Abstract: Urinary Tract Infections (UTI) account for an estimated 25-40% nosocomial infection, out of which 90% are associated with urinary catheter, called Catheter associated urinary tract infection (CAUTI). The microbial populations within CAUTI frequently develop as biofilms. In the present study, microbial contamination of indwelling urinary catheters was investigated. Biofilm forming ability of the isolates was determined by tissue culture plate method. Prevention of biofilm formation in the urinary catheter by Pseudomonas aeruginosa was also determined by coating the catheter with some enzymes, gentamycin and EDTA. It was found that 64% of the urinary catheters get contaminated during the course of catheterization. Of the total 6 isolates, biofilm formation was seen in 100% Pseudomonas aeruginosa and E. coli, 90% in Enterococci, 80% in Klebsiella and 66% in S. aureus. It was noted that the biofilm production by Pseudomonas was prolonged by 7 days in amylase, 8 days in protease, 6 days in lysozyme, 7days in gentamycin and 5 days in EDTA treated catheter.
Abstract: A neurofuzzy approach for a given set of input-output training data is proposed in two phases. Firstly, the data set is partitioned automatically into a set of clusters. Then a fuzzy if-then rule is extracted from each cluster to form a fuzzy rule base. Secondly, a fuzzy neural network is constructed accordingly and parameters are tuned to increase the precision of the fuzzy rule base. This network is able to learn and optimize the rule base of a Sugeno like Fuzzy inference system using Hybrid learning algorithm, which combines gradient descent, and least mean square algorithm. This proposed neurofuzzy system has the advantage of determining the number of rules automatically and also reduce the number of rules, decrease computational time, learns faster and consumes less memory. The authors also investigate that how neurofuzzy techniques can be applied in the area of control theory to design a fuzzy controller for linear and nonlinear dynamic systems modelling from a set of input/output data. The simulation analysis on a wide range of processes, to identify nonlinear components on-linely in a control system and a benchmark problem involving the prediction of a chaotic time series is carried out. Furthermore, the well-known examples of linear and nonlinear systems are also simulated under the Matlab/Simulink environment. The above combination is also illustrated in modeling the relationship between automobile trips and demographic factors.
Abstract: There are many automotive accidents due to blind spots and driver inattentiveness. Blind spot is the area that is invisible to the driver's viewpoint without head rotation. Several methods are available for assisting the drivers. Simplest methods are — rear mirrors and wide-angle lenses. But, these methods have a disadvantage of the requirement for human assistance. So, the accuracy of these devices depends on driver. Another approach called an automated approach that makes use of sensors such as sonar or radar. These sensors are used to gather range information. The range information will be processed and used for detecting the collision. The disadvantage of this system is — low angular resolution and limited sensing volumes. This paper is a panoramic sensor based automotive vehicle monitoring..
Abstract: A numerical study is presented on buckling and post
buckling behaviour of laminated carbon fiber reinforced plastic
(CFRP) thin-walled cylindrical shells under axial compression using
asymmetric meshing technique (AMT). Asymmetric meshing
technique is a perturbation technique to introduce disturbance without
changing geometry, boundary conditions or loading conditions.
Asymmetric meshing affects predicted buckling load, buckling mode
shape and post-buckling behaviour. Linear (eigenvalue) and nonlinear
(Riks) analyses have been performed to study the effect of
asymmetric meshing in the form of a patch on buckling behaviour.
The reduction in the buckling load using Asymmetric meshing
technique was observed to be about 15%. An isolated dimple formed
near the bifurcation point and the size of which increased to reach a
stable state in the post-buckling region. The load-displacement curve
behaviour applying asymmetric meshing is quite similar to the curve
obtained using initial geometric imperfection in the shell model.
Abstract: Type 2 diabetes mellitus (T2DM) is a complex
metabolic disorder that characterized by the presence of high glucose
in blood that cause from insulin resistance and insufficiency due to
deterioration β-cell Langerhans functions. T2DM is commonly
caused by the combination of inherited genetic variations as well as
our own lifestyle. Metallothionein (MT) is a known cysteine-rich
protein responsible in helping zinc homeostasis which is important in
insulin signaling and secretion as well as protection our body from
reactive oxygen species (ROS). MT scavenged ROS and free
radicals in our body happen to be one of the reasons of T2DM and its
complications. The objective of this study was to investigate the
association of MT1A and MT2A polymorphisms between T2DM and
control subjects among Malay populations. This study involved 150
T2DM and 120 Healthy individuals of Malay ethnic with mixed
genders. The genomic DNA was extracted from buccal cells and
amplified for MT1A and MT2A loci; the 347bp and 238bp banding
patterns were respectively produced by mean of the Polymerase
Chain Reaction (PCR). The PCR products were digested with Mlucl
and Tsp451 restriction enzymes respectively and producing
fragments lengths of (158/189/347bp) and (103/135/238bp)
respectively. The ANOVA test was conducted and it shown that there
was a significant difference between diabetic and control subjects for
age, BMI, WHR, SBP, FPG, HBA1C, LDL, TG, TC and family
history with (P0.05). The genotype
frequency for AA, AG and GG of MT1A polymorphisms was 72.7%,
22.7% and 4.7% in cases and 15%, 55% and 30% in control
respectively. As for MT2A, genotype frequency of GG, GC and CC
was 42.7%, 27.3% and 30% in case and 5%, 40% and 55% for
control respectively. Both polymorphisms show significant difference
between two investigated groups with (P=0.000). The Post hoc test
was conducted and shows a significant difference between the
genotypes within each polymorphism (P=0. 000). The MT1A and
MT2A polymorphisms were believed to be the reliable molecular
markers to distinguish the T2DM subjects from healthy individuals in
Malay populations.
Abstract: It has been established that microRNAs (miRNAs) play
an important role in gene expression by post-transcriptional regulation
of messengerRNAs (mRNAs). However, the precise relationships
between microRNAs and their target genes in sense of numbers,
types and biological relevance remain largely unclear. Dissecting the
miRNA-target relationships will render more insights for miRNA
targets identification and validation therefore promote the understanding
of miRNA function. In miRBase, miRanda is the key
algorithm used for target prediction for Zebrafish. This algorithm
is high-throughput but brings lots of false positives (noise). Since
validation of a large scale of targets through laboratory experiments
is very time consuming, several computational methods for miRNA
targets validation should be developed. In this paper, we present an
integrative method to investigate several aspects of the relationships
between miRNAs and their targets with the final purpose of extracting
high confident targets from miRanda predicted targets pool. This is
achieved by using the techniques ranging from statistical tests to
clustering and association rules. Our research focuses on Zebrafish.
It was found that validated targets do not necessarily associate with
the highest sequence matching. Besides, for some miRNA families,
the frequency of their predicted targets is significantly higher in the
genomic region nearby their own physical location. Finally, in a case
study of dre-miR-10 and dre-miR-196, it was found that the predicted
target genes hoxd13a, hoxd11a, hoxd10a and hoxc4a of dre-miR-
10 while hoxa9a, hoxc8a and hoxa13a of dre-miR-196 have similar
characteristics as validated target genes and therefore represent high
confidence target candidates.
Abstract: With increasing utilization of the wireless devices in
different fields such as medical devices and industrial fields, the
paper presents a method for simplify the Bluetooth packets with
throughput enhancing. The paper studies a vital issue in wireless
communications, which is the throughput of data over wireless
networks. In fact, the Bluetooth and ZigBee are a Wireless Personal
Area Network (WPAN). With taking these two systems competition
consideration, the paper proposes different schemes for improve the
throughput of Bluetooth network over a reliable channel. The
proposition depends on the Channel Quality Driven Data Rate
(CQDDR) rules, which determines the suitable packet in the
transmission process according to the channel conditions. The
proposed packet is studied over additive White Gaussian Noise
(AWGN) and fading channels. The Experimental results reveal the
capability of extension of the PL length by 8, 16, 24 bytes for classic
and EDR packets, respectively. Also, the proposed method is suitable
for the low throughput Bluetooth.
Abstract: The use of Electronic Commerce (EC)
technologies enables Small Medium Enterprises (SMEs) to improve their efficiency and competitive position. Much of the literature proposes an extensive set of benefits for
organizations that choose to adopt and implement ECommerce
systems. Factors of Business –to-business (B2B)
E-Commerce adoption and implementation have been
extensively investigated. Despite enormous attention given to encourage Small Medium Enterprises (SMEs) to adopt and
implement E-Commerce, little research has been carried out in identifying the factors of Business-to-Consumer ECommerce adoption and implementation for SMEs. To conduct the study, Tornatsky and Fleischer model was adopted
and tested in four SMEs located in Christchurch, New
Zealand. This paper explores the factors that impact the
decision and method of adoption and implementation of ECommerce
systems in automobile industry. Automobile
industry was chosen because the product they deal with i.e.
cars are not a common commodity to be sold online, despite this fact the eCommerce penetration in automobile industry is
high. The factors that promote adoption and implementation of
E-Commerce technologies are discussed, together with the
barriers. This study will help SME owners to effectively
handle the adoption and implementation process and will also
improve the chance of successful E-Commerce
implementation. The implications of the findings for
managers, consultants, and government organizations engaged in promoting E-Commerce adoption and implementation in
small businesses and future research are discussed.
Abstract: Numerous concrete structures projects are currently running in Libya as part of a US$50 billion government funding. The
quality of concrete used in 20 different construction projects were assessed based mainly on the concrete compressive strength achieved. The projects are scattered all over the country and are at
various levels of completeness. For most of these projects, the
concrete compressive strength was obtained from test results of a
150mm standard cube mold. Statistical analysis of collected concrete
compressive strengths reveals that the data in general followed a
normal distribution pattern. The study covers comparison and assessment of concrete quality aspects such as: quality control, strength range, data standard deviation, data scatter, and ratio of minimum strength to design strength. Site quality control for these projects ranged from very good to poor according to ACI214 criteria [1]. The ranges (Rg) of the strength (max. strength – min. strength) divided by average strength are from (34% to 160%). Data scatter is
measured as the range (Rg) divided by standard deviation () and is
found to be (1.82 to 11.04), indicating that the range is ±3σ.
International construction companies working in Libya follow
different assessment criteria for concrete compressive strength in lieu
of national unified procedure. The study reveals that assessments of
concrete quality conducted by these construction companies usually
meet their adopted (internal) standards, but sometimes fail to meet
internationally known standard requirements. The assessment of
concrete presented in this paper is based on ACI, British standards
and proposed Libyan concrete strength assessment criteria.
Abstract: The objective of this work is to show a procedure for
mesh generation in a fluidized bed using large eddy simulations
(LES) of a filtered two-fluid model. The experimental data were
obtained by [1] in a laboratory fluidized bed. Results show that it is
possible to use mesh with less cells as compared to RANS turbulence
model with granular kinetic theory flow (KTGF). Also, the numerical
results validate the experimental data near wall of the bed, which
cannot be predicted by RANS.model.
Abstract: This paper describes the design and fabrication of a clock and data recovery circuit (CDR). We propose a new clock and data recovery which is based on a 1/4-rate frequency detector (QRFD). The proposed frequency detector helps reduce the VCO frequency and is thus advantageous for high speed application. The proposed frequency detector can achieve low jitter operation and extend the pull-in range without using the reference clock. The proposed CDR was implemented using a 1/4-rate bang-bang type phase detector (PD) and a ring voltage controlled oscillator (VCO). The CDR circuit has been fabricated in a standard 0.18 CMOS technology. It occupies an active area of 1 x 1 and consumes 90 mW from a single 1.8V supply.
Abstract: Multi-loop (De-centralized) Proportional-Integral-
Derivative (PID) controllers have been used extensively in process
industries due to their simple structure for control of multivariable
processes. The objective of this work is to design multiple-model
adaptive multi-loop PID strategy (Multiple Model Adaptive-PID)
and neural network based multi-loop PID strategy (Neural Net
Adaptive-PID) for the control of multivariable system. The first
method combines the output of multiple linear PID controllers,
each describing process dynamics at a specific level of operation.
The global output is an interpolation of the individual multi-loop
PID controller outputs weighted based on the current value of the
measured process variable. In the second method, neural network
is used to calculate the PID controller parameters based on the
scheduling variable that corresponds to major shift in the process
dynamics. The proposed control schemes are simple in structure with
less computational complexity. The effectiveness of the proposed
control schemes have been demonstrated on the CSTR process,
which exhibits dynamic non-linearity.
Abstract: TiO2/MgO composite films were prepared by coating
the magnesium acetate solution in the pores of mesoporous TiO2
films using a dip coating method. Concentrations of magnesium
acetate solution were varied in a range of 1x10-4 – 1x10-1 M. The
TiO2/MgO composite films were characterized by scanning electron
microscopy (SEM), transmission electron microscropy (TEM),
electrochemical impedance spectroscopy(EIS) , transient voltage
decay and I-V test. The TiO2 films and TiO2/MgO composite films
were immersed in a 0.3 mM N719 dye solution. The Dye-sensitized
solar cells with the TiO2/MgO/N719 structure showed an optimal
concentration of magnesium acetate solution of 1x10-3 M resulting in
the MgO film estimated thickness of 0.0963 nm and giving the
maximum efficiency of 4.85%. The improved efficiency of dyesensitized
solar cell was due to the magnesium oxide film as the wide
band gap coating decays the electron back transfer to the triiodide
electrolyte and reduce charge recombination.
Abstract: As emails communications have no consistent
authentication procedure to ensure the authenticity, we present an
investigation analysis approach for detecting forged emails based on
Random Forests and Naïve Bays classifiers. Instead of investigating
the email headers, we use the body content to extract a unique writing
style for all the possible suspects. Our approach consists of four main
steps: (1) The cybercrime investigator extract different effective
features including structural, lexical, linguistic, and syntactic
evidence from previous emails for all the possible suspects, (2) The
extracted features vectors are normalized to increase the accuracy
rate. (3) The normalized features are then used to train the learning
engine, (4) upon receiving the anonymous email (M); we apply the
feature extraction process to produce a feature vector. Finally, using
the machine learning classifiers the email is assigned to one of the
suspects- whose writing style closely matches M. Experimental
results on real data sets show the improved performance of the
proposed method and the ability of identifying the authors with a
very limited number of features.
Abstract: In the 21. century it comes true, that competitiveness of the firm is - to a considerable level - influenced by its participation in the chain of suppliers, customers and partners and by the way how the subject cooperates in the chain. This is valid also for new forms of enterprise such as virtual organization or virtual firm. In the first part of the paper there are determined the differences between these forms of enterprise. Another part will bring methodological framework for analysis of the factors, that influence the competitiveness of the virtual organization from spontaneity and order point of view.
Abstract: In this paper we will develop further the sequential
life test approach presented in a previous article by [1] using an
underlying two parameter Weibull sampling distribution. The
minimum life will be considered equal to zero. We will again provide
rules for making one of the three possible decisions as each
observation becomes available; that is: accept the null hypothesis H0;
reject the null hypothesis H0; or obtain additional information by
making another observation. The product being analyzed is a new
type of a low alloy-high strength steel product. To estimate the shape
and the scale parameters of the underlying Weibull model we will use
a maximum likelihood approach for censored failure data. A new
example will further develop the proposed sequential life testing
approach.
Abstract: Most of the concurrent transactional protocols consider
serializability as a correctness criterion of the transactions execution.
Usually, the proof of the serializability relies on mathematical proofs
for a fixed finite number of transactions. In this paper, we introduce
a protocol to deal with an infinite number of transactions which are
iterated infinitely often. We specify serializability of the transactions
and the protocol using a specification language based on temporal
logics. It is worthwhile using temporal logics such as LTL (Lineartime
Temporal Logic) to specify transactions, to gain full automatic
verification by using model checkers.
Abstract: The requirements analysis, modeling, and simulation have consistently been one of the main challenges during the development of complex systems. The scenarios and the state machines are two successful models to describe the behavior of an interactive system. The scenarios represent examples of system execution in the form of sequences of messages exchanged between objects and are a partial view of the system. In contrast, state machines can represent the overall system behavior. The automation of processing scenarios in the state machines provide some answers to various problems such as system behavior validation and scenarios consistency checking. In this paper, we propose a method for translating scenarios in state machines represented by Discreet EVent Specification and procedure to detect implied scenarios. Each induced DEVS model represents the behavior of an object of the system. The global system behavior is described by coupling the atomic DEVS models and validated through simulation. We improve the validation process with integrating formal methods to eliminate logical inconsistencies in the global model. For that end, we use the Z notation.
Abstract: The tree structured approach of non-uniform filterbank
(NUFB) is normally used in perfect reconstruction (PR). The PR is
not always feasible due to certain limitations, i.e, constraints in
selecting design parameters, design complexity and some times
output is severely affected by aliasing error if necessary and
sufficient conditions of PR is not satisfied perfectly. Therefore, there
has been generalized interest of researchers to go for near perfect
reconstruction (NPR). In this proposed work, an optimized tree
structure technique is used for the design of NPR non-uniform
filterbank. Window functions of Blackman family are used to design
the prototype FIR filter. A single variable linear optimization is used
to minimize the amplitude distortion. The main feature of the
proposed design is its simplicity with linear phase property.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.