Abstract: There have been numerous implementations of
security system using biometric, especially for identification and
verification cases. An example of pattern used in biometric is the iris
pattern in human eye. The iris pattern is considered unique for each
person. The use of iris pattern poses problems in encoding the human
iris.
In this research, an efficient iris recognition method is proposed.
In the proposed method the iris segmentation is based on the
observation that the pupil has lower intensity than the iris, and the
iris has lower intensity than the sclera. By detecting the boundary
between the pupil and the iris and the boundary between the iris and
the sclera, the iris area can be separated from pupil and sclera. A step
is taken to reduce the effect of eyelashes and specular reflection of
pupil. Then the four levels Coiflet wavelet transform is applied to the
extracted iris image. The modified Hamming distance is employed to
measure the similarity between two irises.
This research yields the identification success rate of 84.25% for
the CASIA version 1.0 database. The method gives an accuracy of
77.78% for the left eyes of MMU 1 database and 86.67% for the
right eyes. The time required for the encoding process, from the
segmentation until the iris code is generated, is 0.7096 seconds.
These results show that the accuracy and speed of the method is
better than many other methods.
Abstract: This research project aims to investigate difference in
relative rates concerning phosphoryl transfer relevant to biological
catalysis of DNA and RNA in the pH-independent reactions.
Activated Models of DNA and RNA for alkyl-aryl phosphate diesters
(with 4-nitrophenyl as a good leaving group) have successfully been
prepared to gather kinetic parameters. Eyring plots for the pH–
independent hydrolysis of 1 and 2 were established at different
temperatures in the range 100–160 °C. These measurements have
been used to provide a better estimate for the difference in relative
rates between the reactivity of DNA and RNA cleavage. Eyring plot
gave an extrapolated rate of kH2O = 1 × 10-10 s -1 for 1 (RNA model)
and 2 (DNA model) at 25°C. Comparing the reactivity of RNA
model and DNA model shows that the difference in relative rates in
the pH-independent reactions is surprisingly very similar at 25°. This
allows us to obtain chemical insights into how biological catalysts
such as enzymes may have evolved to perform their current
functions.
Abstract: In aircraft applications, according to the nature of
electrical equipment its location may be in unpressurized area or very
close to the engine; thus, the environmental conditions may change
from atmospheric pressure to less than 100 mbar, and the temperature
may be higher than the ambient one as in most real working
conditions of electrical equipment. Then, the classical Paschen curve
has to be replotted since these parameters may affect the discharge
ignition voltage. In this paper, we firstly investigate the domain of
validity of two corrective expressions on the Paschen-s law found in
the literature, in case of changing the air environment and known as
Peek and Dunbar corrections. Results show that these corrections are
no longer valid for combined variation of temperature and pressure.
After that, a new empirical expression for breakdown voltage is
proposed and is validated in the case of combined variations of
temperature and pressure.
Abstract: This paper reports the findings of a research
conducted to evaluate the ownership and usage of technology devices
within Distance Education students- according to their age. This
research involved 45 Distance Education students from USM
Universiti Sains Malaysia (DEUSM) as its respondents. Data was
collected through questionnaire that had been developed by the
researchers based on some literature review. The data was analyzed
to find out the frequencies of respondents agreements towards
ownership of technology devices and the use of technology devices.
The findings shows that all respondents own mobile phone and
majority of them reveal that they use mobile on regular basis. The
student in the age 30-39 has the heist ownership of the technology
devices.
Abstract: This study was conducted to evaluate the effects of
gibberellic acid and 2,4- dichlorophenoxyacetic acid on flower
number, fruit growth and fruit quality of wax apple. GA3 and 2,4-D
were applied at small bud and petal fall stage. Number of flower,
fruit set, fruit drop, fruit crack, fruit growth and fruit quality were
recorded. Results indicated that spraying with 10 ppm GA3 had the
best results in number of flower. GA3 spray at 30 ppm gave the
faster rate of fruit growth than the other treatments. Fruit set, fruit
size as well as fruit weight markedly improved by spraying 30 ppm
GA3, followed by 10 ppm GA3 compared to untreated control.
Moreover, spray GA3 at 30 ppm was the most effective and
increased total soluble solids, reduced titratable acidity and fruit
drop. On the other hand, it was noticed that with 10 ppm 2,4-D
application also enhanced the fruit growth rate, improved
physiological and biochemical characters of fruit compared to
untreated control. It was concluded that both GA3 and 2,4-D spray
have positive effects on fruit development, reduced fruit drop, fruit
crack and improved fruit quality of wax apple under field conditions.
Abstract: The aim of this paper is to understand how peers can
influence adolescent girls- dieting behaviour and their body image.
Departing from imitation and social learning theories, we study
whether adolescent girls tend to model their peer group dieting
behaviours, thus influencing their body image construction. Our
study was conducted through an enquiry applied to a cluster sample
of 466 adolescent high school girls in Lisbon city public schools. Our
main findings point to an association between girls- and peers-
dieting behaviours, thus reinforcing the modelling hypothesis.
Abstract: A synchronous network-on-chip using wormhole packet switching
and supporting guaranteed-completion best-effort with low-priority (LP)
and high-priority (HP) wormhole packet delivery service is presented in
this paper. Both our proposed LP and HP message services deliver a good
quality of service in term of lossless packet completion and in-order message
data delivery. However, the LP message service does not guarantee minimal
completion bound. The HP packets will absolutely use 100% bandwidth of
their reserved links if the HP packets are injected from the source node with
maximum injection. Hence, the service are suitable for small size messages
(less than hundred bytes). Otherwise the other HP and LP messages, which
require also the links, will experience relatively high latency depending on the
size of the HP message. The LP packets are routed using a minimal adaptive
routing, while the HP packets are routed using a non-minimal adaptive routing
algorithm. Therefore, an additional 3-bit field, identifying the packet type,
is introduced in their packet headers to classify and to determine the type
of service committed to the packet. Our NoC prototypes have been also
synthesized using a 180-nm CMOS standard-cell technology to evaluate the
cost of implementing the combination of both services.
Abstract: One of the mayor problems of programming a cruise
circuit is to decide which destinations to include and which don-t.
Thus a decision problem emerges, that might be solved using a linear
and goal programming approach. The problem becomes more
complex if several boats in the fleet must be programmed in a limited
schedule, trying their capacity matches best a seasonal demand and
also attempting to minimize the operation costs. Moreover, the
programmer of the company should consider the time of the
passenger as a limited asset, and would like to maximize its usage.
The aim of this work is to design a method in which, using linear and
goal programming techniques, a model to design circuits for the
cruise company decision maker can achieve an optimal solution
within the fleet schedule.
Abstract: Probability-based identity disclosure risk
measurement may give the same overall risk for different
anonymization strategy of the same dataset. Some entities in the
anonymous dataset may have higher identification risks than the
others. Individuals are more concerned about higher risks than the
average and are more interested to know if they have a possibility of
being under higher risk. A notation of overall risk in the above
measurement method doesn-t indicate whether some of the involved
entities have higher identity disclosure risk than the others. In this
paper, we have introduced an identity disclosure risk measurement
method that not only implies overall risk, but also indicates whether
some of the members have higher risk than the others. The proposed
method quantifies the overall risk based on the individual risk values,
the percentage of the records that have a risk value higher than the
average and how larger the higher risk values are compared to the
average. We have analyzed the disclosure risks for different
disclosure control techniques applied to original microdata and
present the results.
Abstract: The performances of small and medium enterprises
have stagnated in the last two decades. This has mainly been due to
the emergence of HIV / Aids. The disease has had a detrimental
effect on the general economy of the country leading to morbidity
and mortality of the Kenyan workforce in their primary age. The
present study sought to establish the economic impact of HIV / Aids
on the micro-enterprise development in Obunga slum – Kisumu, in
terms of production loss, increasing labor related cost and to establish
possible strategies to address the impact of HIV / Aids on microenterprises.
The study was necessitated by the observation that most
micro-enterprises in the slum are facing severe economic and social
crisis due to the impact of HIV / Aids, they get depleted and close
down within a short time due to death of skilled and experience
workforce. The study was carried out between June 2008 and June
2009 in Obunga slum. Data was subjected to computer aided
statistical analysis that included descriptive statistic, chi-squared and
ANOVA techniques. Chi-squared analysis on the micro-enterprise
owners opinion on the impact of HIV / Aids on depletion of microenterprise
compared to other diseases indicated high levels of the
negative effects of the disease at significance levels of P
Abstract: In present paper we proposed a simple and effective method to compress an image. Here we found success in size reduction of an image without much compromising with it-s quality. Here we used Haar Wavelet Transform to transform our original image and after quantization and thresholding of DWT coefficients Run length coding and Huffman coding schemes have been used to encode the image. DWT is base for quite populate JPEG 2000 technique.
Abstract: Formal Specification languages are being widely used
for system specification and testing. Highly critical systems such as
real time systems, avionics, and medical systems are represented
using Formal specification languages. Formal specifications based
testing is mostly performed using black box testing approaches thus
testing only the set of inputs and outputs of the system. The formal
specification language such as VDMµ can be used for white box
testing as they provide enough constructs as any other high level
programming language. In this work, we perform data and control
flow analysis of VDMµ class specifications. The proposed work is
discussed with an example of SavingAccount.
Abstract: This paper proposes a dual tree complex wavelet transform (DT-CWT) based directional interpolation scheme for noisy images. The problems of denoising and interpolation are modelled as to estimate the noiseless and missing samples under the same framework of optimal estimation. Initially, DT-CWT is used to decompose an input low-resolution noisy image into low and high frequency subbands. The high-frequency subband images are interpolated by linear minimum mean square estimation (LMMSE) based interpolation, which preserves the edges of the interpolated images. For each noisy LR image sample, we compute multiple estimates of it along different directions and then fuse those directional estimates for a more accurate denoised LR image. The estimation parameters calculated in the denoising processing can be readily used to interpolate the missing samples. The inverse DT-CWT is applied on the denoised input and interpolated high frequency subband images to obtain the high resolution image. Compared with the conventional schemes that perform denoising and interpolation in tandem, the proposed DT-CWT based noisy image interpolation method can reduce many noise-caused interpolation artifacts and preserve well the image edge structures. The visual and quantitative results show that the proposed technique outperforms many of the existing denoising and interpolation methods.
Abstract: Two group of kids (“Safflower cake" and “Control") were fed ad libitum with pelleted total mixed rations. After a 7-days adaptation period, the diet of the “Safflower cake" group were supplemented with 20% of safflower cake. The kids were slaughtered at 96 days of age. Dietary safflower cake did not affect the growth traits of kids. In addition, kids fed experimental diet showed a lower feed intake and consequently a better feed conversion ratio in comparison to the “Control" group. The use of safflower decreased the level of SFA and increased the level of MUFA in kid meat. The level of PUFA was higher in lipid extracted from animals feeding “Control“ diet even if the UFA level was lower. Furthermore, lipid extracted from animals feeding control diet contained more ω6 fatty acids in comparison to kids feeding experimental diet while the opposite trend was observed for the level of ω3 fatty acids. The ω6 to ω3 ratio was significantly affected by diet and in particular this ratio decreased in meat of kids fed experimental diet. Our results indicate that intramuscular fatty acid composition of kid meat can be improved from a human health perspective by inclusion of safflower cake in the diet.
Abstract: Image registration plays an important role in the
diagnosis of dental pathologies such as dental caries, alveolar bone
loss and periapical lesions etc. This paper presents a new wavelet
based algorithm for registering noisy and poor contrast dental x-rays.
Proposed algorithm has two stages. First stage is a preprocessing
stage, removes the noise from the x-ray images. Gaussian filter has
been used. Second stage is a geometric transformation stage.
Proposed work uses two levels of affine transformation. Wavelet
coefficients are correlated instead of gray values. Algorithm has been
applied on number of pre and post RCT (Root canal treatment)
periapical radiographs. Root Mean Square Error (RMSE) and
Correlation coefficients (CC) are used for quantitative evaluation.
Proposed technique outperforms conventional Multiresolution
strategy based image registration technique and manual registration
technique.
Abstract: A bird strike can cause damage to stationary and
rotating aircraft engine parts, especially the engine fan. This paper
presents a bird strike simulated by blocking four stator blade
passages. It includes the numerical results of the unsteady lowfrequency
aerodynamic forces and the aeroelastic behaviour caused
by a non-symmetric upstream flow affecting the first two rotor blade
stages in the axial-compressor of a jet engine. The obtained results
show that disturbances in the engine inlet strongly influence the level
of unsteady forces acting on the rotor blades. With a partially
blocked inlet the whole spectrum of low-frequency harmonics is
observed. Such harmonics can lead to rotor blade damage. The lowfrequency
amplitudes are higher in the first stage rotor blades than in
the second stage. In both rotor blades stages flutter appeared as a
result of bird strike.
Abstract: Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants- collusion. We propose a cheating model for the secret sharing schemes based on linear memory cellular automata. For this purpose we present a novel uniform model for representation of all secret sharing schemes based on cellular automata. Participants can cheat by means of sending bogus shares or bogus transition rules. Cheaters can cooperate to corrupt a shared secret and compute a cheating value added to it. Honest participants are not aware of cheating and suppose the incorrect secret as the valid one. We prove that cheaters can recover valid secret by removing the cheating value form the corrupted secret. We provide methods of calculating the cheating value.
Abstract: Regarding the multi-media property of internet and the facilities that can be provided for the users, the purpose of this paper is to investigate the users- behavioral patterns and the impact of internet on taboos of marriage. For this purpose a survey technique on the sample size amounted 403 students of governmental guidance schools of city of Mashhad in country of Iran were considered. The results showed, the process of using various internet environments depends on the degree of the users- familiarity with these sites. In order to clarify the effects of the Internet on the taboos of marriage, the non – internet parameters also considered to be controlled. The ttest held among the internet users and non-users, indicated that internet users possess lower taboos of marriage. Extraction of the effects of internet via considering the effects of non-internet parameters, indicate that addiction to the internet, creating a cordial atmosphere, emotional communication, and message attractive factors have significant effects on the family's traditional values.
Abstract: Source code retrieval is of immense importance in the software engineering field. The complex tasks of retrieving and extracting information from source code documents is vital in the development cycle of the large software systems. The two main subtasks which result from these activities are code duplication prevention and plagiarism detection. In this paper, we propose a Mohamed Amine Ouddan, and Hassane Essafi source code retrieval system based on two-level fingerprint representation, respectively the structural and the semantic information within a source code. A sequence alignment technique is applied on these fingerprints in order to quantify the similarity between source code portions. The specific purpose of the system is to detect plagiarism and duplicated code between programs written in different programming languages belonging to the same class, such as C, Cµ, Java and CSharp. These four languages are supported by the actual version of the system which is designed such that it may be easily adapted for any programming language.
Abstract: In this paper, a strategy for long-span bridge disaster response was developed, divided into risk analysis, business impact analysis, and emergency response plan. At the risk analysis stage, the critical risk was estimated. The critical risk was “car accident."The critical process by critical-risk classification was assessed at the business impact analysis stage. The critical process was the task related to the road conditions and traffic safety. Based on the results of the precedent analysis, an emergency response plan was established. By making the order of the standard operating procedures clear, an effective plan for dealing with disaster was formulated. Finally, a prototype software was developed based on the research findings. This study laid the foundation of an information-technology-based disaster response guideline and is significant in that it computerized the disaster response plan to improve the plan-s accessibility.