Abstract: Biological data has several characteristics that strongly differentiate it from typical business data. It is much more complex, usually large in size, and continuously changes. Until recently business data has been the main target for discovering trends, patterns or future expectations. However, with the recent rise in biotechnology, the powerful technology that was used for analyzing business data is now being applied to biological data. With the advanced technology at hand, the main trend in biological research is rapidly changing from structural DNA analysis to understanding cellular functions of the DNA sequences. DNA chips are now being used to perform experiments and DNA analysis processes are being used by researchers. Clustering is one of the important processes used for grouping together similar entities. There are many clustering algorithms such as hierarchical clustering, self-organizing maps, K-means clustering and so on. In this paper, we propose a clustering algorithm that imitates the ecosystem taking into account the features of biological data. We implemented the system using an Ant-Colony clustering algorithm. The system decides the number of clusters automatically. The system processes the input biological data, runs the Ant-Colony algorithm, draws the Topic Map, assigns clusters to the genes and displays the output. We tested the algorithm with a test data of 100 to1000 genes and 24 samples and show promising results for applying this algorithm to clustering DNA chip data.
Abstract: The design of an active leg orthosis for tumble
protection is proposed in this paper. The orthosis would be applied to
assist elders or invalids in rebalancing while they fall unexpectedly.
We observe the regain balance motion of healthy and youthful people,
and find the difference to elders or invalids. First, the physical model
of leg would be established, and we consider the leg motions are
achieve through four joints (phalanx stem, ankle, knee, and hip joint)
and five links (phalanges, talus, tibia, femur, and hip bone). To
formulate the dynamic equations, the coordinates which can clearly
describe the position in 3D space are first defined accordance with the
human movement of leg, and the kinematics and dynamics of the leg
movement can be formulated based on the robotics. For the purpose,
assisting elders and invalids in avoiding tumble, the posture variation
of unbalance and regaining balance motion are recorded by the
motion-capture image system, and the trajectory is taken as the desire
one. Then we calculate the force and moment of each joint based on
the leg motion model through programming MATLAB code. The
results would be primary information of the active leg orthosis design
for tumble protection.
Abstract: The use of magnetic and magnetic/gold core/shell
nanoparticles in biotechnology or medicine has shown good promise
due to their hybrid nature which possesses superior magnetic and
optical properties. Some of these potential applications include
hyperthermia treatment, bio-separations, diagnostics, drug delivery
and toxin removal. Synthesis refinement to control geometric and
magnetic/optical properties, and finding functional surfactants for
biomolecular attachment, are requirements to meet application
specifics.
Various high-temperature preparative methods were used for the
synthesis of iron oxide and gold-coated iron oxide nanoparticles.
Different surface functionalities, such as 11-aminoundecanoic and
11-mercaptoundecanoic acid, were introduced on the surface of the
particles to facilitate further attachment of biomolecular functionality
and drug-like molecules. Nanoparticle thermal stability, composition,
state of aggregation, size and morphology were investigated and the
results from techniques such as Fourier Transform-Infra Red
spectroscopy (FT-IR), Ultraviolet visible spectroscopy (UV-vis),
Transmission Electron Microscopy (TEM) and thermal analysis are
discussed.
Abstract: In this paper, a novel LVTSCR-based device for
electrostatic discharge (ESD) protection of integrated circuits (ICs) is
designed, fabricated and characterized. The proposed device is similar
to the conventional LVTSCR but it has an embedded PMOSFET in the
anode n-well to enhance the turn on speed, the clamping capability and
the robustness. This is possible because the embedded PMOSFET
provides the sub-path of ESD discharge current. The TLP, HBM and
MM testing are carried out to verify the ESD performance of the
proposed devices, which are fabricated in 0.35um
(Bipolar-CMOS-DMOS) BCDMOS process. The device has the
robustness of 70mA/um that is higher about 60mA/um than the
LVTSCR, approximately.
Abstract: The intent of this essay is to evaluate the effectiveness
of surge suppressor aimed at power supply used for automation
devices in power distribution system which is consist of MOV and
T type low-pass filter. Books, journal articles and e-sources related
to surge protection of power supply used for automation devices in
power distribution system were consulted, and the useful information
was organized, analyzed and developed into five parts: characteristics
of surge wave, protection against surge wave, impedance characteristics
of target, using Matlab to simulate circuit response after
5kV,1.2/50s surge wave and suggestions for surge protection. The
results indicate that various types of load situation have great impact
on the effectiveness of surge protective device. Therefore, type and
parameters of surge protective device need to be carefully selected,
and load matching is also vital to be concerned.
Abstract: The purpose of this study is to investigate the
efficiency of a double-layer roof in collecting solar energy as an
application to the areas such as raising high-end temperature of
organic Rankine cycle (ORC). The by-product of the solar roof is to
reduce building air-conditioning loads. The experimental apparatus
are arranged to evaluate the effects of the solar roof in absorbing solar
energy. The flow channel is basically formed by an aluminum plate on
top of a plywood plate. The geometric configurations in which the
effects of absorbing energy is analyzed include: a bare uncovered
aluminum plate, a glass-covered aluminum plate, a
glass-covered/black-painted aluminum plate, a plate with variable
lengths, a flow channel with stuffed material (in an attempt on
enhancement of heat conduction), and a flow channel with variable
slanted angles. The experimental results show that the efficiency of
energy collection varies from 0.6 % to 11 % for the geometric
configurations mentioned above. An additional study is carried out
using CFD simulation to investigate the effects of fins on the
aluminum plate. It shows that due to vastly enhanced heat conduction,
the efficiency can reach ~23 % if 50 fins are installed on the aluminum
plate. The study shows that a double-layer roof can efficiently absorb
solar energy and substantially reduce building air-conditioning
loads. On the high end of an organic Rankine cycle, a solar pond is
used to replace the warm surface water of the sea as OTEC (ocean
thermal energy conversion) is the driving energy for the ORC. The
energy collected from the double-layered solar roof can be pumped
into the pond and raise the pond temperature as the pond surface area is
equivalently increased by nearly one-fourth of the total area of the
double-layer solar roof. The effect of raising solar pond temperature is
especially prominent if the double-layer solar roofs are installed in a
community area.
Abstract: The field research was carried out at the Látókép AGTC KIT research area of the University of Debrecen in Eastern-Hungary, on the area of the aeolain loess of the Hajdúság. We examined the effects of the sowing time on the phytopathogenic characteristics and yield production by applying various fertilizer treatments on two different sunflower genotypes (NK Ferti, PR64H42) in 2012 and 2013. We applied three different sowing times (early, optimal, late) and two different treatment levels of fungicides (control = no fungicides applied, double fungicide protection).
During our investigations, the studied cropyears were of different sowing time optimum in terms of yield amount (2012: early, 2013: average). By Pearson’s correlation analysis, we have found that delaying the sowing time pronouncedly decreased the extent of infection in both crop years (Diaporthe: r=0.663**, r=0.681**, Sclerotinia: r=0.465**, r=0.622**). The fungicide treatment not only decreased the extent of infection, but had yield increasing effect too (2012: r=0.498**, 2013: r=0.603**). In 2012, delaying of the sowing time increased (r=0.600**), but in 2013, it decreased (r= 0.356*) the yield amount.
Abstract: The condition of lightning surge causes the traveling waves and the temporary increase in voltage in the transmission line system. Lightning is the most harmful for destroying the transmission line and setting devices so it is necessary to study and analyze the temporary increase in voltage for designing and setting the surge arrester. This analysis describes the figure of the lightning wave in transmission line with 115 kV voltage level in Thailand by using ATP/EMTP program to create the model of the transmission line and lightning surge. Because of the limit of this program, it must be calculated for the geometry of the transmission line and surge parameter and calculation in the manual book for the closest value of the parameter. On the other hand, for the effects on surge protector when the lightning comes, the surge arrester model must be right and standardized as metropolitan electrical authority's standard. The candidate compared the real information to the result from calculation, also. The results of the analysis show that the temporary increase in voltage value will be rise to 326.59 kV at the line which is done by lightning when the surge arrester is not set in the system. On the other hand, the temporary increase in voltage value will be 182.83 kV at the line which is done by lightning when the surge arrester is set in the system and the period of the traveling wave is reduced, also. The distance for setting the surge arrester must be as near to the transformer as possible. Moreover, it is necessary to know the right distance for setting the surge arrester and the size of the surge arrester for preventing the temporary increase in voltage, effectively.
Abstract: The paper deals with the perspectives and possibilities
of "smart solutions" to critical infrastructure protection. It means that
common computer aided technologies are used from the perspective
of new, better protection of selected infrastructure objects. The paper
is focused on the co-product of the Czech Defence Research Project -
ADAPTIV. This project is carrying out by the University of Defence,
Faculty of Economics and Management at the Department of Civil
Protection. The project creates system and technology for adaptive
cybernetic camouflage of armed forces objects, armaments, vehicles
and troops and of mobilization infrastructure. These adaptive
camouflage system and technology will be useful for army tactic
activities protection and for decoys generation also. The fourth
chapter of the paper concerns the possibilities of using the introduced
technology to the protection of selected civil (economically
important), critical infrastructure objects. The aim of this section
is to introduce the scientific capabilities and potential of the
University of Defence research results and solutions for the practice.
Abstract: With the fast evolution of digital data exchange, security information becomes much important in data storage and transmission. Due to the increasing use of images in industrial process, it is essential to protect the confidential image data from unauthorized access. In this paper, we analyze the Advanced Encryption Standard (AES), and we add a key stream generator (A5/1, W7) to AES to ensure improving the encryption performance; mainly for images characterised by reduced entropy. The implementation of both techniques has been realized for experimental purposes. Detailed results in terms of security analysis and implementation are given. Comparative study with traditional encryption algorithms is shown the superiority of the modified algorithm.
Abstract: In a world of climate change and limited fossil fuel resources, renewable energy sources are playing an increasingly important role. Due to industrializations and population growth our economy and technologies today largely depend upon natural resources, which are not replaceable. Approximately 90% of our energy consumption comes from fossil fuels (viz. coal, oil and natural gas). The irony is that these resources are depleting. Also, the huge consumption of fossil fuels has caused visible damage to the environment in various forms viz. global warming, acid rains etc.
Abstract: This research aims to study the lead pollution in the air of Babylon governorate that resulted generally from vehicles exhausts in addition to industrial and human activities.Vehicles number in Babylon governorate increased significantly after year 2003 that resulted with increase in lead emissions into the air.Measurement of lead emissions was done in seven stations distributed randomly in Babylon governorate. These stations where located in Industrial (Al-Sena'ay) Quarter, 60 street (near to Babylon sewer directorate), 40 Street (near to the first intersection), Al-Hashmia city, Al-Mahaweel city, , Al- Musayab city in addition to another station in Sayd Idris village belong to Abugharaq district (Agricultural station for comparison). The measured concentrations in these stations were compared with the standard limits of Environmental Protection Agency EPA (2 μg /m3). The results of this study showed that the average of lead concentrations ,in Babylon governorate during year 2010, was (3.13 μg/m3) which was greater than standard limits (2 μg/m3). The maximum concentration of lead was (6.41 μg / m3) recorded in the Industrial (Al-Sena'ay) Quarter during April month, while the minimum concentrations was (0.36 μg / m3) recorded in the agricultural station (Abugharaq) during December month.
Abstract: In this paper, the effect of width and height of the
model on the earthquake response in the finite element method is
discussed. For this purpose an earth dam as a soil structure under
earthquake has been considered. Various dam-foundation models are
analyzed by Plaxis, a finite element package for solving geotechnical
problems. The results indicate considerable differences in the seismic
responses.
Abstract: Intellectual capital measurement is a central aspect of knowledge management. The measurement and the evaluation of intangible assets play a key role in allowing an effective management of these assets as sources of competitiveness. For these reasons, managers and practitioners need conceptual and analytical tools taking into account the unique characteristics and economic significance of Intellectual Capital. Following this lead, we propose an efficiency and productivity analysis of Intellectual Capital, as a determinant factor of the company competitive advantage. The analysis is carried out by means of Data Envelopment Analysis (DEA) and Malmquist Productivity Index (MPI). These techniques identify Bests Practice companies that have accomplished competitive advantage implementing successful strategies of Intellectual Capital management, and offer to inefficient companies development paths by means of benchmarking. The proposed methodology is employed on the Biotechnology industry in the period 2007-2010.
Abstract: Recently, wireless sensor networks have been paid
more interest, are widely used in a lot of commercial and military
applications, and may be deployed in critical scenarios (e.g. when a
malfunctioning network results in danger to human life or great
financial loss). Such networks must be protected against human
intrusion by using the secret keys to encrypt the exchange messages
between communicating nodes. Both the symmetric and asymmetric
methods have their own drawbacks for use in key management. Thus,
we avoid the weakness of these two cryptosystems and make use of
their advantages to establish a secure environment by developing the
new method for encryption depending on the idea of code
conversion. The code conversion-s equations are used as the key for
designing the proposed system based on the basics of logic gate-s
principals. Using our security architecture, we show how to reduce
significant attacks on wireless sensor networks.
Abstract: In this paper, we start by first characterizing the most
important and distinguishing features of wavelet-based watermarking
schemes. We studied the overwhelming amount of algorithms
proposed in the literature. Application scenario, copyright protection
is considered and building on the experience that was gained,
implemented two distinguishing watermarking schemes. Detailed
comparison and obtained results are presented and discussed. We
concluded that Joo-s [1] technique is more robust for standard noise
attacks than Dote-s [2] technique.
Abstract: Multimedia information availability has increased
dramatically with the advent of video broadcasting on handheld
devices. But with this availability comes problems of maintaining the
security of information that is displayed in public. ISMA Encryption
and Authentication (ISMACryp) is one of the chosen technologies for
service protection in DVB-H (Digital Video Broadcasting-
Handheld), the TV system for portable handheld devices. The
ISMACryp is encoded with H.264/AVC (advanced video coding),
while leaving all structural data as it is. Two modes of ISMACryp are
available; the CTR mode (Counter type) and CBC mode (Cipher
Block Chaining) mode. Both modes of ISMACryp are based on 128-
bit AES algorithm. AES algorithms are more complex and require
larger time for execution which is not suitable for real time
application like live TV. The proposed system aims to gain a deep
understanding of video data security on multimedia technologies and
to provide security for real time video applications using selective
encryption for H.264/AVC. Five level of security proposed in this
paper based on the content of NAL unit in Baseline Constrain profile
of H.264/AVC. The selective encryption in different levels provides
encryption of intra-prediction mode, residue data, inter-prediction
mode or motion vectors only. Experimental results shown in this
paper described that fifth level which is ISMACryp provide higher
level of security with more encryption time and the one level provide
lower level of security by encrypting only motion vectors with lower
execution time without compromise on compression and quality of
visual content. This encryption scheme with compression process
with low cost, and keeps the file format unchanged with some direct
operations supported. Simulation was being carried out in Matlab.
Abstract: Information hiding, especially watermarking is a
promising technique for the protection of intellectual property rights.
This technology is mainly advanced for multimedia but the same has
not been done for text. Web pages, like other documents, need a
protection against piracy. In this paper, some techniques are
proposed to show how to hide information in web pages using some
features of the markup language used to describe these pages. Most
of the techniques proposed here use the white space to hide
information or some varieties of the language in representing
elements. Experiments on a very small page and analysis of five
thousands web pages show that these techniques have a wide
bandwidth available for information hiding, and they might form a
solid base to develop a robust algorithm for web page watermarking.
Abstract: The present study was designed to investigate the
cardio protective role of chronic oral administration of alcoholic
extract of Terminalia arjuna in in-vivo ischemic reperfusion injury
and the induction of HSP72. Rabbits, divided into three groups, and
were administered with the alcoholic extract of the bark powder of
Terminalia arjuna (TAAE) by oral gavage [6.75mg/kg: (T1) and
9.75mg/kg: (T2), 6 days /week for 12 weeks]. In open-chest
Ketamine pentobarbitone anaesthetized rabbits, the left anterior
descending coronary artery was occluded for 15 min of ischemia
followed by 60 min of reperfusion. In the vehicle-treated group,
ischemic-reperfusion injury (IRI) was evidenced by depression of
global hemodynamic function (MAP, HR, LVEDP, peak LV (+) & (-
) (dP/dt) along with depletion of HEP compounds. Oxidative stress
in IRI was evidenced by, raised levels of myocardial TBARS and
depletion of endogenous myocardial antioxidants GSH, SOD and
catalase. Western blot analysis showed a single band corresponding
to 72 kDa in homogenates of hearts from rabbits treated with both the
doses. In the alcoholic extract of the bark powder of Terminalia
arjuna treatment groups, both the doses had better recovery of
myocardial hemodynamic function, with significant reduction in
TBARS, and rise in SOD, GSH, catalase were observed. The results
of the present study suggest that the alcoholic extract of the bark
powder of Terminalia arjuna in rabbit induces myocardial HSP 72
and augments myocardial endogenous antioxidants, without causing
any cellular injury and offered better cardioprotection against
oxidative stress associated with myocardial IR injury.
Abstract: Secure electronic payment system is presented in this
paper. This electronic payment system is to be secure for clients such
as customers and shop owners. The security architecture of the
system is designed by RC5 encryption / decryption algorithm. This
eliminates the fraud that occurs today with stolen credit card
numbers. The symmetric key cryptosystem RC5 can protect
conventional transaction data such as account numbers, amount and
other information. This process can be done electronically using RC5
encryption / decryption program written by Microsoft Visual Basic
6.0. There is no danger of any data sent within the system being
intercepted, and replaced. The alternative is to use the existing
network, and to encrypt all data transmissions. The system with
encryption is acceptably secure, but that the level of encryption has
to be stepped up, as computing power increases. Results In order to
be secure the system the communication between modules is
encrypted using symmetric key cryptosystem RC5. The system will
use simple user name, password, user ID, user type and cipher
authentication mechanism for identification, when the user first
enters the system. It is the most common method of authentication in
most computer system.