Abstract: Prickly pear (Opuntia spp) fruit has received renewed
interest since it contains a betalain pigment that has an attractive
purple colour for the production of juice. Prickly pear juice was
prepared by homogenizing the fruit and treating the pulp with 48 g of
pectinase from Aspergillus niger. Titratable acidity was determined
by diluting 10 ml prickly pear juice with 90 ml deionized water and
titrating to pH 8.2 with 0.1 N NaOH. Brix was measured using a
refractometer and ascorbic acid content assayed
spectrophotometrically. Colour variation was determined
colorimetrically (Hunter L.a.b.). Hunter L.a.b. analysis showed that
the red purple colour of prickly pear juice had been affected by juice
treatments. This was indicated by low light values of colour
difference meter (CDML*), hue, CDMa* and CDMb* values. It was
observed that non-treated prickly pear juice had a high (colour
difference meter of light) CDML* of 3.9 compared to juice
treatments (range 3.29 to 2.14). The CDML* significantly (p
Abstract: Mining frequent tree patterns have many useful
applications in XML mining, bioinformatics, network routing, etc.
Most of the frequent subtree mining algorithms (i.e. FREQT,
TreeMiner and CMTreeMiner) use anti-monotone property in the
phase of candidate subtree generation. However, none of these
algorithms have verified the correctness of this property in tree
structured data. In this research it is shown that anti-monotonicity
does not generally hold, when using weighed support in tree pattern
discovery. As a result, tree mining algorithms that are based on this
property would probably miss some of the valid frequent subtree
patterns in a collection of trees. In this paper, we investigate the
correctness of anti-monotone property for the problem of weighted
frequent subtree mining. In addition we propose W3-Miner, a new
algorithm for full extraction of frequent subtrees. The experimental
results confirm that W3-Miner finds some frequent subtrees that the
previously proposed algorithms are not able to discover.
Abstract: There is strong evidence that water channel proteins
'aquaporins (AQPs)' are central components in plant-water relations
as well as a number of other physiological parameters. We had
previously reported the isolation of 24 plasma membrane intrinsic
protein (PIP) type AQPs. However, the gene numbers in rice and the
polyploid nature of bread wheat indicated a high probability of
further genes in the latter. The present work focused on identification
of further AQP isoforms in bread wheat. With the use of altered
primer design, we identified five genes homologous, designated
PIP1;5b, PIP2;9b, TaPIP2;2, TaPIP2;2a, TaPIP2;2b. Sequence
alignments indicate PIP1;5b, PIP2;9b are likely to be homeologues of
two previously reported genes while the other three are new genes
and could be homeologs of each other. The results indicate further
AQP diversity in wheat and the sequence data will enable physical
mapping of these genes to identify their genomes as well as genetic to
determine their association with any quantitative trait loci (QTLs)
associated with plant-water relation such as salinity or drought
tolerance.
Abstract: Nowadays in applications of renewable energy sources
it is important to develop powerful and energy-saving photovoltaic
converters and to keep the prescriptions of the standards. In grid
connected PV converters the obvious solution to increase the
efficiency is to reduce the switching losses. Our new developed
control method reduces the switching losses and keeps the limitations
of the harmonic distortion standards. The base idea of the method is
the utilization of 3-state control causing discontinuous current mode
at low input power. In the following sections the control theory, the
realizations and the simulation results are presented.
Abstract: Checkpointing is one of the commonly used techniques to provide fault-tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence, checkpointing protocols having lesser number of synchronization messages and fewer checkpoints are preferred in mobile environment. There are two different approaches, although not orthogonal, to checkpoint mobile computing systems namely, time-based and index-based. Our protocol is a fusion of these two approaches, though not first of its kind. In the present exposition, an index-based checkpointing protocol has been developed, which uses time to indirectly coordinate the creation of consistent global checkpoints for mobile computing systems. The proposed algorithm is non-blocking, adaptive, and does not use any control message. Compared to other contemporary checkpointing algorithms, it is computationally more efficient because it takes lesser number of checkpoints and does not need to compute dependency relationships. A brief account of important and relevant works in both the fields, time-based and index-based, has also been included in the presentation.
Abstract: We present a new algorithm for nonlinear dimensionality reduction that consistently uses global information, and that enables understanding the intrinsic geometry of non-convex manifolds. Compared to methods that consider only local information, our method appears to be more robust to noise. Unlike most methods that incorporate global information, the proposed approach automatically handles non-convexity of the data manifold. We demonstrate the performance of our algorithm and compare it to state-of-the-art methods on synthetic as well as real data.
Abstract: Security management has changed from the
management of security equipments and useful interface to manager.
It analyzes the whole security conditions of network and preserves the
network services from attacks. Secure router technology has security
functions, such as intrusion detection, IPsec(IP Security) and access
control, are applied to legacy router for secure networking. It controls
an unauthorized router access and detects an illegal network intrusion.
This paper relates to a security engine management of router based on
a security policy, which is the definition of security function against a
network intrusion. This paper explains the security policy and designs
the structure of security engine management framework.
Abstract: This paper presents an analytical model to estimate
the cost of an optimized design of reinforced concrete isolated
footing base on structural safety. Flexural and optimized formulas for
square and rectangular footingare derived base on ACI building code
of design, material cost and optimization. The optimization
constraints consist of upper and lower limits of depth and area of
steel. Footing depth and area of reinforcing steel are to be minimized
to yield the optimal footing dimensions. Optimized footing materials
cost of concrete, reinforcing steel and formwork of the designed
sections are computed. Total cost factor TCF and other cost factors
are developed to generalize and simplify the calculations of footing
material cost. Numerical examples are presented to illustrate the
model capability of estimating the material cost of the footing for a
desired axial load.
Abstract: This paper introduces our first efforts of developing a
new team for RoboCup Middle Size Competition. In our robots we
have applied omni directional based mobile system with omnidirectional
vision system and fuzzy control algorithm to navigate
robots. The control architecture of MRL middle-size robots is a three
layered architecture, Planning, Sequencing, and Executing. It also
uses Blackboard system to achieve coordination among agents.
Moreover, the architecture should have minimum dependency on low
level structure and have a uniform protocol to interact with real
robot.
Abstract: This paper presents a new and efficient approach for
capacitor placement in radial distribution systems that determine
the optimal locations and size of capacitor with an objective of
improving the voltage profile and reduction of power loss. The
solution methodology has two parts: in part one the loss sensitivity
factors are used to select the candidate locations for the capacitor
placement and in part two a new algorithm that employs Plant growth
Simulation Algorithm (PGSA) is used to estimate the optimal size
of capacitors at the optimal buses determined in part one. The main
advantage of the proposed method is that it does not require any
external control parameters. The other advantage is that it handles the
objective function and the constraints separately, avoiding the trouble
to determine the barrier factors. The proposed method is applied to 9
and 34 bus radial distribution systems. The solutions obtained by the
proposed method are compared with other methods. The proposed
method has outperformed the other methods in terms of the quality
of solution.
Abstract: Low power consumption is a major constraint for battery-powered system like computer notebook or PDA. In the past, specialists usually designed both specific optimized equipments and codes to relief this concern. Doing like this could work for quite a long time, however, in this era, there is another significant restraint, the time to market. To be able to serve along the power constraint while can launch products in shorter production period, objectoriented programming (OOP) has stepped in to this field. Though everyone knows that OOP has quite much more overhead than assembly and procedural languages, development trend still heads to this new world, which contradicts with the target of low power consumption. Most of the prior power related software researches reported that OOP consumed much resource, however, as industry had to accept it due to business reasons, up to now, no papers yet had mentioned about how to choose the best OOP practice in this power limited boundary. This article is the pioneer that tries to specify and propose the optimized strategy in writing OOP software under energy concerned environment, based on quantitative real results. The language chosen for studying is C# based on .NET Framework 2.0 which is one of the trendy OOP development environments. The recommendation gotten from this research would be a good roadmap that can help developers in coding that well balances between time to market and time of battery.
Abstract: Restoration of endodontically treated teeth is a
common problem in dentistry, related to the fractures occurring in
such teeth and to concentration of forces little information regarding
variation of basic preparation guidelines in stress distribution has
been available. To date, there is still no agreement in the literature
about which material or technique can optimally restore
endodontically treated teeth. The aim of the present study was to
evaluate the influence of the core height and restoration materials on
corono-radicular restored upper first premolar. The first step of the
study was to achieve 3D models in order to analyze teeth, dowel and
core restorations and overlying full ceramic crowns. The FEM model
was obtained by importing the solid model into ANSYS finite
element analysis software. An occlusal load of 100 N was conducted,
and stresses occurring in the restorations, and teeth structures were
calculated. Numerical simulations provide a biomechanical
explanation for stress distribution in prosthetic restored teeth. Within
the limitations of the present study, it was found that the core height
has no important influence on the stress generated in coronoradicular
restored premolars. It can be drawn that the cervical regions
of the teeth and restorations were subjected to the highest stress
concentrations.
Abstract: Waiting times and queues are a daily problem for theme parks. Fast lines or priority queues appear as a solution for a specific segment of customers, that is, tourists who are willing to pay to avoid waiting. This paper analyzes the fast line system and explores the factors that affect the decision to purchase a fast line pass. A greater understanding of these factors may help companies to design appropriate products and services. This conceptual paper was based on a literature review in marketing and consumer behavior. Additional research was identified in related disciplines such as leisure studies, psychology, and sociology. A conceptual framework of the factors influencing the decision to purchase a fast line pass is presented.
Abstract: We decribe a formal specification and verification of the Rabin public-key scheme in the formal proof system Is-abelle/HOL. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. The analysis presented uses a given database to prove formal properties of our implemented functions with computer support. Thema in task in designing a practical formalization of correctness as well as security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as eficient formal proofs. This yields the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Consequently, we get reliable proofs with a minimal error rate augmenting the used database. This provides a formal basis for more computer proof constructions in this area.
Abstract: Land with low pH soil spread widely in Indonesia
can be used for soybean (Glycine max) cultivation, however the
production is low. The use of acid tolerant soybean and acidaluminium
tolerant nitrogen-fixing bacteria formula was an
alternative way to increase soybean productivity on acid soils.
Bradyrhizobium japonicum is one of the nitrogen fixing bacteria
which can symbiose with soybean plants through root nodule
formation. Most of the nitrogen source required by soybean plants
can be provided by this symbiosis. This research was conducted to
study the influence of acid-aluminium tolerant B. japonicum strain
BJ 11 formula using peat as carrier on growth of Tanggamus and
Anjasmoro cultivar soybean planted on acid soil fields (pH 5.0-
5.5). The results showed that the inoculant was able to increase the
growth and production of soybean which were grown on fields acid
soil at Sukadana (Lampung) and Tanah Laut (South Kalimantan),
Indonesia.
Abstract: A novel and efficient approach to realize
fractional-order capacitors is investigated in this paper. Meanwhile, a
new approach which is more efficient for semiconductor
implementation of fractional-order capacitors is proposed. The
feasibility of the approach has been verified with the preliminary
measured results.
Abstract: The dynamic speckle or biospeckle is an interference
phenomenon generated at the reflection of a coherent light by an
active surface or even by a particulate or living body surface. The
above mentioned phenomenon gave scientific support to a method
named biospeckle which has been employed to study seed viability,
biological activity, tissue senescence, tissue water content, fruit
bruising, etc. Since the above mentioned method is not invasive and
yields numerical values, it can be considered for possible automation
associated to several processes, including selection and sorting.
Based on these preliminary considerations, this research work
proposed to study the interaction of a laser beam with vegetative
samples by measuring the incident light intensity and the transmitted
light beam intensity at several vegetative slabs of varying thickness.
Tests were carried on fifteen slices of apple tissue divided into three
thickness groups, i.e., 4 mm, 5 mm, 18 mm and 22 mm. A diode laser
beam of 10mW and 632 nm wavelength and a Samsung digital
camera were employed to carry the tests. Outgoing images were
analyzed by comparing the gray gradient of a fixed image column of
each image to obtain a laser penetration scale into the tissue,
according to the slice thickness.
Abstract: The myoelectric signal (MES) is one of the Biosignals
utilized in helping humans to control equipments. Recent approaches
in MES classification to control prosthetic devices employing pattern
recognition techniques revealed two problems, first, the classification
performance of the system starts degrading when the number of
motion classes to be classified increases, second, in order to solve the
first problem, additional complicated methods were utilized which
increase the computational cost of a multifunction myoelectric
control system. In an effort to solve these problems and to achieve a
feasible design for real time implementation with high overall
accuracy, this paper presents a new method for feature extraction in
MES recognition systems. The method works by extracting features
using Wavelet Packet Transform (WPT) applied on the MES from
multiple channels, and then employs Fuzzy c-means (FCM)
algorithm to generate a measure that judges on features suitability for
classification. Finally, Principle Component Analysis (PCA) is
utilized to reduce the size of the data before computing the
classification accuracy with a multilayer perceptron neural network.
The proposed system produces powerful classification results (99%
accuracy) by using only a small portion of the original feature set.
Abstract: The history of money is described in relationship to the history of computing. With the transformation and acceptance of money as information, major challenges to the security of money have involved engineering, computer science, and management. Research opportunities and challenges are described as money continues its transformation into information.
Abstract: Nano-MgO was successfully deposited on titania using deposition-precipitation method. The catalyst produced was characterised using FTIR, XRD, BET and XRF and its activity was tested on the transesterification reaction of soybean oil to biodiesel. The catalyst activity improved when the reaction temperature was increasedfrom 150 and 225 OC. It was also observed that increasing the reaction time above 1h had no significant benefit on conversion. The stability fixed MgO on TiO2 was investigated using XRF and ICP-OES. It was observed that MgO loss during the reaction was between 0.5-2.3 percent and that there was no correlation between the reaction temperature and the MgO loss.