Abstract: The biological activity of A. pullulans isolates against
species of the genus Fusarium, bacteria of the genus Azotobacter and
pseudomonads colonizing wheat kernels was evaluated. A field
experiment was carried out in 2009-2011, in north-eastern Poland.
Winter wheat (cv. Bogatka) plants were sprayed with a cell
suspension of A. pullulans at a density of 106 - 108 per cm3 water at
the stem elongation stage and the heading stage. Untreated plants
served as control. The abundance of epiphytic yeasts, bacteria of the
genus Azotobacter, pseudomonads and Fusarium pathogens on wheat
grain was estimated at harvest and after six months’ storage. The
average size of yeast communities was significantly greater on wheat
kernels treated with a cell suspension of A. pullulans, compared with
control samples. In 2010-2011, biological control reduced the
abundance of some species of the genus Fusarium.
Abstract: Ants are fascinating creatures that demonstrate the
ability to find food and bring it back to their nest. Their ability as a
colony, to find paths to food sources has inspired the development of
algorithms known as Ant Colony Systems (ACS). The principle of
cooperation forms the backbone of such algorithms, commonly used
to find solutions to problems such as the Traveling Salesman
Problem (TSP). Ants communicate to each other through chemical
substances called pheromones. Modeling individual ants- ability to
manipulate this substance can help an ACS find the best solution.
This paper introduces a Dynamic Ant Colony System with threelevel
updates (DACS3) that enhance an existing ACS. Experiments
were conducted to observe single ant behavior in a colony of
Malaysian House Red Ants. Such behavior was incorporated into the
DACS3 algorithm. We benchmark the performance of DACS3 versus
DACS on TSP instances ranging from 14 to 100 cities. The result
shows that the DACS3 algorithm can achieve shorter distance in
most cases and also performs considerably faster than DACS.
Abstract: The problem addressed herein is the efficient management of the Grid/Cluster intense computation involved, when the preconditioned Bi-CGSTAB Krylov method is employed for the iterative solution of the large and sparse linear system arising from the discretization of the Modified Helmholtz-Dirichlet problem by the Hermite Collocation method. Taking advantage of the Collocation ma-trix's red-black ordered structure we organize efficiently the whole computation and map it on a pipeline architecture with master-slave communication. Implementation, through MPI programming tools, is realized on a SUN V240 cluster, inter-connected through a 100Mbps and 1Gbps ethernet network,and its performance is presented by speedup measurements included.
Abstract: Modern civilization has come in recent decades into a new phase in its development, called the information society. The concept of "information society" has become one of the most common. Therefore, the attempt to understand what exactly the society we live in, what are its essential features, and possible future scenarios, is important to the social and philosophical analysis. At the heart of all these deep transformations is more increasing, almost defining role knowledge and information as play substrata of «information society». The mankind opened for itself and actively exploits a new resource – information. Information society puts forward on the arena new type of the power, at the heart of which activity – mastering by a new resource: information and knowledge. The password of the new power – intelligence as synthesis of knowledge, information and communications, the strength of mind, fundamental sociocultural values. In a postindustrial society, the power of knowledge and information is crucial in the management of the company, pushing into the background the influence of money and state coercion.
Abstract: Text Mining is around applying knowledge discovery techniques to unstructured text is termed knowledge discovery in text (KDT), or Text data mining or Text Mining. In Neural Network that address classification problems, training set, testing set, learning rate are considered as key tasks. That is collection of input/output patterns that are used to train the network and used to assess the network performance, set the rate of adjustments. This paper describes a proposed back propagation neural net classifier that performs cross validation for original Neural Network. In order to reduce the optimization of classification accuracy, training time. The feasibility the benefits of the proposed approach are demonstrated by means of five data sets like contact-lenses, cpu, weather symbolic, Weather, labor-nega-data. It is shown that , compared to exiting neural network, the training time is reduced by more than 10 times faster when the dataset is larger than CPU or the network has many hidden units while accuracy ('percent correct') was the same for all datasets but contact-lences, which is the only one with missing attributes. For contact-lences the accuracy with Proposed Neural Network was in average around 0.3 % less than with the original Neural Network. This algorithm is independent of specify data sets so that many ideas and solutions can be transferred to other classifier paradigms.
Abstract: From past many decades human beings are suffering
from plethora of natural disasters. Occurrence of disasters is a
frequent process; it changes conceptual myths as more and more
advancement are made. Although we are living in technological era
but in developing countries like Pakistan disasters are shaped by
socially constructed roles. The need is to understand the most
vulnerable group of society i.e. females; their issues are complex in
nature because of undermined gender status in the society. There is a
need to identify maximum issues regarding females and to enhance
the achievement of millennium development goals (MDGs). Gender
issues are of great concern all around the globe including Pakistan.
Here female visibility in society is low, and also during disasters, the
failure to understand the reality that concentrates on double burden
including productive and reproductive care. Women have to
contribute a lot in society so we need to make them more disaster
resilient. For this non-structural measures like awareness, trainings
and education must be carried out. In rural and in urban settings in
any disaster like earthquake or flood, elements like gender
perspective, their age, physical health, demographic issues contribute
towards vulnerability. In Pakistan the gender issues in disasters were
of less concern before 2005 earthquake and 2010 floods. Significant
achievements are made after 2010 floods when gender and child cell
was created to provide all facilities to women and girls. The aim of
the study is to highlight all necessary facilities in a disaster to build
coping mechanism in females from basic rights till advance level
including education.
Abstract: Currently, slider process of Hard Disk Drive Industry
become more complex, defective diagnosis for yield improvement
becomes more complicated and time-consumed. Manufacturing data
analysis with data mining approach is widely used for solving that
problem. The existing mining approach from combining of the KMean
clustering, the machine oriented Kruskal-Wallis test and the
multivariate chart were applied for defective diagnosis but it is still
be a semiautomatic diagnosis system. This article aims to modify an
algorithm to support an automatic decision for the existing approach.
Based on the research framework, the new approach can do an
automatic diagnosis and help engineer to find out the defective
factors faster than the existing approach about 50%.
Abstract: The paper deals with the analysis of triggering
conditions and evolution processes of piping phenomena, in relation
to both mechanical and hydraulic aspects. In particular, the aim of
the study is to predict slope instabilities triggered by piping,
analysing the conditions necessary for a flow failure to occur. Really,
the mechanical effect involved in the loads redistribution around the
pipe is coupled to the drainage process arising from higher
permeability of the pipe. If after the pipe formation, the drainage
goes prevented for pipe clogging, the porewater pressure increase can
lead to the failure or even the liquefaction, with a subsequent flow
slide. To simulate the piping evolution and to verify relevant stability
conditions, a iterative coupled modelling approach has been pointed
out. As example, the proposed tool has been applied to the Stava
Valley disaster (July, 1985), demonstrating that piping might be one
of triggering phenomena of the tailings dams collapse.
Abstract: The amounts of radioactivity in the igneous rocks
have been investigated; samples were collected from the total of eight
basalt rock types in the northeastern of Kurdistan region/Iraq. The
activity concentration of 226Ra (238U) series, 228Ac (232Th) series, 40K
and 137Cs were measured using Planar HPGe and NaI(Tl) detectors.
Along the study area the radium equivalent activities Raeq in Bq/Kg
of samples under investigation were found in the range of 22.16 to
77.31 Bq/Kg with an average value of 44.8 Bq/Kg, this value is much
below the internationally accepted value of 370 Bq/Kg. To estimate
the health effects of this natural radioactive composition, the average
values of absorbed gamma dose rate D (55 nGyh-1), Indoor and
outdoor annual effective dose rates Eied (0.11 mSvy-1) . and Eoed
(0.03 mSvy-1), External hazard index Hex (0.138) and internal hazard
index Hin(0.154), and representative level index Iγr (0.386) have been
calculated and found to be lower than the worldwide average values.
Abstract: Fake finger submission attack is a major problem in fingerprint recognition systems. In this paper, we introduce an aliveness detection method based on multiple static features, which derived from a single fingerprint image. The static features are comprised of individual pore spacing, residual noise and several first order statistics. Specifically, correlation filter is adopted to address individual pore spacing. The multiple static features are useful to reflect the physiological and statistical characteristics of live and fake fingerprint. The classification can be made by calculating the liveness scores from each feature and fusing the scores through a classifier. In our dataset, we compare nine classifiers and the best classification rate at 85% is attained by using a Reduced Multivariate Polynomial classifier. Our approach is faster and more convenient for aliveness check for field applications.
Abstract: This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent techniques in cryptography. The main aim is the development of recent crypt analysis hash function. We present different approaches to defining security properties more formally and present basic attack on hash function. We recall Merkle-Damgard security properties of iterated hash function. The Main aim of this paper is the development of recent techniques applicable to crypt Analysis hash function, mainly from SHA family. Recent proposed attacks an MD5 & SHA motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks on hash functions.
Abstract: The case study deals with the semi-quantitative risk
assessment of water resource earmarked for the emergency supply
of population with drinking water. The risk analysis has been based
on previously identified hazards/sensitivities of the elements
of hydrogeological structure and technological equipment of ground
water resource as well as on the assessment of the levels of hazard,
sensitivity and criticality of individual resource elements in the form
of point indexes. The following potential sources of hazard have
been considered: natural disasters caused by atmospheric and
geological changes, technological hazards, and environmental
burdens. The risk analysis has proved that the assessed risks are
acceptable and the water resource may be integrated into a crisis plan
of a given region.
Abstract: This paper presents design features of a rescue robot, named CEO Mission II. Its body is designed to be the track wheel type with double front flippers for climbing over the collapse and the rough terrain. With 125 cm. long, 5-joint mechanical arm installed on the robot body, it is deployed not only for surveillance from the top view but also easier and faster access to the victims to get their vital signs. Two cameras and sensors for searching vital signs are set up at the tip of the multi-joint mechanical arm. The third camera is at the back of the robot for driving control. Hardware and software of the system, which controls and monitors the rescue robot, are explained. The control system is used for controlling the robot locomotion, the 5-joint mechanical arm, and for turning on/off devices. The monitoring system gathers all information from 7 distance sensors, IR temperature sensors, 3 CCD cameras, voice sensor, robot wheels encoders, yawn/pitch/roll angle sensors, laser range finder and 8 spare A/D inputs. All sensors and controlling data are communicated with a remote control station via IEEE 802.11b Wi-Fi. The audio and video data are compressed and sent via another IEEE 802.11g Wi-Fi transmitter for getting real-time response. At remote control station site, the robot locomotion and the mechanical arm are controlled by joystick. Moreover, the user-friendly GUI control program is developed based on the clicking and dragging method to easily control the movement of the arm. Robot traveling map is plotted from computing the information of wheel encoders and the yawn/pitch data. 2D Obstacle map is plotted from data of the laser range finder. The concept and design of this robot can be adapted to suit many other applications. As the Best Technique awardee from Thailand Rescue Robot Championship 2006, all testing results are satisfied.
Abstract: The motivation of this work was to find a suitable 3D
scanner for human body parts digitalization in the field of prosthetics
and orthotics. The main project objective is to compare the three
hand-held portable scanners (two optical and one laser) and two
optical tripod scanners. The comparison was made with respect of
scanning detail, simplicity of operation and ability to scan directly on
the human body. Testing was carried out on a plaster cast of the
upper limb and directly on a few volunteers. The objective monitored
parameters were time of digitizing and post-processing of 3D data
and resulting visual data quality. Subjectively, it was considered level
of usage and handling of the scanner. The new tripod was developed
to improve the face scanning conditions. The results provide an
overview of the suitability of different types of scanners.
Abstract: Timing driven physical design, synthesis, and
optimization tools need efficient closed-form delay models for
estimating the delay associated with each net in an integrated circuit
(IC) design. The total number of nets in a modern IC design has
increased dramatically and exceeded millions. Therefore efficient
modeling of interconnection is needed for high speed IC-s. This
paper presents closed–form expressions for RC and RLC
interconnection trees in current mode signaling, which can be
implemented in VLSI design tool. These analytical model
expressions can be used for accurate calculation of delay after the
design clock tree has been laid out and the design is fully routed.
Evaluation of these analytical models is several orders of magnitude
faster than simulation using SPICE.
Abstract: The strong international competition as the factor of rising economic development efficiency should not turn into destructive force for models of social orientation. What result Europe received from the accelerated integration without a long transition period of the accepted countries. Correlative relationship between the research and development expenditure and labor productivity, inflation and the rate economy's growth of the USA and the euro zone, employment and gross value added between Old and New Europe is analyzed in this article. The article estimates the differences in economic growth of Old and New Europe. Correlation rate between cycles of the euro area and the countries of Central and the Eastern Europe very much differs, though some of these countries have high correlation as members of the Economic and Monetary Union. Besides, the majority of the countries of Central and the Eastern Europe does not correspond to criteria of an optimum currency area.
Abstract: Information and communication technology (ICT) has
become, within a very short time, one of the basic building blocks of
modern society. Many countries now understanding the importance
of ICT and mastering the basic skills and concepts of it as part of the
core of education. Organizations, experts and practitioners in the
education sector increasingly recognizing the importance of ICT in
supporting educational improvement and reform. This paper
addresses the convergence of ICT and education. When two
technologies are converging to each other, together they will generate
some great opportunities and challenges. This paper focuses on these
issues. In introduction section, it explains the ICT, education, and
ICT-enhanced education. In next section it describes need of ICT in
education, relationship between ICT skills and education, and stages
of teaching learning process. The next two sections describe
opportunities and challenges in integrating ICT in education. Finally
the concluding section summaries the idea and its usefulness.
Abstract: Time delay in bilateral teleoperation system was
introduced as a sufficient reason to make the system unstable or
certainly degrade the system performance. In this paper, simulations
and experimental results of implementing p-like control scheme,
under different ranges of variable time delay, will be presented to
verify a certain criteria, which guarantee the system stability and
position tracking. The system consists of two Phantom premium 1.5A
devices. One of them acts as a master and the other acts as a slave.
The study includes deriving the Phantom kinematic and dynamic
model, establishing the link between the two Phantoms over
Simulink in Matlab, and verifying the stability criteria with
simulations and real experiments.
Abstract: These This paper looks into frameworks which aim at
furthering the discussion of the role of regenerative design practices
in a city-s historic core and the tool of urban design to achieve urban
revitalization on the island of Cyprus. It also examines the region-s
demographic mix, the effectiveness of its governmental coordination
and the strategies of adaptive reuse and strategic investments in older
areas with existing infrastructure. The two main prongs of
investigation will consider the effect of the existing and proposed
changes in the physical infrastructure and fabric of the city, as well as
the catalytic effect of sustainable urban design practices. Through this
process, the work hopes to integrate the contained potential within
the existing historic core and the contributions and participation of
the migrant and immigrant populations to the local economy. It also
examines ways in which this coupling of factors can bring to the front
the positive effects of this combined effort on an otherwise sluggish
local redevelopment effort. The data for this study is being collected
and organized as part of ongoing urban design and development
student workshop efforts in urban planning and design education.
The work is presented in graphic form and includes data collected
from interviews with study area organizations and the community at
large. Planning work is also based on best practices initiated by the
staff of the Nicosia Master Plan task force, which coordinates holistic
planning efforts for the historic center of the city of Nicosia.
Abstract: Industrial radiography is a famous technique for the identification and evaluation of discontinuities, or defects, such as cracks, porosity and foreign inclusions found in welded joints. Although this technique has been well developed, improving both the inspection process and operating time, it does suffer from several drawbacks. The poor quality of radiographic images is due to the physical nature of radiography as well as small size of the defects and their poor orientation relatively to the size and thickness of the evaluated parts. Digital image processing techniques allow the interpretation of the image to be automated, avoiding the presence of human operators making the inspection system more reliable, reproducible and faster. This paper describes our attempt to develop and implement digital image processing algorithms for the purpose of automatic defect detection in radiographic images. Because of the complex nature of the considered images, and in order that the detected defect region represents the most accurately possible the real defect, the choice of global and local preprocessing and segmentation methods must be appropriated.