Abstract: Date palm (Phoenix dactylifera L.) seeds are waste streams which are considered a major problem to the food industry. They contain potentially useful protein (10-15% of the whole date-s weight). Global production, industrialisation and utilisation of dates are increasing steadily. The worldwide production of date palm fruit has increased from 1.8 million tons in 1961 to 6.9 million tons in 2005, thus from the global production of dates are almost 800.000 tonnes of date palm seeds are not currently used [1]. The current study was carried out to convert the date palm seeds into useful protein powder. Compositional analysis showed that the seeds were rich in protein and fat 5.64 and 8.14% respectively. We used several laboratory scale methods to extract proteins from seed to produce a high protein powder. These methods included simple acid or alkali extraction, with or without ultrafiltration and phenol trichloroacetic acid with acetone precipitation (Ph/TCA method). The highest protein content powder (68%) was obtained by Ph/TCA method with yield of material (44%) whereas; the use of just alkali extraction gave the lowest protein content of 8%, and a yield of 32%.
Abstract: Text categorization is the problem of classifying text documents into a set of predefined classes. After a preprocessing step the documents are typically represented as large sparse vectors. When training classifiers on large collections of documents, both the time and memory restrictions can be quite prohibitive. This justifies the application of features selection methods to reduce the dimensionality of the document-representation vector. Four feature selection methods are evaluated: Random Selection, Information Gain (IG), Support Vector Machine (called SVM_FS) and Genetic Algorithm with SVM (GA_FS). We showed that the best results were obtained with SVM_FS and GA_FS methods for a relatively small dimension of the features vector comparative with the IG method that involves longer vectors, for quite similar classification accuracies. Also we present a novel method to better correlate SVM kernel-s parameters (Polynomial or Gaussian kernel).
Abstract: This study focuses on examining why the range of
experience with respect to HIV infection is so diverse, especially in
regard to the latency period. An agent-based approach in modelling
the infection is used to extract high-level behaviour which cannot be
obtained analytically from the set of interaction rules at the cellular
level. A prototype model encompasses local variation in baseline
properties, contributing to the individual disease experience, and is
included in a network which mimics the chain of lymph nodes. The
model also accounts for stochastic events such as viral mutations.
The size and complexity of the model require major computational
effort and parallelisation methods are used.
Abstract: This study was conducted to determine the
objectivity, reliability and validity of the 90º push-ups test protocol
among male and female students of Sports Science Program, Faculty
of Sports Science and Coaching Sultan Idris University of Education.
Samples (n = 300), consisted of males (n = 168) and females (n =
132) students were randomly selected for this study. Researchers
tested the 90º push-ups on the sample twice in a single trial, test and
re-test protocol in the bench press test. Pearson-Product Moment
Correlation method's was used to determine the value of objectivity,
reliability and validity testing. The findings showed that the 900 pushups
test protocol showed high consistency between the two testers
with a value of r = .99. Likewise, The reliability value between test
and re-test for the 90º push-ups test for the male (r=.93) and female
(r=.93) students was also high. The results showed a correlation
between 90º push-ups test and bench press test for boys was r = .64
and girls was r = .28. This finding indicates that the use of the 90º
push-ups to test muscular strength and endurance in the upper body
of males has a higher validity values than female students.
Abstract: Groundlessness of application probability-statistic methods are especially shown at an early stage of the aviation GTE technical condition diagnosing, when the volume of the information has property of the fuzzy, limitations, uncertainty and efficiency of application of new technology Soft computing at these diagnosing stages by using the fuzzy logic and neural networks methods. It is made training with high accuracy of multiple linear and nonlinear models (the regression equations) received on the statistical fuzzy data basis. At the information sufficiency it is offered to use recurrent algorithm of aviation GTE technical condition identification on measurements of input and output parameters of the multiple linear and nonlinear generalized models at presence of noise measured (the new recursive least squares method (LSM)). As application of the given technique the estimation of the new operating aviation engine D30KU-154 technical condition at height H=10600 m was made.
Abstract: In present days the area of data migration is very topical. Current tools for data migration in the area of relational database have several disadvantages that are presented in this paper. We propose a methodology for data migration of the database tables and their data between various types of relational database systems (RDBMS). The proposed methodology contains an expert system. The expert system contains a knowledge base that is composed of IFTHEN rules and based on the input data suggests appropriate data types of columns of database tables. The proposed tool, which contains an expert system, also includes the possibility of optimizing the data types in the target RDBMS database tables based on processed data of the source RDBMS database tables. The proposed expert system is shown on data migration of selected database of the source RDBMS to the target RDBMS.
Abstract: In this paper, we propose an approach of unsupervised
segmentation with fuzzy connectedness. Valid seeds are first specified
by an unsupervised method based on scale space theory. A region is
then extracted for each seed with a relative object extraction method of
fuzzy connectedness. Afterwards, regions are merged according to the
values between them of an introduced measure. Some theorems and
propositions are also provided to show the reasonableness of the
measure for doing mergence. Experiment results on a synthetic image,
a color image and a large amount of MR images of our method are
reported.
Abstract: A Positron Emission Tomography (PET) is a radioisotope imaging technique that illustrates the organs and the metabolisms of the human body. This technique is based on the simultaneous detection of 511 keV annihilation photons, annihilated as a result of electrons annihilating positrons that radiate from positron-emitting radioisotopes that enter biological active molecules in the body. This study was conducted on ten patients in an effort to conduct patient-related experimental studies. Dosage monitoring for the bladder, which was the organ that received the highest dose during PET applications, was conducted for 24 hours. Assessment based on measuring urination activities after injecting patients was also a part of this study. The MIRD method was used to conduct dosage calculations for results obtained from experimental studies. Results obtained experimentally and theoretically were assessed comparatively.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: Primary studies are being carried out in Turkey for
expanding information and communication technologies (ICT) aided instruction activities. Subject of the present study is to identify
whether those studies achieved their goals in the application. Information technologies (IT) formative teachers in the primary
schools, and academicians in the faculties of education were interviewed to investigate the process and results of implementing
computer-aided instruction methods whose basis is strengthened in theory. Analysis of the results gained from two separate surveys
demonstrated that capability of the teachers in elementary education institutions for carrying into effect computer-aided instruction and
technical infrastructure has not been established for computer-aided instruction practices yet. Prospective teachers must be well-equipped in ICT to duly fulfill requirements of modern education and also
must be self-confident. Finally, scope and intensity of the courses given in connection with teaching of the ICT in faculties of education needs to be revised.
Abstract: Explosive welding is a process which uses explosive
detonation to move the flyer plate material into the base material to
produce a solid state joint. Experimental tests have been carried out
by other researchers; have been considered to explosively welded
aluminium 7039 and steel 4340 tubes in one step. The tests have been
done using various stand-off distances and explosive ratios. Various
interface geometries have been obtained from these experiments. In
this paper, all the experiments carried out were simulated using the
finite element method. The flyer plate and collision velocities
obtained from the analysis were validated by the pin-measurement
experiments. The numerical results showed that very high localized
plastic deformation produced at the bond interface. The
Ls_dyna_971 FEM has been used for all simulation process.
Abstract: In this paper a multi-objective nonlinear programming
model of cellular manufacturing system is presented which minimize
the intercell movements and maximize the sum of reliability of cells.
We present a genetic approach for finding efficient solutions to the
problem of cell formation for products having multiple routings.
These methods find the non-dominated solutions and according to
decision makers prefer, the best solution will be chosen.
Abstract: Urinary Tract Infections (UTI) account for an estimated 25-40% nosocomial infection, out of which 90% are associated with urinary catheter, called Catheter associated urinary tract infection (CAUTI). The microbial populations within CAUTI frequently develop as biofilms. In the present study, microbial contamination of indwelling urinary catheters was investigated. Biofilm forming ability of the isolates was determined by tissue culture plate method. Prevention of biofilm formation in the urinary catheter by Pseudomonas aeruginosa was also determined by coating the catheter with some enzymes, gentamycin and EDTA. It was found that 64% of the urinary catheters get contaminated during the course of catheterization. Of the total 6 isolates, biofilm formation was seen in 100% Pseudomonas aeruginosa and E. coli, 90% in Enterococci, 80% in Klebsiella and 66% in S. aureus. It was noted that the biofilm production by Pseudomonas was prolonged by 7 days in amylase, 8 days in protease, 6 days in lysozyme, 7days in gentamycin and 5 days in EDTA treated catheter.
Abstract: The effects of equilibrium time, solution pH, and
sorption temperature of cationic methylene blue (MB) adsorption on nanoporous metallosilicoaluminophosphate ZnAPSO-34 was studied
using a batch equilibration method. UV–VIS spectroscopy was used
to obtain the adsorption isotherms at 20° C. The optimum period for
adsorption was 300 min. However, MB removal increased from
81,82 % to 94,81 %. The equilibrium adsorption data was analyzed
by using Langmuir, Freundlich and Temkin isotherm models.
Langmuir isotherm was found to be the better-fitting model and the process followed pseudo second–order kinetics. The results showed
that ZnAPSO-34 could be employed as an effective material and could be an attractive alternative for the removal of dyes and colors
from aqueous solutions.
Abstract: A new method for color image segmentation using fuzzy logic is proposed in this paper. Our aim here is to automatically produce a fuzzy system for color classification and image segmentation with least number of rules and minimum error rate. Particle swarm optimization is a sub class of evolutionary algorithms that has been inspired from social behavior of fishes, bees, birds, etc, that live together in colonies. We use comprehensive learning particle swarm optimization (CLPSO) technique to find optimal fuzzy rules and membership functions because it discourages premature convergence. Here each particle of the swarm codes a set of fuzzy rules. During evolution, a population member tries to maximize a fitness criterion which is here high classification rate and small number of rules. Finally, particle with the highest fitness value is selected as the best set of fuzzy rules for image segmentation. Our results, using this method for soccer field image segmentation in Robocop contests shows 89% performance. Less computational load is needed when using this method compared with other methods like ANFIS, because it generates a smaller number of fuzzy rules. Large train dataset and its variety, makes the proposed method invariant to illumination noise
Abstract: The belief decision tree (BDT) approach is a decision
tree in an uncertain environment where the uncertainty is represented
through the Transferable Belief Model (TBM), one interpretation
of the belief function theory. The uncertainty can appear either in
the actual class of training objects or attribute values of objects to
classify. In this paper, we develop a post-pruning method of belief
decision trees in order to reduce size and improve classification
accuracy on unseen cases. The pruning of decision tree has a
considerable intention in the areas of machine learning.
Abstract: There are many automotive accidents due to blind spots and driver inattentiveness. Blind spot is the area that is invisible to the driver's viewpoint without head rotation. Several methods are available for assisting the drivers. Simplest methods are — rear mirrors and wide-angle lenses. But, these methods have a disadvantage of the requirement for human assistance. So, the accuracy of these devices depends on driver. Another approach called an automated approach that makes use of sensors such as sonar or radar. These sensors are used to gather range information. The range information will be processed and used for detecting the collision. The disadvantage of this system is — low angular resolution and limited sensing volumes. This paper is a panoramic sensor based automotive vehicle monitoring..
Abstract: The mechanical properties of granular solids are
dependent on the flow of stresses from one particle to another
through inter-particle contact. Although some experimental methods
have been used to study the inter-particle contacts in the past,
preliminary work with these techniques indicated that they do not
have the necessary resolution to distinguish between those contacts
that transmit the load and those that do not, especially for systems
with a wide distribution of particle sizes. In this research, computer
simulations are used to study the nature and distribution of contacts
in a compact with wide particle size distribution, representative of
aggregate size distribution used in asphalt pavement construction.
The packing fraction, the mean number of contacts and the
distribution of contacts were studied for different scenarios. A
methodology to distinguish and compute the fraction of load-bearing
particles and the fraction of space-filling particles (particles that do
not transmit any force) is needed for further investigation.
Abstract: It has been established that microRNAs (miRNAs) play
an important role in gene expression by post-transcriptional regulation
of messengerRNAs (mRNAs). However, the precise relationships
between microRNAs and their target genes in sense of numbers,
types and biological relevance remain largely unclear. Dissecting the
miRNA-target relationships will render more insights for miRNA
targets identification and validation therefore promote the understanding
of miRNA function. In miRBase, miRanda is the key
algorithm used for target prediction for Zebrafish. This algorithm
is high-throughput but brings lots of false positives (noise). Since
validation of a large scale of targets through laboratory experiments
is very time consuming, several computational methods for miRNA
targets validation should be developed. In this paper, we present an
integrative method to investigate several aspects of the relationships
between miRNAs and their targets with the final purpose of extracting
high confident targets from miRanda predicted targets pool. This is
achieved by using the techniques ranging from statistical tests to
clustering and association rules. Our research focuses on Zebrafish.
It was found that validated targets do not necessarily associate with
the highest sequence matching. Besides, for some miRNA families,
the frequency of their predicted targets is significantly higher in the
genomic region nearby their own physical location. Finally, in a case
study of dre-miR-10 and dre-miR-196, it was found that the predicted
target genes hoxd13a, hoxd11a, hoxd10a and hoxc4a of dre-miR-
10 while hoxa9a, hoxc8a and hoxa13a of dre-miR-196 have similar
characteristics as validated target genes and therefore represent high
confidence target candidates.
Abstract: With increasing utilization of the wireless devices in
different fields such as medical devices and industrial fields, the
paper presents a method for simplify the Bluetooth packets with
throughput enhancing. The paper studies a vital issue in wireless
communications, which is the throughput of data over wireless
networks. In fact, the Bluetooth and ZigBee are a Wireless Personal
Area Network (WPAN). With taking these two systems competition
consideration, the paper proposes different schemes for improve the
throughput of Bluetooth network over a reliable channel. The
proposition depends on the Channel Quality Driven Data Rate
(CQDDR) rules, which determines the suitable packet in the
transmission process according to the channel conditions. The
proposed packet is studied over additive White Gaussian Noise
(AWGN) and fading channels. The Experimental results reveal the
capability of extension of the PL length by 8, 16, 24 bytes for classic
and EDR packets, respectively. Also, the proposed method is suitable
for the low throughput Bluetooth.