Abstract: The article deals with numerical investigation of axisymmetric
subsonic air to air ejector. An analysis of flow and mixing
processes in cylindrical mixing chamber are made. Several modes
with different velocity and ejection ratio are presented. The mixing
processes are described and differences between flow in the initial
region of mixing and the main region of mixing are described. The
lengths of both regions are evaluated. Transition point and point
where the mixing processes are finished are identified. It was found
that the length of the initial region of mixing is strongly dependent on
the velocity ratio, while the length of the main region of mixing is
dependent on velocity ratio only slightly.
Abstract: Many studies have focused on the nonlinear analysis
of electroencephalography (EEG) mainly for the characterization of
epileptic brain states. It is assumed that at least two states of the
epileptic brain are possible: the interictal state characterized by a
normal apparently random, steady-state EEG ongoing activity; and
the ictal state that is characterized by paroxysmal occurrence of
synchronous oscillations and is generally called in neurology, a
seizure.
The spatial and temporal dynamics of the epileptogenic process is
still not clear completely especially the most challenging aspects of
epileptology which is the anticipation of the seizure. Despite all the
efforts we still don-t know how and when and why the seizure
occurs. However actual studies bring strong evidence that the
interictal-ictal state transition is not an abrupt phenomena. Findings
also indicate that it is possible to detect a preseizure phase.
Our approach is to use the neural network tool to detect interictal
states and to predict from those states the upcoming seizure ( ictal
state). Analysis of the EEG signal based on neural networks is used
for the classification of EEG as either seizure or non-seizure. By
applying prediction methods it will be possible to predict the
upcoming seizure from non-seizure EEG.
We will study the patients admitted to the epilepsy monitoring
unit for the purpose of recording their seizures. Preictal, ictal, and
post ictal EEG recordings are available on such patients for analysis
The system will be induced by taking a body of samples then
validate it using another. Distinct from the two first ones a third body
of samples is taken to test the network for the achievement of
optimum prediction. Several methods will be tried 'Backpropagation
ANN' and 'RBF'.
Abstract: Petri Net (PN) has proven to be effective graphical, mathematical, simulation, and control tool for Discrete Event Systems (DES). But, with the growth in the complexity of modern industrial, and communication systems, PN found themselves inadequate to address the problems of uncertainty, and imprecision in data. This gave rise to amalgamation of Fuzzy logic with Petri nets and a new tool emerged with the name of Fuzzy Petri Nets (FPN). Although there had been a lot of research done on FPN and a number of their applications have been anticipated, but their basic types and structure are still ambiguous. Therefore, in this research, an effort is made to categorize FPN according to their structure and algorithms Further, literature review of the applications of FPN in the light of their classifications has been done.
Abstract: The problem of ranking (rank regression) has become popular in the machine learning community. This theory relates to problems, in which one has to predict (guess) the order between objects on the basis of vectors describing their observed features. In many ranking algorithms a convex loss function is used instead of the 0-1 loss. It makes these procedures computationally efficient. Hence, convex risk minimizers and their statistical properties are investigated in this paper. Fast rates of convergence are obtained under conditions, that look similarly to the ones from the classification theory. Methods used in this paper come from the theory of U-processes as well as empirical processes.
Abstract: This paper investigates experimental studies on
vibration suppression for a cantilever beam using an
Electro-Rheological (ER) sandwich shock absorber. ER fluid (ERF) is a
class of smart materials that can undergo significant reversible changes
immediately in its rheological and mechanical properties under the
influence of an applied electric field. Firstly, an ER sandwich beam is
fabricated by inserting a starch-based ERF into a hollow composite
beam. At the same time, experimental investigations are focused on the
frequency response of the ERF sandwich beam. Second, the ERF
sandwich beam is attached to a cantilever beam to become as a shock
absorber. Finally, a fuzzy semi-active vibration control is designed to
suppress the vibration of the cantilever beam via the ERF sandwich
shock absorber. To check the consistency of the proposed fuzzy
controller, the real-time implementation validated the performance of
the controller.
Abstract: Petrol Fuel Station (PFS) has potential hazards to the
people, asset, environment and reputation of an operating company.
Fire hazards, static electricity air pollution evoked by aliphatic and
aromatic organic compounds are major causes of accident/incident
occurrence at fuel station. Activities such as carelessness,
maintenance, housekeeping, slips trips and falls, transportation
hazard, major and minor injuries, robbery and snake bites has a
potential to create unsafe conditions. The level of risk of these
hazards varies according to location and country. The emphasis on
safety considerations by the government is variable all around the
world. Developed countries safety records are much better as
compared to developing countries safety statistics. There is no
significant approach available to highlight the unsafe acts and unsafe
conditions during operation and maintenance of fuel station. Fuel
station is the most commonly available facilities that contain
flammable and hazardous materials. Due to continuous operation of
fuel station they pose various hazards to people, environment and
assets of an organization. To control these hazards, there is a need for
specific approach. PFS operation is unique as compared to other
businesses. For smooth operations it demands an involvement of
operating company, contractor and operator group. This study will
focus to address hazard contributing factors that have a potential to
make PFS operation risky. One year data collected, 902 activities
analyzed, comparisons were made to highlight significant
contributing factors. The study will provide help and assistance to
PFS outlet marketing companies to make their fuel station operation
safer. It will help health safety and environment (HSE) professionals
to arrest the gap available related to safety matters at PFS.
Abstract: In this work a new offline signature recognition system
based on Radon Transform, Fractal Dimension (FD) and Support Vector Machine (SVM) is presented. In the first step, projections of
original signatures along four specified directions have been performed using radon transform. Then, FDs of four obtained
vectors are calculated to construct a feature vector for each
signature. These vectors are then fed into SVM classifier for recognition of signatures. In order to evaluate the effectiveness of
the system several experiments are carried out. Offline signature
database from signature verification competition (SVC) 2004 is used
during all of the tests. Experimental result indicates that the proposed method achieved high accuracy rate in signature recognition.
Abstract: In this paper, a new learning approach for network
intrusion detection using naïve Bayesian classifier and ID3 algorithm
is presented, which identifies effective attributes from the training
dataset, calculates the conditional probabilities for the best attribute
values, and then correctly classifies all the examples of training and
testing dataset. Most of the current intrusion detection datasets are
dynamic, complex and contain large number of attributes. Some of
the attributes may be redundant or contribute little for detection
making. It has been successfully tested that significant attribute
selection is important to design a real world intrusion detection
systems (IDS). The purpose of this study is to identify effective
attributes from the training dataset to build a classifier for network
intrusion detection using data mining algorithms. The experimental
results on KDD99 benchmark intrusion detection dataset demonstrate
that this new approach achieves high classification rates and reduce
false positives using limited computational resources.
Abstract: Segmentation is an important step in medical image
analysis and classification for radiological evaluation or computer
aided diagnosis. This paper presents the problem of inaccurate lung
segmentation as observed in algorithms presented by researchers
working in the area of medical image analysis. The different lung
segmentation techniques have been tested using the dataset of 19
patients consisting of a total of 917 images. We obtained datasets of
11 patients from Ackron University, USA and of 8 patients from
AGA Khan Medical University, Pakistan. After testing the algorithms
against datasets, the deficiencies of each algorithm have been
highlighted.
Abstract: This paper presents an approach based on the
adoption of a distributed cognition framework and a non parametric
multicriteria evaluation methodology (DEA) designed specifically to
compare e-commerce websites from the consumer/user viewpoint. In
particular, the framework considers a website relative efficiency as a
measure of its quality and usability. A website is modelled as a black
box capable to provide the consumer/user with a set of
functionalities. When the consumer/user interacts with the website to
perform a task, he/she is involved in a cognitive activity, sustaining a
cognitive cost to search, interpret and process information, and
experiencing a sense of satisfaction. The degree of ambiguity and
uncertainty he/she perceives and the needed search time determine
the effort size – and, henceforth, the cognitive cost amount – he/she
has to sustain to perform his/her task. On the contrary, task
performing and result achievement induce a sense of gratification,
satisfaction and usefulness. In total, 9 variables are measured,
classified in a set of 3 website macro-dimensions (user experience,
site navigability and structure). The framework is implemented to
compare 40 websites of businesses performing electronic commerce
in the information technology market. A questionnaire to collect
subjective judgements for the websites in the sample was purposely
designed and administered to 85 university students enrolled in
computer science and information systems engineering
undergraduate courses.
Abstract: The identification and elimination of bad
measurements is one of the basic functions of a robust state estimator
as bad data have the effect of corrupting the results of state
estimation according to the popular weighted least squares method.
However this is a difficult problem to handle especially when dealing
with multiple errors from the interactive conforming type. In this
paper, a self adaptive genetic based algorithm is proposed. The
algorithm utilizes the results of the classical linearized normal
residuals approach to tune the genetic operators thus instead of
making a randomized search throughout the whole search space it is
more likely to be a directed search thus the optimum solution is
obtained at very early stages(maximum of 5 generations). The
algorithm utilizes the accumulating databases of already computed
cases to reduce the computational burden to minimum. Tests are
conducted with reference to the standard IEEE test systems. Test
results are very promising.
Abstract: As mobile ad hoc networks (MANET) have different
characteristics from wired networks and even from standard wireless
networks, there are new challenges related to security issues that
need to be addressed. Due to its unique features such as open nature,
lack of infrastructure and central management, node mobility and
change of dynamic topology, prevention methods from attacks on
them are not enough. Therefore intrusion detection is one of the
possible ways in recognizing a possible attack before the system
could be penetrated. All in all, techniques for intrusion detection in
old wireless networks are not suitable for MANET. In this paper, we
classify the architecture for Intrusion detection systems that have so
far been introduced for MANETs, and then existing intrusion
detection techniques in MANET presented and compared. We then
indicate important future research directions.
Abstract: Traditional higher-education classrooms allow lecturers to observe students- behaviours and responses to a particular pedagogy during learning in a way that can influence changes to the pedagogical approach. Within current e-learning systems it is difficult to perform continuous analysis of the cohort-s behavioural tendency, making real-time pedagogical decisions difficult. This paper presents a Virtual Learning Process Environment (VLPE) based on the Business Process Management (BPM) conceptual framework. Within the VLPE, course designers can model various education pedagogies in the form of learning process workflows using an intuitive flow diagram interface. These diagrams are used to visually track the learning progresses of a cohort of students. This helps assess the effectiveness of the chosen pedagogy, providing the information required to improve course design. A case scenario of a cohort of students is presented and quantitative statistical analysis of their learning process performance is gathered and displayed in realtime using dashboards.
Abstract: Most of the real queuing systems include special properties and constraints, which can not be analyzed directly by using the results of solved classical queuing models. Lack of Markov chains features, unexponential patterns and service constraints, are the mentioned conditions. This paper represents an applied general algorithm for analysis and optimizing the queuing systems. The algorithm stages are described through a real case study. It is consisted of an almost completed non-Markov system with limited number of customers and capacities as well as lots of common exception of real queuing networks. Simulation is used for optimizing this system. So introduced stages over the following article include primary modeling, determining queuing system kinds, index defining, statistical analysis and goodness of fit test, validation of model and optimizing methods of system with simulation.
Abstract: This study has investigated the antidiabetic and
antioxidant potential of Pseudovaria macrophylla bark extract on
streptozotocin–nicotinamide induced type 2 diabetic rats. LCMSQTOF
and NMR experiments were done to determine the chemical
composition in the methanolic bark extract. For in vivo experiments,
the STZ (60 mg/kg/b.w, 15 min after 120 mg/kg/1 nicotinamide, i.p.)
induced diabetic rats were treated with methanolic extract of
Pseuduvaria macrophylla (200 and 400 mg/kg·bw) and
glibenclamide (2.5 mg/kg) as positive control respectively.
Biochemical parameters were assayed in the blood samples of all
groups of rats. The pro-inflammatory cytokines, antioxidant status
and plasma transforming growth factor βeta-1 (TGF-β1) were
evaluated. The histological study of the pancreas was examined and
its expression level of insulin was observed by
immunohistochemistry. In addition, the expression of glucose
transporters (GLUT 1, 2 and 4) were assessed in pancreas tissue by
western blot analysis. The outcomes of the study displayed that the
bark methanol extract of Pseuduvaria macrophylla has potentially
normalized the elevated blood glucose levels and improved serum
insulin and C-peptide levels with significant increase in the
antioxidant enzyme, reduced glutathione (GSH) and decrease in the
level of lipid peroxidation (LPO). Additionally, the extract has
markedly decreased the levels of serum pro-inflammatory cytokines
and transforming growth factor beta-1 (TGF-β1). Histopathology
analysis demonstrated that Pseuduvaria macrophylla has the
potential to protect the pancreas of diabetic rats against peroxidation
damage by downregulating oxidative stress and elevated
hyperglycaemia. Furthermore, the expression of insulin protein,
GLUT-1, GLUT-2 and GLUT-4 in pancreatic cells was enhanced.
The findings of this study support the anti-diabetic claims of
Pseudovaria macrophylla bark.
Abstract: In this paper, we introduce an e-collaborative learning circles methodology which utilizes the information and communication technologies (ICTs) in e-educational processes. In e-collaborative learning circles methodology, the teachers and students announce their research projects on various mailing lists and discussion boards using available ICTs. The teachers & moderators and students who are already members of the e-forums, discuss the project proposals in their classrooms sent out by the potential global partner schools and return the requested feed back to the proposing school(s) about their level of the participation and contribution in the research. In general, an e-collaborative learning circle project is implemented with a small and diverse group (usually 8-10 participants) from around the world. The students meet regularly over a period of weeks/months through the ICTs during the ecollaborative learning process. When the project is completed, a project product (e-book / DVD) is prepared and sent to the circle members. In this research, when taking into account the interests and motivation of the participating students with the facilitating role of the teacher(s), the students in each circle do research to obtain new data and information, thus enabling them to have the opportunity to meet both different cultures and international understandings across the globe. However, while the participants communicate along with the members in the circle they also practice and develop their communication language skills. Finally, teachers and students find the possibility to develop their skills in using the ICTs as well.
Abstract: Cosmic showers, during the transit through space, produce
sub - products as a result of interactions with the intergalactic
or interstellar medium which after entering earth generate secondary
particles called Extensive Air Shower (EAS). Detection and analysis
of High Energy Particle Showers involve a plethora of theoretical and
experimental works with a host of constraints resulting in inaccuracies
in measurements. Therefore, there exist a necessity to develop a
readily available system based on soft-computational approaches
which can be used for EAS analysis. This is due to the fact that soft
computational tools such as Artificial Neural Network (ANN)s can be
trained as classifiers to adapt and learn the surrounding variations. But
single classifiers fail to reach optimality of decision making in many
situations for which Multiple Classifier System (MCS) are preferred
to enhance the ability of the system to make decisions adjusting
to finer variations. This work describes the formation of an MCS
using Multi Layer Perceptron (MLP), Recurrent Neural Network
(RNN) and Probabilistic Neural Network (PNN) with data inputs
from correlation mapping Self Organizing Map (SOM) blocks and
the output optimized by another SOM. The results show that the setup
can be adopted for real time practical applications for prediction
of primary energy and location of EAS from density values captured
using detectors in a circular grid.
Abstract: This paper seeks to explore the actual classroom
setting, to examine its role for students- learning, and attitude in the
class. It presents a theoretical approach of the classroom as system to
be explored and examines the concrete reality of Greek secondary
education students, under the light of the above approach. Based on
the findings of a quantitative and qualitative research, authors
propose a rather ontological approach of the classroom and underline
what the key-elements for such approach should be. The paper
explores extensively the theoretical dimensions for the change of
paradigm required and addresses the new issues to be considered.
Abstract: In this paper, an efficient local appearance feature
extraction method based the multi-resolution Curvelet transform is
proposed in order to further enhance the performance of the well
known Linear Discriminant Analysis(LDA) method when applied
to face recognition. Each face is described by a subset of band
filtered images containing block-based Curvelet coefficients. These
coefficients characterize the face texture and a set of simple statistical
measures allows us to form compact and meaningful feature vectors.
The proposed method is compared with some related feature extraction
methods such as Principal component analysis (PCA), as well
as Linear Discriminant Analysis LDA, and independent component
Analysis (ICA). Two different muti-resolution transforms, Wavelet
(DWT) and Contourlet, were also compared against the Block Based
Curvelet-LDA algorithm. Experimental results on ORL, YALE and
FERET face databases convince us that the proposed method provides
a better representation of the class information and obtains much
higher recognition accuracies.
Abstract: In synchronized games players make their moves simultaneously
rather than alternately. Synchronized Triomineering
and Synchronized Tridomineering are respectively the synchronized
versions of Triomineering and Tridomineering, two variants of a
classic two-player combinatorial game called Domineering. Experimental
results for small m × n boards (with m + n ≤ 12 for
Synchronized Triomineering and m + n ≤ 10 for Synchronized
Tridomineering) and some theoretical results for general k×n boards
(with k = 3, 4, 5 for Synchronized Triomineering and k = 3
for Synchronized Tridomineering) are presented. Future research is
indicated.