Abstract: In this paper we describe a computer-aided diagnosis (CAD) system for automated detection of pulmonary nodules in computed-tomography (CT) images. After extracting the pulmonary parenchyma using a combination of image processing techniques, a region growing method is applied to detect nodules based on 3D geometric features. We applied the CAD system to CT scans collected in a screening program for lung cancer detection. Each scan consists of a sequence of about 300 slices stored in DICOM (Digital Imaging and Communications in Medicine) format. All malignant nodules were detected and a low false-positive detection rate was achieved.
Abstract: The biomarker for colorectal cancer (CRC) is CEACAM-6 antigen (C6AG). Therefore, this study aims to develop a novel, simple and low-cost CEACAM-6 antigen immumosensor (C6AG-IMS), based on electrical impedance measurement, for precise determination of C6AG. A low-cost screen-printed graphite electrode was constructed and used as the sensor, with CEACAM-6 antibody (C6AB) immobilized on it. The procedures of sensor fabrication and antibody immobilization are simple and low-cost. Measurement of the electrical impedance at a definite frequency ranges (0.43 – 1.26 MHz) showed that the C6AG-IMS has an excellent linear (r2>0.9) response range (8.125 – 65 pg/mL), covering the normal physiological and pathological ranges of blood C6AG levels. Also, the C6AG-IMS has excellent reliability and validity, with the intraclass correlation coefficient being 0.97. In conclusion, a novel, simple, low-cost and reliable C6AG-IMS was designed and developed, being able to accurately determine blood C6AG levels in the range of pathological and normal physiological regions. The C6AG-IMS can provide a point-of-care and immediate screening results to the user at home.
Abstract: Color Image quantization (CQ) is an important
problem in computer graphics, image and processing. The aim of
quantization is to reduce colors in an image with minimum distortion.
Clustering is a widely used technique for color quantization; all
colors in an image are grouped to small clusters. In this paper, we
proposed a new hybrid approach for color quantization using firefly
algorithm (FA) and K-means algorithm. Firefly algorithm is a swarmbased
algorithm that can be used for solving optimization problems.
The proposed method can overcome the drawbacks of both
algorithms such as the local optima converge problem in K-means
and the early converge of firefly algorithm. Experiments on three
commonly used images and the comparison results shows that the
proposed algorithm surpasses both the base-line technique k-means
clustering and original firefly algorithm.
Abstract: In Peer-to-Peer service networks, where peers offer any kind of publicly available services or applications, intuitive navigation through all services in the network becomes more difficult as the number of services increases. In this article, a concept is discussed that enables users to intuitively browse and use large scale P2P service networks. The concept extends the idea of creating virtual 3D-environments solely based on Peer-to-Peer technologies. Aside from browsing, users shall have the possibility to emphasize services of interest using their own semantic criteria. The appearance of the virtual world shall intuitively reflect network properties that may be of interest for the user. Additionally, the concept comprises options for load- and traffic-balancing. In this article, the requirements concerning the underlying infrastructure and the graphical user interface are defined. First impressions of the appearance of future systems are presented and the next steps towards a prototypical implementation are discussed.
Abstract: This document details the process of developing a
wireless device that captures the basic movements of the foot (plantar
flexion, dorsal flexion, abduction, adduction.), and the knee
movement (flexion). It implements a motion capture system by using
a hardware based on optical fiber sensors, due to the advantages in
terms of scope, noise immunity and speed of data transmission and
reception. The operating principle used by this system is the detection
and transmission of joint movement by mechanical elements and
their respective measurement by optical ones (in this case infrared).
Likewise, Visual Basic software is used for reception, analysis and
signal processing of data acquired by the device, generating a 3D
graphical representation in real time of each movement. The result is
a boot in charge of capturing the movement, a transmission module
(Implementing Xbee Technology) and a receiver module for
receiving information and sending it to the PC for their respective
processing.
The main idea with this device is to help on topics such as
bioengineering and medicine, by helping to improve the quality of
life and movement analysis.
Abstract: The incidence of mechanical fracture of an
automobile piston rings prompted development of fracture analysis
method on this case. The three rings (two compression rings and one
oil ring) were smashed into several parts during the power-test (after
manufacturing the engine) causing piston and liner to be damaged.
The radial and oblique cracking happened on the failed piston rings.
The aim of the fracture mechanics simulations presented in this paper
was the calculation of particular effective fracture mechanics
parameters, such as J-integrals and stress intensity factors. Crack
propagation angles were calculated as well. Two-dimensional
fracture analysis of the first compression ring has been developed in
this paper using ABAQUS CAE6.5-1 software. Moreover, SEM
fractography was developed on fracture surfaces and is discussed in
this paper. Results of numerical calculations constitute the basis for
further research on real object.
Abstract: In the Top Right Access point Minimum Length Corridor (TRA-MLC) problem [1], a rectangular boundary partitioned into rectilinear polygons is given and the problem is to find a corridor of least total length and it must include the top right corner of the outer rectangular boundary. A corridor is a tree containing a set of line segments lying along the outer rectangular boundary and/or on the boundary of the rectilinear polygons. The corridor must contain at least one point from the boundaries of the outer rectangle and also the rectilinear polygons. Gutierrez and Gonzalez [1] proved that the MLC problem, along with some of its restricted versions and variants, are NP-complete. In this paper, we give a shorter proof of NP-Completeness of TRA-MLC by findig the reduction in the following way.
Abstract: Distance education program is a dimension of contemporary and new education technologies. Concepts and applications in this field are the results of a series of educational demands and developments in various communication and education technologies. Distance education applications have some conceptual bases. These are creating new education opportunities, realizing work-education unity, getting democratic in education, lifelong education, tendency to individual matters, effective use of institutions, integration of technology and education, tendency to individual and social needs, taking three dimensional integration as the main principle (publishing, printed materials and face to face education), reaching maximum mass, individual and mass education integrity and education demand and financial matters balance. Economics, Business Administration and Open Education faculties, which have been giving education within Anadolu University since 1982 in Turkey, are carrying on education with nearly 1.000.000 students. The aim of this study is to determine organizational commitment levels of students who have been studying at Anadolu University Economics, Business Administration and Open Education faculties in the scope of affective, continuance and nominative commitment in Allen&Meyer model. In the study, organizational commitment of the Economics, Business Administration and Open Education faculty students, who are receiving education by means of distance education, to their faculties is dealt after introducing Anadolu University Distance Education system which gives higher education via distance education method in Turkey. In order to increase the success level of faculties it is required for students to have high level of organizational commitment to their faculties. A questionnaire has been applied by using “Organizational Commitment Scale", developed by Meyer&Allen to determine organizational commitments of Economics, Business Administration and Open Education students. Organizational commitment is dealt with as affective, continuance and nominative commitment. The questionnaire was applied face to face to randomly chosen 500 students living in Eskişehir and the data was downloaded to the computer by using SPSS program and the results were analyzed in terms of demographic features (gender, age, marital status, years of study, work and income level) of students by using frequency test, ttest and ANOVA test. As a result of these analyses, when the comments of Open Education Faculty students on levels of affective, continuance and nominative commitment to their faculties were examined, it has been revealed that continuance commitment level has the highest rate. Among the female participants; continuance commitment is high in the age range of 30-40, for normative commitment it is 17-22. However no dominant age range was defined for affective commitment. Regarding the marital status; continuance commitment average is higher among married participants; but nominative affective commitment average is higher among single participants. As to the years of study, affective and continuance commitment is higher among senior students while normative commitment is higher among junior students. Moreover; in terms of continuance, affective and normative commitment, those who do not work and have low income have higher level of all there commitment types than those who work and have relatively high income.
Abstract: L-system is a tool commonly used for modeling and simulating the growth of fractal plants. The aim of this paper is to join some problems of the computational geometry with the fractal geometry by using the L-system technique to generate fractal plant in 3D. L-system constructs the fractal structure by applying rewriting rules sequentially and this technique depends on recursion process with large number of iterations to get different shapes of 3D fractal plants. Instead, it was reiterated a specific number of iterations up to three iterations. The vertices generated from the last stage of the Lsystem rewriting process are used as input to the triangulation algorithm to construct the triangulation shape of these vertices. The resulting shapes can be used as covers for the architectural objects and in different computer graphics fields. The paper presents a gallery of triangulation forms which application in architecture creates an alternative for domes and other traditional types of roofs.
Abstract: Mining tailings represent a generating source of rich heavy metal material with a potential danger the public health and the environment, since these metals, under certain conditions, can leach and contaminate aqueous systems that serve like supplying potable water sources. The strategy for this work is based on the observation, experimentation and the simulation that can be obtained by binding real answers of the hydrodynamic behavior of metals leached from mining tailings, and the applied mathematics that provides the logical structure to decipher the individual effects of the general physicochemical phenomenon. The case of study presented herein focuses on mining tailings deposits located in Monte San Nicolas, Guanajuato, Mexico, an abandoned mine. This was considered the contamination source that under certain physicochemical conditions can favor the metal leaching, and its transport towards aqueous systems. In addition, the cartography, meteorology, geology and the hydrodynamics and hydrological characteristics of the place, will be helpful in determining the way and the time in which these systems can interact. Preliminary results demonstrated that arsenic presents a great mobility, since this one was identified in several superficial aqueous systems of the micro watershed, as well as in sediments in concentrations that exceed the established maximum limits in the official norms. Also variations in pH and potential oxide-reduction were registered, conditions that favor the presence of different species from this element its solubility and therefore its mobility.
Abstract: Since the conception of JML, many tools, applications and implementations have been done. In this context, the users or developers who want to use JML seem surounded by many of these tools, applications and so on. Looking for a common infrastructure and an independent language to provide a bridge between these tools and JML, we developed an approach to embedded contracts in XML for Java: XJML. This approach offer us the ability to separate preconditions, posconditions and class invariants using JML and XML, so we made a front-end which can process Runtime Assertion Checking, Extended Static Checking and Full Static Program Verification. Besides, the capabilities for this front-end can be extended and easily implemented thanks to XML. We believe that XJML is an easy way to start the building of a Graphic User Interface delivering in this way a friendly and IDE independency to developers community wich want to work with JML.
Abstract: One of the main research directions in CAD/CAM
machining area is the reducing of machining time.
The feedrate scheduling is one of the advanced techniques that
allows keeping constant the uncut chip area and as sequel to keep
constant the main cutting force. They are two main ways for feedrate
optimization. The first consists in the cutting force monitoring, which
presumes to use complex equipment for the force measurement and
after this, to set the feedrate regarding the cutting force variation. The
second way is to optimize the feedrate by keeping constant the
material removal rate regarding the cutting conditions.
In this paper there is proposed a new approach using an extended
database that replaces the system model.
The feedrate scheduling is determined based on the identification
of the reconfigurable machine tool, and the feed value determination
regarding the uncut chip section area, the contact length between tool
and blank and also regarding the geometrical roughness.
The first stage consists in the blank and tool monitoring for the
determination of actual profiles. The next stage is the determination
of programmed tool path that allows obtaining the piece target
profile.
The graphic representation environment models the tool and blank
regions and, after this, the tool model is positioned regarding the
blank model according to the programmed tool path. For each of
these positions the geometrical roughness value, the uncut chip area
and the contact length between tool and blank are calculated. Each of
these parameters are compared with the admissible values and
according to the result the feed value is established.
We can consider that this approach has the following advantages:
in case of complex cutting processes the prediction of cutting force is
possible; there is considered the real cutting profile which has
deviations from the theoretical profile; the blank-tool contact length
limitation is possible; it is possible to correct the programmed tool
path so that the target profile can be obtained.
Applying this method, there are obtained data sets which allow the
feedrate scheduling so that the uncut chip area is constant and, as a
result, the cutting force is constant, which allows to use more
efficiently the machine tool and to obtain the reduction of machining
time.
Abstract: This article concerns the presentation of an integrated
method for detection of steganographic content embedded by new
unknown programs. The method is based on data mining and
aggregated hypothesis testing. The article contains the theoretical
basics used to deploy the proposed detection system and the
description of improvement proposed for the basic system idea.
Further main results of experiments and implementation details are
collected and described. Finally example results of the tests are
presented.
Abstract: In this paper, RSA encryption algorithm and its hardware
implementation in Xilinx-s Virtex Field Programmable Gate
Arrays (FPGA) is analyzed. The issues of scalability, flexible performance,
and silicon efficiency for the hardware acceleration of
public key crypto systems are being explored in the present work.
Using techniques based on the interleaved math for exponentiation,
the proposed RSA calculation architecture is compared to existing
FPGA-based solutions for speed, FPGA utilization, and scalability.
The paper covers the RSA encryption algorithm, interleaved multiplication,
Miller Rabin algorithm for primality test, extended Euclidean
math, basic FPGA technology, and the implementation details of
the proposed RSA calculation architecture. Performance of several
alternative hardware architectures is discussed and compared. Finally,
conclusion is drawn, highlighting the advantages of a fully flexible
& parameterized design.
Abstract: One approach to assess neural networks underlying the cognitive processes is to study Electroencephalography (EEG). It is relevant to detect various mental states and characterize the physiological changes that help to discriminate two situations. That is why an EEG (amplitude, synchrony) classification procedure is described, validated. The two situations are "eyes closed" and "eyes opened" in order to study the "alpha blocking response" phenomenon in the occipital area. The good classification rate between the two situations is 92.1 % (SD = 3.5%) The spatial distribution of a part of amplitude features that helps to discriminate the two situations are located in the occipital regions that permit to validate the localization method. Moreover amplitude features in frontal areas, "short distant" synchrony in frontal areas and "long distant" synchrony between frontal and occipital area also help to discriminate between the two situations. This procedure will be used for mental fatigue detection.
Abstract: In this paper a three dimensional thermal model of a
sliding contact system is proposed for both steady-state or transient
conditions. The influence of contact force, electric current and
ambient temperature on the temperature distribution, has been
investigated. A thermal analysis of the different type of the graphite
material of fixed electric contact and its influence on contact system
temperature rise, has been performed. To validate the three
dimensional thermal model, some experimental tests have been done.
There is a good correlation between experimental and simulation
results.
Abstract: The length of a cycle basis of a graph is the sum of the lengths of its elements. A minimum cycle basis is a cycle basis with minimum length. In this work, a construction of a minimum cycle basis for the wreath product of wheels with stars is presented. Moreover, the length of minimum cycle basis and the length of its longest cycle are calculated.
Abstract: Routing security is a major concerned in Wireless
Sensor Network since a large scale of unattended nodes is deployed
in ad hoc fashion with no possibility of a global addressing due to a
limitation of node-s memory and the node have to be self organizing
when the systems require a connection with the other nodes. It
becomes more challenging when the nodes have to act as the router
and tightly constrained on energy and computational capabilities
where any existing security mechanisms are not allowed to be fitted
directly. These reasons thus increasing vulnerabilities to the network
layer particularly and to the whole network, generally. In this paper,
a Dynamic Window Secured Implicit Geographic Forwarding
(DWSIGF) routing is presented where a dynamic time is used for
collection window to collect Clear to Send (CTS) control packet in
order to find an appropriate hoping node. The DWIGF is expected to
minimize a chance to select an attacker as the hoping node that
caused by a blackhole attack that happen because of the CTS rushing
attack, which promise a good network performance with high packet
delivery ratios.
Abstract: The use of wind energy for electricity generation is
growing rapidly across the world and in Portugal. However, the
geographical characteristics of the country along with the average
wind regime and with the environmental restrictions imposed to these
projects create limitations to the exploit of the onshore wind
resource. The best onshore wind spots are already committed and the
possibility of offshore wind farms in the Portuguese cost is now
being considered. This paper aims to make a contribution to the
evaluation of offshore wind power projects in Portugal. The technical
restrictions are addressed and the strategic, environmental and
financial interest of the project is analysed from the private company
and public points of view. The results suggest that additional support
schemes are required to ensure private investors interest for these
projects. Assuming an approach of direct substitution of energy
sources for electricity generation, the avoided CO2 equivalent
emissions for an offshore wind power project were quantified. Based
on the conclusions, future research is proposed to address the
environmental and social impacts of these projects.
Abstract: The seismic vulnerability of an urban area is of a great
deal for local authorities especially those facing earthquakes. So, it is
important to have an efficient tool to assess the vulnerability of
existing buildings. The use of the VIP (Vulnerability Index Program)
and the GIS (Geographic Information System) let us to identify the
most vulnerable districts of an urban area.
The use of the vulnerability index method lets us to assess the
vulnerability of the center town of Blida (Algeria) which is a
historical town and which has grown enormously during the last
decades. In this method, three levels of vulnerability are defined. The
GIS has been used to build a data base in order to perform different
thematic analyses. These analyses show the seismic vulnerability of
Blida.