Abstract: Medical image modalities such as computed
tomography (CT), magnetic resonance imaging (MRI), ultrasound
(US), X-ray are adapted to diagnose disease. These modalities
provide flexible means of reviewing anatomical cross-sections and
physiological state in different parts of the human body. The raw
medical images have a huge file size and need large storage
requirements. So it should be such a way to reduce the size of those
image files to be valid for telemedicine applications. Thus the image
compression is a key factor to reduce the bit rate for transmission or
storage while maintaining an acceptable reproduction quality, but it is
natural to rise the question of how much an image can be compressed
and still preserve sufficient information for a given clinical
application. Many techniques for achieving data compression have
been introduced. In this study, three different MRI modalities which
are Brain, Spine and Knee have been compressed and reconstructed
using wavelet transform. Subjective and objective evaluation has
been done to investigate the clinical information quality of the
compressed images. For the objective evaluation, the results show
that the PSNR which indicates the quality of the reconstructed image
is ranging from (21.95 dB to 30.80 dB, 27.25 dB to 35.75 dB, and
26.93 dB to 34.93 dB) for Brain, Spine, and Knee respectively. For
the subjective evaluation test, the results show that the compression
ratio of 40:1 was acceptable for brain image, whereas for spine and
knee images 50:1 was acceptable.
Abstract: The most common type of controller being used in
the industry is PI(D) controller which has been used since 1945 and
is still being widely used due to its efficiency and simplicity. In
most cases, the PI(D) controller was tuned without taking into
consideration of the effect of actuator saturation. In real processes,
the most common actuator which is valve will act as constraint and
restrict the controller output. Since the controller is not designed to
encounter saturation, the process may windup and consequently
resulted in large oscillation or may become unstable. Usually, an
antiwindup compensator is added to the feedback control loop to
reduce the deterioration effect of integral windup. This research
aims to specifically control processes with constraints. The
proposed method was applied to two different types of food
processes, which are blending and spray drying. Simulations were
done using MATLAB and the performances of the proposed
method were compared with other conventional methods. The
proposed technique was able to control the processes and avoid
saturation such that no anti windup compensator is needed.
Abstract: Biological sequences from different species are called or-thologs if they evolved from a sequence of a common ancestor species and they have the same biological function. Approximations of Kolmogorov complexity or entropy of biological sequences are already well known to be useful in extracting similarity information between such sequences -in the interest, for example, of ortholog detection. As is well known, the exact Kolmogorov complexity is not algorithmically computable. In prac-tice one can approximate it by computable compression methods. How-ever, such compression methods do not provide a good approximation to Kolmogorov complexity for short sequences. Herein is suggested a new ap-proach to overcome the problem that compression approximations may notwork well on short sequences. This approach is inspired by new, conditional computations of Kolmogorov entropy. A main contribution of the empir-ical work described shows the new set of entropy-based machine learning attributes provides good separation between positive (ortholog) and nega-tive (non-ortholog) data - better than with good, previously known alter-natives (which do not employ some means to handle short sequences well).Also empirically compared are the new entropy based attribute set and a number of other, more standard similarity attributes sets commonly used in genomic analysis. The various similarity attributes are evaluated by cross validation, through boosted decision tree induction C5.0, and by Receiver Operating Characteristic (ROC) analysis. The results point to the conclu-sion: the new, entropy based attribute set by itself is not the one giving the best prediction; however, it is the best attribute set for use in improving the other, standard attribute sets when conjoined with them.
Abstract: Using maximal consistent blocks of tolerance relation
on the universe in incomplete decision table, the concepts of join block
and meet block are introduced and studied. Including tolerance class,
other blocks such as tolerant kernel and compatible kernel of an object
are also discussed at the same time. Upper and lower approximations
based on those blocks are also defined. Default definite decision rules
acquired from incomplete decision table are proposed in the paper. An
incremental algorithm to update default definite decision rules is
suggested for effective mining tasks from incomplete decision table
into which data is appended. Through an example, we demonstrate
how default definite decision rules based on maximal consistent
blocks, join blocks and meet blocks are acquired and how optimization
is done in support of discernibility matrix and discernibility function
in the incomplete decision table.
Abstract: A measurement system was successfully fabricated to
detect ion concentrations (hydrogen and chlorine) in this study.
PIC18F4520, the microcontroller was used as the control unit in the
measurement system. The measurement system was practically used
to sense the H+ and Cl- in different examples, and the pH and pCl
values were exhibited on real-time LCD display promptly. In the study,
the measurement method is used to judge whether the response voltage
is stable. The change quantity is smaller than 0.01%, that the present
response voltage compares with next response voltage for H+
measurement, and the above condition is established only 6 sec.
Besides, the change quantity is smaller than 0.01%, that the present
response voltage compares with next response voltage for Clmeasurement,
and the above condition is established only 5 sec.
Furthermore, the average error quantities would also be considered,
and they are 0.05 and 0.07 for measurements of pH and pCl values,
respectively.
Abstract: Dew harvesting needs only weak investment and
exploits a free, clean and inexhaustible energy. This study aims to
measure the relative contributions of dew and rain water in the
Mediterranean Dalmatian coast and islands of Croatia and determine
whether dew water is potable. Two sites were chosen, an open site on
the coast favourable to dew formation (Zadar) and a less favourable
site in a circus of mountains in Komiža (Vis Island). Between July
1st, 2003 and October 31st, 2006, dew hasbeen daily collected on a 1
m2 tilted (30°) test dew condenser together with ordinary
meteorological data (air temperature and relative humidity, cloud
coverage, windspeed and direction). The mean yearly cumulative
dew yields were found to be 20 mm (Zadar) and 9.3 mm (Komiža ).
During the dry season (May to October), monthly cumulative dew
water yield can represent up to 38% of water collected by rain fall. In
July 2003 and 2006, dew water represented about 120% of the
monthly cumulative rain water. Dew and rain water were analyzed in
Zadar. The corresponding parameters were measured: pH, electrical
conductivity, major anions (HCO3
-, Cl-, SO4
2-
, NO3
-
, ,) and major
cations (NH4
+, Na+, K+, Ca2+, Mg2+. Both dew and rain water are in
conformity with the WHO directives for potability except Mg2+.
Using existing roofs and refurbishing the abandoned impluviums to
permit dew collection could then provide a useful supplementary
amount of water, especially during the dry season.
Abstract: Dehydration of methanol to dimethyl ether (DME)
over a commercial Al2O3 catalyst was studied in an isothermal integral
fixed bed reactor. The experiments were performed on the temperature
interval 513-613 K, liquid hourly space velocity (LHSV) of 0.9-2.1h-1,
pressures between 0.1 and 1.0 MPa. The effect of different operation
conditions on the dehydration of methanol was investigated in a
laboratory scale experiment. A new intrinsic kinetics equation based
on the mechanism of Langmuir-Hinshelwood dissociation adsorption
was developed for the dehydration reaction by fitting the expressions
to the experimental data. An activation energy of 67.21 kJ/mol was
obtained for the catalyst with the best performance. Statistic test
showed that this new intrinsic kinetics equation was acceptable.
Abstract: Trust and Energy consumption is the most challenging
issue in routing protocol design for Mobile ad hoc networks
(MANETs), since mobile nodes are battery powered and nodes
behaviour are unpredictable. Furthermore replacing and recharging
batteries and making nodes co-operative is often impossible in
critical environments like military applications. In this paper, we
propose a trust based energy aware routing model in MANET.
During route discovery, node with more trust and maximum energy
capacity is selected as a router based on a parameter called
'Reliability'. Route request from the source is accepted by a node
only if its reliability is high. Otherwise, the route request is
discarded. This approach forms a reliable route from source to
destination thus increasing network life time, improving energy
utilization and decreasing number of packet loss during transmission.
Abstract: The Taiwan Health Literacy Scale (THLS) was developed to cope with the need of measuring heath literacy of Chinese-speaking adults in Taiwan. Although the scale was proven having good reliability and validity, it was not popularly adopted by the practitioners due to the length, and the time required completing. Based on the THLS, this research further invited healthcare professionals to review the original scale for a possible shorten work. Under the logic of THLS, the research adopted an analytic hierarchy process technique to consolidate the healthcare experts- assessments to shorten the original scale. There are fifteen items out of the original 66 items were identified having higher loadings. Confirmed by the experts and passed a pilot test with 40 undergraduate students, a short form of THLS is then introduced. This research then used 839 samples from the major cities of the Hua-lien county in the eastern part of Taiwan to test the reliability and validity of this new scale. The reliability of the scale is high and acceptable. The current scale is also highly correlated with the original, of which provide evidence for the validity of the scale.
Abstract: We study bifurcation structure of the zonal jet flow the
streamfunction of which is expressed by a single spherical harmonics
on a rotating sphere. In the non-rotating case, we find that a steady
traveling wave solution arises from the zonal jet flow through Hopf
bifurcation. As the Reynolds number increases, several traveling
solutions arise only through the pitchfork bifurcations and at high
Reynolds number the bifurcating solutions become Hopf unstable. In
the rotating case, on the other hand, under the stabilizing effect of
rotation, as the absolute value of rotation rate increases, the number
of the bifurcating solutions arising from the zonal jet flow decreases
monotonically. We also carry out time integration to study unsteady
solutions at high Reynolds number and find that in the non-rotating
case the unsteady solutions are chaotic, while not in the rotating cases
calculated. This result reflects the general tendency that the rotation
stabilizes nonlinear solutions of Navier-Stokes equations.
Abstract: The brain MR imaging-based clinical research and analysis system were specifically built and the development for a large-scale data was targeted. We used the general clinical data available for building large-scale data. Registration period for the selection of the lesion ROI and the region growing algorithm was used and the Mesh-warp algorithm for matching was implemented. The accuracy of the matching errors was modified individually. Also, the large ROI research data can accumulate by our developed compression method. In this way, the correctly decision criteria to the research result was suggested. The experimental groups were age, sex, MR type, patient ID and smoking which can easily be queries. The result data was visualized of the overlapped images by a color table. Its data was calculated by the statistical package. The evaluation for the utilization of this system in the chronic ischemic damage in the area has done from patients with the acute cerebral infarction. This is the cause of neurologic disability index location in the center portion of the lateral ventricle facing. The corona radiate was found in the position. Finally, the system reliability was measured both inter-user and intra-user registering correlation.
Abstract: Air infiltration in mass scale industrial applications of
bio char production is inevitable. The presence of oxygen during the
carbonization process is detrimental to the production of biochar yield
and properties. The experiment was carried out on several wood
species in a fixed-bed pyrolyser under various fractions of oxygen
ranging from 0% to 11% by varying nitrogen and oxygen composition
in the pyrolysing gas mixtures at desired compositions. The bed
temperature and holding time were also varied. Process optimization
was carried out by Response Surface Methodology (RSM) by
employing Central Composite Design (CCD) using Design Expert 6.0
Software. The effect of oxygen ratio and holding time on biochar yield
within the range studied were statistically significant. From the
analysis result, optimum condition of 15.2% biochar yield of
mangrove wood was predicted at pyrolysis temperature of 403 oC,
oxygen percentage of 2.3% and holding time of two hours. This
prediction agreed well with the experiment finding of 15.1% biochar
yield.
Abstract: Evaluation of educational portals is an important
subject area that needs more attention from researchers. A university
that has an educational portal which is difficult to use and interact by
teachers or students or management staff can reduce the position and
reputation of the university. Therefore, it is important to have the
ability to make an evaluation of the quality of e-services the
university provide to improve them over time.
The present study evaluates the usability of the Information
Technology Faculty portal at University of Benghazi. Two evaluation
methods were used: a questionnaire-based method and an online
automated tool-based method. The first method was used to measure
the portal's external attributes of usability (Information, Content and
Organization of the portal, Navigation, Links and Accessibility,
Aesthetic and Visual Appeal, Performance and Effectiveness and
educational purpose) from users' perspectives, while the second
method was used to measure the portal's internal attributes of
usability (number and size of HTML files, number and size of images,
load time, HTML check errors, browsers compatibility problems,
number of bad and broken links), which cannot be perceived by the
users. The study showed that some of the usability aspects have been
found at the acceptable level of performance and quality, and some
others have been found otherwise. In general, it was concluded that
the usability of IT faculty educational portal generally acceptable.
Recommendations and suggestions to improve the weakness and
quality of the portal usability are presented in this study.
Abstract: Formaldehyde is the illegal chemical substance used
for food preservation in fish and vegetable. It can promote
carcinogenesis. Superoxide dismutases are the important
antioxidative enzymes that catalyze the dismutation of superoxide
anion into oxygen and hydrogen peroxide. The resultant level of
oxidative stress in formaldehyde-treated lymphocytes was
investigated. The formaldehyde concentrations of 0, 20, 40, 60, 80
and 120μmol/L were treated in human lymphocytes for 12 hours.
After 12 treated hours, the superoxide dismutase activity change was
measured in formaldehyde-treated lymphocytes. The results showed
that the formaldehyde concentrations of 60, 80 and 120μmol/L
significantly decreased superoxide dismutase activities in
lymphocytes (P < 0.05). The change of superoxide dismutase
activity in formaldehyde-treated lymphocytes may be the biomarker
for detect cellular injury, such as damage to DNA, due to
formaldehyde exposure.
Abstract: The aim of this study is to develop a cost-effective WBGT heat stress monitor which provides precise heat stress measurement. The proposed device employs SHT15 and DS18B20 as a temperature and humidity sensors, respectively, incorporating with ATmega328 microcontroller. The developed heat stress monitor was calibrated and adjusted to that of the standard temperature and humidity sensors in the laboratory. The results of this study illustrated that the mean percentage error and the standard deviation from the measurement of the globe temperature was 2.33 and 2.71 respectively, while 0.94 and 1.02 were those of the dry bulb temperature, 0.79 and 0.48 were of the wet bulb temperature, and 4.46 and 1.60 were of the relative humidity sensor. This device is relatively low-cost and the measurement error is acceptable.
Abstract: Recent medical studies have investigated the importance of enteral feeding and the use of feeding pumps for recovering patients unable to feed themselves or gain nourishment and nutrients by natural means. The most of enteral feeding system uses a peristaltic tube pump. A peristaltic pump is a form of positive displacement pump in which a flexible tube is progressively squeezed externally to allow the resulting enclosed pillow of fluid to progress along it. The squeezing of the tube requires a precise and robust controller of the geared motor to overcome parametric uncertainty of the pumping system which generates due to a wide variation of friction and slip between tube and roller. So, this paper proposes fuzzy adaptive controller for the robust control of the peristaltic tube pump. This new adaptive controller uses a fuzzy multi-layered architecture which has several independent fuzzy controllers in parallel, each with different robust stability area. Out of several independent fuzzy controllers, the most suited one is selected by a system identifier which observes variations in the controlled system parameter. This paper proposes a design procedure which can be carried out mathematically and systematically from the model of a controlled system. Finally, the good control performance, accurate dose rate and robust system stability, of the developed feeding pump is confirmed through experimental and clinic testing.
Abstract: In this paper, we propose the robust water level detection method based on the accumulated histogram under small changed image which is acquired from water level surveillance camera. In general surveillance system, this is detecting and recognizing invasion from searching area which is in big change on the sequential images. However, in case of a water level detection system, these general surveillance techniques are not suitable due to small change on the water surface. Therefore the algorithm introduces the accumulated histogram which is emphasizing change of water surface in sequential images. Accumulated histogram is based on the current image frame. The histogram is cumulating differences between previous images and current image. But, these differences are also appeared in the land region. The band pass filter is able to remove noises in the accumulated histogram Finally, this algorithm clearly separates water and land regions. After these works, the algorithm converts from the water level value on the image space to the real water level on the real space using calibration table. The detected water level is sent to the host computer with current image. To evaluate the proposed algorithm, we use test images from various situations.
Abstract: Education, as the most important resource in any country, has multiplying effects on all facets of development in a society. The new social realities, particularly the interplay between democratization of education; unprecedented developments in IT sector; emergence of knowledge society, liberalization of economy and globalization have greatly influenced the educational process of all nations. This turbulence entails upon education to undergo dramatic changes to keep up with the new expectations. Growth of entrepreneurship among Indian women is highly important for empowering them and this is highly essential for socio-economic development of a society. Unfortunately in India there is poor acceptance of entrepreneurship among women as unfounded myths and fears restrain them to be enterprising. To remove these inhibitions, education system needs to be re-engineered to make entrepreneurship more acceptable. This paper empirically analyses the results of a survey done on around 500 female graduates in North India to measure and evaluate various entrepreneurial traits present in them. A formative model has been devised in this context, which should improve the teaching-learning process in our education system, which can lead to sustainable growth of women entrepreneurship in India.
Abstract: Security has been an important issue and concern in the
smart home systems. Smart home networks consist of a wide range of
wired or wireless devices, there is possibility that illegal access to
some restricted data or devices may happen. Password-based
authentication is widely used to identify authorize users, because this
method is cheap, easy and quite accurate. In this paper, a neural
network is trained to store the passwords instead of using verification
table. This method is useful in solving security problems that
happened in some authentication system. The conventional way to
train the network using Backpropagation (BPN) requires a long
training time. Hence, a faster training algorithm, Resilient
Backpropagation (RPROP) is embedded to the MLPs Neural
Network to accelerate the training process. For the Data Part, 200
sets of UserID and Passwords were created and encoded into binary
as the input. The simulation had been carried out to evaluate the
performance for different number of hidden neurons and combination
of transfer functions. Mean Square Error (MSE), training time and
number of epochs are used to determine the network performance.
From the results obtained, using Tansig and Purelin in hidden and
output layer and 250 hidden neurons gave the better performance. As
a result, a password-based user authentication system for smart home
by using neural network had been developed successfully.
Abstract: In the last decade digital watermarking procedures have
become increasingly applied to implement the copyright protection
of multimedia digital contents distributed on the Internet. To this
end, it is worth noting that a lot of watermarking procedures
for images and videos proposed in literature are based on spread
spectrum techniques. However, some scepticism about the robustness
and security of such watermarking procedures has arisen because
of some documented attacks which claim to render the inserted
watermarks undetectable. On the other hand, web content providers
wish to exploit watermarking procedures characterized by flexible and
efficient implementations and which can be easily integrated in their
existing web services frameworks or platforms. This paper presents
how a simple spread spectrum watermarking procedure for MPEG-2
videos can be modified to be exploited in web contexts. To this end,
the proposed procedure has been made secure and robust against some
well-known and dangerous attacks. Furthermore, its basic scheme
has been optimized by making the insertion procedure adaptive with
respect to the terminals used to open the videos and the network transactions
carried out to deliver them to buyers. Finally, two different
implementations of the procedure have been developed: the former
is a high performance parallel implementation, whereas the latter is
a portable Java and XML based implementation. Thus, the paper
demonstrates that a simple spread spectrum watermarking procedure,
with limited and appropriate modifications to the embedding scheme,
can still represent a valid alternative to many other well-known and
more recent watermarking procedures proposed in literature.