Anomaly Detection and Characterization to Classify Traffic Anomalies Case Study: TOT Public Company Limited Network

This paper represents four unsupervised clustering algorithms namely sIB, RandomFlatClustering, FarthestFirst, and FilteredClusterer that previously works have not been used for network traffic classification. The methodology, the result, the products of the cluster and evaluation of these algorithms with efficiency of each algorithm from accuracy are shown. Otherwise, the efficiency of these algorithms considering form the time that it use to generate the cluster quickly and correctly. Our work study and test the best algorithm by using classify traffic anomaly in network traffic with different attribute that have not been used before. We analyses the algorithm that have the best efficiency or the best learning and compare it to the previously used (K-Means). Our research will be use to develop anomaly detection system to more efficiency and more require in the future.

Daily and Seasonal Changes of Air Pollution in Kuwait

This paper focuses on assessment of air pollution in Umm-Alhyman, Kuwait, which is located south to oil refineries, power station, oil field, and highways. The measurements were made over a period of four days in March and July in 2001, 2004, and 2008. The measured pollutants included methanated and nonmethanated hydrocarbons (MHC, NMHC), CO, CO2, SO2, NOX, O3, and PM10. Also, meteorological parameters were measured, which includes temperature, wind speed and direction, and solar radiation. Over the study period, data analysis showed increase in measured SO2, NOX and CO by factors of 1.2, 5.5 and 2, respectively. This is explained in terms of increase in industrial activities, motor vehicle density, and power generation. Predictions of the measured data were made by the ISC-AERMOD software package and by using the ISCST3 model option. Finally, comparison was made between measured data against international standards.

Theoretical and Analytical Approaches for Investigating the Relations between Sediment Transport and Channel Shape

This study investigated the effect of cross sectional geometry on sediment transport rate. The processes of sediment transport are generally associated to environmental management, such as pollution caused by the forming of suspended sediment in the channel network of a watershed and preserving physical habitats and native vegetations, and engineering applications, such as the influence of sediment transport on hydraulic structures and flood control design. Many equations have been proposed for computing the sediment transport, the influence of many variables on sediment transport has been understood; however, the effect of other variables still requires further research. For open channel flow, sediment transport capacity is recognized to be a function of friction slope, flow velocity, grain size, grain roughness and form roughness, the hydraulic radius of the bed section and the type and quantity of vegetation cover. The effect of cross sectional geometry of the channel on sediment transport is one of the variables that need additional investigation. The width-depth ratio (W/d) is a comparative indicator of the channel shape. The width is the total distance across the channel and the depth is the mean depth of the channel. The mean depth is best calculated as total cross-sectional area divided by the top width. Channels with high W/d ratios tend to be shallow and wide, while channels with low (W/d) ratios tend to be narrow and deep. In this study, the effects of the width-depth ratio on sediment transport was demonstrated theoretically by inserting the shape factor in sediment continuity equation and analytically by utilizing the field data sets for Yalobusha River. It was found by utilizing the two approaches as a width-depth ratio increases the sediment transport decreases.

Estimation of Attenuation and Phase Delay in Driving Voltage Waveform of a Digital-Noiseless, Ultra-High-Speed Image Sensor

Since 2004, we have been developing an in-situ storage image sensor (ISIS) that captures more than 100 consecutive images at a frame rate of 10 Mfps with ultra-high sensitivity as well as the video camera for use with this ISIS. Currently, basic research is continuing in an attempt to increase the frame rate up to 100 Mfps and above. In order to suppress electro-magnetic noise at such high frequency, a digital-noiseless imaging transfer scheme has been developed utilizing solely sinusoidal driving voltages. This paper presents highly efficient-yet-accurate expressions to estimate attenuation as well as phase delay of driving voltages through RC networks of an ultra-high-speed image sensor. Elmore metric for a fundamental RC chain is employed as the first-order approximation. By application of dimensional analysis to SPICE data, we found a simple expression that significantly improves the accuracy of the approximation. Similarly, another simple closed-form model to estimate phase delay through fundamental RC networks is also obtained. Estimation error of both expressions is much less than previous works, only less 2% for most of the cases . The framework of this analysis can be extended to address similar issues of other VLSI structures.

The Relationship of Anthocyanins with Color of Organically and Conventionally Cultivated Potatoes

Many of the compounds present in potato are important because of their beneficial effects on health, therefore, are highly desirable in the human diet. Potato tubers contain significant amounts of anthocyanins. The aim of this research was to determine the content of anthocyanins and its relationship with the colour of organically and conventionally cultivated potato varieties. In the research eight potato samples of three potato varieties were analyzed on anthocyanins, dry matter content and color. Obtained results show that there was no significant influence on amount of anthocyanins between different cultivation environments (p>0.05) while between varieties – significant difference (p

Using Non-Linear Programming Techniques in Determination of the Most Probable Slip Surface in 3D Slopes

Among many different methods that are used for optimizing different engineering problems mathematical (numerical) optimization techniques are very important because they can easily be used and are consistent with most of engineering problems. Many studies and researches are done on stability analysis of three dimensional (3D) slopes and the relating probable slip surfaces and determination of factors of safety, but in most of them force equilibrium equations, as in simplified 2D methods, are considered only in two directions. In other words for decreasing mathematical calculations and also for simplifying purposes the force equilibrium equation in 3rd direction is omitted. This point is considered in just a few numbers of previous studies and most of them have only given a factor of safety and they haven-t made enough effort to find the most probable slip surface. In this study shapes of the slip surfaces are modeled, and safety factors are calculated considering the force equilibrium equations in all three directions, and also the moment equilibrium equation is satisfied in the slip direction, and using nonlinear programming techniques the shape of the most probable slip surface is determined. The model which is used in this study is a 3D model that is composed of three upper surfaces which can cover all defined and probable slip surfaces. In this research the meshing process is done in a way that all elements are prismatic with quadrilateral cross sections, and the safety factor is defined on this quadrilateral surface in the base of the element which is a part of the whole slip surface. The method that is used in this study to find the most probable slip surface is the non-linear programming method in which the objective function that must get optimized is the factor of safety that is a function of the soil properties and the coordinates of the nodes on the probable slip surface. The main reason for using non-linear programming method in this research is its quick convergence to the desired responses. The final results show a good compatibility with the previously used classical and 2D methods and also show a reasonable convergence speed.

Shading Percentage Effects on Energy Consumption for Bahraini Residential Buildings

Energy consumption is a very important topic these days especially regarding air conditioning in residential buildings, since this takes the biggest amount of energy in buildings total consumption, residential buildings constitute the biggest percentage of energy consumption in Bahrain. This research reflects on the effects of shading percentage in different solar orientations on the energy consumption inside residential buildings (domestic dwellings). The research as found that, there are different effects of shading in changing building orientation: • 0.69% for the shading percentage 25% when the building is oriented to the north (0º); • 18.59% for 75% of shading in north-west orientation (325º); • The best effect for shading is in north-west orientation (315º); • The less effect for shading was in case of the building orientation is the north (0º).

Stature Estimation Using Foot and Shoeprint Length of Malaysian Population

Formulation of biological profile is one of the modern roles of forensic anthropologist. The present study was conducted to estimate height using foot and shoeprint length of Malaysian population. The present work can be very useful information in the process of identification of individual in forensic cases based on shoeprint evidence. It can help to narrow down suspects and ease the police investigation. Besides, stature is important parameters in determining the partial identify of unidentified and mutilated bodies. Thus, this study can help the problem encountered in cases of mass disaster, massacre, explosions and assault cases. This is because it is very hard to identify parts of bodies in these cases where people are dismembered and become unrecognizable. Samples in this research were collected from 200 Malaysian adults (100 males and 100 females) with age ranging from 20 to 45 years old. In this research, shoeprint length were measured based on the print of the shoes made from the flat shoes. Other information like gender, foot length and height of subject were also recorded. The data was analyzed using IBM® SPSS Statistics 19 software. Results indicated that, foot length has a strong correlation with stature than shoeprint length for both sides of the feet. However, in the unknown, where the gender was undetermined have shown a better correlation in foot length and shoeprint length parameter compared to males and females analyzed separately. In addition, prediction equations are developed to estimate the stature using linear regression analysis of foot length and shoeprint length. However, foot lengths give better prediction than shoeprint length. 

Effect of Different pH on Canthaxanthin Degradation

In this research, natural canthaxanthin as one of the most important carotenoids was extracted from Dietzia natronolimnaea HS-1. The changes of canthaxanthin enriched in oilin- water emulsions with vegetable oil (5 mg/ 100 mL), Arabic gum (5 mg/100 mL), and potassium sorbate (0.5 g/100 mL) was investigated. The effects of different pH (3, 5 and 7), as well as, time treatment (3, 18 and 33 days) in the environmental temperature (24°C) on the degradation were studied by response surface methodology (RSM). The Hunter values (L*, a*, and b*) and the concentration of canthaxanthin (C, mg/L) illustrated more degradation of this pigment at low pHs (pH≤ 4) by passing the time (days≥10) with R² 97.00%, 91.31%, 97.60%, and 99.54% for C, L*, a*, and b* respectively. The predicted model were found to be significant (p

Travel Time Evaluation of an Innovative U-Turn Facility on Urban Arterial Roadways

Signalized intersections on high-volume arterials are often congested during peak hours, causing a decrease in through movement efficiency on the arterial. Much of the vehicle delay incurred at conventional intersections is caused by high left-turn demand. Unconventional intersection designs attempt to reduce intersection delay and travel time by rerouting left-turns away from the main intersection and replacing it with right-turn followed by Uturn. The proposed new type of U-turn intersection is geometrically designed with a raised island which provides a protected U-turn movement. In this study several scenarios based on different distances between U-turn and main intersection, traffic volume of major/minor approaches and percentage of left-turn volumes were simulated by use of AIMSUN, a type of traffic microsimulation software. Subsequently some models are proposed in order to compute travel time of each movement. Eventually by correlating these equations to some in-field collected data of some implemented U-turn facilities, the reliability of the proposed models are approved. With these models it would be possible to calculate travel time of each movement under any kind of geometric and traffic condition. By comparing travel time of a conventional signalized intersection with U-turn intersection travel time, it would be possible to decide on converting signalized intersections into this new kind of U-turn facility or not. However comparison of travel time is not part of the scope of this research. In this paper only travel time of this innovative U-turn facility would be predicted. According to some before and after study about the traffic performance of some executed U-turn facilities, it is found that commonly, this new type of U-turn facility produces lower travel time. Thus, evaluation of using this type of unconventional intersection should be seriously considered.

Applications of Cascade Correlation Neural Networks for Cipher System Identification

Crypto System Identification is one of the challenging tasks in Crypt analysis. The paper discusses the possibility of employing Neural Networks for identification of Cipher Systems from cipher texts. Cascade Correlation Neural Network and Back Propagation Network have been employed for identification of Cipher Systems. Very large collection of cipher texts were generated using a Block Cipher (Enhanced RC6) and a Stream Cipher (SEAL). Promising results were obtained in terms of accuracy using both the Neural Network models but it was observed that the Cascade Correlation Neural Network Model performed better compared to Back Propagation Network.

On the Prediction of Transmembrane Helical Segments in Membrane Proteins Based on Wavelet Transform

The prediction of transmembrane helical segments (TMHs) in membrane proteins is an important field in the bioinformatics research. In this paper, a new method based on discrete wavelet transform (DWT) has been developed to predict the number and location of TMHs in membrane proteins. PDB coded as 1KQG was chosen as an example to describe the prediction of the number and location of TMHs in membrane proteins by using this method. To access the effect of the method, 80 proteins with known 3D-structure from Mptopo database are chosen at random as the test objects (including 325 TMHs), 308 of which can be predicted accurately, the average predicted accuracy is 96.3%. In addition, the above 80 membrane proteins are divided into 13 groups according to their function and type. In particular, the results of the prediction of TMHs of the 13 groups are satisfying.

Corporate Social Responsibility in China Apparel Industry

China apparel industry, which is deeply embedded in the global production network (GPN), faces the dual pressures of social upgrading and economic upgrading. Based on the survey in Ningbo apparel cluster, the paper shows the state of corporate social responsibility (CSR) in China apparel industry is better than before. And the investigation indicates that the firms who practice CSR actively perform better both socially and economically than those who inactively. The research demonstrates that CSR can be an initial capital rather than cost, and “doing well by doing good" is also existed in labor intensive industry.

Social Influence in the Adoption Process and Usage of Innovation: Gender Differences

The purpose of this study is to determine in what ways elementary education prospective teachers are being informed about innovations and to explain the role of social influence in the usage process of a technological innovation in terms of genders. The study group consisted of 300 prospective teachers, including 234 females and 66 males. Data have been collected by a questionnaire developed by the researchers. The result of the study showed that, while prospective teachers are being informed about innovations most frequently by mass media, they rarely seek to take expert advice. In addition, analysis of results showed that the social influence on females were significantly higher than males in usage process of a technological innovation.

A Data Hiding Model with High Security Features Combining Finite State Machines and PMM method

Recent years have witnessed the rapid development of the Internet and telecommunication techniques. Information security is becoming more and more important. Applications such as covert communication, copyright protection, etc, stimulate the research of information hiding techniques. Traditionally, encryption is used to realize the communication security. However, important information is not protected once decoded. Steganography is the art and science of communicating in a way which hides the existence of the communication. Important information is firstly hidden in a host data, such as digital image, video or audio, etc, and then transmitted secretly to the receiver.In this paper a data hiding model with high security features combining both cryptography using finite state sequential machine and image based steganography technique for communicating information more securely between two locations is proposed. The authors incorporated the idea of secret key for authentication at both ends in order to achieve high level of security. Before the embedding operation the secret information has been encrypted with the help of finite-state sequential machine and segmented in different parts. The cover image is also segmented in different objects through normalized cut.Each part of the encoded secret information has been embedded with the help of a novel image steganographic method (PMM) on different cuts of the cover image to form different stego objects. Finally stego image is formed by combining different stego objects and transmit to the receiver side. At the receiving end different opposite processes should run to get the back the original secret message.

Evaluating the Tool Wear Rate in Ultrasonic Machining of Titanium using Design of Experiments Approach

Ultrasonic machining (USM) is a non-traditional machining process being widely used for commercial machining of brittle and fragile materials such as glass, ceramics and semiconductor materials. However, USM could be a viable alternative for machining a tough material such as titanium; and this aspect needs to be explored through experimental research. This investigation is focused on exploring the use of ultrasonic machining for commercial machining of pure titanium (ASTM Grade-I) and evaluation of tool wear rate (TWR) under controlled experimental conditions. The optimal settings of parameters are determined through experiments planned, conducted and analyzed using Taguchi method. In all, the paper focuses on parametric optimization of ultrasonic machining of pure titanium metal with TWR as response, and validation of the optimized value of TWR by conducting confirmatory experiments.

Firm Performance of Thai Cuisines in Bangkok, Thailand: Contribution to the Tourism Industry

This study is a descriptive-normative research. It attempted to investigate the restaurants’ firm performance in terms of the customers and restaurant personnel’s degree of satisfaction. A total of 12 restaurants in Bangkok, Thailand that offer Thai cuisine were included in this study. It involved 24 stockholders/managers, 120 subordinates and 360 customers. General Managers and restaurants’ stockholders, 10 staffs, and 30 costumers for each restaurant were chosen for random sampling. This study found that respondents are slightly satisfied with their work environment but are generally satisfied with the accessibility to transportation, to malls, convenience, safety, recreation, noise-free, and attraction; customers find the Quality of Food in most Thai Cuisines like services, prices of food, sales promotion, and capital and length of service satisfactory. Therefore, both stockholder-related and personnel-related factors which are influenced by restaurant, personnel, and customer-related factors are partially accepted whereas; customer-related factors which are influenced by restaurant, personnel and customer-related factors are rejected.

Class Outliers Mining: Distance-Based Approach

In large datasets, identifying exceptional or rare cases with respect to a group of similar cases is considered very significant problem. The traditional problem (Outlier Mining) is to find exception or rare cases in a dataset irrespective of the class label of these cases, they are considered rare events with respect to the whole dataset. In this research, we pose the problem that is Class Outliers Mining and a method to find out those outliers. The general definition of this problem is “given a set of observations with class labels, find those that arouse suspicions, taking into account the class labels". We introduce a novel definition of Outlier that is Class Outlier, and propose the Class Outlier Factor (COF) which measures the degree of being a Class Outlier for a data object. Our work includes a proposal of a new algorithm towards mining of the Class Outliers, presenting experimental results applied on various domains of real world datasets and finally a comparison study with other related methods is performed.

Off-Shore Port Management on the Environmental Issue - Case Study of Sichang Harbor

The research is to minimize environmental damage pertinent to maritime activities about the operation of lighter boat anchorage and its tugboat. The guidance on upgrading current harbor service and infrastructure has been provided to Kho Sichang Municpality. This will involve a study of the maritime logistics of the water area under jurisdiction of the Sichang island Municipality and possible recommendations may involve charging taxes, regulations and fees. With implementing these recommendations will help in protection of the marine environment and in increasing operator functionality. Additionally, our recommendation is to generate a consistent revenue stream to the municipality. The action items contained in this research are feasible and effective, the success of these initiatives are heavily dependent upon successful promotion and enforcement. Promoting new rules and regulations effectively and peacefully can be done through theories and techniques used in the psychology of persuasion. In order to assure compliance with the regulations, the municipality must maintain stringent patrols and fines for violators. In order to become success, the Municipality must preserve a consistent, transparent and significant enforcement system. Considering potential opportunities outside of the current state of the municipality, the authors recommend that Koh Sichang be given additional jurisdiction to capture value from the master vessels, as well as to confront the more significant environmental challenges these vessels pose. Finally, the authors recommend that the Port of Koh Sichang Island obtain a free port status in order to increase economic viability and overall sustainability.

Research on Rail Safety Security System

This paper analysis the integrated use of safety monitoring with the domestic and international latest research on rail safety protection system, and focus on the implementation of an organic whole system, with the monitoring and early warning, risk assessment, predictive control and emergency rescue system. The system framework, contents and system structure of Security system is proposed completely. It-s pointed out that the Security system is a negative feedback system composed of by safety monitoring and warning system, risk assessment and emergency rescue system. Safety monitoring and warning system focus on the monitoring target monitoring, early warning, tracking, integration of decision-making, for objective and subjective risks factors. Risk assessment system analysis the occurrence of a major Security risk mechanism, determines the standard of the future short, medium and long term safety conditions, and give prop for development of safety indicators, accident analysis and safety standards. Emergency rescue system is with the goal of rapid and effective rescue work for accident, to minimize casualties and property losses.