Abstract: In open settings, the participants in virtual
organization are autonomous and there is no central authority to
ensure the felicity of their interactions. When agents interact in such
settings, each relies upon being able to model the trustworthiness of
the agents with whom it interacts. Fundamentally, such models must
consider the past behavior of the other parties in order to predict their
future behavior. Further, it is sensible for the agents to share
information via referrals to trustworthy agents. In this article, trust is
a bet on the future contingent actions of others" and enumerates six
major factors supporting it: (1) reputation, (2) performance, (3)
appearance, (4) accountability, (5) precommitment, and (6)
contextual facilitation.
Abstract: This work deals with the initial applications and formulation of an anisotropic plastic-damage constitutive model proposed for non-linear analysis of reinforced concrete structures submitted to a loading with change of the sign. The original constitutive model is based on the fundamental hypothesis of energy equivalence between real and continuous medium following the concepts of the Continuum Damage Mechanics. The concrete is assumed as an initial elastic isotropic medium presenting anisotropy, permanent strains and bimodularity (distinct elastic responses whether traction or compression stress states prevail) induced by damage evolution. In order to take into account the bimodularity, two damage tensors governing the rigidity in tension or compression regimes are introduced. Then, some conditions are introduced in the original version of the model in order to simulate the damage unilateral effect. The three-dimensional version of the proposed model is analyzed in order to validate its formulation when compared to micromechanical theory. The one-dimensional version of the model is applied in the analyses of a reinforced concrete beam submitted to a loading with change of the sign. Despite the parametric identification problems, the initial applications show the good performance of the model.
Abstract: In this paper, by employing a new Lyapunov functional
and an elementary inequality analysis technique, some sufficient
conditions are derived to ensure the existence and uniqueness of
periodic oscillatory solution for fuzzy bi-directional memory (BAM)
neural networks with time-varying delays, and all other solutions of
the fuzzy BAM neural networks converge the uniqueness periodic
solution. These criteria are presented in terms of system parameters
and have important leading significance in the design and applications
of neural networks. Moreover an example is given to illustrate the
effectiveness and feasible of results obtained.
Abstract: Prickly pear fruit (Opuntia ficus indica L. Miller) belongs to the Cactaceae family. This species is very sensitive to low storage temperatures (< 5°C) which cause damages. The fruits can be peeled, suitably packaged and successfully commercialized as a ready-to-eat product. The main limit to the extension of the shelf life is the production of off-flavors due to different factors, the growth of microorganisms and the action of endogenous enzymes. Lipoxygenase (LOX) and Pectinesterase (PE) are involved in fruit degradation. In particular, LOX pathway is directly responsible for lipid oxidation, and the subsequent production of off-flavours, while PE causes the softening of fruit during maturation. They act on the texture and shelf-life of post-harvest, packaged fruits, as a function of the the grown of microorganisms and packaging technologies used. The aim of this work is to compare the effect of different packaging technologies on the shelf life extension of ready-to-eat prickly pear fruits with regards for the enzymes activities.
Abstract: The amount of the information being churned out by the field of biology has jumped manifold and now requires the extensive use of computer techniques for the management of this information. The predominance of biological information such as protein sequence similarity in the biological information sea is key information for detecting protein evolutionary relationship. Protein sequence similarity typically implies homology, which in turn may imply structural and functional similarities. In this work, we propose, a learning method for detecting remote protein homology. The proposed method uses a transformation that converts protein sequence into fixed-dimensional representative feature vectors. Each feature vector records the sensitivity of a protein sequence to a set of amino acids substrings generated from the protein sequences of interest. These features are then used in conjunction with support vector machines for the detection of the protein remote homology. The proposed method is tested and evaluated on two different benchmark protein datasets and it-s able to deliver improvements over most of the existing homology detection methods.
Abstract: Recently T. C. Au-Yeung, C.Au, and P. C. W. Fung [2] have given the solution of the KdV equation [1] to the boundary condition , where b is a constant. We have further extended the method of [2] to find the solution of the KdV equation with asymptotic degeneracy. Via simulations we find both bright and dark Solitons (i.e. Solitons with opposite phases).
Abstract: Bacillus subtilis strain LB5 produced lipopeptide
antibiotic iturin A-2 in liquid medium. Crude extract
from cell-free supernatant of B. subtilis cultivated broth extracted
with n-butanol showed antifungal activity to conidial germination of
Colletotrichum gloeosporioides. The germination of conidia was
completely inhibited by crude extract. The ultrastructure of conidia
after treated with crude extract was found an accumulation of vesiclelike
material between cell wall and plasma membrane while this
accumulation was not observed in untreated and germinated conidia.
Besides, the cell wall was not affected by crude extract.
Abstract: Empirical force fields and density functional theory
(DFT) was used to study the binding energies and structures of
methylamine on the surface of activated carbons (ACs). This is a first
step in studying the adsorption of alkyl amines on the surface of
functionalized ACs. The force fields used were Dreiding (DFF),
Universal (UFF) and Compass (CFF) models. The generalized
gradient approximation with Perdew Wang 91 (PW91) functional
was used for DFT calculations. In addition to obtaining the aminecarboxylic
acid adsorption energies, the results were used to establish
reliability of the empirical models for these systems. CFF predicted a
binding energy of -9.227 (kcal/mol) which agreed with PW91 at -
13.17 (kcal/mol), compared to DFF 0 (kcal/mol) and UFF -0.72
(kcal/mol). However, the CFF binding energies for the amine to ester
and ketone disagreed with PW91 results. The structures obtained
from all models agreed with PW91 results.
Abstract: Main goal of preventive healthcare problems are at
decreasing the likelihood and severity of potentially life-threatening
illnesses by protection and early detection. The levels of
establishment and staffing costs along with summation of the travel
and waiting time that clients spent are considered as objectives
functions of the proposed nonlinear integer programming model. In
this paper, we have proposed a bi-objective mathematical model for
designing a network of preventive healthcare facilities so as to
minimize aforementioned objectives, simultaneously. Moreover, each
facility acts as M/M/1 queuing system. The number of facilities to be
established, the location of each facility, and the level of technology
for each facility to be chosen are provided as the main determinants
of a healthcare facility network. Finally, to demonstrate performance
of the proposed model, four multi-objective decision making
techniques are presented to solve the model.
Abstract: The security of computer networks plays a strategic
role in modern computer systems. Intrusion Detection Systems (IDS)
act as the 'second line of defense' placed inside a protected
network, looking for known or potential threats in network traffic
and/or audit data recorded by hosts. We developed an Intrusion
Detection System using LAMSTAR neural network to learn patterns
of normal and intrusive activities, to classify observed system
activities and compared the performance of LAMSTAR IDS with
other classification techniques using 5 classes of KDDCup99 data.
LAMSAR IDS gives better performance at the cost of high
Computational complexity, Training time and Testing time, when
compared to other classification techniques (Binary Tree classifier,
RBF classifier, Gaussian Mixture classifier). we further reduced the
Computational Complexity of LAMSTAR IDS by reducing the
dimension of the data using principal component analysis which in
turn reduces the training and testing time with almost the same
performance.
Abstract: Many recent electrophysiological studies have
revealed the importance of investigating meditation state in order to
achieve an increased understanding of autonomous control of
cardiovascular functions. In this paper, we characterize heart rate
variability (HRV) time series acquired during meditation using
nonlinear dynamical parameters. We have computed minimum
embedding dimension (MED), correlation dimension (CD), largest
Lyapunov exponent (LLE), and nonlinearity scores (NLS) from HRV
time series of eight Chi and four Kundalini meditation practitioners.
The pre-meditation state has been used as a baseline (control) state to
compare the estimated parameters. The chaotic nature of HRV during
both pre-meditation and meditation is confirmed by MED. The
meditation state showed a significant decrease in the value of CD and
increase in the value of LLE of HRV, in comparison with premeditation
state, indicating a less complex and less predictable nature
of HRV. In addition, it was shown that the HRV of meditation state
is having highest NLS than pre-meditation state. The study indicated
highly nonlinear dynamic nature of cardiac states as revealed by
HRV during meditation state, rather considering it as a quiescent
state.
Abstract: The functional response of an infective is the relationship
between an infected individual-s infection rate and the abundance
of the number of susceptibles that one can potentially be infected.
In this paper, we consider defensive attitudes for HIV prevention
(primary prevention) while at the same time emphasizing on offensive
attitudes that reduce infection for those infected (secondary prevention).
We look at how defenses can protect an uninfected individual
in the case where high risk groups such as commercial sex workers
and those who deliberately go out to look for partners. We propose
an infection cycle that begins with a search, then an encounter,
a proposal and contact. The infection cycle illustrates the various
steps an infected individual goes through to successfully infect a
susceptible. For heterogeneous transmission of HIV, there will be no
infection unless there is contact. The ability to avoid an encounter,
detection, proposal and contact constitute defense.
Abstract: The deterministic quantum transfer-matrix (QTM)
technique and its mathematical background are presented. This
important tool in computational physics can be applied to a class of
the real physical low-dimensional magnetic systems described by the
Heisenberg hamiltonian which includes the macroscopic molecularbased
spin chains, small size magnetic clusters embedded in some
supramolecules and other interesting compounds. Using QTM, the
spin degrees of freedom are accurately taken into account, yielding
the thermodynamical functions at finite temperatures.
In order to test the application for the susceptibility calculations to
run in the parallel environment, the speed-up and efficiency of
parallelization are analyzed on our platform SGI Origin 3800 with
p = 128 processor units. Using Message Parallel Interface (MPI)
system libraries we find the efficiency of the code of 94% for
p = 128 that makes our application highly scalable.
Abstract: A numerical method for solving the time-independent Schrödinger equation of a particle moving freely in a three-dimensional
axisymmetric region is developed. The boundary of the region
is defined by an arbitrary analytic function. The method uses a
coordinate transformation and an expansion in eigenfunctions. The
effectiveness is checked and confirmed by applying the method to a
particular example, which is a prolate spheroid.
Abstract: In this paper, the fuzzy linear programming formulation
of fuzzy maximal flow problems are proposed and on the basis of the
proposed formulation a method is proposed to find the fuzzy optimal
solution of fuzzy maximal flow problems. In the proposed method all
the parameters are represented by triangular fuzzy numbers. By using
the proposed method the fuzzy optimal solution of fuzzy maximal
flow problems can be easily obtained. To illustrate the proposed
method a numerical example is solved and the obtained results are
discussed.
Abstract: In cognitive radio (CR) systems, the primary user (PU) signal would randomly depart or arrive during the sensing period of a CR user, which is referred to as the high traffic environment. In this paper, we propose a novel spectrum sensing scheme based
on the cyclostationarity of PU signals in high traffic environments. Specifically, we obtain a test statistic by applying an estimate of spectral autocoherence function of the PU signal to the generalized- likelihood ratio. From numerical results, it is confirmed that the proposed scheme provides a better spectrum sensing performance compared with the conventional spectrum sensing scheme based on the energy of the PU signals in high traffic environments.
Abstract: In this paper, a robust statistics based filter to remove salt and pepper noise in digital images is presented. The function of the algorithm is to detect the corrupted pixels first since the impulse noise only affect certain pixels in the image and the remaining pixels are uncorrupted. The corrupted pixels are replaced by an estimated value using the proposed robust statistics based filter. The proposed method perform well in removing low to medium density impulse noise with detail preservation upto a noise density of 70% compared to standard median filter, weighted median filter, recursive weighted median filter, progressive switching median filter, signal dependent rank ordered mean filter, adaptive median filter and recently proposed decision based algorithm. The visual and quantitative results show the proposed algorithm outperforms in restoring the original image with superior preservation of edges and better suppression of impulse noise
Abstract: Custom power is a technology driven product and
service solution which embraces a family devices such as Dynamic
Voltage Restorer (DVR), Distributed Shunt Compensator
(DSTATCOM), Solid State Breaker (SSB) etc which will provide
power quality functions at distribution voltages. The rapid response
of these devices enables them to operate in real time, providing
continuous and dynamic control of the supply including voltage and
reactive power regulation, harmonic reduction and elimination of
voltage dips. This paper presents the benefits of multilevel inverters
when they are used for DPC based custom power devices. Power
flow control mechanism, salient features, advantages and
disadvantages of direct power control (DPC) using lookup table,
SVM, predictive voltage vector and hybrid DPC strategies are
discussed in this paper. Simulation results of three level inverter
based STATCOM, harmonic analysis of multi level inverters are
presented at the end.
Abstract: The cardiovascular system has become the most
important subject of clinical research, particularly measurement of
arterial blood flow. Therefore correct determination of arterial
diameter is crucial. We propose a novel, semi-automatic method for
artery lumen detection. The method is based on Gaussian probability
function. Usability of our proposed method was assessed by
analyzing ultrasound B-mode CFA video sequences acquired from
eleven healthy volunteers. The correlation coefficient between the
manual and semi-automatic measurement of arterial diameter was
0.996. Our proposed method for detecting artery boundary is novel
and accurate enough for the measurement of artery diameter.
Abstract: Influence diagrams (IDs) are one of the most commonly used graphical decision models for reasoning under uncertainty. The quantification of IDs which consists in defining conditional probabilities for chance nodes and utility functions for value nodes is not always obvious. In fact, decision makers cannot always provide exact numerical values and in some cases, it is more easier for them to specify qualitative preference orders. This work proposes an adaptation of standard IDs to the qualitative framework based on possibility theory.