Abstract: The purpose of research was to know the role of
immunogenic protein of 49 kDa from V.alginolyticus which capable
to initiate molecule expression of MHC Class II in receptor of
Cromileptes altivelis. The method used was in vivo experimental
research through testing of immunogenic protein 49 kDa from
V.alginolyticus at Cromileptes altivelis (size of 250 - 300 grams)
using 3 times booster by injecting an immunogenic protein in a
intramuscular manner. Response of expressed MHC molecule was
shown using immunocytochemistry method and SEM. Results
indicated that adhesin V.alginolyticus 49 kDa which have
immunogenic character could trigger expression of MHC class II on
receptor of grouper and has been proven by staining using
immunocytochemistry and SEM with labeling using antibody anti
MHC (anti mouse). This visible expression based on binding between
epitopes antigen and antibody anti MHC in the receptor. Using
immunocytochemistry, intracellular response of MHC to in vivo
induction of immunogenic adhesin from V.alginolyticus was shown.
Abstract: Most CT reconstruction system x-ray computed
tomography (CT) is a well established visualization technique in
medicine and nondestructive testing. However, since CT scanning
requires sampling of radiographic projections from different viewing
angles, common CT systems with mechanically moving parts are too
slow for dynamic imaging, for instance of multiphase flows or live
animals. A large number of X-ray projections are needed to
reconstruct CT images, so the collection and calculation of the
projection data consume too much time and harmful for patient. For
the purpose of solving the problem, in this study, we proposed a
method for tomographic reconstruction of a sample from a limited
number of x-ray projections by using linear interpolation method. In
simulation, we presented reconstruction from an experimental x-ray
CT scan of a Aluminum phantom that follows to two steps: X-ray
projections will be interpolated using linear interpolation method and
using it for CT reconstruction based upon Ordered Subsets
Expectation Maximization (OSEM) method.
Abstract: Least Significant Bit (LSB) technique is the earliest
developed technique in watermarking and it is also the most simple,
direct and common technique. It essentially involves embedding the
watermark by replacing the least significant bit of the image data with
a bit of the watermark data. The disadvantage of LSB is that it is not
robust against attacks. In this study intermediate significant bit (ISB)
has been used in order to improve the robustness of the watermarking
system. The aim of this model is to replace the watermarked image
pixels by new pixels that can protect the watermark data against
attacks and at the same time keeping the new pixels very close to the
original pixels in order to protect the quality of watermarked image.
The technique is based on testing the value of the watermark pixel
according to the range of each bit-plane.
Abstract: In this study the behavior of interlaminar fracture of
carbon-epoxy thermoplastic laminated composite is investigated
numerically and experimentally. Tests are performed with Arcan
specimens. Testing with Arcan specimen gives the opportunity of
utilizing just one kind of specimen for extracting fracture properties
for mode I, mode II and different mixed mode ratios of materials with
exerting load via different loading angles. Variation of loading angles
in range of 0-90° made possible to achieve different mixed mode
ratios. Correction factors for various conditions are obtained from
ABAQUS 2D finite element models which demonstrate the finite
shape of Arcan specimens used in this study. Finally, applying the
correction factors to critical loads obtained experimentally, critical
interlaminar fracture toughness of this type of carbon- epoxy
composite has been attained.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
Abstract: In this paper we will develop further the sequential life test approach presented in a previous article by [1] using an underlying two parameter Inverse Weibull sampling distribution. The location parameter or minimum life will be considered equal to zero. Once again we will provide rules for making one of the three possible decisions as each observation becomes available; that is: accept the null hypothesis H0; reject the null hypothesis H0; or obtain additional information by making another observation. The product being analyzed is a new electronic component. There is little information available about the possible values the parameters of the corresponding Inverse Weibull underlying sampling distribution could have.To estimate the shape and the scale parameters of the underlying Inverse Weibull model we will use a maximum likelihood approach for censored failure data. A new example will further develop the proposed sequential life testing approach.
Abstract: Significant changes in oil and gas drilling have
emphasized the need to verify the integrity and reliability of drill
stem components. Defects are inevitable in cast components,
regardless of application; but if these defects go undetected, any
severe defect could cause down-hole failure.
One such defect is shrinkage porosity. Castings with lower level
shrinkage porosity (CB levels 1 and 2) have scattered pores and do
not occupy large volumes; so pressure testing and helium leak testing
(HLT) are sufficient for qualifying the castings. However, castings
with shrinkage porosity of CB level 3 and higher, behave erratically
under pressure testing and HLT making these techniques insufficient
for evaluating the castings- integrity.
This paper presents a case study to highlight how the radiography
technique is much more effective than pressure testing and HLT.
Abstract: In this paper, we apply the FM methodology to the
cross-section of Romanian-listed common stocks and investigate the
explanatory power of market beta on the cross-section of commons
stock returns from Bucharest Stock Exchange. Various assumptions
are empirically tested, such us linearity, market efficiency, the “no
systematic effect of non-beta risk" hypothesis or the positive
expected risk-return trade-off hypothesis. We find that the Romanian
stock market shows the same properties as the other emerging
markets in terms of efficiency and significance of the linear riskreturn
models. Our analysis included weekly returns from January
2002 until May 2010 and the portfolio formation, estimation and
testing was performed in a rolling manner using 51 observations (one
year) for each stage of the analysis.
Abstract: Dielectric sheet perturbation to the dominant TE111
mode resonant frequency of a circular cavity is studied and presented
in this paper. The dielectric sheet, placed at the middle of the airfilled
cavity, introduces discontinuities and disturbs the configuration
of electromagnetic fields in the cavity. For fixed dimensions of cavity
and fixed thickness of the loading dielectric, the dominant resonant
frequency varies quite linearly with the permittivity of the dielectric.
This quasi-linear relationship is plotted using Maple software and
verified using 3D electromagnetic simulations. Two probes are used
in the simulation for wave excitation into and from the cavity. The
best length of probe is found to be 3 mm, giving the closest resonant
frequency to the one calculated using Maple. A total of fourteen
different dielectrics of permittivity ranging from 1 to 12.9 are tested
one by one in the simulation. The works show very close agreement
between the results from Maple and the simulation. A constant
difference of 0.04 GHz is found between the resonant frequencies
collected during simulation and the ones from Maple. The success of
this project may lead to the possibility of using the middle loaded
cavity at TE111 mode as a microwave non-destructive testing of solid
materials.
Abstract: The purpose of this study is to revisit the concept of
rape as represented by professionals in the literature as well as its
perception (beliefs and attitudes) in the population at large and to
propose methodological improvements to its measurement tool. Rape
is a serious crime threatening its victim-s physical and mental health
and integrity; and as such is legally prosecuted in all modern
societies. The problem is not in accepting or rejecting rape as a
criminal act, but rather in the vagueness of its interpretations and
“justifications" maintained in the mentality of modern societies -
known in the literature as the phenomenon of "rape-myth". The rapemyth
can be studied from different perspectives: criminology,
sociology, ethics, medicine and psychology. Its investigation requires
rigorous scientific objectivity, free of passion (victims of rape are at
risk of emotional bias), free of activism (social activists, even if wellintentioned
are also biased), free of any pre-emptive assumptions or
prejudices. To apply a rigorous scientific procedure, we need a solid,
valid and reliable measurement. Rape is a form of heterosexual or
homosexual aggression, violently forcing the victim to give-in in the
sexual activity of the aggressor against her/his will. Human beings
always try to “understand" or find a reason justifying their acts.
Psychological literature provides multiple clinical and experimental
examples of it; just to mention the famous studies by Milgram on the
level of electroshock delivered by the “teacher" towards the “learner"
if “scientifically justifiable" or the studies on the behavior of
“prisoners" and the “guards" and many other experiments and field
observations. Sigmund Freud presented the phenomenon of
unconscious justification and called it rationalization. The multiple
justifications, rationalizations and repeated opinions about sexual
behavior contribute to a myth maintained in the society. What kind of
“rationale" our societies apply to “understand" the non-consensual
sexual behavior? There are many, just to mention few:
• Sex is a ludistic activity for both participants, therefore –
even if not consented – it should bring pleasure to both.
• Everybody wants sex, but only men are allowed to manifest
it openly while women have to pretend the opposite, thus men have
to initiate sexual behavior and women would follow.
• A person who strongly needs sex is free to manifest it and
struggle to get it; the person who doesn-t want it must not reveal
her/his sexual attraction and avoid risky situations; otherwise she/he
is perceived as a promiscuous seducer.
• A person who doesn-t fight against the sexual initiator
unconsciously accepts the rape (does it explain why homosexual
rapes are reported less frequently than rapes against women?).
• Women who are raped deserve it because their wardrobe is
very revealing and seducing and they ''willingly'' go to highly risky
places (alleys, dark roads, etc.).
• Men need to ventilate their sexual energy and if they are
deprived of a partner their urge to have sex is difficult to control.
• Men are supposed to initiate and insist even by force to have
sex (their testosterone makes them both sexual and aggressive).
The paper overviews numerous cultural beliefs about masculine
versus feminine behavior and their impact on the “rape myth".
Abstract: Deployment of pneumatic muscles in various
industrial applications is still in its early days, considering the relative
newness of these components. The field of robotics holds particular
future potential for pneumatic muscles, especially in view of their
specific behaviour known as compliance. The paper presents and
discusses an innovative constructive solution for a gripper system
mountable on an industrial robot, based on actuation by a linear
pneumatic muscle and transmission of motion by gear and rack
mechanism. The structural, operational and constructive models of
the new gripper are presented, along with some of the experimental
results obtained subsequently to the testing of a prototype. Further
presented are two control variants of the gripper system, one by
means of a 3/2-way fast-switching solenoid valve, the other by means
of a proportional pressure regulator. Advantages and disadvantages
are discussed for both variants.
Abstract: Accounts of language acquisition differ significantly in their treatment of the role of prediction in language learning. In particular, nativist accounts posit that probabilistic learning about words and word sequences has little to do with how children come to use language. The accuracy of this claim was examined by testing whether distributional probabilities and frequency contributed to how well 3-4 year olds repeat simple word chunks. Corresponding chunks were the same length, expressed similar content, and were all grammatically acceptable, yet the results of the study showed marked differences in performance when overall distributional frequency varied. It was found that a distributional model of language predicted the empirical findings better than a number of other models, replicating earlier findings and showing that children attend to distributional probabilities in an adult corpus. This suggested that language is more prediction-and-error based, rather than on abstract rules which nativist camps suggest.
Abstract: A new observer based fault detection and diagnosis
scheme for predicting induction motors- faults is proposed in this
paper. Prediction of incipient faults, using different variants of
Kalman filter and their relative performance are evaluated. Only soft
faults are considered for this work. The data generation, filter
convergence issues, hypothesis testing and residue estimates are
addressed. Simulink model is used for data generation and various
types of faults are considered. A comparative assessment of the
estimates of different observers associated with these faults is
included.
Abstract: In aerospace applications, interactions of airflow with
aircraft structures can result in undesirable structural deformations.
This structural deformation in turn, can be predicted if the natural
modes of the structure are known. This can be achieved through
conventional modal testing that requires a known excitation force in
order to extract these dynamic properties. This technique can be
experimentally complex because of the need for artificial excitation
and it is also does not represent actual operational condition. The
current work presents part of research work that address the practical
implementation of operational modal analysis (OMA) applied to a
cantilevered hybrid composite plate employing single contactless
sensing system via laser vibrometer. OMA technique extracts the
modal parameters based only on the measurements of the dynamic
response. The OMA results were verified with impact hammer modal
testing and good agreement was obtained.
Abstract: Rapid progress in process automation and tightening
quality standards result in a growing demand being placed on fault
detection and diagnostics methods to provide both speed and
reliability of motor quality testing. Doubly fed induction generators
are used mainly for wind energy conversion in MW power plants.
This paper presents a detection of an inter turn stator and an open
phase faults, in a doubly fed induction machine whose stator and
rotor are supplied by two pulse width modulation (PWM) inverters.
The method used in this article to detect these faults, is based on
Park-s Vector Approach, using a neural network.
Abstract: Text Mining is around applying knowledge discovery techniques to unstructured text is termed knowledge discovery in text (KDT), or Text data mining or Text Mining. In Neural Network that address classification problems, training set, testing set, learning rate are considered as key tasks. That is collection of input/output patterns that are used to train the network and used to assess the network performance, set the rate of adjustments. This paper describes a proposed back propagation neural net classifier that performs cross validation for original Neural Network. In order to reduce the optimization of classification accuracy, training time. The feasibility the benefits of the proposed approach are demonstrated by means of five data sets like contact-lenses, cpu, weather symbolic, Weather, labor-nega-data. It is shown that , compared to exiting neural network, the training time is reduced by more than 10 times faster when the dataset is larger than CPU or the network has many hidden units while accuracy ('percent correct') was the same for all datasets but contact-lences, which is the only one with missing attributes. For contact-lences the accuracy with Proposed Neural Network was in average around 0.3 % less than with the original Neural Network. This algorithm is independent of specify data sets so that many ideas and solutions can be transferred to other classifier paradigms.
Abstract: Food mileage is one of the important issues concerning environmental sustainability. In this research we have utilized a prototype platform with iterative user-centered testing. With these findings we successfully demonstrate the use of the context of persuasive methods to influence users- attitudes towards the sustainable concept.
Abstract: The development of many measurement and inspection systems of products based on real-time image processing can not be carried out totally in a laboratory due to the size or the temperature of the manufactured products. Those systems must be developed in successive phases. Firstly, the system is installed in the production line with only an operational service to acquire images of the products and other complementary signals. Next, a recording service of the image and signals must be developed and integrated in the system. Only after a large set of images of products is available, the development of the real-time image processing algorithms for measurement or inspection of the products can be accomplished under realistic conditions. Finally, the recording service is turned off or eliminated and the system operates only with the real-time services for the acquisition and processing of the images. This article presents a systematic performance evaluation of the image compression algorithms currently available to implement a real-time recording service. The results allow establishing a trade off between the reduction or compression of the image size and the CPU time required to get that compression level.
Abstract: This work presents the mixed-mode II/III prestressed split-cantilever beam specimen for the fracture testing of composite materials. In accordance with the concept of prestressed composite beams one of the two fracture modes is provided by the prestressed state of the specimen, and the other one is increased up to fracture initiation by using a testing machine. The novel beam-like specimen is able to provide any combination of the mode-II and mode-III energy release rates. A simple closed-form solution is developed using beam theory as a data reduction scheme and for the calculation of the energy release rates in the new configuration. The applicability and the limitations of the novel fracture mechanical test are demonstrated using unidirectional glass/polyester composite specimens. If only crack propagation onset is involved then the mixed-mode beam specimen can be used to obtain the fracture criterion of transparent composite materials in the GII - GIII plane in a relatively simple way.