Abstract: In many applications, data is in graph structure, which
can be naturally represented as graph-structured XML. Existing
queries defined on tree-structured and graph-structured XML data
mainly focus on subgraph matching, which can not cover all the
requirements of querying on graph. In this paper, a new kind of
queries, topological query on graph-structured XML is presented.
This kind of queries consider not only the structure of subgraph but
also the topological relationship between subgraphs. With existing
subgraph query processing algorithms, efficient algorithms for topological
query processing are designed. Experimental results show the
efficiency of implementation algorithms.
Abstract: Till date, English as a Second Language (ESL) educators involved in teaching language and communication to engineering students face an uphill task in developing graduate communicative competency. This challenge is accentuated by the apparent lack of English for Specific Purposes (ESP) materials for engineering students in the engineering curriculum. As such, most ESL educators are forced to play multiple roles. They don tasks such as curriculum designers, material writers and teachers with limited knowledge of the disciplinary content. Previous research indicates that prospective professional engineers should possess some sub-sets of competency: technical, linguistic oral immediacy, meta-cognitive and rhetorical explanatory competence. Another study revealed that engineering students need to be equipped with technical and linguistic oral immediacy competence. However, little is known whether these competency needs are in line with the educators- perceptions of communicative competence. This paper examines the best mix of communicative competence subsets that create the magic for engineering students in technical oral presentations. For the purpose of this study, two groups of educators were interviewed. These educators were language and communication lecturers involved in teaching a speaking course and content experts who assess students- technical oral presentations at tertiary level. The findings indicate that these two groups differ in their perceptions
Abstract: In this paper, we present a novel technique called Self-Learning Expert System (SLES). Unlike Expert System, where there is a need for an expert to impart experiences and knowledge to create the knowledge base, this technique tries to acquire the experience and knowledge automatically. To display this technique at work, a simulation of a mobile robot navigating through an environment with obstacles is employed using visual basic. The mobile robot will move through this area without colliding with any obstacle and save the path that it took. If the mobile robot has to go through a similar environment again, then it will apply this experience to help it move through quicker without having to check for collision.
Abstract: Petrol Fuel Station (PFS) has potential hazards to the
people, asset, environment and reputation of an operating company.
Fire hazards, static electricity air pollution evoked by aliphatic and
aromatic organic compounds are major causes of accident/incident
occurrence at fuel station. Activities such as carelessness,
maintenance, housekeeping, slips trips and falls, transportation
hazard, major and minor injuries, robbery and snake bites has a
potential to create unsafe conditions. The level of risk of these
hazards varies according to location and country. The emphasis on
safety considerations by the government is variable all around the
world. Developed countries safety records are much better as
compared to developing countries safety statistics. There is no
significant approach available to highlight the unsafe acts and unsafe
conditions during operation and maintenance of fuel station. Fuel
station is the most commonly available facilities that contain
flammable and hazardous materials. Due to continuous operation of
fuel station they pose various hazards to people, environment and
assets of an organization. To control these hazards, there is a need for
specific approach. PFS operation is unique as compared to other
businesses. For smooth operations it demands an involvement of
operating company, contractor and operator group. This study will
focus to address hazard contributing factors that have a potential to
make PFS operation risky. One year data collected, 902 activities
analyzed, comparisons were made to highlight significant
contributing factors. The study will provide help and assistance to
PFS outlet marketing companies to make their fuel station operation
safer. It will help health safety and environment (HSE) professionals
to arrest the gap available related to safety matters at PFS.
Abstract: In the numerical solution of the forward dynamics of a
multibody system, the positions and velocities of the bodies in the
system are obtained first. With the information of the system state
variables at each time step, the internal and external forces acting on
the system are obtained by appropriate contact force models if the
continuous contact method is used instead of a discrete contact
method. The local deformation of the bodies in contact, represented
by penetration, is used to compute the contact force. The ability and
suitability with current cylindrical contact force models to describe
the contact between bodies with cylindrical geometries with
particular focus on internal contacting geometries involving low
clearances and high loads simultaneously is discussed in this paper.
A comparative assessment of the performance of each model under
analysis for different contact conditions, in particular for very
different penetration and clearance values, is presented. It is
demonstrated that some models represent a rough approximation to
describe the conformal contact between cylindrical geometries
because contact forces are underestimated.
Abstract: In this paper, we present the region based hidden Markov random field model (RBHMRF), which encodes the characteristics of different brain regions into a probabilistic framework for brain MR image segmentation. The recently proposed TV+L1 model is used for region extraction. By utilizing different spatial characteristics in different brain regions, the RMHMRF model performs beyond the current state-of-the-art method, the hidden Markov random field model (HMRF), which uses identical spatial information throughout the whole brain. Experiments on both real and synthetic 3D MR images show that the segmentation result of the proposed method has higher accuracy compared to existing algorithms.
Abstract: In this paper, a novel and fast algorithm for segmental
and subsegmental lung vessel segmentation is introduced using
Computed Tomography Angiography images. This process is quite
important especially at the detection of pulmonary embolism, lung
nodule, and interstitial lung disease. The applied method has been
realized at five steps. At the first step, lung segmentation is achieved.
At the second one, images are threshold and differences between the
images are detected. At the third one, left and right lungs are gathered
with the differences which are attained in the second step and Exact
Lung Image (ELI) is achieved. At the fourth one, image, which is
threshold for vessel, is gathered with the ELI. Lastly, identifying and
segmentation of segmental and subsegmental lung vessel have been
carried out thanks to image which is obtained in the fourth step. The
performance of the applied method is found quite well for
radiologists and it gives enough results to the surgeries medically.
Abstract: In this paper, a new learning approach for network
intrusion detection using naïve Bayesian classifier and ID3 algorithm
is presented, which identifies effective attributes from the training
dataset, calculates the conditional probabilities for the best attribute
values, and then correctly classifies all the examples of training and
testing dataset. Most of the current intrusion detection datasets are
dynamic, complex and contain large number of attributes. Some of
the attributes may be redundant or contribute little for detection
making. It has been successfully tested that significant attribute
selection is important to design a real world intrusion detection
systems (IDS). The purpose of this study is to identify effective
attributes from the training dataset to build a classifier for network
intrusion detection using data mining algorithms. The experimental
results on KDD99 benchmark intrusion detection dataset demonstrate
that this new approach achieves high classification rates and reduce
false positives using limited computational resources.
Abstract: Most simple nonlinear thresholding rules for
wavelet- based denoising assume that the wavelet coefficients are independent. However, wavelet coefficients of natural images have significant dependencies. This paper attempts to give a recipe for selecting one of the popular image-denoising algorithms based
on VisuShrink, SureShrink, OracleShrink, BayesShrink and BiShrink and also this paper compares different Bivariate models used for image denoising applications. The first part of the paper
compares different Shrinkage functions used for image-denoising.
The second part of the paper compares different bivariate models
and the third part of this paper uses the Bivariate model with modified marginal variance which is based on Laplacian assumption. This paper gives an experimental comparison on six 512x512 commonly used images, Lenna, Barbara, Goldhill,
Clown, Boat and Stonehenge. The following noise powers 25dB,26dB, 27dB, 28dB and 29dB are added to the six standard images and the corresponding Peak Signal to Noise Ratio (PSNR) values
are calculated for each noise level.
Abstract: In a previous work, we presented the numerical
solution of the two dimensional second order telegraph partial
differential equation discretized by the centred and rotated five-point
finite difference discretizations, namely the explicit group (EG) and
explicit decoupled group (EDG) iterative methods, respectively. In
this paper, we utilize a domain decomposition algorithm on these
group schemes to divide the tasks involved in solving the same
equation. The objective of this study is to describe the development
of the parallel group iterative schemes under OpenMP programming
environment as a way to reduce the computational costs of the
solution processes using multicore technologies. A detailed
performance analysis of the parallel implementations of points and
group iterative schemes will be reported and discussed.
Abstract: One of the popular methods for recognition of facial
expressions such as happiness, sadness and surprise is based on
deformation of facial features. Motion vectors which show these
deformations can be specified by the optical flow. In this method, for
detecting emotions, the resulted set of motion vectors are compared
with standard deformation template that caused by facial expressions.
In this paper, a new method is introduced to compute the quantity of
likeness in order to make decision based on the importance of
obtained vectors from an optical flow approach. For finding the
vectors, one of the efficient optical flow method developed by
Gautama and VanHulle[17] is used. The suggested method has been
examined over Cohn-Kanade AU-Coded Facial Expression Database,
one of the most comprehensive collections of test images available.
The experimental results show that our method could correctly
recognize the facial expressions in 94% of case studies. The results
also show that only a few number of image frames (three frames) are
sufficient to detect facial expressions with rate of success of about
83.3%. This is a significant improvement over the available methods.
Abstract: Segmentation is an important step in medical image
analysis and classification for radiological evaluation or computer
aided diagnosis. This paper presents the problem of inaccurate lung
segmentation as observed in algorithms presented by researchers
working in the area of medical image analysis. The different lung
segmentation techniques have been tested using the dataset of 19
patients consisting of a total of 917 images. We obtained datasets of
11 patients from Ackron University, USA and of 8 patients from
AGA Khan Medical University, Pakistan. After testing the algorithms
against datasets, the deficiencies of each algorithm have been
highlighted.
Abstract: Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodologies leading to the selection of a proper methodology to fulfill these requirements. Then, a detailed analysis of the most effective methodology is accomplished, presenting numerical examples to demonstrate how easy it is to use.
Abstract: Oxidative stress makes up common incidents in
eukaryotic metabolism. The presence of diverse components
disturbing the equilibrium during oxygen metabolism increases
oxidative damage unspecifically in living cells. Body´s own
ubiquinone (Q10) seems to be a promising drug in defending the
heightened appearance of reactive oxygen species (ROS). Though, its
lipophilic properties require a new strategy in drug formulation to
overcome their low bioavailability. Consequently, the manufacture of
heterogeneous nanodispersions is in focus for medical applications.
The composition of conventional nanodispersions is made up of a
drug-consisting core and a surfactive agent, also named as surfactant.
Long-termed encapsulation of the surfactive components into tissues
might be the consequence of the use during medical therapeutics. The
potential of provoking side-effects is given by their nonbiodegradable
properties. Further improvements during fabrication
process use the incorporation of biodegradable components such as
modified γ-polyglutamic acid which decreases the potential of
prospective side-effects.
Abstract: The numerous qualities of squirrel cage induction
machines enhance their use in industry. However, various faults can
occur, such as stator short-circuits and rotor failures.
In this paper, we use a technique based on the spectral analysis of
stator current in order to detect the fault in the machine: broken rotor
bars. Thus, the number effect of the breaks has been highlighted. The
effect is highlighted by considering the machine controlled by the
Direct Torque Control (DTC). The key to fault detection is the
development of a simplified dynamic model of a squirrel cage
induction motor taking account the broken bars fault and the stator
current spectrum analysis (FFT).
Abstract: This paper examines the influence of communication
form on employee uncertainty during mergers and acquisitions
(M&As). Specifically, the author uses narrative theory to analyze
how narrative organizational communication affects the three
components of uncertainty – decreased predictive, explanatory, and
descriptive ability. It is hypothesized that employees whose
organizations use narrative M&A communication will have greater
predictive, explanatory, and descriptive abilities than employees of
organizations using non-narrative M&A communication. This paper
contributes to the stream of research examining uncertainty during
mergers and acquisitions and argues that narratives are an effective
means of managing uncertainty in the mergers and acquisitions
context.
Abstract: This paper presents the results of the authors in designing, experimenting, assessing and transferring an innovative approach to energy education in secondary schools, aimed to enhance the quality of learning in terms of didactic curricula and pedagogic methods. The training is online delivered to youngsters via e-Books and portals specially designed for this purpose or by learning by doing via interactive games. An online educational methodology is available teachers.
Abstract: Vermiculite was used to develop inorganic
carrier-based formulations of fluorescent pseudomonad strains
R62 and R81. The effect of bio-inoculation of fluorescent
pseudomonad strains R62 and R81 (plant growth promoting
and biocontrol agent) on growth responses of Vigna-mungo
under field condition was enumerated. The combined bioinoculation
of these two organisms in a formuation increased
the pods yield by 300% in comparison to the control crop.
There was also significant increment in the other plant growth
responses such as dry root weight, dry shoot weight, shoot
length and number of branches per plant.
Abstract: This paper explores steady-state characteristics of
grid-connected doubly fed induction motor (DFIM) in case of unity
power factor operation. Based on the synchronized mathematical
model, analytic determination of the control laws is presented and
illustrated by various figures to understand the effect of the applied
rotor voltage on the speed and the active power. On other hand,
unlike previous works where the stator resistance was neglected, in
this work, stator resistance is included such that the equations can be
applied to small wind turbine generators which are becoming more
popular. Finally the work is crowned by integration of the studied
induction generator in a wind system where an open loop control is
proposed confers a remarkable simplicity of implementation
compared to the known methods.
Abstract: Supply Chain Management (SCM) is the integration
between manufacturer, transporter and customer in order to form one
seamless chain that allows smooth flow of raw materials, information
and products throughout the entire network that help in minimizing
all related efforts and costs. The main objective of this paper is to
develop a model that can accept a specified number of spare-parts
within the supply chain, simulating its inventory operations
throughout all stages in order to minimize the inventory holding
costs, base-stock, safety-stock, and to find the optimum quantity of
inventory levels, thereby suggesting a way forward to adapt some
factors of Just-In-Time to minimizing the inventory costs throughout
the entire supply chain. The model has been developed using Micro-
Soft Excel & Visual Basic in order to study inventory allocations in
any network of the supply chain. The application and reproducibility
of this model were tested by comparing the actual system that was
implemented in the case study with the results of the developed
model. The findings showed that the total inventory costs of the
developed model are about 50% less than the actual costs of the
inventory items within the case study.