Abstract: The amount of the information being churned out by the field of biology has jumped manifold and now requires the extensive use of computer techniques for the management of this information. The predominance of biological information such as protein sequence similarity in the biological information sea is key information for detecting protein evolutionary relationship. Protein sequence similarity typically implies homology, which in turn may imply structural and functional similarities. In this work, we propose, a learning method for detecting remote protein homology. The proposed method uses a transformation that converts protein sequence into fixed-dimensional representative feature vectors. Each feature vector records the sensitivity of a protein sequence to a set of amino acids substrings generated from the protein sequences of interest. These features are then used in conjunction with support vector machines for the detection of the protein remote homology. The proposed method is tested and evaluated on two different benchmark protein datasets and it-s able to deliver improvements over most of the existing homology detection methods.
Abstract: In this paper, we explore a new scheme for filtering spoofed packets (DDOS attack) which is a combination of path fingerprint and client puzzle concepts. In this each IP packet has a unique fingerprint is embedded that represents, the route a packet has traversed. The server maintains a mapping table which contains the client IP address and its corresponding fingerprint. In ingress router, client puzzle is placed. For each request, the puzzle issuer provides a puzzle which the source has to solve. Our design has the following advantages over prior approaches, 1) Reduce the network traffic, as we place a client puzzle at the ingress router. 2) Mapping table at the server is lightweight and moderate.
Abstract: The objective is to split a simply connected polygon
into a set of convex quadrilaterals without inserting new
boundary nodes. The presented approach consists in repeatedly
removing quadrilaterals from the polygon. Theoretical results
pertaining to quadrangulation of simply connected polygons are
derived from the usual 2-ear theorem. It produces a quadrangulation
technique with O(n) number of quadrilaterals. The
theoretical methodology is supplemented by practical results
and CAD surface segmentation.
Abstract: XML files contain data which is in well formatted manner. By studying the format or semantics of the grammar it will be helpful for fast retrieval of the data. There are many algorithms which describes about searching the data from XML files. There are no. of approaches which uses data structure or are related to the contents of the document. In these cases user must know about the structure of the document and information retrieval techniques using NLPs is related to content of the document. Hence the result may be irrelevant or not so successful and may take more time to search.. This paper presents fast XML retrieval techniques by using new indexing technique and the concept of RXML. When indexing an XML document, the system takes into account both the document content and the document structure and assigns the value to each tag from file. To query the system, a user is not constrained about fixed format of query.
Abstract: Main goal of preventive healthcare problems are at
decreasing the likelihood and severity of potentially life-threatening
illnesses by protection and early detection. The levels of
establishment and staffing costs along with summation of the travel
and waiting time that clients spent are considered as objectives
functions of the proposed nonlinear integer programming model. In
this paper, we have proposed a bi-objective mathematical model for
designing a network of preventive healthcare facilities so as to
minimize aforementioned objectives, simultaneously. Moreover, each
facility acts as M/M/1 queuing system. The number of facilities to be
established, the location of each facility, and the level of technology
for each facility to be chosen are provided as the main determinants
of a healthcare facility network. Finally, to demonstrate performance
of the proposed model, four multi-objective decision making
techniques are presented to solve the model.
Abstract: The security of computer networks plays a strategic
role in modern computer systems. Intrusion Detection Systems (IDS)
act as the 'second line of defense' placed inside a protected
network, looking for known or potential threats in network traffic
and/or audit data recorded by hosts. We developed an Intrusion
Detection System using LAMSTAR neural network to learn patterns
of normal and intrusive activities, to classify observed system
activities and compared the performance of LAMSTAR IDS with
other classification techniques using 5 classes of KDDCup99 data.
LAMSAR IDS gives better performance at the cost of high
Computational complexity, Training time and Testing time, when
compared to other classification techniques (Binary Tree classifier,
RBF classifier, Gaussian Mixture classifier). we further reduced the
Computational Complexity of LAMSTAR IDS by reducing the
dimension of the data using principal component analysis which in
turn reduces the training and testing time with almost the same
performance.
Abstract: This paper presents a forgetting factor scheme for variable step-size affine projection algorithms (APA). The proposed scheme uses a forgetting processed input matrix as the projection matrix of pseudo-inverse to estimate system deviation. This method introduces temporal weights into the projection matrix, which is typically a better model of the real error's behavior than homogeneous temporal weights. The regularization overcomes the ill-conditioning introduced by both the forgetting process and the increasing size of the input matrix. This algorithm is tested by independent trials with coloured input signals and various parameter combinations. Results show that the proposed algorithm is superior in terms of convergence rate and misadjustment compared to existing algorithms. As a special case, a variable step size NLMS with forgetting factor is also presented in this paper.
Abstract: Tolerance is a tool for achieving a social cohesion, particularly, among individuals and groups with different values. The aim is to study the characteristics of the ethnic tolerance, the inhabitants of Latvia. The ethnic tolerance is taught as a set of conscious and unconscious orientations of the individual in social interaction and inter-ethnic communication. It uses the tools of empirical studies of the ethnic tolerance which allows to identify the explicitly and implicitly levels of the emotional component of Latvia's residents. Explicit measurements were made using the techniques of self-report which revealed the index of the ethnic tolerance and the ethnic identity of the participants. The implicit component was studied using methods based on the effect of the emotional priming. During the processing of the results, there were calculated indicators of the positive and negative implicit attitudes towards members of their own and other ethnicity as well as the explicit parameters of the ethnic tolerance and the ethnic identity of Latvia-s residents. The implicit measurements of the ratio of neighboring ethnic groups against each other showed a mutual negative attitude whereas the explicit measurements indicate a neutral attitude. The data obtained contribute to a further study of the ethnic tolerance of Latvia's residents.
Abstract: Information and communication technology (ICT) is
essential to the operation of business, and create many employment
opportunities. High volumes of students graduate in ICT however
students struggle to find job placement. A discrepancy exists between
graduate skills and industry skill requirements. To address the need
for ICT skills required, universities must create programs to meet the
demands of a changing ICT industry. This requires a partnership
between industry, universities and other stakeholders. This situation
may be viewed as a critical systems thinking problem situation as
there are various role players each with their own needs and
requirements. Jackson states a typical critical systems methods has a
pluralistic nature. This paper explores the applicability and suitability
of Maslow and Dooyeweerd to guide understanding and make
recommendations for change in ICT WIL, to foster an all-inclusive
understanding of the situation by stakeholders. The above methods
provide tools for understanding softer issues beyond the skills
required. The study findings suggest that besides skills requirements,
a deeper understanding and empowering students from being a
student to a professional need to be understood and addressed.
Abstract: Arrack is one of the forms of alcoholic beverage or
liquor which is produced from palm or date juice and commonly
consumed by the lower social class of all religious/ethnic
communities in the north-western villages of Bangladesh. The
purpose of the study was to compare arrack drinking patterns
associated with socio-demographic status among the Muslim, Hindu,
Santal, and Oraon communities in the Rasulpur union of Bangladesh.
A total of 391 respondents (Muslim n-109, Hindu n-103, Santal n-89,
Oraon n-90) selected by cluster random sampling were interviewed
by ADP (Arrack Drinking Pattern) questionnaire. The results of
Pearson Chi-Squire test revealed that arrack drinking patterns were
significantly differed among the Muslim, Hindu, Santal, and Oraon
communities- drinkers. In addition, the results of Spearman-s
bivariate correlation coefficients also revealed that sociodemographic
characteristics of the communities- drinkers were the
significantly positive and negative associations with the arrack
drinking patterns in the Rasulpur union, Bangladesh. The study
suggests that further cross-cultural researches should be conducted
on the consequences of arrack drinking patterns on the communities-
drinkers.
Abstract: The recognition of handwritten numeral is an
important area of research for its applications in post office, banks
and other organizations. This paper presents automatic recognition of
handwritten Kannada numerals based on structural features. Five
different types of features, namely, profile based 10-segment string,
water reservoir; vertical and horizontal strokes, end points and
average boundary length from the minimal bounding box are used in
the recognition of numeral. The effect of each feature and their
combination in the numeral classification is analyzed using nearest
neighbor classifiers. It is common to combine multiple categories of
features into a single feature vector for the classification. Instead,
separate classifiers can be used to classify based on each visual
feature individually and the final classification can be obtained based
on the combination of separate base classification results. One
popular approach is to combine the classifier results into a feature
vector and leaving the decision to next level classifier. This method
is extended to extract a better information, possibility distribution,
from the base classifiers in resolving the conflicts among the
classification results. Here, we use fuzzy k Nearest Neighbor (fuzzy
k-NN) as base classifier for individual feature sets, the results of
which together forms the feature vector for the final k Nearest
Neighbor (k-NN) classifier. Testing is done, using different features,
individually and in combination, on a database containing 1600
samples of different numerals and the results are compared with the
results of different existing methods.
Abstract: The deterministic quantum transfer-matrix (QTM)
technique and its mathematical background are presented. This
important tool in computational physics can be applied to a class of
the real physical low-dimensional magnetic systems described by the
Heisenberg hamiltonian which includes the macroscopic molecularbased
spin chains, small size magnetic clusters embedded in some
supramolecules and other interesting compounds. Using QTM, the
spin degrees of freedom are accurately taken into account, yielding
the thermodynamical functions at finite temperatures.
In order to test the application for the susceptibility calculations to
run in the parallel environment, the speed-up and efficiency of
parallelization are analyzed on our platform SGI Origin 3800 with
p = 128 processor units. Using Message Parallel Interface (MPI)
system libraries we find the efficiency of the code of 94% for
p = 128 that makes our application highly scalable.
Abstract: The recycling process of Tungsten alloy (Swarf) by
oxidation reduction technique have been investigated. The reduced
powder was pressed under a pressure 20Kg/cm2 and sintered at
1150°C in dry hydrogen atmosphere. The particle size of the recycled
alloy powder was 1-3 μm and the shape was regular at a reduction
temperature 800°C. The chemical composition of the recycled alloy
is the same as the primary Swarf.
Abstract: VRML( The virtual reality modeling language) is a standard language used to build up 3D virtualized models. The quick development of internet technology and computer manipulation has promoted the commercialization of reality virtualization. VRML, thereof, is expected to be the most effective framework of building up virtual reality. This article has studied plans to build virtualized scenes based on the technology of virtual reality and Java programe, and introduced how to execute real-time data transactions of VRML file and Java programe by applying Script Node, in doing so we have the VRML interactivity being strengthened.
Abstract: This paper presents a recognition system for isolated
words like robot commands. It’s carried out by Time Delay Neural
Networks; TDNN. To teleoperate a robot for specific tasks as turn,
close, etc… In industrial environment and taking into account the
noise coming from the machine. The choice of TDNN is based on its
generalization in terms of accuracy, in more it acts as a filter that
allows the passage of certain desirable frequency characteristics of
speech; the goal is to determine the parameters of this filter for
making an adaptable system to the variability of speech signal and to
noise especially, for this the back propagation technique was used in
learning phase. The approach was applied on commands pronounced
in two languages separately: The French and Arabic. The results for
two test bases of 300 spoken words for each one are 87%, 97.6% in
neutral environment and 77.67%, 92.67% when the white Gaussian
noisy was added with a SNR of 35 dB.
Abstract: In this paper, a method for decision making in fuzzy environment is presented.A new subjective and objective integrated approach is introduced that used to assign weight attributes in fuzzy multiple attribute decision making (FMADM) problems and alternatives and fmally ranked by proposed method.
Abstract: Automated material handling is given prime
importance in the semi automated and automated facilities since it
provides solution to the gigantic problems related to inventory and
also support the latest philosophies like just in time production JIT
and lean production. Automated storage and retrieval system is an
antidote (if designed properly) to the facility sufferings like getting
the right material , materials getting perished, long cycle times or
many other similar kind of problems. A working model of automated
storage and retrieval system (AS/RS) is designed and developed
under the design parameters specified by Material Handling Industry
of America (MHIA). Later on analysis was carried out to calculate
the throughput and size of the machine. The possible implementation
of this technology in local scenario is also discussed in this paper.
Abstract: Custom power is a technology driven product and
service solution which embraces a family devices such as Dynamic
Voltage Restorer (DVR), Distributed Shunt Compensator
(DSTATCOM), Solid State Breaker (SSB) etc which will provide
power quality functions at distribution voltages. The rapid response
of these devices enables them to operate in real time, providing
continuous and dynamic control of the supply including voltage and
reactive power regulation, harmonic reduction and elimination of
voltage dips. This paper presents the benefits of multilevel inverters
when they are used for DPC based custom power devices. Power
flow control mechanism, salient features, advantages and
disadvantages of direct power control (DPC) using lookup table,
SVM, predictive voltage vector and hybrid DPC strategies are
discussed in this paper. Simulation results of three level inverter
based STATCOM, harmonic analysis of multi level inverters are
presented at the end.
Abstract: Imaging is defined as the process of obtaining
geometric images either two dimensional or three dimensional by scanning or digitizing the existing objects or products. In this research, it applied to retrieve 3D information of the human skin
surface in medical application. This research focuses on analyzing
and determining volume of leg ulcers using imaging devices. Volume
determination is one of the important criteria in clinical assessment of leg ulcer. The volume and size of the leg ulcer wound will give the
indication on responding to treatment whether healing or worsening.
Different imaging techniques are expected to give different result (and accuracies) in generating data and images. Midpoint projection
algorithm was used to reconstruct the cavity to solid model and compute the volume. Misinterpretation of the results can affect the
treatment efficacy. The objectives of this paper is to compare the
accuracy between two 3D data acquisition method, which is laser
triangulation and structured light methods, It was shown that using models with known volume, that structured-light-based 3D technique
produces better accuracy compared with laser triangulation data
acquisition method for leg ulcer volume determination.
Abstract: A lot of research made during these last 15 years
showed that the quantification of the springback has a significant role
in the industry of sheet metal forming. These studies were made with
the objective of finding techniques and methods to minimize or
completely avoid this permanent physical variation. Moreover, the
use of steel and aluminum alloys in the car industry and aviation
poses every day the problem of the springback. The determination in
advance of the quantity of the springback allows consequently the
design and manufacture of the tool. The aim of this paper is to study
experimentally the influence of the blank holder force BHF and the
radius of curvature of the die on the springback and their influence on
the strain in various zone of specimen.
The original of our purpose consist on tests which are ensured by
adapting a U-type stretching-bending device on a tensile testing
machine, where we studied and quantified the variation of the
springback according to displacement.