Abstract: In this paper, we investigate the appearance of the giant component in random subgraphs G(p) of a given large finite graph family Gn = (Vn, En) in which each edge is present independently with probability p. We show that if the graph Gn satisfies a weak isoperimetric inequality and has bounded degree, then the probability p under which G(p) has a giant component of linear order with some constant probability is bounded away from zero and one. In addition, we prove the probability of abnormally large order of the giant component decays exponentially. When a contact graph is modeled as Gn, our result is of special interest in the study of the spread of infectious diseases or the identification of community in various social networks.
Abstract: During the last couple of years, the degree of dependence on IT systems has reached a dimension nobody imagined to be possible 10 years ago. The increased usage of mobile devices (e.g., smart phones), wireless sensor networks and embedded devices (Internet of Things) are only some examples of the dependency of modern societies on cyber space. At the same time, the complexity of IT applications, e.g., because of the increasing use of cloud computing, is rising continuously. Along with this, the threats to IT security have increased both quantitatively and qualitatively, as recent examples like STUXNET or the supposed cyber attack on Illinois water system are proofing impressively. Once isolated control systems are nowadays often publicly available - a fact that has never been intended by the developers. Threats to IT systems don’t care about areas of responsibility. Especially with regard to Cyber Warfare, IT threats are no longer limited to company or industry boundaries, administrative jurisdictions or state boundaries. One of the important countermeasures is increased cooperation among the participants especially in the field of Cyber Defence. Besides political and legal challenges, there are technical ones as well. A better, at least partially automated exchange of information is essential to (i) enable sophisticated situational awareness and to (ii) counter the attacker in a coordinated way. Therefore, this publication performs an evaluation of state of the art Intrusion Detection Message Exchange protocols in order to guarantee a secure information exchange between different entities.
Abstract: The halophilic proteinase showed a maximal activity
at 50°C and pH 9~10, in 20% NaCl and was highly stabilized by
NaCl. It was able to hydrolyse natural actomyosin (NAM), collagen
and anchovy protein. For NAM hydrolysis, the myosin heavy chain
was completely digested by halophilic proteinase as evidenced by the
lowest band intensity remaining, but partially hydrolysed actin. The
SR5-3 proteinase was also capable hydrolyzing two major
components of collagen, β- and α-compounds, effectively. The
degree of hydrolysis (DH) of the halophilic proteinase and
commercial proteinases (Novozyme, Neutrase, chymotrypsin and
Flavourzyme) on the anchovy protein, were compared, and it was
found that the proteinase showed a greater degree of hydrolysis
towards anchovy protein than that from commercial proteinases. DH
of halophilic proteinase was sharply enhanced according to the
increase in the concentration of enzyme from 0.035 U to 0.105 U.
The results warranting that the acceleration of the production of fish
sauce with higher quality, may be achieved by adding of the
halophilic proteinase from this bacterium.
Abstract: This research investigates the suitability of fuel oil in
improving gypseous soil. A detailed laboratory tests were carried-out
on two soils (soil I with 51.6% gypsum content, and soil II with
26.55%), where the two soils were obtained from Al-Therthar site
(Al-Anbar Province-Iraq).
This study examines the improvement of soil properties using the
gypsum material which is locally available with low cost to minimize
the effect of moisture on these soils by using the fuel oil. This study
was conducted on two models of the soil gypsum, from the Tharthar
area. The first model was sandy soil with Gypsum content of (51.6%)
and the second is clayey soil and the content of Gypsum is (26.55%).
The program included tests measuring the permeability and
compressibility of the soil and their collapse properties. The shear
strength of the soil and the amounts of weight loss of fuel oil due to
drying had been found. These tests have been conducted on the
treated and untreated soils to observe the effect of soil treatment on
the engineering properties when mixed with varying degrees of fuel
oil with the equivalent of the water content.
The results showed that fuel oil is a good material to modify the
basic properties of the gypseous soil of collapsibility and
permeability, which are the main problems of this soil and retained
the soil by an appropriate amount of the cohesion suitable for
carrying the loads from the structure.
Abstract: Bode stability analysis based on transmission line
modeling (TLM) for single wall carbon nanotube (SWCNT)
interconnects used in 3D-VLSI circuits is investigated for the first
time. In this analysis, the dependence of the degree of relative
stability for SWCNT interconnects on the geometry of each tube has
been acquired. It is shown that, increasing the length and diameter of
each tube, SWCNT interconnects become more stable.
Abstract: In this paper we propose a new knowledge model using
the Dempster-Shafer-s evidence theory for image segmentation and
fusion. The proposed method is composed essentially of two steps.
First, mass distributions in Dempster-Shafer theory are obtained from
the membership degrees of each pixel covering the three image
components (R, G and B). Each membership-s degree is determined by
applying Fuzzy C-Means (FCM) clustering to the gray levels of the
three images. Second, the fusion process consists in defining three
discernment frames which are associated with the three images to be
fused, and then combining them to form a new frame of discernment.
The strategy used to define mass distributions in the combined
framework is discussed in detail. The proposed fusion method is
illustrated in the context of image segmentation. Experimental
investigations and comparative studies with the other previous methods
are carried out showing thus the robustness and superiority of the
proposed method in terms of image segmentation.
Abstract: Bootstrapping has gained popularity in different tests of hypotheses as an alternative in using asymptotic distribution if one is not sure of the distribution of the test statistic under a null hypothesis. This method, in general, has two variants – the parametric and the nonparametric approaches. However, issues on reliability of this method always arise in many applications. This paper addresses the issue on reliability by establishing a reliability measure in terms of quantiles with respect to asymptotic distribution, when this is approximately correct. The test of hypotheses used is Ftest. The simulated results show that using nonparametric bootstrapping in F-test gives better reliability than parametric bootstrapping with relatively higher degrees of freedom.
Abstract: As the remedy used music becomes active and
meditation effect through the music is verified, people take a growing
interest about psychological balance or remedy given by music. From
traditional studies, it is verified that the music of which spectral
envelop varies approximately as 1/f (f is frequency) down to a
frequency of low frequency bandwidth gives psychological balance.
In this paper, we researched signal properties of music which gives
psychological balance. In order to find this, we derived the property
from voice. Music composed by voice shows large value in NCSD.
We confirmed the degree of deference between music by curvature of
normalized cumulative spectral distribution. In the music that gives
psychological balance, the curvature shows high value, otherwise, the
curvature shows low value.
Abstract: This paper describes the results of an extensive study
and comparison of popular hash functions SHA-1, SHA-256,
RIPEMD-160 and RIPEMD-320 with JERIM-320, a 320-bit hash
function. The compression functions of hash functions like SHA-1
and SHA-256 are designed using serial successive iteration whereas
those like RIPEMD-160 and RIPEMD-320 are designed using two
parallel lines of message processing. JERIM-320 uses four parallel
lines of message processing resulting in higher level of security than
other hash functions at comparable speed and memory requirement.
The performance evaluation of these methods has been done by using
practical implementation and also by using step computation
methods. JERIM-320 proves to be secure and ensures the integrity of
messages at a higher degree. The focus of this work is to establish
JERIM-320 as an alternative of the present day hash functions for the
fast growing internet applications.
Abstract: The purpose of this study is to analyze the cognitive
and travel experience the situation of the tourist attraction of the sport
tourism in Penghu. This study used a questionnaires, the main island
of Taiwan to Penghu in the way of marine sports tourists adopted the
designated convenience sampling method, a total of 1447 valid
questionnaires. After statistical analysis, this study found that: 1.
Tourists to Penghu sports tourism attraction cognitive as “good air
quality, suitable for water activities". 2. Tourists in Penghu's tourism
experience, “Let me taste the delicious specialties and snacks". 3. The
attraction of the sport tourism, travel experience and perceived value
are correlated, and both the perceived value with a high degree of
predictive ability. Based on the findings of this study not only for
Penghu's tourism industry with the unit in charge of the proposed
operating and suggestions for future research to other researchers.
Abstract: This paper describes Independent Component Analysis (ICA) based fixed-point algorithm for the blind separation of the convolutive mixture of speech, picked-up by a linear microphone array. The proposed algorithm extracts independent sources by non- Gaussianizing the Time-Frequency Series of Speech (TFSS) in a deflationary way. The degree of non-Gaussianization is measured by negentropy. The relative performances of algorithm under random initialization and Null beamformer (NBF) based initialization are studied. It has been found that an NBF based initial value gives speedy convergence as well as better separation performance
Abstract: Fuzzy sets theory affirmed that the linguistic value for
every contraries relation is complementary. It was stressed in the
intuitionistic fuzzy sets (IFS) that the conditions for contraries
relations, which are the fuzzy values, cannot be greater than one.
However, complementary in two contradict phenomena are not
always true. This paper proposes a new idea condition for conflicting
bifuzzy sets by relaxing the condition of intuitionistic fuzzy sets.
Here, we will critically forward examples using triangular fuzzy
number in formulating a new condition for conflicting bifuzzy sets
(CBFS). Evaluation of positive and negative in conflicting
phenomena were calculated concurrently by relaxing the condition in
IFS. The hypothetical illustration showed the applicability of the new
condition in CBFS for solving non-complement contraries
intuitionistic evaluation. This approach can be applied to any
decision making where conflicting is very much exist.
Abstract: Planning capacities when regenerating complex investment goods involves particular challenges in that the planning is subject to a large degree of uncertainty regarding load information. Using information fusion – by applying Bayesian Networks – a method is being developed for forecasting the anticipated expenditures (human labor, tool and machinery utilization, time etc.) for regenerating a good. The generated forecasts then later serve as a tool for planning capacities and ensure a greater stability in the planning processes.
Abstract: There is lot of work done in prediction of the fault proneness of the software systems. But, it is the severity of the faults that is more important than number of faults existing in the developed system as the major faults matters most for a developer and those major faults needs immediate attention. In this paper, we tried to predict the level of impact of the existing faults in software systems. Neuro-Fuzzy based predictor models is applied NASA-s public domain defect dataset coded in C programming language. As Correlation-based Feature Selection (CFS) evaluates the worth of a subset of attributes by considering the individual predictive ability of each feature along with the degree of redundancy between them. So, CFS is used for the selecting the best metrics that have highly correlated with level of severity of faults. The results are compared with the prediction results of Logistic Models (LMT) that was earlier quoted as the best technique in [17]. The results are recorded in terms of Accuracy, Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). The results show that Neuro-fuzzy based model provide a relatively better prediction accuracy as compared to other models and hence, can be used for the modeling of the level of impact of faults in function based systems.
Abstract: This is a cross-cultural study that determines South
African multinational enterprises (MNEs) entry strategies as they
invest in Africa. An integrated theoretical framework comprising the
transaction cost theory, Uppsala model, eclectic paradigm and the
distance framework was adopted. A sample of 40 South African
MNEs with 415 existing FDI entries in Africa was drawn. Using an
ordered logistic regression model, the impact of culture on the choice
of degree of control by South African MNEs in Africa was
determined. Cultural distance was one of significant factors that
influenced South African MNEs- choice of degree of control.
Furthermore, South African MNEs are risk averse in all countries in
Africa but minimize the risks differently across sectors. Service
sectors chooses to own their subsidiaries 100% and avoid dealing
with the locals while manufacturing, resources and construction
choose to have a local partner to share the risk.
Abstract: This paper deals with the thermo-mechanical deformation behavior of shear deformable functionally graded ceramicmetal (FGM) plates. Theoretical formulations are based on higher order shear deformation theory with a considerable amendment in the transverse displacement using finite element method (FEM). The mechanical properties of the plate are assumed to be temperaturedependent and graded in the thickness direction according to a powerlaw distribution in terms of the volume fractions of the constituents. The temperature field is supposed to be a uniform distribution over the plate surface (XY plane) and varied in the thickness direction only. The fundamental equations for the FGM plates are obtained using variational approach by considering traction free boundary conditions on the top and bottom faces of the plate. A C0 continuous isoparametric Lagrangian finite element with thirteen degrees of freedom per node have been employed to accomplish the results. Convergence and comparison studies have been performed to demonstrate the efficiency of the present model. The numerical results are obtained for different thickness ratios, aspect ratios, volume fraction index and temperature rise with different loading and boundary conditions. Numerical results for the FGM plates are provided in dimensionless tabular and graphical forms. The results proclaim that the temperature field and the gradient in the material properties have significant role on the thermo-mechanical deformation behavior of the FGM plates.
Abstract: Biological reactions of individuals of a testing animal
to toxic substance are unique and can be used as an indication of the
existing of toxic substance. However, to distinguish such phenomenon
need a very complicate system and even more complicate to analyze
data in 3 dimensional. In this paper, a system to evaluate in vitro
biological activities to acute toxicity of stochastic self-affine
non-stationary signal of 3D goldfish swimming by using fractal
analysis is introduced. Regular digital camcorders are utilized by
proposed algorithm 3DCCPC to effectively capture and construct 3D
movements of the fish. A Critical Exponent Method (CEM) has been
adopted as a fractal estimator. The hypothesis was that the swimming
of goldfish to acute toxic would show the fractal property which
related to the toxic concentration. The experimental results supported
the hypothesis by showing that the swimming of goldfish under the
different toxic concentration has fractal properties. It also shows that
the fractal dimension of the swimming related to the pH value of FD Ôëê
0.26pH + 0.05. With the proposed system, the fish is allowed to swim
freely in all direction to react to the toxic. In addition, the trajectories
are precisely evaluated by fractal analysis with critical exponent
method and hence the results exhibit with much higher degree of
confidence.
Abstract: One of the main concerns about parallel mechanisms
is the presence of singular points within their workspaces. In singular
positions the mechanism gains or loses one or several degrees of
freedom. It is impossible to control the mechanism in singular
positions. Therefore, these positions have to be avoided. This is a
vital need especially in computer controlled machine tools designed
and manufactured on the basis of parallel mechanisms. This need has
to be taken into consideration when selecting design parameters. A
prerequisite to this is a thorough knowledge about the effect of
design parameters and constraints on singularity. In this paper,
quality condition index was introduced as a criterion for evaluating
singularities of different configurations of a hexapod mechanism
obtainable by different design parameters. It was illustrated that this
method can effectively be employed to obtain the optimum
configuration of hexapod mechanism with the aim of avoiding
singularity within the workspace. This method was then employed to
design the hexapod table of a CNC milling machine.
Abstract: Recently, as the scale of construction projects has
increases, more ground excavation for foundations is carried out than ever before. Consequently, damage to underground ducts (gas, water/sewage or oil pipelines, communication cables or power cable ducts) or superannuated pipelines frequently cause serious accidents
resulting in damage to life and property. (In Korea, the total length of city water pipelines was approximately 2,000 km as of the end of 2009.) In addition, large amounts of damage caused by fractures, water
and gas leakage caused by superannuation or damage to underground
ducts in construction has been reported. Therefore, a system is required to precisely detect defects and deterioration in underground
pipelines and the locations of such defects, for timely and accurate
maintenance or replacement of the ducts. In this study, a system was
developed which can locate underground structures (gas and water
pipelines, power cable ducts, etc.) in 3D-coordinates and monitor the
degree and position of defects using an Inertial Measurement Unit
(IMU) sensing technique. The system can prevent damage to underground ducts and superannuated pipelines during construction,
and provide reliable data for maintenance. The utility of the IMU sensing technique used in aircraft and ships in civil applications was
verified.
Abstract: In this paper, the application of multiple Elman neural networks to time series data regression problems is studied. An ensemble of Elman networks is formed by boosting to enhance the performance of the individual networks. A modified version of the AdaBoost algorithm is employed to integrate the predictions from multiple networks. Two benchmark time series data sets, i.e., the Sunspot and Box-Jenkins gas furnace problems, are used to assess the effectiveness of the proposed system. The simulation results reveal that an ensemble of boosted Elman networks can achieve a higher degree of generalization as well as performance than that of the individual networks. The results are compared with those from other learning systems, and implications of the performance are discussed.