Abstract: Cytogenetic analysis still remains the gold standard method for prenatal diagnosis of trisomy 21 (Down syndrome, DS). Nevertheless, the conventional cytogenetic analysis needs live cultured cells and is too time-consuming for clinical application. In contrast, molecular methods such as FISH, QF-PCR, MLPA and quantitative Real-time PCR are rapid assays with results available in 24h. In the present study, we have successfully used a novel MGB TaqMan probe-based real time PCR assay for rapid diagnosis of trisomy 21 status in Down syndrome samples. We have also compared the results of this molecular method with corresponding results obtained by the cytogenetic analysis. Blood samples obtained from DS patients (n=25) and normal controls (n=20) were tested by quantitative Real-time PCR in parallel to standard G-banding analysis. Genomic DNA was extracted from peripheral blood lymphocytes. A high precision TaqMan probe quantitative Real-time PCR assay was developed to determine the gene dosage of DSCAM (target gene on 21q22.2) relative to PMP22 (reference gene on 17p11.2). The DSCAM/PMP22 ratio was calculated according to the formula; ratio=2 -ΔΔCT. The quantitative Real-time PCR was able to distinguish between trisomy 21 samples and normal controls with the gene ratios of 1.49±0.13 and 1.03±0.04 respectively (p value
Abstract: This work presents a new approach of securing a
wireless network. The configuration is focused on securing &
Protecting wireless network traffic for a small network such as a
home or dorm room. The security Mechanism provided both
authentication, allowing only known authorized users access to the
wireless network, and encryption, preventing anyone from reading
the wireless traffic. The mentioned solution utilizes the open source
free S/WAN software which implements the Internet Protocol
Security –IPSEC. In addition to wireless components, wireless NIC
in PC and wireless access point needs a machine running Linux to act
as security gateway. While the current configuration assumes that the
wireless PC clients are running Linux, Windows XP/VISTA/7 based
machines equipped with VPN software which will allow to interface
with this configuration.
Abstract: This paper analyzes the linkage between migration,
economic globalization and terrorism concerns. On a broad level, I
analyze Canadian economic and political considerations, searching
for causal relationships between political and economic actors on the
one hand, and Canadian immigration law on the other. Specifically,
the paper argues that there are contradictory impulses affecting state
sovereignty. These impulses are are currently being played out in the
field of Canadian immigration law through several proposed changes
to Canada-s Immigration and Refugee Protection Act (IRPA). These
changes reflect an ideological conception of sovereignty that is
intrinsically connected with decision-making capacity centered on an
individual. This conception of sovereign decision-making views
Parliamentary debate and bureaucratic inefficiencies as both equally
responsible for delaying essential decisions relating to the protection
of state sovereignty, economic benefits and immigration control This
paper discusses these concepts in relation to Canadian immigration
policy under Canadian governments over the past twenty five years.
Abstract: In recent years, the number of the cases of information
leaks is increasing. Companies and Research Institutions make various
actions against information thefts and security accidents. One of the
actions is adoption of the crime prevention system, including the
monitoring system by surveillance cameras. In order to solve
difficulties of multiple cameras monitoring, we develop the automatic
human tracking system using mobile agents through multiple
surveillance cameras to track target persons. In this paper, we develop
the monitor which confirms mobile agents tracing target persons, and
the simulator of video picture analysis to construct the tracking
algorithm.
Abstract: The history of technology and banking is examined as
it relates to risk and technological determinism. It is proposed that
the services that banks offer are determined by technology and that
banks must adopt new technologies to be competitive. The adoption
of technologies paradoxically forces the adoption of other new
technologies to protect the bank from the increased risk of
technology. This cycle will lead to bank examiners and regulators to
focus on human behavior, not on the ever changing technology.
Abstract: In this paper we present an efficient approach for the prediction of two sunspot-related time series, namely the Yearly Sunspot Number and the IR5 Index, that are commonly used for monitoring solar activity. The method is based on exploiting partially recurrent Elman networks and it can be divided into three main steps: the first one consists in a “de-rectification" of the time series under study in order to obtain a new time series whose appearance, similar to a sum of sinusoids, can be modelled by our neural networks much better than the original dataset. After that, we normalize the derectified data so that they have zero mean and unity standard deviation and, finally, train an Elman network with only one input, a recurrent hidden layer and one output using a back-propagation algorithm with variable learning rate and momentum. The achieved results have shown the efficiency of this approach that, although very simple, can perform better than most of the existing solar activity forecasting methods.
Abstract: The proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch. Web Application Firewall (WAF) is an intermediate tool between web server and users that provides comprehensive protection for web application. WAF is a negative security model where the detection and prevention mechanisms are based on predefined or user-defined attack signatures and patterns. However, WAF alone is not adequate to offer best defensive system against web vulnerabilities that are increasing in number and complexity daily. This paper presents a methodology to automatically design a positive security based model which identifies and allows only legitimate web queries. The paper shows a true positive rate of more than 90% can be achieved.
Abstract: Persuasive technology has been applied in marketing,
health, environmental conservation, safety and other domains and is
found to be quite effective in changing people-s attitude and
behaviours. This research extends the application domains of
persuasive technology to information security awareness and uses a
theory-driven approach to evaluate the effectiveness of a web-based
program developed based on the principles of persuasive technology
to improve the information security awareness of end users. The
findings confirm the existence of a very strong effect of the webbased
program in raising users- attitude towards information security
aware behavior. This finding is useful to the IT researchers and
practitioners in developing appropriate and effective education
strategies for improving the information security attitudes for endusers.
Abstract: Three novel and significant contributions are made in
this paper Firstly, non-recursive formulation of Haar connection
coefficients, pioneered by the present authors is presented, which
can be computed very efficiently and avoid stack and memory
overflows. Secondly, the generalized approach for state analysis of
singular bilinear time-invariant (TI) and time-varying (TV) systems
is presented; vis-˜a-vis diversified and complex works reported by
different authors. Thirdly, a generalized approach for parameter
estimation of bilinear TI and TV systems is also proposed. The unified
framework of the proposed method is very significant in that the
digital hardware once-designed can be used to perform the complex
tasks of state analysis and parameter estimation of different types
of bilinear systems single-handedly. The simplicity, effectiveness and
generalized nature of the proposed method is established by applying
it to different types of bilinear systems for the two tasks.
Abstract: Freeze concentration freezes or crystallises the water
molecules out as ice crystals and leaves behind a highly concentrated
solution. In conventional suspension freeze concentration where ice
crystals formed as a suspension in the mother liquor, separation of
ice is difficult. The size of the ice crystals is still very limited which
will require usage of scraped surface heat exchangers, which is very
expensive and accounted for approximately 30% of the capital cost.
This research is conducted using a newer method of freeze
concentration, which is progressive freeze concentration. Ice crystals
were formed as a layer on the designed heat exchanger surface. In
this particular research, a helical structured copper crystallisation
chamber was designed and fabricated. The effect of two operating
conditions on the performance of the newly designed crystallisation
chamber was investigated, which are circulation flowrate and coolant
temperature. The performance of the design was evaluated by the
effective partition constant, K, calculated from the volume and
concentration of the solid and liquid phase. The system was also
monitored by a data acquisition tool in order to see the temperature
profile throughout the process. On completing the experimental
work, it was found that higher flowrate resulted in a lower K, which
translated into high efficiency. The efficiency is the highest at 1000
ml/min. It was also found that the process gives the highest
efficiency at a coolant temperature of -6 °C.
Abstract: Pattern matching is one of the fundamental applications in molecular biology. Searching DNA related data is a common activity for molecular biologists. In this paper we explore the applicability of a new pattern matching technique called Index based Forward Backward Multiple Pattern Matching algorithm(IFBMPM), for DNA Sequences. Our approach avoids unnecessary comparisons in the DNA Sequence due to this; the number of comparisons of the proposed algorithm is very less compared to other existing popular methods. The number of comparisons rapidly decreases and execution time decreases accordingly and shows better performance.
Abstract: Composite pins of rubber dust collected from tyre
retreading centres of trucks, cars and buses etc.and epoxy with
weight percentages of 10. 15, and 20 % of rubber (weight fractions of
9, 13 and 17 % respectively) have been prepared in house with the
help of a split wooden mould. The pins were tested in a pin-on-disc
wear monitor to determine the co-efficient of friction and weight
losses with varying speeds, loads and time. The wear volume and
wear rates have also been found out for all these three specimens.. It
is observed that all the specimens have exhibited very low coefficient
of friction and low wear rates under dry sliding condition. Out of the
above three samples tested, the specimen with 10 % rubber dust by
weight has shown lowest wear rates. However a peculiar result i.e
decreasing trend has been obtained with 20% reinforcement of rubber
in epoxy while rubbed against steel at varying speeds. This might
have occurred due to high surface finish of the disc and formation of
a thin transfer layer from the composite
Abstract: Oilsands bitumen is an extremely important source of
energy for North America. However, due to the presence of large
molecules such as asphaltenes, the density and viscosity of the
bitumen recovered from these sands are much higher than those of
conventional crude oil. As a result the extracted bitumen has to be
diluted with expensive solvents, or thermochemically upgraded in
large, capital-intensive conventional upgrading facilities prior to
pipeline transport. This study demonstrates that globally abundant
natural zeolites such as clinoptilolite from Saint Clouds, New Mexico
and Ca-chabazite from Bowie, Arizona can be used as very effective
reagents for cracking and visbreaking of oilsands bitumen. Natural
zeolite cracked oilsands bitumen products are highly recoverable (up
to ~ 83%) using light hydrocarbons such as pentane, which indicates
substantial conversion of heavier fractions to lighter components.
The resultant liquid products are much less viscous, and have lighter
product distribution compared to those produced from pure thermal
treatment. These natural minerals impart similar effect on industrially
extracted Athabasca bitumen.
Abstract: Researches show that probability-statistical methods application, especially at the early stage of the aviation Gas Turbine Engine (GTE) technical condition diagnosing, when the flight information has property of the fuzzy, limitation and uncertainty is unfounded. Hence the efficiency of application of new technology Soft Computing at these diagnosing stages with the using of the Fuzzy Logic and Neural Networks methods is considered. According to the purpose of this problem training with high accuracy of fuzzy multiple linear and non-linear models (fuzzy regression equations) which received on the statistical fuzzy data basis is made. For GTE technical condition more adequate model making dynamics of skewness and kurtosis coefficients- changes are analysed. Researches of skewness and kurtosis coefficients values- changes show that, distributions of GTE work parameters have fuzzy character. Hence consideration of fuzzy skewness and kurtosis coefficients is expedient. Investigation of the basic characteristics changes- dynamics of GTE work parameters allows drawing conclusion on necessity of the Fuzzy Statistical Analysis at preliminary identification of the engines' technical condition. Researches of correlation coefficients values- changes shows also on their fuzzy character. Therefore for models choice the application of the Fuzzy Correlation Analysis results is offered. At the information sufficiency is offered to use recurrent algorithm of aviation GTE technical condition identification (Hard Computing technology is used) on measurements of input and output parameters of the multiple linear and non-linear generalised models at presence of noise measured (the new recursive Least Squares Method (LSM)). The developed GTE condition monitoring system provides stageby- stage estimation of engine technical conditions. As application of the given technique the estimation of the new operating aviation engine technical condition was made.
Abstract: Gastric ulceration is a discontinuity in gastric mucosa, usually occurs due to imbalance between the gastric mucosal protective factors, that is called gastric mucosal barrier, and the aggressive factors, to which the mucosa is exposed. This study was carried out on sixty male Sprague-Dowely rats (12- 16 weeks old) allocated into two groups. The first control group and the second Gastric lesion group which induced by oral administration of a single daily dose of aspirin at a dose of 300 mg/kg body weight for 7 consecutive-days (6% aspirin solution will be prepared and each rat will be given 5 ml of that solution/kg body weight). Blood is collected 1, 2 and 3 weeks after induction of gastric ulceration. Significant increase in serum copper, nitric oxide, and prostaglandin E2 all over the period of experiment. Significant decrease in erythrocyte superoxide dismutase (t-SOD) activities, serum (calcium, phosphorus, glucose and insulin) levels. Non-significant changes in serum sodium and potassium levels are obtained.
Abstract: One main drawback of intrusion detection system is the
inability of detecting new attacks which do not have known
signatures. In this paper we discuss an intrusion detection method
that proposes independent component analysis (ICA) based feature
selection heuristics and using rough fuzzy for clustering data. ICA is
to separate these independent components (ICs) from the monitored
variables. Rough set has to decrease the amount of data and get rid of
redundancy and Fuzzy methods allow objects to belong to several
clusters simultaneously, with different degrees of membership. Our
approach allows us to recognize not only known attacks but also to
detect activity that may be the result of a new, unknown attack. The
experimental results on Knowledge Discovery and Data Mining-
(KDDCup 1999) dataset.
Abstract: In this paper, we propose an improvement of pattern
growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use sufficient data structure for Seq-Tree
framework and separator database to reduce the execution time and
memory usage. Thus, with I-PrefixSpan there is no in-memory database stored after index set is constructed. The experimental result
shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.
Abstract: Two optimized strategies were successfully established
to develop biomolecule-based magnetic nanoassemblies.
Streptavidin-coated and amine-coated magnetic nanoparticles were
chosen as model scaffolds onto which double-stranded DNA and
human immunoglobulin G were specifically conjugated in succession,
using biotin-streptavidin interaction or covalent cross-linkers. The
success of this study opens the prospect of developing selective and
sensitive nanoparticle-based structures for diagnostics or drug
delivery.
Abstract: Photo-BJMOSFET (Bipolar Junction Metal-Oxide-
Semiconductor Field Effect Transistor) fabricated on SOI film was proposed. ITO film is adopted in the device as gate electrode to reduce
light absorption. Depletion region but not inversion region is formed
in film by applying gate voltage (but low reverse voltage) to achieve
high photo-to-dark-current ratio. Comparisons of photoelectriccharacteristics
executed among VGK=0V, 0.3V, 0.6V, 0.9V and 1.0V
(reverse voltage VAK is equal to 1.0V for total area of 10×10μm2). The
results indicate that the greatest improvement in photo-to-dark-current
ratio is achieved up to 2.38 at VGK=0.6V. In addition,
photo-BJMOSFET is compatible with CMOS integration due to big
input resistance
Abstract: Prior research evidenced that unimodal biometric
systems have several tradeoffs like noisy data, intra-class variations,
restricted degrees of freedom, non-universality, spoof attacks, and
unacceptable error rates. In order for the biometric system to be more
secure and to provide high performance accuracy, more than one
form of biometrics are required. Hence, the need arise for multimodal
biometrics using combinations of different biometric modalities. This
paper introduces a multimodal biometric system (MMBS) based on
fusion of whole dorsal hand geometry and fingerprints that acquires
right and left (Rt/Lt) near-infra-red (NIR) dorsal hand geometry (HG)
shape and (Rt/Lt) index and ring fingerprints (FP). Database of 100
volunteers were acquired using the designed prototype. The acquired
images were found to have good quality for all features and patterns
extraction to all modalities. HG features based on the hand shape
anatomical landmarks were extracted. Robust and fast algorithms for
FP minutia points feature extraction and matching were used. Feature
vectors that belong to similar biometric traits were fused using
feature fusion methodologies. Scores obtained from different
biometric trait matchers were fused using the Min-Max
transformation-based score fusion technique. Final normalized scores
were merged using the sum of scores method to obtain a single
decision about the personal identity based on multiple independent
sources. High individuality of the fused traits and user acceptability
of the designed system along with its experimental high performance
biometric measures showed that this MMBS can be considered for
med-high security levels biometric identification purposes.