Abstract: The network traffic data provided for the design of
intrusion detection always are large with ineffective information and
enclose limited and ambiguous information about users- activities.
We study the problems and propose a two phases approach in our
intrusion detection design. In the first phase, we develop a
correlation-based feature selection algorithm to remove the worthless
information from the original high dimensional database. Next, we
design an intrusion detection method to solve the problems of
uncertainty caused by limited and ambiguous information. In the
experiments, we choose six UCI databases and DARPA KDD99
intrusion detection data set as our evaluation tools. Empirical studies
indicate that our feature selection algorithm is capable of reducing the
size of data set. Our intrusion detection method achieves a better
performance than those of participating intrusion detectors.
Abstract: The zero truncated model is usually used in modeling
count data without zero. It is the opposite of zero inflated model.
Zero truncated Poisson and zero truncated negative binomial models
are discussed and used by some researchers in analyzing the
abundance of rare species and hospital stay. Zero truncated models
are used as the base in developing hurdle models. In this study, we
developed a new model, the zero truncated strict arcsine model,
which can be used as an alternative model in modeling count data
without zero and with extra variation. Two simulated and one real
life data sets are used and fitted into this developed model. The
results show that the model provides a good fit to the data. Maximum
likelihood estimation method is used in estimating the parameters.
Abstract: Thyroid cancer-s overall contribution to the
worldwide cancer burden is relatively small, but incidence rates have increased over the last three decades throughout the world. This trend has been hypothesised to reflect a combination of technological advances enabling increased detection, but also changes in
environmental factors, including population exposure to ionising radiation from fallout, diagnostic tests and treatment for benign and
malignant conditions. The Thyroid dose received apparently shielded
by cerrobend blocks was about 8cGy in 100cGy Expose
Abstract: Deaminated lesions were produced via nitrosative oxidation of natural nucleobases; uracul (Ura, U) from cytosine (Cyt, C), hypoxanthine (Hyp, H) from adenine (Ade, A), and xanthine (Xan, X) and oxanine (Oxa, O) from guanine (Gua, G). Such damaged nucleobases may induce mutagenic problems, so that much attentions and efforts have been poured on the revealing of their mechanisms in vivo or in vitro. In this study, we employed these deaminated lesions as useful probes for analysis of DNA-binding/recognizing proteins or enzymes. Since the pyrimidine lesions such as Hyp, Oxa and Xan are employed as analogues of guanine, their comparative uses are informative for analyzing the role of Gua in DNA sequence in DNA-protein interaction. Several DNA oligomers containing such Hyp, Oxa or Xan substituted for Gua were designed to reveal the molecular interaction between DNA and protein. From this approach, we have got useful information to understand the molecular mechanisms of the DNA-recognizing enzymes, which have not ever been observed using conventional DNA oligomer composed of just natural nucleobases.
Abstract: This paper discusses the applicability of the Data
Distribution Service (DDS) for the development of automated and modular manufacturing systems which require a flexible and robust
communication infrastructure. DDS is an emergent standard for datacentric publish/subscribe middleware systems that provides an
infrastructure for platform-independent many-to-many
communication. It particularly addresses the needs of real-time systems that require deterministic data transfer, have low memory
footprints and high robustness requirements. After an overview of the
standard, several aspects of DDS are related to current challenges for the development of modern manufacturing systems with distributed architectures. Finally, an example application is presented based on a modular active fixturing system to illustrate the described aspects.
Abstract: Most scientific programs have large input and output
data sets that require out-of-core programming or use virtual memory
management (VMM). Out-of-core programming is very error-prone
and tedious; as a result, it is generally avoided. However, in many
instance, VMM is not an effective approach because it often results
in substantial performance reduction. In contrast, compiler driven I/O
management will allow a program-s data sets to be retrieved in parts,
called blocks or tiles. Comanche (COmpiler MANaged caCHE) is a
compiler combined with a user level runtime system that can be used
to replace standard VMM for out-of-core programs. We describe
Comanche and demonstrate on a number of representative problems
that it substantially out-performs VMM. Significantly our system
does not require any special services from the operating system and
does not require modification of the operating system kernel.
Abstract: We study the spatial design of experiment and we want to select a most informative subset, having prespecified size, from a set of correlated random variables. The problem arises in many applied domains, such as meteorology, environmental statistics, and statistical geology. In these applications, observations can be collected at different locations and possibly at different times. In spatial design, when the design region and the set of interest are discrete then the covariance matrix completely describe any objective function and our goal is to choose a feasible design that minimizes the resulting uncertainty. The problem is recast as that of maximizing the determinant of the covariance matrix of the chosen subset. This problem is NP-hard. For using these designs in computer experiments, in many cases, the design space is very large and it's not possible to calculate the exact optimal solution. Heuristic optimization methods can discover efficient experiment designs in situations where traditional designs cannot be applied, exchange methods are ineffective and exact solution not possible. We developed a GA algorithm to take advantage of the exploratory power of this algorithm. The successful application of this method is demonstrated in large design space. We consider a real case of design of experiment. In our problem, design space is very large and for solving the problem, we used proposed GA algorithm.
Abstract: The paper presents the brief information on particular results of experimental study focused to the problems of behavior of structural plated components made of fiber-cement-based materials and used in building constructions, exposed to atmospheric physical effects given by the weather changes in the summer period. Weather changes represented namely by temperature and rain cause also the changes of the temperature and moisture of the investigated structural components. This can affect their static behavior that means stresses and deformations, which have been monitored as the main outputs of tests performed. Experimental verification is based on the simulation of the influence of temperature and rain using the defined procedure of warming and water sprinkling with respect to the corresponding weather conditions during summer period in the South Moravian region at the Czech Republic, for which the application of these structural components is mainly planned. Two types of components have been tested: (i) glass-fiber-concrete panels used for building façades and (ii) fiber-cement slabs used mainly for claddings, but also as a part of floor structures or lost shuttering, and so on.
Abstract: This paper describes the study of cryptographic hash functions, one of the most important classes of primitives used in recent techniques in cryptography. The main aim is the development of recent crypt analysis hash function. We present different approaches to defining security properties more formally and present basic attack on hash function. We recall Merkle-Damgard security properties of iterated hash function. The Main aim of this paper is the development of recent techniques applicable to crypt Analysis hash function, mainly from SHA family. Recent proposed attacks an MD5 & SHA motivate a new hash function design. It is designed not only to have higher security but also to be faster than SHA-256. The performance of the new hash function is at least 30% better than that of SHA-256 in software. And it is secure against any known cryptographic attacks on hash functions.
Abstract: This paper demonstrates design and construction of
microcontroller-based telephone exchange system and the aims of
this paper is to study telecommunication, connection with
PIC16F877A and DTMF MT8870D. In microcontroller system, PIC
16F877 microcontroller is used to control the call processing. Dial
tone, busy tone and ring tone are provided during call progress.
Instead of using ready made tone generator IC, oscillator based tone
generator is used. The results of this telephone exchange system are
perfect for homes and small businesses needing the extensions. It
requires the phone operation control system, the analog interface
circuit and the switching circuit. This exchange design will contain
eight channels.
It is the best low cost, good quality telephone exchange for today-s
telecommunication needs. It offers the features available in much
more expensive PBX units without using high-priced phones. It is for
long distance telephone services.
Abstract: This study describes analysis of tower grounding
resistance effected the back flashover voltage across insulator string
in a transmission system. This paper studies the 500 kV transmission
lines from Mae Moh, Lampang to Nong Chok, Bangkok, Thailand,
which is double circuit in the same steel tower with two overhead
ground wires. The factor of this study includes magnitude of
lightning stroke, and front time of lightning stroke. Steel tower uses
multistory tower model. The assumption of studies based on the
return stroke current ranged 1-200 kA, front time of lightning stroke
between 1 μs to 3 μs. The simulations study the effect of varying
tower grounding resistance that affect the lightning current.
Simulation results are analyzed lightning over voltage that causes
back flashover at insulator strings. This study helps to know causes
of problems of back flashover the transmission line system, and also
be as a guideline solving the problem for 500 kV transmission line
systems, as well.
Abstract: Public awareness towards green energy are on the rise and this can be prove by many product being manufactured or prerequired to be made as energy saving devices mainly to save consumer from spending more on utility billing. These schemes are popular nowadays and many homemade appliances are turned into energy saving gadget which attracts the attention of consumers. Knowing the public demands and pattern towards purchasing home appliances thus the idea of “energy saving suction hood (ESSH)" is proposed. The ESSH can be used in many places that require smoke ventilation or even to reduce the room temperature as many conventional suction hoods (CSH) do, but this device works automatically by the usage of sensors that detects the smoke/temperature and automatically spins the exhaust fan. As it turns, the mechanical rotation rotates the AC generator which is coupled together with the fan and then charges the battery. The innovation of this product is, it does not rely on the utility supply as it is also hook up with a solar panel which also charges the battery, Secondly, it generates energy as the exhaust fan mechanically rotates. Thirdly, an energy loop back feature is introduced to this system which will supply for the ventilator fan. Another major innovation is towards interfacing this device with an in house production of generator. This generator is produced by proper design on stator as well as rotor to reduce the losses. A comparison is made between the ESSH and the CSH and result shows that the ESSH saves 172.8kWh/year of utility supply which is used by CSH. This amount of energy can save RM 3.14 from monthly utility bill and a total of RM 37.67 per year. In fact this product can generate 175 Watt of power from generator(75W) and solar panel(100W) that can be used either to supply other household appliances and/or to loop back to supply the fans motor. The innovation of this system is essential for future production of other equipment by using the loopback power method and turning most equipment into a standalone system.
Abstract: In this study the adsorption of Cu (II) ions from aqueous solutions on synthetic zeolite NaA was evaluated. The effect of solution temperature and the determination of the kinetic parameters of adsorption of Cu(II) from aqueous solution on zeolite NaA is important in understanding the adsorption mechanism. Variables of the system include adsorption time, temperature (293- 328K), initial solution concentration and pH for the system. The sorption kinetics of the copper ions were found to be strongly dependent on pH (the optimum pH 3-5), solute ion concentration and temperature (293 – 328 K). It was found, the pseudo-second-order model was the best choice among all the kinetic models to describe the adsorption behavior of Cu(II) onto ziolite NaA, suggesting that the adsorption mechanism might be a chemisorptions process The activation energy of adsorption (Ea) was determined as Cu(II) 13.5 kJ mol-1. The low value of Ea shows that Cu(II) adsorption process by zeolite NaA may be an activated chemical adsorption. The thermodynamic parameters (ΔG0, ΔH0, and ΔS0) were also determined from the temperature dependence. The results show that the process of adsorption Cu(II) is spontaneous and endothermic process and rise in temperature favors the adsorption.
Abstract: This paper presents a video transmission system using
layered multiple description (coding (MDC) and multi-path transport
for reliable video communications in wireless ad-hoc networks.
The proposed MDC extends a quality-scalable H.264/AVC video
coding algorithm to generate two independent descriptions. The two
descriptions are transmitted over different paths to a receiver in order
to alleviate the effect of unstable channel conditions of wireless adhoc
networks. If one description is lost due to transmission erros,
then the correctly received description is used to estimate the lost
information of the corrupted description. The proposed MD coder
maintains an adequate video quality as long as both description are
not simultaneously lost. Simulation results show that the proposed
MD coding combined with multi-path transport system is largely
immune to packet losses, and therefore, can be a promising solution
for robust video communications over wireless ad-hoc networks.
Abstract: Levenberg-Marquardt method (LM) was proposed to
be applied as a non-linear least-square fitting in the analysis of a
natural gamma-ray spectrum that was taken by the Hp (Ge) detector.
The Gaussian function that composed of three components, main
Gaussian, a step background function and tailing function in the lowenergy
side, has been suggested to describe each of the y-ray lines
mathematically in the spectrum. The whole spectrum has been
analyzed by determining the energy and relative intensity for the
strong y-ray lines.
Abstract: When architecting an application, key nonfunctional requirements such as performance, scalability, availability and security, which influence the architecture of the system, are some times not adequately addressed. Performance of the application may not be looked at until there is a concern. There are several problems with this reactive approach. If the system does not meet its performance objectives, the application is unlikely to be accepted by the stakeholders. This paper suggests an approach for performance modeling for web based J2EE and .Net applications to address performance issues early in the development life cycle. It also includes a Performance Modeling Case Study, with Proof-of-Concept (PoC) and implementation details for .NET and J2EE platforms.
Abstract: Recently, bianisotropic media again received
increasing importance in electromagnetic theory because of advances
in material science which enable the manufacturing of complex
bianisotropic materials. By using Maxwell's equations and
corresponding boundary conditions, the electromagnetic field
distribution in bianisotropic solenoid coils is determined and the
influence of the bianisotropic behaviour of coil to the impedance and
Q-factor is considered. Bianisotropic media are the largest class of
linear media which is able to describe the macroscopic material
properties of artificial dielectrics, artificial magnetics, artificial chiral
materials, left-handed materials, metamaterials, and other composite
materials. Several special cases of coils, filled with complex
substance, have been analyzed. Results obtained by using the
analytical approach are compared with values calculated by
numerical methods, especially by our new hybrid EEM/BEM method
and FEM.
Abstract: Guaranteeing the availability of the required parts at
the scheduled time represents a key logistical challenge. This is
especially important when several parts are required together. This
article describes a tool that supports the positioning in the area of
conflict between low stock costs and a high service level for a
consumer.
Abstract: Static synchronous compensator (STATCOM) is a shunt connected voltage source converter (VSC), which can affect rapid control of reactive flow in the transmission line by controlling the generated a.c. voltage. The main aim of the paper is to design a power system installed with a Static synchronous compensator (STATCOM) and demonstrates the application of the linearised Phillips-heffron model in analyzing the damping effect of the STATCOM to improve power system oscillation stability. The proposed PI controller is designed to coordinate two control inputs: Voltage of the injection bus and capacitor voltage of the STATCOM, to improve the Dynamic stability of a SMIB system .The power oscillations damping (POD) control and power system stabilizer (PSS) and their coordinated action with proposed controllers are tested. The simulation result shows that the proposed damping controllers provide satisfactory performance in terms of improvements of dynamic stability of the system.
Abstract: The computer modeling is carried out for parameter of
sensitivity of optoelectronic chemical and biosensors, using
phenomena of surface plasmon resonance (SPR). The physical model
of SPR-sensor-s is described with (or without) of modifications of
sensitive gold film surface by a dielectric layer. The variants of
increasing of sensitivity for SPR-biosensors, constructed on the
principle gold – dielectric – biomolecular layer are considered. Two
methods of mathematical treatment of SPR-curve are compared –
traditional, with estimation of sensor-s response as shift of the SPRcurve
minimum and proposed, for system with dielectric layer, using
calculating of the derivative in the point of SPR-curve half-width.