Abstract: The porous silicon (PS), formed from the anodization
of a p+ type substrate silicon, consists of a network organized in a
pseudo-column as structure of multiple side ramifications. Structural
micro-topology can be interpreted as the fraction of the interconnected
solid phase contributing to thermal transport. The
reduction of dimensions of silicon of each nanocristallite during the
oxidation induced a reduction in thermal conductivity. Integration of
thermal sensors in the Microsystems silicon requires an effective
insulation of the sensor element. Indeed, the low thermal conductivity
of PS consists in a very promising way in the fabrication of integrated
thermal Microsystems.In this work we are interesting in the
measurements of thermal conductivity (on the surface and in depth)
of PS by the micro-Raman spectroscopy. The thermal conductivity is
studied according to the parameters of anodization (initial doping and
current density. We also, determine porosity of samples by
spectroellipsometry.
Abstract: Email has become a fast and cheap means of online
communication. The main threat to email is Unsolicited Bulk Email
(UBE), commonly called spam email. The current work aims at
identification of unigrams in more than 2700 UBE that advertise
body-enhancement drugs. The identification is based on the
requirement that the unigram is neither present in dictionary, nor is a
slang term. The motives of the paper are many fold. This is an
attempt to analyze spamming behaviour and employment of wordmutation
technique. On the side-lines of the paper, we have
attempted to better understand the spam, the slang and their interplay.
The problem has been addressed by employing Tokenization
technique and Unigram BOW model. We found that the non-lexicon
words constitute nearly 66% of total number of lexis of corpus
whereas non-slang words constitute nearly 2.4% of non-lexicon
words. Further, non-lexicon non-slang unigrams composed of 2
lexicon words, form more than 71% of the total number of such
unigrams. To the best of our knowledge, this is the first attempt to
analyze usage of non-lexicon non-slang unigrams in any kind of
UBE.
Abstract: This paper proposes a stroke extraction method for use in off-line signature verification. After giving a brief overview of the current ongoing researches an algorithm is introduced for detecting and following strokes in static images of signatures. Problems like the handling of junctions and variations in line width and line intensity are discussed in detail. Results are validated by both using an existing on-line signature database and by employing image registration methods.
Abstract: Let Xi be a Lacunary System, we established large
deviations inequality for Lacunary System. Furthermore, we gained
Marcinkiewicz Larger Number Law with dependent random variables
sequences.
Abstract: In this paper, we investigated the characteristic of a
clinical dataseton the feature selection and classification
measurements which deal with missing values problem.And also
posed the appropriated techniques to achieve the aim of the activity;
in this research aims to find features that have high effect to mortality
and mortality time frame. We quantify the complexity of a clinical
dataset. According to the complexity of the dataset, we proposed the
data mining processto cope their complexity; missing values, high
dimensionality, and the prediction problem by using the methods of
missing value replacement, feature selection, and classification.The
experimental results will extend to develop the prediction model for
cardiology.
Abstract: Experimental investigation of heat transfer and
friction factor characteristics of circular tube fitted with 300 right-left helical screw inserts with 100 mm spacer of different twist ratio has
been presented for laminar and turbulent flow.. The experimental data obtained were compared with those obtained from plain tube
published data. The heat transfer coefficient enhancement for 300 RL
inserts with 100 mm spacer is quite comparable with for 300 R-L
inserts. Performance evaluation analysis has been made and found
that the performance ratio increases with increasing Reynolds number
and decreasing twist ration with the maximum for the twist ratio 2.93.
Also, the performance ratio of more than one indicates that the type
of twist inserts can be used effectively for heat transfer augmentation.
Abstract: In this work, the influence of temperature on the
different parameters of solar cells based on organic semiconductors
are studied. The short circuit current Isc increases so monotonous
with temperature and then saturates to a maximum value before
decreasing at high temperatures. The open circuit voltage Vco
decreases linearly with temperature. The fill factor FF and efficiency,
which are directly related with Isc and Vco follow the variations of
the letters. The phenomena are explained by the behaviour of the
mobility which is a temperature activated process.
Abstract: Text categorization is the problem of classifying text
documents into a set of predefined classes. After a preprocessing
step, the documents are typically represented as large sparse vectors.
When training classifiers on large collections of documents, both the
time and memory restrictions can be quite prohibitive. This justifies
the application of feature selection methods to reduce the
dimensionality of the document-representation vector. In this paper,
we present three feature selection methods: Information Gain,
Support Vector Machine feature selection called (SVM_FS) and
Genetic Algorithm with SVM (called GA_SVM). We show that the
best results were obtained with GA_SVM method for a relatively
small dimension of the feature vector.
Abstract: Superelastic Shape Memory Alloy (SMA) is accepted
when it used as connection in steel structures. The seismic behaviour
of steel frames with SMA is being assessed in this study. Three eightstorey
steel frames with different SMA systems are suggested, the
first one of which is braced with diagonal bracing system, the second
one is braced with nee bracing system while the last one is which the
SMA is used as connection at the plastic hinge regions of beams.
Nonlinear time history analyses of steel frames with SMA subjected
to two different ground motion records have been performed using
Seismostruct software. To evaluate the efficiency of suggested
systems, the dynamic responses of the frames were compared. From
the comparison results, it can be concluded that using SMA element
is an effective way to improve the dynamic response of structures
subjected to earthquake excitations. Implementing the SMA braces
can lead to a reduction in residual roof displacement. The shape
memory alloy is effective in reducing the maximum displacement at
the frame top and it provides a large elastic deformation range. SMA
connections are very effective in dissipating energy and reducing the
total input energy of the whole frame under severe seismic ground
motion. Using of the SMA connection system is more effective in
controlling the reaction forces at the base frame than other bracing
systems. Using SMA as bracing is more effective in reducing the
displacements. The efficiency of SMA is dependant on the input
wave motions and the construction system as well.
Abstract: This paper deals with the formulation of Maxwell-s equations in a cavity resonator in the presence of the gravitational field produced by a blackhole. The metric of space-time due to the blackhole is the Schwarzchild metric. Conventionally, this is expressed in spherical polar coordinates. In order to adapt this metric to our problem, we have considered this metric in a small region close to the blackhole and expressed this metric in a cartesian system locally.
Abstract: This paper present lease agreement regulations in
selected European countries. The lease agreement has a long history
and now is one of the main ways to manage agricultural lands in
Europe. The analysis of individual regulations, which has been done,
indicates that this agreement is very important to build social
relations in agriculture and society. This article provides an analysis
of the legal regulations concerning the lease in France, Spain,
Switzerland, Ukraine and Italy. Article is example of study of the
legal regulations and can be used for legal changes in individual
countries.
Abstract: A novel behavioral detection framework is proposed
to detect zero day buffer overflow vulnerabilities (based on network
behavioral signatures) using zero-day exploits, instead of the
signature-based or anomaly-based detection solutions currently
available for IDPS techniques. At first we present the detection
model that uses shadow honeypot. Our system is used for the online
processing of network attacks and generating a behavior detection
profile. The detection profile represents the dataset of 112 types of
metrics describing the exact behavior of malware in the network. In
this paper we present the examples of generating behavioral
signatures for two attacks – a buffer overflow exploit on FTP server
and well known Conficker worm. We demonstrated the visualization
of important aspects by showing the differences between valid
behavior and the attacks. Based on these metrics we can detect
attacks with a very high probability of success, the process of
detection is however very expensive.
Abstract: We evaluate the average energy consumption per bit
in Optical Packet Switches equipped with BENES switching fabric
realized in Semiconductor Optical Amplifier (SOA) technology. We
also study the impact that the Amplifier Spontaneous Emission
(ASE) noise generated by a transmission system has on the power
consumption of the BENES switches due to the gain saturation of the
SOAs used to realize the switching fabric. As a matter of example for
32×32 switches supporting 64 wavelengths and offered traffic equal
to 0,8, the average energy consumption per bit is 2, 34 · 10-1 nJ/bit
and increases if ASE noise introduced by the transmission systems
is increased.
Abstract: Knowledge sharing culture contributes to a positive
working environment. Currently, there is no platform for the Faculty
of Industrial Information Technology (FIIT), Unisel academic staff to
share knowledge among them. As it is done manually, the sharing
process is through common meeting or by any offline discussions.
There is no repository for future retrieval. However, with open
source solution the development of knowledge based application may
reduce the cost tremendously. In this paper we discuss about the
domain on which this knowledge portal is being developed and also
the deployment of open source tools such as JOOMLA, PHP
programming language and MySQL. This knowledge portal is
evidence that open source tools also reliable in developing
knowledge based portal. These recommendations will be useful to
the open source community to produce more open source products in
future.
Abstract: In this paper, an automatic system of diagnosis was
developed to detect and locate in real time the defects of the wound
rotor asynchronous machine associated to electronic converter. For
this purpose, we have treated the signals of the measured parameters
(current and speed) to use them firstly, as indicating variables of the
machine defects under study and, secondly, as inputs to the Artificial
Neuron Network (ANN) for their classification in order to detect the
defect type in progress. Once a defect is detected, the interpretation
system of information will give the type of the defect and its place of
appearance.
Abstract: Defect prevention is the most vital but habitually
neglected facet of software quality assurance in any project. If
functional at all stages of software development, it can condense the
time, overheads and wherewithal entailed to engineer a high quality
product. The key challenge of an IT industry is to engineer a
software product with minimum post deployment defects.
This effort is an analysis based on data obtained for five selected
projects from leading software companies of varying software
production competence. The main aim of this paper is to provide
information on various methods and practices supporting defect
detection and prevention leading to thriving software generation. The
defect prevention technique unearths 99% of defects. Inspection is
found to be an essential technique in generating ideal software
generation in factories through enhanced methodologies of abetted
and unaided inspection schedules. On an average 13 % to 15% of
inspection and 25% - 30% of testing out of whole project effort time
is required for 99% - 99.75% of defect elimination.
A comparison of the end results for the five selected projects
between the companies is also brought about throwing light on the
possibility of a particular company to position itself with an
appropriate complementary ratio of inspection testing.
Abstract: Preparation of hydrogel based on carrageenan
extracted from Kappaphycus alvarezii was conducted with film
immersion in glutaraldehyde solution (GA 4%w/w) for 2min and
then followed by thermal curing at 110°C for 25min. The method of
carrageenan recovery strongly determines the properties of
crosslinked carrageenan. Hydrogel obtained from alkali treated
carrageenan showed higher swelling ability compared to hydrogel
from nonalkali treated carrageenan. Hydrogel from alkali treated
showed the ability of sensitive to pH media.
Abstract: Particle damping is a technique to reduce the
structural vibrations by means of placing small metallic particles
inside a cavity that is attached to the structure at location of high
vibration amplitudes. In this paper, we have presented an analytical
model to simulate the particle damping of two dimensional transient
vibrations in structure operating under high centrifugal loads. The
simulation results show that this technique remains effective as long
as the ratio of the dynamic acceleration of the structure to the applied
centrifugal load is more than 0.1. Particle damping increases with the
increase of particle to structure mass ratio. However, unlike to the
case of particle damping in the absence of centrifugal loads where
the damping efficiency strongly depends upon the size of the cavity,
here this dependence becomes very weak. Despite the simplicity of
the model, the simulation results are considerably in good agreement
with the very scarce experimental data available in the literature for
particle damping under centrifugal loads.
Abstract: This study presents design of a carbon silicon electrode
for iontophorsis treatment towards alopecia. The alopecia is a medical
description means loss of hair from the body. For solving this problem,
the drug need to be delivered into the scalp, therefore, the
iontophoresis was chosen to use in this treatment. However, almost
common electrodes of iontophoresis device are made with metal
material, the electrodes could give patients hurt when they using it, and
it is hard to avoid the hair for attaching the hair. For this reason, an
electrode is made with silicon material to decrease the hurt from the
electrodes, and the carbon material is mixed in it for increasing
conductance. The several cones with stainless material on the
electrode make the electrode is able to void hair to attach the affected
part. According to the results of a vivo-experiment, the carbon silicon
electrode showed a good performance and in treatment comfortably.
Abstract: Fine-grained data replication over the Internet allows duplication of frequently accessed data objects, as opposed to entire sites, to certain locations so as to improve the performance of largescale content distribution systems. In a distributed system, agents representing their sites try to maximize their own benefit since they are driven by different goals such as to minimize their communication costs, latency, etc. In this paper, we will use game theoretical techniques and in particular auctions to identify a bidding mechanism that encapsulates the selfishness of the agents, while having a controlling hand over them. In essence, the proposed game theory based mechanism is the study of what happens when independent agents act selfishly and how to control them to maximize the overall performance. A bidding mechanism asks how one can design systems so that agents- selfish behavior results in the desired system-wide goals. Experimental results reveal that this mechanism provides excellent solution quality, while maintaining fast execution time. The comparisons are recorded against some well known techniques such as greedy, branch and bound, game theoretical auctions and genetic algorithms.