Abstract: Since primary school trips usually start from home,
attention by many scholars have been focused on the home end for
data gathering. Thereafter category analysis has often been relied
upon when predicting school travel demands. In this paper, school
end was relied on for data gathering and multivariate regression for
future travel demand prediction. 9859 pupils were surveyed by way
of questionnaires at 21 primary schools. The town was divided into 5
zones. The study was carried out in Skudai Town, Malaysia. Based
on the hypothesis that the number of primary school trip ends are
expected to be the same because school trips are fixed, the choice of
trip end would have inconsequential effect on the outcome. The
study compared empirical data for home and school trip end
productions and attractions. Variance from both data results was
insignificant, although some claims from home based family survey
were found to be grossly exaggerated. Data from the school trip ends
was relied on for travel demand prediction because of its
completeness. Accessibility, trip attraction and trip production were
then related to school trip rates under daylight and dry weather
conditions. The paper concluded that, accessibility is an important
parameter when predicting demand for future school trip rates.
Abstract: An adaptive neural network controller for
autonomous underwater vehicles (AUVs) is presented in this paper.
The AUV model is highly nonlinear because of many factors, such as
hydrodynamic drag, damping, and lift forces, Coriolis and centripetal
forces, gravity and buoyancy forces, as well as forces from thruster.
In this regards, a nonlinear neural network is used to approximate the
nonlinear uncertainties of AUV dynamics, thus overcoming some
limitations of conventional controllers and ensure good performance.
The uniform ultimate boundedness of AUV tracking errors and the
stability of the proposed control system are guaranteed based on
Lyapunov theory. Numerical simulation studies for motion control of
an AUV are performed to demonstrate the effectiveness of the
proposed controller.
Abstract: The intention of this paper is, to help the user of evolutionary algorithms to adapt them easier to their problem at hand. For a lot of problems in the technical field it is not necessary to reach an optimum solution, but to reach a good solution in time. In many cases the solution is undetermined or there doesn-t exist a method to determine the solution. For these cases an evolutionary algorithm can be useful. This paper intents to give the user rules of thumb with which it is easier to decide if the problem is suitable for an evolutionary algorithm and how to design them.
Abstract: Programmable logic controllers are the main controllers in the today's industries; they are used for several applications in industrial control systems and there are lots of examples exist from the PLC applications in industries especially in big companies and plants such as refineries, power plants, petrochemical companies, steel companies, and food and production companies. In the PLCs there are some functions in the function library in software that can be used in PLC programs as basic program elements. The aim of this project are introducing and implementing a new function block of a neural network to the function library of PLC. This block can be applied for some control applications or nonlinear functions calculations after it has been trained for these applications. The implemented neural network is a Perceptron neural network with three layers, three input nodes and one output node. The block can be used in manual or automatic mode. In this paper the structure of the implemented function block, the parameters and the training method of the network are presented by considering the especial method of PLC programming and its complexities. Finally the application of the new block is compared with a classic simulated block and the results are presented.
Abstract: Bagging and boosting are among the most popular re-sampling ensemble methods that generate and combine a diversity of regression models using the same learning algorithm as base-learner. Boosting algorithms are considered stronger than bagging on noise-free data. However, there are strong empirical indications that bagging is much more robust than boosting in noisy settings. For this reason, in this work we built an ensemble using an averaging methodology of bagging and boosting ensembles with 10 sub-learners in each one. We performed a comparison with simple bagging and boosting ensembles with 25 sub-learners on standard benchmark datasets and the proposed ensemble gave better accuracy.
Abstract: Rational Emotive Behaviour Therapy is the first
cognitive behavior therapy which was introduced by Albert Ellis.
This is a systematic and structured psychotherapy which is effective
in treating various psychological problems. A patient, 25 years old
male, experienced intense fear and situational panic attack to return
to his faculty and to face his class-mates after a long absence (2
years). This social anxiety disorder was a major factor that impeded
the progress of his study. He was treated with the use of behavioural
technique such as relaxation breathing technique and cognitive
techniques such as imagery, cognitive restructuring, rationalization
technique and systematic desensitization. The patient reported
positive improvement in the anxiety disorder, able to progress well in
studies and lead a better quality of life as a student.
Abstract: The implicit block methods based on the backward
differentiation formulae (BDF) for the solution of stiff initial value
problems (IVPs) using variable step size is derived. We construct a
variable step size block methods which will store all the coefficients
of the method with a simplified strategy in controlling the step size
with the intention of optimizing the performance in terms of
precision and computation time. The strategy involves constant,
halving or increasing the step size by 1.9 times the previous step size.
Decision of changing the step size is determined by the local
truncation error (LTE). Numerical results are provided to support the
enhancement of method applied.
Abstract: This research study the application of the immobilized
TiO2 layer and Cu-TiO2 layer on graphite substrate as a negative
electrode or anode for Li-ion battery. The titania layer was produced
through chemical bath deposition method, meanwhile Cu particles
were deposited electrochemically. A material can be used as an
electrode as it has capability to intercalates Li ions into its crystal
structure. The Li intercalation into TiO2/Graphite and Cu-
TiO2/Graphite were analyzed from the changes of its XRD pattern
after it was used as electrode during discharging process. The XRD
patterns were refined by Le Bail method in order to determine the
crystal structure of the prepared materials. A specific capacity and the
cycle ability measurement were carried out to study the performance
of the prepared materials as negative electrode of the Li-ion battery.
The specific capacity was measured during discharging process from
fully charged until the cut off voltage. A 300 was used as a load.
The result shows that the specific capacity of Li-ion battery with
TiO2/Graphite as negative electrode is 230.87 ± 1.70mAh.g-1 which is
higher than the specific capacity of Li-ion battery with pure graphite
as negative electrode, i.e 140.75 ±0.46mAh.g-1. Meanwhile
deposition of Cu onto TiO2 layer does not increase the specific
capacity, and the value even lower than the battery with
TiO2/Graphite as electrode. The cycle ability of the prepared battery
is only two cycles, due to the Li ribbon which was used as cathode
became fragile and easily broken.
Abstract: In this article, a formal specification and verification of the Rabin public-key scheme in a formal proof system is presented. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. A major objective of this article is the presentation of the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Moreover, we explicate a (computer-proven) formalization of correctness as well as a computer verification of security properties using a straight-forward computation model in Isabelle/HOL. The analysis uses a given database to prove formal properties of our implemented functions with computer support. The main task in designing a practical formalization of correctness as well as efficient computer proofs of security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as efficient formal proofs. Consequently, we get reliable proofs with a minimal error rate augmenting the used database, what provides a formal basis for more computer proof constructions in this area.
Abstract: In this paper, an analytical approach for free vibration
analysis of rectangular and circular membranes is presented. The
method is based on wave approach. From wave standpoint vibration
propagate, reflect and transmit in a structure. Firstly, the propagation
and reflection matrices for rectangular and circular membranes are
derived. Then, these matrices are combined to provide a concise and
systematic approach to free vibration analysis of membranes.
Subsequently, the eigenvalue problem for free vibration of membrane
is formulated and the equation of membrane natural frequencies is
constructed. Finally, the effectiveness of the approach is shown by
comparison of the results with existing classical solution.
Abstract: This paper presents an architecture of current filesystem
implementations as well as our new filesystem SpadFS and operating
system Spad with rewritten VFS layer targeted at high performance
I/O applications. The paper presents microbenchmarks and real-world
benchmarks of different filesystems on the same kernel as well as
benchmarks of the same filesystem on different kernels – enabling
the reader to make conclusion how much is the performance of
various tasks affected by operating system and how much by physical
layout of data on disk. The paper describes our novel features–most
notably continuous allocation of directories and cross-file readahead
– and shows their impact on performance.
Abstract: In this paper, we introduce a novel platform
encryption method, which modify its keys and random number
generators step by step during encryption algorithms. According to
complexity of the proposed algorithm, it was safer than any other
method.
Abstract: From the beginning of creation, human being has ever
fought against the ecosystem by changes has made in environment.
The most environmental changes on the nature have been done after
starting the concentrated life in the same region. Dams are one of the
most important buildings in water resources and transferring. These
buildings have been made from old times without access to
hydrological, hydraulically, hydro mechanical information. Dams
have positive and negative effects on environment. Constructing a
dam relatively causes equal ecological consequences. According to
different criteria, environmental effects of dams can lead short term
and long term damages. These effects may influence on the situation
and treatment of meteorology, biology, culture, ancient works, etc
and severely causes to change and complicate it. So considering
importance of positive effects of dam construction, it is necessary to
minimize negative environmental effects of dams to achieve a stable
development. In this article the considered effects and their solutions
in influencing on assessment of destructive environmental effects of
dams construction have been surveyed and presented.
Abstract: A model of (4, 4) single-walled boron-nitride nanotube as a representative of armchair boron-nitride nanotubes studied. At first the structure optimization performed and then Nuclear Magnetic Resonance parameters (NMR) by Density Functional Theory (DFT) method at 11B and 15N nuclei calculated. Resulted parameters evaluation presents electrostatic environment heterogeneity along the nanotube and especially at the ends but the nuclei in a layer feel the same electrostatic environment. All of calculations carried out using Gaussian 98 Software package.
Abstract: Conventional industrial monitoring systems are
tedious, inefficient and the at times integrity of the data is
unreliable. The objective of this system is to monitor industrial
processes specifically the fluid level which will measure the
instantaneous fluid level parameter and respond by text
messaging the exact value of the parameter to the user when
being enquired by a privileged access user. The development of
the embedded program code and the circuit for fluid level
measuring are discussed as well. Suggestions for future
implementations and efficient remote monitoring works are
included.
Abstract: This paper proposes a VPN Accelerator Board
(VPN-AB), a virtual private network (VPN) protocol designed for
trust channel security system (TCSS). TCSS supports safety
communication channel between security nodes in internet. It
furnishes authentication, confidentiality, integrity, and access control
to security node to transmit data packets with IPsec protocol. TCSS
consists of internet key exchange block, security association block,
and IPsec engine block. The internet key exchange block negotiates
crypto algorithm and key used in IPsec engine block. Security
Association blocks setting-up and manages security association
information. IPsec engine block treats IPsec packets and consists of
networking functions for communication. The IPsec engine block
should be embodied by H/W and in-line mode transaction for high
speed IPsec processing. Our VPN-AB is implemented with high speed
security processor that supports many cryptographic algorithms and
in-line mode. We evaluate a small TCSS communication environment,
and measure a performance of VPN-AB in the environment. The
experiment results show that VPN-AB gets a performance throughput
of maximum 15.645Gbps when we set the IPsec protocol with
3DES-HMAC-MD5 tunnel mode.
Abstract: Recently, the health of retired National Football
League players, particularly lineman has been investigated. A number of studies have reported increased cardiometabolic risk, premature ardiovascular disease and incidence of type 2 diabetes. Rugby union players have somatotypes very similar
to National Football league players which suggest that rugby players may have similar health risks. The International Golden Oldies World Rugby Festival (GORF) provided a
unique opportunity to investigate the demographics of veteran rugby players. METHODOLOGIES: A cross-sectional, observational study was completed using an online web-based
questionnaire that consisted of medical history and
physiological measures. Data analysis was completed using a one sample t-test (50yrs) and Chi-square test. RESULTS: A total of 216 veteran rugby competitors
(response rate = 6.8%) representing 10 countries, aged 35-72 yrs (mean 51.2, S.D. ±8.0), participated in the online survey. As a group, the incidence of current smokers was low at 8.8%
(avg 72.4 cigs/wk) whilst the percentage consuming alcohol
was high (93.1% (avg 11.2 drinks/wk). Competitors reported
the following top six chronic diseases/disorders; hypertension
(18.6%), arthritis (OA/RA, 11.5%), asthma (9.3%),
hyperlipidemia (8.2%), diabetes (all types, 7.5%) and gout (6%), there were significant differences between groups with
regard to cancer (all types) and migraines. When compared to
the Australian general population (Australian Bureau of Statistics data, n=18,000), GORF competitors had a
Climstein Mike, Walsh Joe (corresponding author) and Burke Stephen
School of Exercise Science, Australian Catholic University, 25A Barker Road,
Strathfield, Sydney, NSW, 2016, Australia (e-mail:
[email protected], [email protected],
[email protected]).
John Best is with Orthosports, 160 Belmore Rd., Randwick, Sydney,NSW
2031, Australia (e-mail: [email protected]).
Heazlewood, Ian Timothy is with School of Environmental and Life
Sciences, Faculty Education, Health and Science, Charles Darwin University,
Precinct Yellow Building 2, Charles Darwin University, NT 0909, Australia
(e-mail: [email protected]).
Kettunen Jyrki Arcada University of Applied Sciences, Jan-Magnus
Janssonin aukio 1, FI-00550, Helsinki, Finland (e-mail:
[email protected]).
Adams Kent is with California State University Monterey Bay, Kinesiology Department, 100 Campus Center, Seaside, CA., 93955, USA (email: [email protected]).
DeBeliso Mark is with Department of Physical Education and Human
Performance, Southern Utah University, 351 West University Blvd, Cedar
City, Utah, USA (e-mail: [email protected]).
significantly lower incidence of anxiety (p
Abstract: In this paper a data miner based on the learning
automata is proposed and is called LA-miner. The LA-miner extracts
classification rules from data sets automatically. The proposed
algorithm is established based on the function optimization using
learning automata. The experimental results on three benchmarks
indicate that the performance of the proposed LA-miner is
comparable with (sometimes better than) the Ant-miner (a data miner
algorithm based on the Ant Colony optimization algorithm) and CNZ
(a well-known data mining algorithm for classification).
Abstract: Statistical selection procedures are used to select the
best simulated system from a finite set of alternatives. In this paper,
we present a procedure that can be used to select the best system
when the number of alternatives is large. The proposed procedure
consists a combination between Ranking and Selection, and Ordinal
Optimization procedures. In order to improve the performance of Ordinal
Optimization, Optimal Computing Budget Allocation technique
is used to determine the best simulation lengths for all simulation
systems and to reduce the total computation time. We also argue
the effect of increment in simulation samples for the combined
procedure. The results of numerical illustration show clearly the effect
of increment in simulation samples on the proposed combination of
selection procedure.
Abstract: Unsteady magnetohydrodynamics (MHD) boundary
layer flow and heat transfer over a continuously stretching surface in
the presence of radiation is examined. By similarity transformation,
the governing partial differential equations are transformed to a set of
ordinary differential equations. Numerical solutions are obtained by
employing the Runge-Kutta-Fehlberg method scheme with shooting
technique in Maple software environment. The effects of
unsteadiness parameter, radiation parameter, magnetic parameter and
Prandtl number on the heat transfer characteristics are obtained and
discussed. It is found that the heat transfer rate at the surface
increases as the Prandtl number and unsteadiness parameter increase
but decreases with magnetic and radiation parameter.