Abstract: Random and natural textures classification is still
one of the biggest challenges in the field of image processing and
pattern recognition. In this paper, texture feature extraction using
Slant Hadamard Transform was studied and compared to other
signal processing-based texture classification schemes. A
parametric SHT was also introduced and employed for natural
textures feature extraction. We showed that a subtly modified
parametric SHT can outperform ordinary Walsh-Hadamard
transform and discrete cosine transform. Experiments were carried
out on a subset of Vistex random natural texture images using a
kNN classifier.
Abstract: Generalized Center String (GCS) problem are
generalized from Common Approximate Substring problem
and Common substring problems. GCS are known to be
NP-hard allowing the problems lies in the explosion of
potential candidates. Finding longest center string without
concerning the sequence that may not contain any motifs is
not known in advance in any particular biological gene
process. GCS solved by frequent pattern-mining techniques
and known to be fixed parameter tractable based on the
fixed input sequence length and symbol set size. Efficient
method known as Bpriori algorithms can solve GCS with
reasonable time/space complexities. Bpriori 2 and Bpriori
3-2 algorithm are been proposed of any length and any
positions of all their instances in input sequences. In this
paper, we reduced the time/space complexity of Bpriori
algorithm by Constrained Based Frequent Pattern mining
(CBFP) technique which integrates the idea of Constraint
Based Mining and FP-tree mining. CBFP mining technique
solves the GCS problem works for all center string of any
length, but also for the positions of all their mutated copies
of input sequence. CBFP mining technique construct TRIE
like with FP tree to represent the mutated copies of center
string of any length, along with constraints to restraint
growth of the consensus tree. The complexity analysis for
Constrained Based FP mining technique and Bpriori
algorithm is done based on the worst case and average case
approach. Algorithm's correctness compared with the
Bpriori algorithm using artificial data is shown.
Abstract: Using the quantum hydrodynamic (QHD) model for quantum plasma at finite temperature the modulational instability of electron plasma waves is investigated by deriving a nonlinear Schrodinger equation. It was found that the electron degeneracy parameter significantly affects the linear and nonlinear properties of electron plasma waves in quantum plasma.
Abstract: A virtualized and virtual approach is presented on
academically preparing students to successfully engage at a strategic
perspective to understand those concerns and measures that are both
structured and not structured in the area of cyber security and
information assurance. The Master of Science in Cyber Security and
Information Assurance (MSCSIA) is a professional degree for those
who endeavor through technical and managerial measures to ensure
the security, confidentiality, integrity, authenticity, control,
availability and utility of the world-s computing and information
systems infrastructure. The National University Cyber Security and
Information Assurance program is offered as a Master-s degree. The
emphasis of the MSCSIA program uniquely includes hands-on
academic instruction using virtual computers. This past year, 2011,
the NU facility has become fully operational using system
architecture to provide a Virtual Education Laboratory (VEL)
accessible to both onsite and online students. The first student cohort
completed their MSCSIA training this past March 2, 2012 after
fulfilling 12 courses, for a total of 54 units of college credits. The
rapid pace scheduling of one course per month is immensely
challenging, perpetually changing, and virtually multifaceted. This
paper analyses these descriptive terms in consideration of those
globalization penetration breaches as present in today-s world of
cyber security. In addition, we present current NU practices to
mitigate risks.
Abstract: The field of polymeric biomaterials is very important
from the socio-economical viewpoint. Synthetic carbohydrate
polymers are being increasingly investigated as biodegradable,
biocompatible and biorenewable materials. The aim of this study was
to synthesize and characterize some derivatives based on D-mannose.
D-mannose was chemically modified to obtain 1-O-allyl-2,3:5,6-di-
O-isopropylidene-D-mannofuranose and 1-O-(2-,3--epoxy-propyl)-
2,3:5,6-di-O-isopropylidene-D-mannofuranose.
The chemical structure of the resulting compounds was
characterized by FT-IR and NMR spectroscopy, and by HPLC-MS.
Abstract: In Virtual organization, Knowledge Discovery (KD)
service contains distributed data resources and computing grid nodes.
Computational grid is integrated with data grid to form Knowledge
Grid, which implements Apriori algorithm for mining association
rule on grid network. This paper describes development of parallel
and distributed version of Apriori algorithm on Globus Toolkit using
Message Passing Interface extended with Grid Services (MPICHG2).
The creation of Knowledge Grid on top of data and
computational grid is to support decision making in real time
applications. In this paper, the case study describes design and
implementation of local and global mining of frequent item sets. The
experiments were conducted on different configurations of grid
network and computation time was recorded for each operation. We
analyzed our result with various grid configurations and it shows
speedup of computation time is almost superlinear.
Abstract: With the proliferation of the mobile device
technologies, mobile learning can be used to complement and
improve traditional learning problems. Both students and teachers
need a proper and handy system to monitor and keep track the
performance of the students. This paper presents an implementation
of M-learning for primary school in Malaysia by using an open
source technology. It focuses on learning mathematics using
handheld devices for primary schools- students aged 11 and 12 years
old. Main users for this system include students, teachers and the
administrator. This application suggests a new mobile learning
environment with mobile graph for tracking the students- progress
and performance. The purpose of this system is not to replace
traditional classroom but to complement the learning process. In a
testing conducted, students who used this system performed better in
their examination.
Abstract: The Wind Turbine Modeling in Wind Energy Conversion System (WECS) using Doubly-Fed Induction Generator (DFIG) PI Controller based design is presented. To study about the variable wind speed. The PI controller performs responding to the dynamic performance. The objective is to study the characteristic of wind turbine and finding the optimum wind speed suitable for wind turbine performance. This system will allow the specification setting (2.5MW). The output active power also corresponding same the input is given. And the reactive power produced by the wind turbine is regulated at 0 Mvar. Variable wind speed is optimum for drive train performance at 12.5 m/s (at maximum power coefficient point) from the simulation of DFIG by Simulink is described.
Abstract: Hidden failure in a protection system has been
recognized as one of the main reasons which may cause to a power
system instability leading to a system cascading collapse. This paper
presents a computationally systematic approach used to obtain the
estimated average probability of a system cascading collapse by
considering the effect of probability hidden failure in a protection
system. The estimated average probability of a system cascading
collapse is then used to determine the severe loading condition
contributing to the higher risk of critical system cascading collapse.
This information is essential to the system utility since it will assist
the operator to determine the highest point of increased system
loading condition prior to the event of critical system cascading
collapse.
Abstract: In this paper, we study the multi-scenario knapsack problem, a variant of the well-known NP-Hard single knapsack problem. We investigate the use of an adaptive algorithm for solving heuristically the problem. The used method combines two complementary phases: a size reduction phase and a dynamic 2- opt procedure one. First, the reduction phase applies a polynomial reduction strategy; that is used for reducing the size problem. Second, the adaptive search procedure is applied in order to attain a feasible solution Finally, the performances of two versions of the proposed algorithm are evaluated on a set of randomly generated instances.
Abstract: In this work, we suggested a new approach for the
control of a mobile robot capable of being a building block of an
intelligent agent. This approach includes obstacle avoidance and goal
tracking implemented as two different sliding mode controllers. A
geometry based behavior arbitration is proposed for fusing the two
outputs. Proposed structure is tested on simulations and real robot.
Results have confirmed the high performance of the method.
Abstract: Thermoacoustic instabilities in combustors have
remained a topic of investigation for over a few decades due to the
challenges it posses to the operation of low emission gas turbines.
For combustors burning liquid fuel, understanding the cause-andeffect
relationship between spray combustion dynamics and
thermoacoustic oscillations is imperative for the successful
development of any control methodology for its mitigation. The
paper presents some very unique operating characteristics of a
kerosene-fueled diffusion type combustor undergoing limit-cycle
oscillations. Combustor stability limits were mapped using three
different-sized injectors. The results show that combustor instability
depends on the characteristics of the fuel spray. A simple analytic
analysis is also reported in support of a plausible explanation for the
unique combustor behavior. The study indicates that high amplitude
acoustic pressure in the combustor may cause secondary breakdown
of fuel droplets resulting in premixed pre-vaporized type burning of
the diffusion type combustor.
Abstract: Within dental-guided surgery, there has been a lack
of analytical methods for optimizing the treatment of the
rehabilitation concepts regarding geometrical variation. The purpose
of this study is to find the source of the greatest geometrical variation
contributor and sensitivity contributor with the help of virtual
variation simulation of a dental drill- and implant-guided surgery
process using a methodical approach. It is believed that lower
geometrical variation will lead to better patient security and higher
quality of dental drill- and implant-guided surgeries. It was found
that the origin of the greatest contributor to the most variation, and
hence where the foci should be set, in order to minimize geometrical
variation was in the assembly category (surgery). This was also the
category that was the most sensitive for geometrical variation.
Abstract: Crude oil blending is an important unit operation in
petroleum refining industry. A good model for the blending system is
beneficial for supervision operation, prediction of the export
petroleum quality and realizing model-based optimal control. Since
the blending cannot follow the ideal mixing rule in practice, we
propose a static neural network to approximate the blending
properties. By the dead-zone approach, we propose a new robust
learning algorithm and give theoretical analysis. Real data of crude
oil blending is applied to illustrate the neuro modeling approach.
Abstract: In this study, three strains of Vibrio parahaemolyticus
(690, BCRC 13023 and BCRC 13025) were subjected to acid
adaptation at pH 5.5 for 90 min. The survival of acid-adapted and
non-adapted V. parahaemolyticus strains under simulated gastric
condition and their protein expression profiles were investigated.
Results showed that acid adaptation increased the survival of the test
V. parahaemolyticus strains after exposure to simulated gastric juice
(pH 3). Additionally, acid adaptation also affected the protein
expression in these V. parahaemolyticus strains. Nine proteins,
identified as atpA, atpB, DnaK, GroEL, OmpU, enolase,
fructose-bisphosphate aldolase, phosphoglycerate kinase and
triosephosphate isomerase, were induced by acid adaptation in two or
three of the test strains. These acid-adaptive proteins may play
important regulatory roles in the acid tolerance response (ATR) of V.
parahaemolyticus.
Abstract: This study was conducted to investigate the optimum
levels of glutamine (Gln) supplementation in broiler diets. A total of
32 one-day-old male chicks with initial body weight 41.5 g were
segregated into 4 groups (8 chicks per group) and subsequently
distributed to individual cages. Feed and water were provided ad
libitum for 21 days. Four dietary treatments were as follows: control
and supplemented Gln at 1, 2 and 3%, respectively. The results found
that the addition Gln had no negative effects on dry matter, organic
matter, ash digestibility or nitrogen retention. Birds fed with 1% Gln
had significantly higher villi wide and villi height : crypt depth ratio
in duodenum than the control chicks and 2 and 3% Gln chicks. It is
suggested that the addition of Gln at 1% indicated a beneficial effect
on improving small intestinal morphology, in addition Gln may
stimulate immune organ development of broiler chickens.
Abstract: In this paper we propose a class of second derivative multistep methods for solving some well-known classes of Lane- Emden type equations which are nonlinear ordinary differential equations on the semi-infinite domain. These methods, which have good stability and accuracy properties, are useful in deal with stiff ODEs. We show superiority of these methods by applying them on the some famous Lane-Emden type equations.
Abstract: Short message integrated distributed monitoring systems (SM-DMS) are growing rapidly in wireless communication applications in various areas, such as electromagnetic field (EMF) management, wastewater monitoring, and air pollution supervision, etc. However, delay in short messages often makes the data embedded in SM-DMS transmit unreliably. Moreover, there are few regulations dealing with this problem in SMS transmission protocols. In this study, based on the analysis of the command and data requirements in the SM-DMS, we developed a processing model for the control center to solve the delay problem in data transmission. Three components of the model: the data transmission protocol, the receiving buffer pool method, and the timer mechanism were described in detail. Discussions on adjusting the threshold parameter in the timer mechanism were presented for the adaptive performance during the runtime of the SM-DMS. This model optimized the data transmission reliability in SM-DMS, and provided a supplement to the data transmission reliability protocols at the application level.
Abstract: To investigate the applicability of the EDR-2 film for
clinical radiation dosimetry, percentage depth-doses, profiles and
distributions in open and dynamically wedged fields were measured
using film and compared with data from a Treatment Planning
system.The validity of the EDR2 film to measure dose in a plane
parallel to the beam was tested by irradiating 10 cm×10 cm and 4
cm×4 cm fields from a Siemens, primus linac with a 6MV beam and
a source-to-surface distance of 100 cm. The film was placed
Horizontally between solid water phantom blocks and marked
with pin holes at a depth of 10 cm from the incident beam surface.
The film measurement results, in absolute dose, were compared with
ion chamber measurements using a Welhoffer scanning water tank
system and Treatment Planning system. Our results indicate a
maximum underestimate of calculated dose of 8 % with Treatment
Planning system.
Abstract: Many electronic voting systems, classified mainly as homomorphic cryptography based, mix-net based and blind signature based, appear after the eighties when zero knowledge proofs were introduced. The common ground for all these three systems is that none of them works without real time cryptologic calculations that should be held on a server. As far as known, the agent-based approach has not been used in a secure electronic voting system. In this study, an agent-based electronic voting schema, which does not contain real time calculations on the server side, is proposed. Conventional cryptologic methods are used in the proposed schema and some of the requirements of an electronic voting system are constructed within the schema. The schema seems quite secure if the used cryptologic methods and agents are secure. In this paper, proposed schema will be explained and compared with already known electronic voting systems.