is one
of the important aspect of modeling. In this paper, we suggest a
method to identify the transmission rate by using the multistage
Adomian decomposition method. As a case study, we use the data of
the reported dengue fever cases in the city of Shah Alam, Malaysia.
The result obtained fairly represents the actual situation. However, in
the SIR model, this method serves as an alternative in parameter
identification and enables us to make necessary analysis for a smaller
interval.