Abstract: Protein residue contact map is a compact
representation of secondary structure of protein. Due to the
information hold in the contact map, attentions from researchers in
related field were drawn and plenty of works have been done
throughout the past decade. Artificial intelligence approaches have
been widely adapted in related works such as neural networks,
genetic programming, and Hidden Markov model as well as support
vector machine. However, the performance of the prediction was not
generalized which probably depends on the data used to train and
generate the prediction model. This situation shown the importance
of the features or information used in affecting the prediction
performance. In this research, support vector machine was used to
predict protein residue contact map on different combination of
features in order to show and analyze the effectiveness of the
features.
Abstract: The advancement in wireless technology with the wide
use of mobile devices have drawn the attention of the research and
technological communities towards wireless environments, such as
Wireless Local Area Networks (WLANs), Wireless Wide Area
Networks (WWANs), and mobile systems and ad-hoc networks.
Unfortunately, wired and wireless networks are expressively different
in terms of link reliability, bandwidth, and time of propagation delay
and by adapting new solutions for these enhanced
telecommunications, superior quality, efficiency, and opportunities
will be provided where wireless communications were otherwise
unfeasible. Some researchers define 4G as a significant improvement
of 3G, where current cellular network’s issues will be solved and data
transfer will play a more significant role. For others, 4G unifies
cellular and wireless local area networks, and introduces new routing
techniques, efficient solutions for sharing dedicated frequency bands,
and an increased mobility and bandwidth capacity. This paper
discusses the possible solutions and enhancements probabilities that
proposed to improve the performance of Transmission Control
Protocol (TCP) over different wireless networks and also the paper
investigated each approach in term of advantages and disadvantages.
Abstract: This paper aims to present a survey of object
recognition/classification methods based on image moments. We
review various types of moments (geometric moments, complex
moments) and moment-based invariants with respect to various
image degradations and distortions (rotation, scaling, affine
transform, image blurring, etc.) which can be used as shape
descriptors for classification. We explain a general theory how to
construct these invariants and show also a few of them in explicit
forms. We review efficient numerical algorithms that can be used
for moment computation and demonstrate practical examples of
using moment invariants in real applications.
Abstract: The effect of phosphorus supplementation of ammoniated rice straw was studied. The in vitro experiment was carried out following the first stage of Tilley and Terry method. The treatments consisting of four diets were A = 50% ammoniated rice straw + 50% concentrate (control), B = A + 0.2% Phosphor (P) supplement, C = A + 0.4% Phosphor (P) supplement, and D = A + 0.6% Phosphor (P) supplement of dry matter. Completely randomized design was used as the experimental design with differences among treatment means were examined using Duncan multiple range test. Variables measured were total bacterial and cellulolytic bacterial population, cellulolytic enzyme activity, ammonia (NH3) and volatile fatty acid (VFA) concentrations, as fermentability indicators and synthesized microbial protein, as well as degradability indicators including dry matter (DM), organic matter (OM), neutral detergent fibre (NDF), acid detergent fibre (ADF) and cellulose. The results indicated that fermentability and degradability of diets consisting ammoniated rice straw with P supplementation were significantly higher than the control diet (P< 0.05). It is concluded that P supplementation is important to improve fermentability and degradability of rations containing ammoniated RS and concentrate. In terms of the most effective level of P supplementation occurred at a supplementation rate of 0.4% of dry matter.
Abstract: The colonic tissue is a complicated dynamic system
and the colonic activities it generates are composed of irregular
segmental waves, which are referred to as erratic fluctuations or spikes.
They are also highly irregular with subunit fractal structure. The
traditional time-frequency domain statistics like the averaged
amplitude, the motility index and the power spectrum, etc. are
insufficient to describe such fluctuations. Thus the fractal
box-counting dimension is proposed and the fractal scaling behaviors
of the human colonic pressure activities under the physiological
conditions are studied. It is shown that the dimension of the resting
activity is smaller than that of the normal one, whereas the clipped
version, which corresponds to the activity of the constipation patient,
shows with higher fractal dimension. It may indicate a practical
application to assess the colonic motility, which is often indicated by
the colonic pressure activity.
Abstract: This paper focuses on reducing the power consumption
of wireless sensor networks. Therefore, a communication protocol
named LEACH (Low-Energy Adaptive Clustering Hierarchy) is modified.
We extend LEACHs stochastic cluster-head selection algorithm
by a modifying the probability of each node to become cluster-head
based on its required energy to transmit to the sink. We present
an efficient energy aware routing algorithm for the wireless sensor
networks. Our contribution consists in rotation selection of clusterheads
considering the remoteness of the nodes to the sink, and then,
the network nodes residual energy. This choice allows a best distribution
of the transmission energy in the network. The cluster-heads
selection algorithm is completely decentralized. Simulation results
show that the energy is significantly reduced compared with the
previous clustering based routing algorithm for the sensor networks.
Abstract: This paper proposes an efficient method to classify
inverse synthetic aperture (ISAR) images. Because ISAR images can
be translated and rotated in the 2-dimensional image place, invariance
to the two factors is indispensable for successful classification. The
proposed method achieves invariance to translation and rotation of
ISAR images using a combination of two-dimensional Fourier
transform, polar mapping and correlation-based alignment of the
image. Classification is conducted using a simple matching score
classifier. In simulations using the real ISAR images of five scaled
models measured in a compact range, the proposed method yields
classification ratios higher than 97 %.
Abstract: The practice of burying the solid waste under the ground is one of the waste disposal methods and dumping is known as an ultimate method in the fastest-growing cities like Rasht city in Iran. Some municipalities select the solid waste landfills without feasibility studies, programming, design and management plans. Therefore, several social and environmental impacts are created by these sites. In this study, the suitability of solid waste landfill in Rasht city, capital of Gilan Province is reviewed using Regional Screening Method (RSM), Geographic Information System (GIS) and Analytical Hierarchy Process (AHP). The results indicated that according to the suitability maps, the value of study site is midsuitable to suitable based on RSM and mid-suitable based on AHP.
Abstract: This paper features the proposed modeling and design
of a Robust Decentralized Periodic Output Feedback (RDPOF)
control technique for the active vibration control of smart flexible
multimodel Euler-Bernoulli cantilever beams for a multivariable
(MIMO) case by retaining the first 6 vibratory modes. The beam
structure is modeled in state space form using the concept of
piezoelectric theory, the Euler-Bernoulli beam theory and the Finite
Element Method (FEM) technique by dividing the beam into 4 finite
elements and placing the piezoelectric sensor / actuator at two finite
element locations (positions 2 and 4) as collocated pairs, i.e., as
surface mounted sensor / actuator, thus giving rise to a multivariable
model of the smart structure plant with two inputs and two outputs.
Five such multivariable models are obtained by varying the
dimensions (aspect ratios) of the aluminum beam, thus giving rise to
a multimodel of the smart structure system. Using model order
reduction technique, the reduced order model of the higher order
system is obtained based on dominant eigen value retention and the
method of Davison. RDPOF controllers are designed for the above 5
multivariable-multimodel plant. The closed loop responses with the
RDPOF feedback gain and the magnitudes of the control input are
observed and the performance of the proposed multimodel smart
structure system with the controller is evaluated for vibration control.
Abstract: Case-Based Reasoning (CBR) is one of machine
learning algorithms for problem solving and learning that caught a lot
of attention over the last few years. In general, CBR is composed of
four main phases: retrieve the most similar case or cases, reuse the
case to solve the problem, revise or adapt the proposed solution, and
retain the learned cases before returning them to the case base for
learning purpose. Unfortunately, in many cases, this retain process
causes the uncontrolled case base growth. The problem affects
competence and performance of CBR systems. This paper proposes
competence-based maintenance method based on deletion policy
strategy for CBR. There are three main steps in this method. Step 1,
formulate problems. Step 2, determine coverage and reachability set
based on coverage value. Step 3, reduce case base size. The results
obtained show that this proposed method performs better than the
existing methods currently discussed in literature.
Abstract: Dilated cardiomyopathy (DCM) is a severe
cardiovascular disorder characterized by progressive systolic
dysfunction due to cardiac chamber dilatation and inefficient
myocardial contractility often leading to chronic heart failure.
Recently, a genome-wide association studies (GWASs) on DCM
indicate that the ZBTB17 gene rs10927875 single nucleotide
polymorphism is associated with DCM. The aim of the study was to
identify the distribution of ZBTB17 gene rs10927875 polymorphism
in 50 Slovak patients with DCM and 80 healthy control subjects
using the Custom Taqman®SNP Genotyping assays. Risk factors
detected at baseline in each group included age, sex, body mass
index, smoking status, diabetes and blood pressure. The mean age of
patients with DCM was 52.9±6.3 years; the mean age of individuals
in control group was 50.3±8.9 years. The distribution of investigated
genotypes of rs10927875 polymorphism within ZBTB17 gene in the
cohort of Slovak patients with DCM was as follows: CC (38.8%), CT
(55.1%), TT (6.1%), in controls: CC (43.8%), CT (51.2%), TT
(5.0%). The risk allele T was more common among the patients with
dilated cardiomyopathy than in normal controls (33.7% versus
30.6%). The differences in genotype or allele frequencies of ZBTB17
gene rs10927875 polymorphism were not statistically significant
(p=0.6908; p=0.6098). The results of this study suggest that ZBTB17
gene rs10927875 polymorphism may be a risk factor for
susceptibility to DCM in Slovak patients with DCM. Studies of
numerous files and additional functional investigations are needed to
fully understand the roles of genetic associations.
Abstract: In this paper a new concept of partial complement of a graph G is introduced and using the same a new graph parameter, called completion number of a graph G, denoted by c(G) is defined. Some basic properties of graph parameter, completion number, are studied and upperbounds for completion number of classes of graphs are obtained , the paper includes the characterization also.
Abstract: This paper analyses the non linear properties
exhibited by a drill string system under various un balanced mass
conditions. The drill string is affected by continuous friction in the
form of drill bit and well bore hole interactions. This paper proves
the origin of limit cycling and increase of non linearity with increase
in speed of the drilling in the presence of friction. The spectrum of
the frequency response is also studied to detect the presence of
vibration abnormalities arising during the drilling process.
Abstract: This paper analyzes different techniques of the fine grained security of relational databases for the two variables-data accessibility and inference. Data accessibility measures the amount of data available to the users after applying a security technique on a table. Inference is the proportion of information leakage after suppressing a cell containing secret data. A row containing a secret cell which is suppressed can become a security threat if an intruder generates useful information from the related visible information of the same row. This paper measures data accessibility and inference associated with row, cell, and column level security techniques. Cell level security offers greatest data accessibility as it suppresses secret data only. But on the other hand, there is a high probability of inference in cell level security. Row and column level security techniques have least data accessibility and inference. This paper introduces cell plus innocent security technique that utilizes the cell level security method but suppresses some innocent data to dodge an intruder that a suppressed cell may not necessarily contain secret data. Four variations of the technique namely cell plus innocent 1/4, cell plus innocent 2/4, cell plus innocent 3/4, and cell plus innocent 4/4 respectively have been introduced to suppress innocent data equal to 1/4, 2/4, 3/4, and 4/4 percent of the true secret data inside the database. Results show that the new technique offers better control over data accessibility and inference as compared to the state-of-theart security techniques. This paper further discusses the combination of techniques together to be used. The paper shows that cell plus innocent 1/4, 2/4, and 3/4 techniques can be used as a replacement for the cell level security.
Abstract: In a handwriting recognition problem, characters can
be represented using chain codes. The main problem in representing
characters using chain code is optimizing the length of the chain
code. This paper proposes to use randomized algorithm to minimize
the length of Freeman Chain Codes (FCC) generated from isolated
handwritten characters. Feedforward neural network is used in the
classification stage to recognize the image characters. Our test results
show that by applying the proposed model, we reached a relatively
high accuracy for the problem of isolated handwritten when tested on
NIST database.
Abstract: In this paper, we focused primarily on Istanbul data
that is gathered by using intelligent transportation systems (ITS), and
considered the developments in traffic information delivery and
future applications that are being planned for implementation. Since
traffic congestion is increasing and travel times are becoming less
consistent and less predictable, traffic information delivery has
become a critical issue. Considering the fuel consumption and wasted
time in traffic, advanced traffic information systems are becoming
increasingly valuable which enables travelers to plan their trips more
accurately and easily.
Abstract: The objective of this research was to study influence
parameters affecting to mechanical property of austenitic stainless
steel grade 304 (AISI 304) with Gas Metal Arc Welding (GMAW).
The research was applying factorial design experiment, which have
following interested parameters: welding current at 80, 90, and 100
Amps, welding speeds at 250, 300, and 350 mm/min, and shield gas
of 75% Ar + 25% CO2, 70% Ar + 25% CO2 + 5% O2 and 69.5% Ar +
25% CO2 + 5% O2 + 0.5% He gas. The study was done in following
aspects: ultimate tensile strength and elongation. A research study of
ultimate tensile strength found that main factor effect, which had the
highest strength to AISI 304 welding was shield gas of 70% Ar +
25% CO2 + 5% O2 at average of 954.81 N/mm2. Result of the highest
elongation was showed significantly different at interaction effect
between shield gas of 69.5%Ar+25%CO2+5%O2+.5%He and
welding speed at 250 mm/min at 47.94%.
Abstract: In this paper we proposed a novel method to acquire
the ROI (Region of interest) of unsupervised and touch-less palmprint
captured from a web camera in real-time. We use Viola-Jones
approach and skin model to get the target area in real time. Then an
innovative course-to-fine approach to detect the key points on the hand
is described. A new algorithm is used to find the candidate key points
coarsely and quickly. In finely stage, we verify the hand key points
with the shape context descriptor. To make the user much comfortable,
it can process the hand image with different poses, even the hand is
closed. Experiments show promising result by using the proposed
method in various conditions.
Abstract: Due to some reasons, observed images are degraded which are mainly caused by noise. Recently image denoising using the wavelet transform has been attracting much attention. Waveletbased approach provides a particularly useful method for image denoising when the preservation of edges in the scene is of importance because the local adaptivity is based explicitly on the values of the wavelet detail coefficients. In this paper, we propose several methods of noise removal from degraded images with Gaussian noise by using adaptive wavelet threshold (Bayes Shrink, Modified Bayes Shrink and Normal Shrink). The proposed thresholds are simple and adaptive to each subband because the parameters required for estimating the threshold depend on subband data. Experimental results show that the proposed thresholds remove noise significantly and preserve the edges in the scene.
Abstract: The RK1GL2X3 method is a numerical method for solving initial value problems in ordinary differential equations, and is based on the RK1GL2 method which, in turn, is a particular case of the general RKrGLm method. The RK1GL2X3 method is a fourth-order method, even though its underlying Runge-Kutta method RK1 is the first-order Euler method, and hence, RK1GL2X3 is considerably more efficient than RK1. This enhancement is achieved through an implementation involving triple-nested two-point Gauss- Legendre quadrature.