Abstract: This study focuses on examining why the range of
experience with respect to HIV infection is so diverse, especially in
regard to the latency period. An agent-based approach in modelling
the infection is used to extract high-level behaviour which cannot be
obtained analytically from the set of interaction rules at the cellular
level. A prototype model encompasses local variation in baseline
properties, contributing to the individual disease experience, and is
included in a network which mimics the chain of lymph nodes. The
model also accounts for stochastic events such as viral mutations.
The size and complexity of the model require major computational
effort and parallelisation methods are used.
Abstract: Groundlessness of application probability-statistic methods are especially shown at an early stage of the aviation GTE technical condition diagnosing, when the volume of the information has property of the fuzzy, limitations, uncertainty and efficiency of application of new technology Soft computing at these diagnosing stages by using the fuzzy logic and neural networks methods. It is made training with high accuracy of multiple linear and nonlinear models (the regression equations) received on the statistical fuzzy data basis. At the information sufficiency it is offered to use recurrent algorithm of aviation GTE technical condition identification on measurements of input and output parameters of the multiple linear and nonlinear generalized models at presence of noise measured (the new recursive least squares method (LSM)). As application of the given technique the estimation of the new operating aviation engine D30KU-154 technical condition at height H=10600 m was made.
Abstract: A Web-based learning tool, the Learn IN Context
(LINC) system, designed and being used in some institution-s
courses in mixed-mode learning, is presented in this paper. This
mode combines face-to-face and distance approaches to education.
LINC can achieve both collaborative and competitive learning. In
order to provide both learners and tutors with a more natural way to
interact with e-learning applications, a conversational interface has
been included in LINC. Hence, the components and essential features
of LINC+, the voice enhanced version of LINC, are described. We
report evaluation experiments of LINC/LINC+ in a real use context
of a computer programming course taught at the Université de
Moncton (Canada). The findings show that when the learning
material is delivered in the form of a collaborative and voice-enabled
presentation, the majority of learners seem to be satisfied with this
new media, and confirm that it does not negatively affect their
cognitive load.
Abstract: As the majority of faults are found in a few of its modules so there is a need to investigate the modules that are affected severely as compared to other modules and proper maintenance need to be done on time especially for the critical applications. In this paper, we have explored the different predictor models to NASA-s public domain defect dataset coded in Perl programming language. Different machine learning algorithms belonging to the different learner categories of the WEKA project including Mamdani Based Fuzzy Inference System and Neuro-fuzzy based system have been evaluated for the modeling of maintenance severity or impact of fault severity. The results are recorded in terms of Accuracy, Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). The results show that Neuro-fuzzy based model provides relatively better prediction accuracy as compared to other models and hence, can be used for the maintenance severity prediction of the software.
Abstract: The remediation of water resources pollution in
developing countries requires the application of alternative
sustainable cheaper and efficient end-of-pipe wastewater treatment
technologies. The feasibility of use of South African cheap and
abundant pine tree (Pinus patula) sawdust for development of lowcost
AC of comparable quality to expensive commercial ACs in the
abatement of water pollution was investigated. AC was developed at
optimized two-stage N2-superheated steam activation conditions in a
fixed bed reactor, and characterized for proximate and ultimate
properties, N2-BET surface area, pore size distribution, SEM, pHPZC
and FTIR. The sawdust pyrolysis activation energy was evaluated by
TGA. Results indicated that the chars prepared at 800oC and 2hrs
were suitable for development of better quality AC at 800oC and 47%
burn-off having BET surface area (1086m2/g), micropore volume
(0.26cm3/g), and mesopore volume (0.43cm3/g) comparable to
expensive commercial ACs, and suitable for water contaminants
removal. The developed AC showed basic surface functionality at
pHPZC at 10.3, and a phenol adsorption capacity that was higher than
that of commercial Norit (RO 0.8) AC. Thus, it is feasible to develop
better quality low-cost AC from (Pinus patula) sawdust using twostage
N2-steam activation in fixed-bed reactor.
Abstract: Academic digital libraries emerged as a result of advances in computing and information systems technologies, and had been introduced in universities and to public. As results, moving in parallel with current technology in learning and researching environment indeed offers myriad of advantages especially to students and academicians, as well as researchers. This is due to dramatic changes in learning environment through the use of digital library system which giving spectacular impact on these societies- way of performing their study/research. This paper presents a survey of current criteria for evaluating academic digital libraries- performance. The goal is to discuss criteria being applied so far for academic digital libraries evaluation in the context of user-centered design. Although this paper does not comprehensively take into account all previous researches in evaluating academic digital libraries but at least it can be a guide in understanding the evaluation criteria being widely applied.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: The dynamic or complex modulus test is considered
to be a mechanistically based laboratory test to reliably characterize
the strength and load-resistance of Hot-Mix Asphalt (HMA) mixes
used in the construction of roads. The most common observation is
that the data collected from these tests are often noisy and somewhat
non-sinusoidal. This hampers accurate analysis of the data to obtain
engineering insight. The goal of the work presented in this paper is to
develop and compare automated evolutionary computational
techniques to filter test noise in the collection of data for the HMA
complex modulus test. The results showed that the Covariance
Matrix Adaptation-Evolutionary Strategy (CMA-ES) approach is
computationally efficient for filtering data obtained from the HMA
complex modulus test.
Abstract: Educational institutions often implement policies with
the intention of influencing how learning and teaching occur.
Generally, such policies are not as effective as their makers would
like; changing the behavior of third-level teachers proves difficult.
Nevertheless, a policy instituted in 2006 at the Dublin Institute of
Technology has met with success: each newly hired faculty member
must have a post-graduate qualification in “Learning and Teaching"
or successfully complete one within the first two years of
employment. The intention is to build teachers- knowledge about
student-centered pedagogies and their capacity to implement them.
As a result of this policy (and associated programs that support it),
positive outcomes are readily apparent. Individual teachers who have
completed the programs have implemented significant change at the
course and program levels. This paper introduces the policy,
identifies outcomes in relation to existing theory, describes research
underway, and pinpoints areas where organizational learning has
occurred.
Abstract: Primary studies are being carried out in Turkey for
expanding information and communication technologies (ICT) aided instruction activities. Subject of the present study is to identify
whether those studies achieved their goals in the application. Information technologies (IT) formative teachers in the primary
schools, and academicians in the faculties of education were interviewed to investigate the process and results of implementing
computer-aided instruction methods whose basis is strengthened in theory. Analysis of the results gained from two separate surveys
demonstrated that capability of the teachers in elementary education institutions for carrying into effect computer-aided instruction and
technical infrastructure has not been established for computer-aided instruction practices yet. Prospective teachers must be well-equipped in ICT to duly fulfill requirements of modern education and also
must be self-confident. Finally, scope and intensity of the courses given in connection with teaching of the ICT in faculties of education needs to be revised.
Abstract: This study presents an exact general solution for
steady-state conductive heat transfer in cylindrical composite
laminates. Appropriate Fourier transformation has been obtained
using Sturm-Liouville theorem. Series coefficients are achieved by
solving a set of equations that related to thermal boundary conditions
at inner and outer of the cylinder, also related to temperature
continuity and heat flux continuity between each layer. The solution
of this set of equations are obtained using Thomas algorithm. In this
paper, the effect of fibers- angle on temperature distribution of
composite laminate is investigated under general boundary
conditions. Here, we show that the temperature distribution for any
composite laminates is between temperature distribution for
laminates with θ = 0° and θ = 90° .
Abstract: In this paper a multi-objective nonlinear programming
model of cellular manufacturing system is presented which minimize
the intercell movements and maximize the sum of reliability of cells.
We present a genetic approach for finding efficient solutions to the
problem of cell formation for products having multiple routings.
These methods find the non-dominated solutions and according to
decision makers prefer, the best solution will be chosen.
Abstract: Mining Sequential Patterns in large databases has become
an important data mining task with broad applications. It is
an important task in data mining field, which describes potential
sequenced relationships among items in a database. There are many
different algorithms introduced for this task. Conventional algorithms
can find the exact optimal Sequential Pattern rule but it takes a
long time, particularly when they are applied on large databases.
Nowadays, some evolutionary algorithms, such as Particle Swarm
Optimization and Genetic Algorithm, were proposed and have been
applied to solve this problem. This paper will introduce a new kind
of hybrid evolutionary algorithm that combines Genetic Algorithm
(GA) with Particle Swarm Optimization (PSO) to mine Sequential
Pattern, in order to improve the speed of evolutionary algorithms
convergence. This algorithm is referred to as SP-GAPSO.
Abstract: Schema matching plays a key role in many different
applications, such as schema integration, data integration, data
warehousing, data transformation, E-commerce, peer-to-peer data
management, ontology matching and integration, semantic Web,
semantic query processing, etc. Manual matching is expensive and
error-prone, so it is therefore important to develop techniques to
automate the schema matching process. In this paper, we present a
solution for XML schema automated matching problem which
produces semantic mappings between corresponding schema
elements of given source and target schemas. This solution
contributed in solving more comprehensively and efficiently XML
schema automated matching problem. Our solution based on
combining linguistic similarity, data type compatibility and structural
similarity of XML schema elements. After describing our solution,
we present experimental results that demonstrate the effectiveness of
this approach.
Abstract: Urinary Tract Infections (UTI) account for an estimated 25-40% nosocomial infection, out of which 90% are associated with urinary catheter, called Catheter associated urinary tract infection (CAUTI). The microbial populations within CAUTI frequently develop as biofilms. In the present study, microbial contamination of indwelling urinary catheters was investigated. Biofilm forming ability of the isolates was determined by tissue culture plate method. Prevention of biofilm formation in the urinary catheter by Pseudomonas aeruginosa was also determined by coating the catheter with some enzymes, gentamycin and EDTA. It was found that 64% of the urinary catheters get contaminated during the course of catheterization. Of the total 6 isolates, biofilm formation was seen in 100% Pseudomonas aeruginosa and E. coli, 90% in Enterococci, 80% in Klebsiella and 66% in S. aureus. It was noted that the biofilm production by Pseudomonas was prolonged by 7 days in amylase, 8 days in protease, 6 days in lysozyme, 7days in gentamycin and 5 days in EDTA treated catheter.
Abstract: Grid computing is growing rapidly in the distributed
heterogeneous systems for utilizing and sharing large-scale resources
to solve complex scientific problems. Scheduling is the most recent
topic used to achieve high performance in grid environments. It aims
to find a suitable allocation of resources for each job. A typical
problem which arises during this task is the decision of scheduling. It
is about an effective utilization of processor to minimize tardiness
time of a job, when it is being scheduled. This paper, therefore,
addresses the problem by developing a general framework of grid
scheduling using dynamic information and an ant colony
optimization algorithm to improve the decision of scheduling. The
performance of various dispatching rules such as First Come First
Served (FCFS), Earliest Due Date (EDD), Earliest Release Date
(ERD), and an Ant Colony Optimization (ACO) are compared.
Moreover, the benefit of using an Ant Colony Optimization for
performance improvement of the grid Scheduling is also discussed. It
is found that the scheduling system using an Ant Colony
Optimization algorithm can efficiently and effectively allocate jobs
to proper resources.
Abstract: The effects of equilibrium time, solution pH, and
sorption temperature of cationic methylene blue (MB) adsorption on nanoporous metallosilicoaluminophosphate ZnAPSO-34 was studied
using a batch equilibration method. UV–VIS spectroscopy was used
to obtain the adsorption isotherms at 20° C. The optimum period for
adsorption was 300 min. However, MB removal increased from
81,82 % to 94,81 %. The equilibrium adsorption data was analyzed
by using Langmuir, Freundlich and Temkin isotherm models.
Langmuir isotherm was found to be the better-fitting model and the process followed pseudo second–order kinetics. The results showed
that ZnAPSO-34 could be employed as an effective material and could be an attractive alternative for the removal of dyes and colors
from aqueous solutions.
Abstract: A new method for color image segmentation using fuzzy logic is proposed in this paper. Our aim here is to automatically produce a fuzzy system for color classification and image segmentation with least number of rules and minimum error rate. Particle swarm optimization is a sub class of evolutionary algorithms that has been inspired from social behavior of fishes, bees, birds, etc, that live together in colonies. We use comprehensive learning particle swarm optimization (CLPSO) technique to find optimal fuzzy rules and membership functions because it discourages premature convergence. Here each particle of the swarm codes a set of fuzzy rules. During evolution, a population member tries to maximize a fitness criterion which is here high classification rate and small number of rules. Finally, particle with the highest fitness value is selected as the best set of fuzzy rules for image segmentation. Our results, using this method for soccer field image segmentation in Robocop contests shows 89% performance. Less computational load is needed when using this method compared with other methods like ANFIS, because it generates a smaller number of fuzzy rules. Large train dataset and its variety, makes the proposed method invariant to illumination noise
Abstract: Multi User Virtual Worlds are becoming a valuable educational tool. Learning experiences within these worlds focus on discovery and active experiences that both engage students and motivate them to explore new concepts. As educators, we need to explore these environments to determine how they can most effectively be used in our instructional practices. This paper explores the current application of virtual worlds to identify meaningful educational strategies that are being used to engage students and enhance teaching and learning.
Abstract: Detection, feature extraction and pose estimation of
people in images and video is made challenging by the variability of
human appearance, the complexity of natural scenes and the high
dimensionality of articulated body models and also the important
field in Image, Signal and Vision Computing in recent years. In this
paper, four types of people in 2D dimension image will be tested and
proposed. The system will extract the size and the advantage of them
(such as: tall fat, short fat, tall thin and short thin) from image. Fat
and thin, according to their result from the human body that has been
extract from image, will be obtained. Also the system extract every
size of human body such as length, width and shown them in output.