Abstract: This research focus on the intrusion detection system (IDS) development which using artificial immune system (AIS) with population based incremental learning (PBIL). AIS have powerful distinguished capability to extirpate antigen when the antigen intrude into human body. The PBIL is based on past learning experience to adjust new learning. Therefore we propose an intrusion detection system call PBIL-AIS which combine two approaches of PBIL and AIS to evolution computing. In AIS part we design three mechanisms such as clonal selection, negative selection and antibody level to intensify AIS performance. In experimental result, our PBIL-AIS IDS can capture high accuracy when an intrusion connection attacks.
Abstract: Over last two decades, due to hostilities of environment
over the internet the concerns about confidentiality of information
have increased at phenomenal rate. Therefore to safeguard the information
from attacks, number of data/information hiding methods have
evolved mostly in spatial and transformation domain.In spatial domain
data hiding techniques,the information is embedded directly on
the image plane itself. In transform domain data hiding techniques the
image is first changed from spatial domain to some other domain and
then the secret information is embedded so that the secret information
remains more secure from any attack. Information hiding algorithms
in time domain or spatial domain have high capacity and relatively
lower robustness. In contrast, the algorithms in transform domain,
such as DCT, DWT have certain robustness against some multimedia
processing.In this work the authors propose a novel steganographic
method for hiding information in the transform domain of the gray
scale image.The proposed approach works by converting the gray
level image in transform domain using discrete integer wavelet
technique through lifting scheme.This approach performs a 2-D
lifting wavelet decomposition through Haar lifted wavelet of the cover
image and computes the approximation coefficients matrix CA and
detail coefficients matrices CH, CV, and CD.Next step is to apply the
PMM technique in those coefficients to form the stego image. The
aim of this paper is to propose a high-capacity image steganography
technique that uses pixel mapping method in integer wavelet domain
with acceptable levels of imperceptibility and distortion in the cover
image and high level of overall security. This solution is independent
of the nature of the data to be hidden and produces a stego image
with minimum degradation.
Abstract: Roadways in Amman city face many problems consequent upon poor drainage systems. Evaluation tools are necessary to identify those roads needing improvement in their drainage system, and those needing regular maintenance. This work aims at evaluating drainage conditions in selected roadways in Amman city with the intent of identifying the problems encountered in their drainage systems. Three sites in the vicinity of Amman city have been selected and then inspected via several field visits to determine the state of their existing drainage systems and define the major problems encountered in these systems. The evaluation tool used in this study is based on visual inspection supported by photographs that depicted the defined problems. Following the field assessment, the drainage system in each road was rated as excellent, fair, good, or poor. The study reveals that more than 60% of the roadways in the selected sites were in poor drainage conditions, which lead to tremendous environmental problems. This assessment serves as a guide for local decision makers to help plan for the maintenance of Amman city roadways drainage systems, and propose ways of managing the associated problems.
Abstract: This study explores perceptions of English as a Foreign
Language (EFL) learners on using computer mediated communication
technology in their learner of English. The data consists of
observations of both synchronous and asynchronous communication
participants engaged in for over a period of 4 months, which included
online, and offline communication protocols, open-ended interviews
and reflection papers composed by participants.
Content analysis of interview data and the written documents listed
above, as well as, member check and triangulation techniques are the
major data analysis strategies. The findings suggest that participants
generally do not benefit from computer-mediated communication in
terms of its effect in learning a foreign language. Participants regarded
the nature of CMC as artificial, or pseudo communication that did not
aid their authentic communicational skills in English. The results of
this study sheds lights on insufficient and inconclusive findings, which
most quantitative CMC studies previously generated.
Abstract: A new approach for protection of power transformer is
presented using a time-frequency transform known as Wavelet transform.
Different operating conditions such as inrush, Normal, load,
External fault and internal fault current are sampled and processed
to obtain wavelet coefficients. Different Operating conditions provide
variation in wavelet coefficients. Features like energy and Standard
deviation are calculated using Parsevals theorem. These features
are used as inputs to PNN (Probabilistic neural network) for fault
classification. The proposed algorithm provides more accurate results
even in the presence of noise inputs and accurately identifies inrush
and fault currents. Overall classification accuracy of the proposed
method is found to be 96.45%. Simulation of the fault (with and
without noise) was done using MATLAB AND SIMULINK software
taking 2 cycles of data window (40 m sec) containing 800 samples.
The algorithm was evaluated by using 10 % Gaussian white noise.
Abstract: Human skull is shown to exhibit numerous sexually dimorphic traits. Estimation of sex is a challenging task especially when a part of skull is brought for medicolegal investigation. The present research was planned to evaluate the sexing potential of the dimensions of foramen magnum in forensic identification by craniometric analysis. Length and breadth of the foramen magnum was measured using Vernier calipers and the area of foramen magnum was calculated. The length, breadth, and area of foramen magnum were found to be larger in males than females. Sexual dimorphism index was calculated to estimate the sexing potential of each variable. The study observations are suggestive of the limited utility of the craniometric analysis of foramen magnum during the examination of skull and its parts in estimation of sex.
Abstract: A water reuse system in wetland paddy was simulated
to supply water for industrial in this paper. A two-tank model was employed to represent the return flow of the wetland paddy.Historical data were performed for parameter estimation and model verification. With parameters estimated from the data, the model was then used to simulate a reasonable return flow rate from the wetland
paddy. The simulation results show that the return flow ratio was 11.56% in the first crop season and 35.66% in the second crop
season individually; the difference may result from the heavy rainfall in the second crop season. Under the existent pond with surplus
active capacity, the water reuse ratio was 17.14%, and the water supplementary ratio was 21.56%. However, the pattern of rainfall, the
active capacity of the pond, and the rate of water treatment limit the
volume of reuse water. Increasing the irrigation water, dredging the
depth of pond before rainy season and enlarging the scale of module are help to develop water reuse system to support for the industrial
water use around wetland paddy.
Abstract: Automatic segmentation of skin lesions is the first step
towards the automated analysis of malignant melanoma. Although
numerous segmentation methods have been developed, few studies
have focused on determining the most effective color space for
melanoma application. This paper proposes an automatic segmentation
algorithm based on color space analysis and clustering-based histogram
thresholding, a process which is able to determine the optimal
color channel for detecting the borders in dermoscopy images. The
algorithm is tested on a set of 30 high resolution dermoscopy images.
A comprehensive evaluation of the results is provided, where borders
manually drawn by four dermatologists, are compared to automated
borders detected by the proposed algorithm, applying three previously
used metrics of accuracy, sensitivity, and specificity and a new metric
of similarity. By performing ROC analysis and ranking the metrics,
it is demonstrated that the best results are obtained with the X and
XoYoR color channels, resulting in an accuracy of approximately
97%. The proposed method is also compared with two state-of-theart
skin lesion segmentation methods.
Abstract: This paper presents a generalized form of the
mechanistic deconvolution technique (GMD) to modeling image sensors applicable in various pan–tilt planes of view. The mechanistic deconvolution technique (UMD) is modified with the
given angles of a pan–tilt plane of view to formulate constraint parameters and characterize distortion effects, and thereby, determine
the corrected image data. This, as a result, does not require experimental setup or calibration. Due to the mechanistic nature of
the sensor model, the necessity for the sensor image plane to be
orthogonal to its z-axis is eliminated, and it reduces the dependency on image data. An experiment was constructed to evaluate the
accuracy of a model created by GMD and its insensitivity to changes in sensor properties and in pan and tilt angles. This was compared
with a pre-calibrated model and a model created by UMD using two sensors with different specifications. It achieved similar accuracy
with one-seventh the number of iterations and attained lower mean error by a factor of 2.4 when compared to the pre-calibrated and
UMD model respectively. The model has also shown itself to be robust and, in comparison to pre-calibrated and UMD model, improved the accuracy significantly.
Abstract: A laboratory study on the influence of compactive
effort on expansive black cotton specimens treated with up to 8%
ordinary Portland cement (OPC) admixed with up to 8% bagasse ash
(BA) by dry weight of soil and compacted using the energies of the
standard Proctor (SP), West African Standard (WAS) or
“intermediate” and modified Proctor (MP) were undertaken. The
expansive black cotton soil was classified as A-7-6 (16) or CL using
the American Association of Highway and Transportation Officials
(AASHTO) and Unified Soil Classification System (USCS),
respectively. The 7day unconfined compressive strength (UCS)
values of the natural soil for SP, WAS and MP compactive efforts are
286, 401 and 515kN/m2 respectively, while peak values of 1019,
1328 and 1420kN/m2 recorded at 8% OPC/ 6% BA, 8% OPC/ 2% BA
and 6% OPC/ 4% BA treatments, respectively were less than the
UCS value of 1710kN/m2 conventionally used as criterion for
adequate cement stabilization. The soaked California bearing ratio
(CBR) values of the OPC/BA stabilized soil increased with higher
energy level from 2, 4 and 10% for the natural soil to Peak values of
55, 18 and 8% were recorded at 8% OPC/4% BA 8% OPC/2% BA
and 8% OPC/4% BA, treatments when SP, WAS and MP compactive
effort were used, respectively. The durability of specimens was
determined by immersion in water. Soils treatment at 8% OPC/ 4%
BA blend gave a value of 50% resistance to loss in strength value
which is acceptable because of the harsh test condition of 7 days
soaking period specimens were subjected instead of the 4 days
soaking period that specified a minimum resistance to loss in strength
of 80%. Finally An optimal blend of is 8% OPC/ 4% BA is
recommended for treatment of expansive black cotton soil for use as
a sub-base material.
Abstract: The Knowledge Management (KM) Criteria is an
essential foundation to evaluate KM outcomes. Different sets of
criteria were developed and tailored by many researchers to
determine the results of KM initiatives. However, literature review
has emphasized on incomplete set of criteria for evaluating KM
outcomes. Hence, this paper tried to address the problem of
determining the criteria for measuring knowledge management
outcomes among different types of Malaysian organizations.
Successively, this paper was assumed to develop widely accepted
criteria to measure success of knowledge management efforts for
Malaysian organizations. Our analysis approach was based on the
ANOVA procedure to compare a set of criteria among different types
of organizations. This set of criteria was exploited from literature
review. It is hoped that this study provides a better picture for
different types of Malaysian organizations to establish a
comprehensive set of criteria due to measure results of KM programs.
Abstract: The provision of urban public transport in Indonesia is not free of problems. Some of the problems include: an overall lack of capacity, lack of quality and choice, severe traffic congestions and insufficient fund to renew and repair vehicles. Generally, the comfort and quality of the city bus is poor, and many of the vehicles are dilapidated and dirty. Surveys were carried out in the city of Yogyakarta, by counting city bus vehicles and occupancies, interviewing the bus passengers, drivers and institutional staffs, who involve in public transport management. This paper will then analyze the possible plan to develop the public transport system to become more attractive and to improve the public transport management. The short, medium and long term plans are analyzed, to find the best solutions. Some constraints such as social impacts and financial impact are also taken into accounts.
Abstract: In this paper two mathematical models for definition of gas accidental escape localization in the gas pipelines are suggested. The first model was created for leak localization in the horizontal branched pipeline and second one for leak detection in inclined section of the main gas pipeline. The algorithm of leak localization in the branched pipeline did not demand on knowledge of corresponding initial hydraulic parameters at entrance and ending points of each sections of pipeline. For detection of the damaged section and then leak localization in this section special functions and equations have been constructed. Some results of calculations for compound pipelines having two, four and five sections are presented. Also a method and formula for the leak localization in the simple inclined section of the main gas pipeline are suggested. Some results of numerical calculations defining localization of gas escape for the inclined pipeline are presented.
Abstract: When the results of the total element concentrations using USEPA method 3051A are compared to the sequential extraction analyses (i.e. the sum of fractions BCR1, BCR2 and BRC3), it can be calculated that the recovery values of elements varied between 56.8-% and 69.4-% in the bottom ash, and between 11.3-% and 70.9-% in the fly ash. This indicates that most of the elements in the ashes do not occur as readily soluble forms.
Abstract: In this paper the problem of face recognition under variable illumination conditions is considered. Most of the works in the literature exhibit good performance under strictly controlled acquisition conditions, but the performance drastically drop when changes in pose and illumination occur, so that recently number of approaches have been proposed to deal with such variability. The aim of this work is to introduce an efficient local appearance feature extraction method based steerable pyramid (SP) for face recognition. Local information is extracted from SP sub-bands using LBP(Local binary Pattern). The underlying statistics allow us to reduce the required amount of data to be stored. The experiments carried out on different face databases confirm the effectiveness of the proposed approach.
Abstract: This paper describes a practical approach to design
and develop a hybrid learning with acceleration feedback control
(HLC) scheme for input tracking and end-point vibration suppression
of flexible manipulator systems. Initially, a collocated proportionalderivative
(PD) control scheme using hub-angle and hub-velocity
feedback is developed for control of rigid-body motion of the system.
This is then extended to incorporate a further hybrid control scheme
of the collocated PD control and iterative learning control with
acceleration feedback using genetic algorithms (GAs) to optimize the
learning parameters. Experimental results of the response of the
manipulator with the control schemes are presented in the time and
frequency domains. The performance of the HLC is assessed in terms
of input tracking, level of vibration reduction at resonance modes and
robustness with various payloads.
Abstract: To overcome the product overload of Internet
shoppers, we introduce a semantic recommendation procedure which
is more efficient when applied to Internet shopping malls. The
suggested procedure recommends the semantic products to the
customers and is originally based on Web usage mining, product
classification, association rule mining, and frequently purchasing.
We applied the procedure to the data set of MovieLens Company for
performance evaluation, and some experimental results are provided.
The experimental results have shown superior performance in
terms of coverage and precision.
Abstract: Implicit equations play a crucial role in Engineering.
Based on this importance, several techniques have been applied to
solve this particular class of equations. When it comes to practical
applications, in general, iterative procedures are taken into account.
On the other hand, with the improvement of computers, other
numerical methods have been developed to provide a more
straightforward methodology of solution. Analytical exact approaches
seem to have been continuously neglected due to the difficulty
inherent in their application; notwithstanding, they are indispensable
to validate numerical routines. Lagrange-s Inversion Theorem is a
simple mathematical tool which has proved to be widely applicable to
engineering problems. In short, it provides the solution to implicit
equations by means of an infinite series. To show the validity of this
method, the tree-parameter infiltration equation is, for the first time,
analytically and exactly solved. After manipulating these series,
closed-form solutions are presented as H-functions.
Abstract: We developed an effective microfluidic device for photoreactions with low reflectance and good heat conductance. The performance of this microfluidic device was tested by carrying out a photoreactive synthesis of benzopinacol and acetone from benzophenone and 2-propanol. The yield reached 36% with an irradiation time of 469.2 s and was improved by more than 30% when compared to the values obtained by the batch method. Therefore, the microfluidic device was found to be effective for improving the yields of photoreactions.
Abstract: In this work, we study the impact of dynamically
changing link slowdowns on the stability properties of packetswitched
networks under the Adversarial Queueing Theory
framework. Especially, we consider the Adversarial, Quasi-Static
Slowdown Queueing Theory model, where each link slowdown may
take on values in the two-valued set of integers {1, D} with D > 1
which remain fixed for a long time, under a (w, ¤ü)-adversary. In this
framework, we present an innovative systematic construction for the
estimation of adversarial injection rate lower bounds, which, if
exceeded, cause instability in networks that use the LIS (Longest-in-
System) protocol for contention-resolution. In addition, we show that
a network that uses the LIS protocol for contention-resolution may
result in dropping its instability bound at injection rates ¤ü > 0 when
the network size and the high slowdown D take large values. This is
the best ever known instability lower bound for LIS networks.