Abstract: This study aims to segment objects using the K-means
algorithm for texture features. Firstly, the algorithm transforms color
images into gray images. This paper describes a novel technique for
the extraction of texture features in an image. Then, in a group of
similar features, objects and backgrounds are differentiated by using
the K-means algorithm. Finally, this paper proposes a new object
segmentation algorithm using the morphological technique. The
experiments described include the segmentation of single and multiple
objects featured in this paper. The region of an object can be
accurately segmented out. The results can help to perform image
retrieval and analyze features of an object, as are shown in this paper.
Abstract: With the advance of information technology in the
new era the applications of Internet to access data resources has
steadily increased and huge amount of data have become accessible
in various forms. Obviously, the network providers and agencies,
look after to prevent electronic attacks that may be harmful or may
be related to terrorist applications. Thus, these have facilitated the
authorities to under take a variety of methods to protect the special
regions from harmful data. One of the most important approaches is
to use firewall in the network facilities. The main objectives of
firewalls are to stop the transfer of suspicious packets in several
ways. However because of its blind packet stopping, high process
power requirements and expensive prices some of the providers are
reluctant to use the firewall. In this paper we proposed a method to
find a discriminate function to distinguish between usual packets and
harmful ones by the statistical processing on the network router logs.
By discriminating these data, an administrator may take an approach
action against the user. This method is very fast and can be used
simply in adjacent with the Internet routers.
Abstract: Microarray data profiles gene expression on a whole
genome scale, therefore, it provides a good way to study associations
between gene expression and occurrence or progression of cancer.
More and more researchers realized that microarray data is helpful
to predict cancer sample. However, the high dimension of gene
expressions is much larger than the sample size, which makes this
task very difficult. Therefore, how to identify the significant genes
causing cancer becomes emergency and also a hot and hard research
topic. Many feature selection algorithms have been proposed in
the past focusing on improving cancer predictive accuracy at the
expense of ignoring the correlations between the features. In this
work, a novel framework (named by SGS) is presented for stable gene
selection and efficient cancer prediction . The proposed framework
first performs clustering algorithm to find the gene groups where
genes in each group have higher correlation coefficient, and then
selects the significant genes in each group with Bayesian Lasso and
important gene groups with group Lasso, and finally builds prediction
model based on the shrinkage gene space with efficient classification
algorithm (such as, SVM, 1NN, Regression and etc.). Experiment
results on real world data show that the proposed framework often
outperforms the existing feature selection and prediction methods,
say SAM, IG and Lasso-type prediction model.
Abstract: This paper presents a hybrid association control
scheme that can maintain load balancing among access points in the
wireless LANs and can satisfy the quality of service requirements of
the multimedia traffic applications. The proposed model is
mathematically described as a linear programming model. Simulation
study and analysis were conducted in order to demonstrate the
performance of the proposed hybrid load balancing and association
control scheme. Simulation results shows that the proposed scheme
outperforms the other schemes in term of the percentage of blocking
and the quality of the data transfer rate providing to the multimedia
and real-time applications.
Abstract: In this paper, an innovative watermarking scheme for audio signal based on genetic algorithms (GA) in the discrete wavelet transforms is proposed. It is robust against watermarking attacks, which are commonly employed in literature. In addition, the watermarked image quality is also considered. We employ GA for the optimal localization and intensity of watermark. The watermark detection process can be performed without using the original audio signal. The experimental results demonstrate that watermark is inaudible and robust to many digital signal processing, such as cropping, low pass filter, additive noise.
Abstract: We introduce an algorithm based on the
morphological shared-weight neural network. Being nonlinear and
translation-invariant, the MSNN can be used to create better
generalization during face recognition. Feature extraction is
performed on grayscale images using hit-miss transforms that are
independent of gray-level shifts. The output is then learned by
interacting with the classification process. The feature extraction and
classification networks are trained together, allowing the MSNN to
simultaneously learn feature extraction and classification for a face.
For evaluation, we test for robustness under variations in gray levels
and noise while varying the network-s configuration to optimize
recognition efficiency and processing time. Results show that the
MSNN performs better for grayscale image pattern classification
than ordinary neural networks.
Abstract: The nanosized polymeric micelles release the drug
due to acoustic cavitation, which is enhanced in dual frequency
ultrasonic fields. In this study, adult female Balb/C mice were
transplanted with spontaneous breast adenocarcinoma tumors and
were injected with a dose of 1.3 mg/kg doxorubicin in one of three
forms: free doxorubicin, micellar doxorubicin without sonication and
micellar doxorubicin with sonication. To increase cavitation yield,
the tumor region was sonicated with low level dual frequency of 3
MHz and 28 kHz. The animals were sacrificed 24 h after injection,
and their tumor, heart, spleen, liver, kidneys and plasma were
separated and homogenized. The drug content in their tumor, heart,
spleen, liver, kidneys and plasma was determined using tissue
fluorimetry. The results show that in the group that received micellar
doxorubicin with sonication, the drug concentration in the tumor
tissue was nine and three times higher than in the free doxorubicin
group and the micellar doxorubicin without sonication group,
respectively. In the micellar doxorubicin with sonication group, the
drug concentration in other tissues was lower than other groups
(p
Abstract: Not all types of mobile phone are successful in entering the market because some types of the mobile phone have a negative perception of user. Therefore, it is important to understand the influence of mobile phone's characteristics in the local user perception. This research investigates the influence of QWERTY mobile phone's forms in the perception of Indonesian user. First, some alternatives of mobile phone-s form are developed based on a certain number of mobile phone's models. At the second stage, some word pairs as design attributes of the mobile phone are chosen to represent the user perception of mobile phone. At the final stage, a survey is conducted to investigate the influence of the developed form alternatives to the user perception. Based on the research, users perceive mobile phone's form with curved top and straight bottom shapes and mobile phone's form with slider and antenna as the most negative form. Meanwhile, mobile phone's form with curved top and bottom shapes and mobile phone-s form without slider and antenna are perceived by the user as the most positive form.
Abstract: Optical 3D measurement of objects is meaningful in
numerous industrial applications. In various cases shape acquisition
of weak textured objects is essential. Examples are repetition parts
made of plastic or ceramic such as housing parts or ceramic bottles as
well as agricultural products like tubers. These parts are often
conveyed in a wobbling way during the automated optical inspection.
Thus, conventional 3D shape acquisition methods like laser scanning
might fail. In this paper, a novel approach for acquiring 3D shape of
weak textured and moving objects is presented. To facilitate such
measurements an active stereo vision system with structured light is
proposed. The system consists of multiple camera pairs and auxiliary
laser pattern generators. It performs the shape acquisition within one
shot and is beneficial for rapid inspection tasks. An experimental
setup including hardware and software has been developed and
implemented.
Abstract: This paper proposes the hypothesis that multilateralism and regionalism are complementary, and that regional income convergence is likely with a like minded and committed regionalism that often has links geographically and culturally. The association between international trade, income per capita, and regional income convergence in founder members of ASEAN and SAARC, is explored by applying the Lumsdaine, and Papell approach. The causal relationships between the above variables are also studied in respective trade blocs by using Granger causality tests. The conclusion is that global reforms have had a greater impact on increasing trade for both trade blocs and induced convergence only in ASEAN-5 countries. The experience of ASEAN countries shows a two-way causal relationship between the flow from trade to regional income convergence, and vice versa. There is no evidence in SAARC countries for income convergence and causality.
Abstract: Five crystal modifications of water insoluble
artesunate were generated by recrystallizing it from various solvents
with improved physicochemical properties. These generated crystal
forms were characterized to select the most potent and soluble form.
SEM of all the forms showed changes in external shape leading them
to be different morphologically. DSC thermograms of Form III and
Form V showed broad endotherm peaks at 83.04oC and 76.96oC prior
to melting fusion of drug respectively. Calculated weight loss in TGA
revealed that Form III and Form V are methanol and acetone solvates
respectively. However, few additional peaks were appeared in XRPD
pattern in these two solvate forms. All forms exhibit exothermic
behavior in buffer and two solvates display maximum ease of
molecular release from the lattice. Methanol and acetone solvates
were found to be most soluble forms and exhibited higher
antimalarial efficacy showing higher survival rate (83.3%) after 30
days.
Abstract: Support vector regression (SVR) has been regarded
as a state-of-the-art method for approximation and regression. The
importance of kernel function, which is so-called admissible support
vector kernel (SV kernel) in SVR, has motivated many studies
on its composition. The Gaussian kernel (RBF) is regarded as a
“best" choice of SV kernel used by non-expert in SVR, whereas
there is no evidence, except for its superior performance on some
practical applications, to prove the statement. Its well-known that
reproducing kernel (R.K) is also a SV kernel which possesses many
important properties, e.g. positive definiteness, reproducing property
and composing complex R.K by simpler ones. However, there are a
limited number of R.Ks with explicit forms and consequently few
quantitative comparison studies in practice. In this paper, two R.Ks,
i.e. SV kernels, composed by the sum and product of a translation
invariant kernel in a Sobolev space are proposed. An exploratory
study on the performance of SVR based general R.K is presented
through a systematic comparison to that of RBF using multiple
criteria and synthetic problems. The results show that the R.K is
an equivalent or even better SV kernel than RBF for the problems
with more input variables (more than 5, especially more than 10) and
higher nonlinearity.
Abstract: The introduction of sowing technologies into minimum- or no-tillage soil has a number of economical and environmental virtues, such as improving soil properties, decreasing soil erosion and degradation, and saving working time and fuel. However, the main disadvantage of these technologies is that plant residues on the soil surface reduce the quality of the planted crop seeds, thus requiring plant residues to be removed or cut. This paper presents a analysis of disc coulter parameters and an experimental investigation of cutting spring barley straw containing various amounts of moisture with different disc coulters (smooth and notched).
Abstract: This paper considers the development of a two-point
predictor-corrector block method for solving delay differential
equations. The formulae are represented in divided difference form
and the algorithm is implemented in variable stepsize variable order
technique. The block method produces two new values at a single
integration step. Numerical results are compared with existing
methods and it is evident that the block method performs very well.
Stability regions of the block method are also investigated.
Abstract: During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Abstract: Not with standing the importance of foreign highly
skilled professionals for host economies, there is a paucity of
research studies investigating the role of the corporate social context
during the integration process. This research aims to address this
paucity by exploring the role of social capital in the integration of
foreign health professionals. It does so by using a qualitative research
approach. In this pilot study the hospital sector forms this study-s
sample and interviews were conducted with HR managers, foreign
health professionals and external HR consultants. It was found that
most of the participating hospitals had not established specific HR
practices and had only partly linked the development of
organisational social capital with a successful integration process.
This research contributes, for example, to the HR literature on the
integration of self-initiated expatriates by analysing the role of HRM
in generating organisational social capital needed for a successful
integration process.
Abstract: Although the World Wide Web is considered the
largest source of information there exists nowadays, due to its
inherent dynamic characteristics, the task of finding useful and
qualified information can become a very frustrating experience. This
study presents a research on the information mining systems in the
Web; and proposes an implementation of these systems by means of
components that can be built using the technology of Web services.
This implies that they can encompass features offered by a services
oriented architecture (SOA) and specific components may be used by
other tools, independent of platforms or programming languages.
Hence, the main objective of this work is to provide an architecture
to Web mining systems, divided into stages, where each step is a
component that will incorporate the characteristics of SOA. The
separation of these steps was designed based upon the existing
literature. Interesting results were obtained and are shown here.
Abstract: Attitude control of aerospace system with liquid containers may face to a problem associate with fuel sloshing. The sloshing phenomena can degrade the stability of control system and in the worst case, interaction between the attitude control system and fuel vibration leading to resonance. In this paper, a full process of nonlinear dynamic modeling of an aerospace launch vehicle with fuel sloshing is given. Then, a new control system based on model reference adaptive filter is proposed and its algorithm is extracted. This controller implemented on the main attitude control system. Finally, numerical simulation of nonlinear model and control system is carried out to examine the performance of the new controller. Results of simulations show that the inconvenient effects of the fuel sloshing by augmenting this control system are reduced and attitude control system performs, satisfactorily.
Abstract: In the present work, we propose a new projection method for solving the matrix equation AXB = F. For implementing our new method, generalized forms of block Krylov subspace and global Arnoldi process are presented. The new method can be considered as an extended form of the well-known global generalized minimum residual (Gl-GMRES) method for solving multiple linear systems and it will be called as the extended Gl-GMRES (EGl- GMRES). Some new theoretical results have been established for proposed method by employing Schur complement. Finally, some numerical results are given to illustrate the efficiency of our new method.
Abstract: Network warfare is an emerging concept that focuses on the network and computer based forms through which information is attacked and defended. Various computer and network security concepts thus play a role in network warfare. Due the intricacy of the various interacting components, a model to better understand the complexity in a network warfare environment would be beneficial. Non-quantitative modeling is a useful method to better characterize the field due to the rich ideas that can be generated based on the use of secular associations, chronological origins, linked concepts, categorizations and context specifications. This paper proposes the use of non-quantitative methods through a morphological analysis to better explore and define the influential conditions in a network warfare environment.