Abstract: In today's day and age, one of the important topics in
information security is authentication. There are several alternatives
to text-based authentication of which includes Graphical Password
(GP) or Graphical User Authentication (GUA). These methods stems
from the fact that humans recognized and remembers images better
than alphanumerical text characters. This paper will focus on the
security aspect of GP algorithms and what most researchers have
been working on trying to define these security features and
attributes. The goal of this study is to develop a fuzzy decision model
that allows automatic selection of available GP algorithms by taking
into considerations the subjective judgments of the decision makers
who are more than 50 postgraduate students of computer science. The
approach that is being proposed is based on the Fuzzy Analytic
Hierarchy Process (FAHP) which determines the criteria weight as a
linear formula.
Abstract: A cancelable palmprint authentication system
proposed in this paper is specifically designed to overcome the
limitations of the contemporary biometric authentication system. In
this proposed system, Geometric and pseudo Zernike moments are
employed as feature extractors to transform palmprint image into a
lower dimensional compact feature representation. Before moment
computation, wavelet transform is adopted to decompose palmprint
image into lower resolution and dimensional frequency subbands.
This reduces the computational load of moment calculation
drastically. The generated wavelet-moment based feature
representation is used to generate cancelable verification key with a
set of random data. This private binary key can be canceled and
replaced. Besides that, this key also possesses high data capture
offset tolerance, with highly correlated bit strings for intra-class
population. This property allows a clear separation of the genuine
and imposter populations, as well as zero Equal Error Rate
achievement, which is hardly gained in the conventional biometric
based authentication system.
Abstract: The methanolic extracts from seeds of tamarind
(Tamarindus indica) was prepared by Soxhlet apparatus extraction
and evaluated for total phenolic content by Folin-Ciocalteu method.
Then, methanolic extract was screened biological activities (In vitro)
for anti-melanogenic activity by tyrosinase inhibition test, antiinflammation
activity by cyclooxygenase 1 (COX-1) and
cyclooxygenase 2 (COX-2) inhibition test, and cytotoxic screening
test with Vero cells. The results showed that total phenolic content,
which contained in extract, was contained 27.72 mg of gallic acid
equivalent per g of dry weight. The ability to inhibit tyrosinase
enzyme, which exerted by Tamarind seed extracts (1 mg/ml) was
52.13 ± 0.42 %. The extract was not possessed inhibitory effect to
COX-1 and COX-2 enzymes and cytotoxic effect to Vero cells. The
finding is concludes that tested seed extract was possessed
antimelanogenic activity with non-toxic effects. However, there was
not exhibited anti-inflammatory activity. Further studies include the
use of advance biological models to confirm this biological activity,
as well as, the isolation and characterization of the purified
compounds that it was contained.
Abstract: None of the processing models in the software
development has explained the software systems performance
evaluation and modeling; likewise, there exist uncertainty in the
information systems because of the natural essence of requirements,
and this may cause other challenges in the processing of software
development. By definition an extended version of UML (Fuzzy-
UML), the functional requirements of the software defined
uncertainly would be supported. In this study, the behavioral
description of uncertain information systems by the aid of fuzzy-state
diagram is crucial; moreover, the introduction of behavioral diagrams
role in F-UML is investigated in software performance modeling
process. To get the aim, a fuzzy sub-profile is used.
Abstract: This paper presents an exact analytical model for
optimizing stability of thin-walled, composite, functionally graded
pipes conveying fluid. The critical flow velocity at which divergence
occurs is maximized for a specified total structural mass in order to
ensure the economic feasibility of the attained optimum designs. The
composition of the material of construction is optimized by defining
the spatial distribution of volume fractions of the material
constituents using piecewise variations along the pipe length. The
major aim is to tailor the material distribution in the axial direction so
as to avoid the occurrence of divergence instability without the
penalty of increasing structural mass. Three types of boundary
conditions have been examined; namely, Hinged-Hinged, Clamped-
Hinged and Clamped-Clamped pipelines. The resulting optimization
problem has been formulated as a nonlinear mathematical
programming problem solved by invoking the MatLab optimization
toolbox routines, which implement constrained function
minimization routine named “fmincon" interacting with the
associated eigenvalue problem routines. In fact, the proposed
mathematical models have succeeded in maximizing the critical flow
velocity without mass penalty and producing efficient and economic
designs having enhanced stability characteristics as compared with
the baseline designs.
Abstract: The exploration of this paper will focus on the Cshaped
transition curve. This curve is designed by using the concept
of circle to circle where one circle lies inside other. The degree of
smoothness employed is curvature continuity. The function used in
designing the C-curve is Bézier-like cubic function. This function has
a low degree, flexible for the interactive design of curves and
surfaces and has a shape parameter. The shape parameter is used to
control the C-shape curve. Once the C-shaped curve design is
completed, this curve will be applied to design spur gear tooth. After
the tooth design procedure is finished, the design will be analyzed by
using Finite Element Analysis (FEA). This analysis is used to find
out the applicability of the tooth design and the gear material that
chosen. In this research, Cast Iron 4.5 % Carbon, ASTM A-48 is
selected as a gear material.
Abstract: The paper provides an in-depth tutorial of mathematical
construction of maximal length sequences (m-sequences) via primitive
polynomials and how to map the same when implemented in
shift registers. It is equally important to check whether a polynomial
is primitive or not so as to get proper m-sequences. A fast method to
identify primitive polynomials over binary fields is proposed where
the complexity is considerably less in comparison with the standard
procedures for the same purpose.
Abstract: Palestinian cities face the challenges of land scarcity,
high population growth rates, rapid urbanization, uneven
development and territorial fragmentation. Due to geopolitical
constrains and the absence of an effective Palestinian planning
institution, urban development in Palestinian cities has not followed
any discernable planning scheme. This has led to a number of
internal contradictions in the structure of cities, and adversely
affected land use, the provision of urban services, and the quality of
the living environment.
This paper explores these challenges, and the potential that exists
for introducing a more sustainable urban development pattern in
Palestinian cities. It assesses alternative development approaches
with a particular focus on sustainable development, promoting ecodevelopment
imperatives, limiting random urbanization, and meeting
present and future challenges, including fulfilling the needs of the
people and conserving the scarce land and limited natural resources.
This paper concludes by offering conceptual proposals and guidelines
for promoting sustainable physical development in Palestinian cities.
Abstract: Bonding has become a routine procedure in several
dental specialties – from prosthodontics to conservative dentistry and
even orthodontics. In many of these fields it is important to be able to
investigate the bonded interfaces to assess their quality. All currently
employed investigative methods are invasive, meaning that samples
are destroyed in the testing procedure and cannot be used again. We
have investigated the interface between human enamel and bonded
ceramic brackets non-invasively, introducing a combination of new
investigative methods – optical coherence tomography (OCT),
fluorescence OCT and confocal microscopy (CM). Brackets were
conventionally bonded on conditioned buccal surfaces of teeth. The
bonding was assessed using these methods. Three dimensional
reconstructions of the detected material defects were developed using
manual and semi-automatic segmentation. The results clearly prove
that OCT, fluorescence OCT and CM are useful in orthodontic
bonding investigations.
Abstract: This study is designed to investigate errors emerged in written texts produced by 30 Turkish EFL learners with an explanatory, and thus, qualitative perspective. Erroneous language elements were identified by the researcher first and then their grammaticality and intelligibility were checked by five native speakers of English. The analysis of the data showed that it is difficult to claim that an error stems from only one single factor since different features of an error are triggered by different factors. Our findings revealed two different types of errors: those which stem from the interference of L1 with L2 and those which are developmental ones. The former type contains more global errors whereas the errors in latter type are more intelligible.
Abstract: Power loss reduction is one of the main targets in power industry and so in this paper, the problem of finding the optimal configuration of a radial distribution system for loss reduction is considered. Optimal reconfiguration involves the selection of the best set of branches to be opened ,one each from each loop, for reducing resistive line losses , and reliving overloads on feeders by shifting the load to adjacent feeders. However ,since there are many candidate switching combinations in the system ,the feeder reconfiguration is a complicated problem. In this paper a new approach is proposed based on a simple optimum loss calculation by determining optimal trees of the given network. From graph theory a distribution network can be represented with a graph that consists a set of nodes and branches. In fact this problem can be viewed as a problem of determining an optimal tree of the graph which simultaneously ensure radial structure of each candidate topology .In this method the refined genetic algorithm is also set up and some improvements of algorithm are made on chromosome coding. In this paper an implementation of the algorithm presented by [7] is applied by modifying in load flow program and a comparison of this method with the proposed method is employed. In [7] an algorithm is proposed that the choice of the switches to be opened is based on simple heuristic rules. This algorithm reduce the number of load flow runs and also reduce the switching combinations to a fewer number and gives the optimum solution. To demonstrate the validity of these methods computer simulations with PSAT and MATLAB programs are carried out on 33-bus test system. The results show that the performance of the proposed method is better than [7] method and also other methods.
Abstract: The ITE Project is a project that has 1800 km length
and across the Turkey's land through east to west. The project of
pipeline enters geographically from Iran to Doğubayazit (Turkey) in
the east, exits to Greece from Ipsala province of Turkey in the west.
This project is the one of the international projects in such scale that
provides the natural gas of Iran and Caspian Sea through the
European continent. In this investigation, some information will be
given about the methods used to verify the direction of the pipeline
and the technical properties of the results obtained. The cost of
project itself entirely depends on the direction of the pipeline which
would be as short as possible and the specifications of the land cover.
Production standards of 1/2000 scaled digital orthophoto and vectoral
maps as a results of the use of map production materials and methods
(such as high resolution satellite images, and digital aerial images
captured from digital aerial cameras), will also be given in this report.
According to Turkish national map production standards, TM
((Transversal Mercator, 3 degree) projection is used for large scale
map and UTM (Universal Transversal Mercator, 6 degree) is used for
small scale map production standards. Some information is also given
about the projection used in the ITE natural gas pipeline project.
Abstract: Data mining uses a variety of techniques each of which is useful for some particular task. It is important to have a deep understanding of each technique and be able to perform sophisticated analysis. In this article we describe a tool built to simulate a variation of the Kohonen network to perform unsupervised clustering and support the entire data mining process up to results visualization. A graphical representation helps the user to find out a strategy to optmize classification by adding, moving or delete a neuron in order to change the number of classes. The tool is also able to automatically suggest a strategy for number of classes optimization.The tool is used to classify macroeconomic data that report the most developed countries? import and export. It is possible to classify the countries based on their economic behaviour and use an ad hoc tool to characterize the commercial behaviour of a country in a selected class from the analysis of positive and negative features that contribute to classes formation.
Abstract: This paper describes the development of an electronic
instrument that looks like a flute, which is able to sense the basic musical notes being executed by a specific user. The principal function of the instrument is to teach how to play a flute. This device
will generate a significant academic impact, in a field of virtual reality interactive that combine art and technology. With this example is expected to contribute in research and implementation of teaching devices around the world.
Abstract: Despite of many scholars and practitioners recognize
the knowledge management implementation in an organizations but
insufficient attention has been paid by researchers to select suitable
knowledge portal system (KPS) selection. This study develops a
Multi Criteria Decision making model based on the fuzzy VIKOR
approach to help organizations in selecting KPS. The suitable portal
is the critical influential factors on the success of knowledge
management (KM) implementation in an organization.
Abstract: Kepsut-Dursunbey volcanic field (KDVF) is located
in NW Turkey and contains various products of the post-collisional
Neogene magmatic activity. Two distinct volcanic suites have been
recognized; the Kepsut volcanic suite (KVS) and the Dursunbey
volcanic suite (DVS). The KVS includes basaltic trachyandesitebasaltic
andesite-andesite lavas and associated pyroclastic rocks. The
DVS consists of dacite-rhyodacite lavas and extensive pumice-ash
fall and flow deposits. Petrographical features (i.e. existence of
xenocrysts, glomerocrysts, and mixing-compatible textures) and
mineral chemistry of phenocryst assemblages of both suites provide
evidence for magma mixing/AFC. Calculated crystallization
pressures and temperatures give values of 5.7–7.0 kbar and 927–982
°C for the KVS and 3.7–5.3 kbar and 783-787°C for the DVS,
indicating separate magma reservoirs and crystallization in magma
chambers at deep and mid crustal levels, respectively. These
observations support the establishment and evolution of KDVF
magma system promoted by episodic basaltic inputs which may
generate and mix with crustal melts.
Abstract: The use of power system stabilizers (PSSs) to damp
power system swing mode of oscillations is practical important. Our
purpose is to retune the power system stabilizer (PSS1A) parameters
in Unitrol D produced by ABB– was installed in 1995in Benghazi
North Power Plants (BNPPs) at General Electricity Company of
Libya (GECOL). The optimal values of the power system stabilizer
(PSS1A) parameters are determined off-line by a particle swarm
optimization technique (PSO). The objective is to damp the local and
inter-area modes of oscillations that occur following power system
disturbances. The retuned power system stabilizer (PSS1A) can cope
with large disturbance at different operating points and has enhanced
power system stability.
Abstract: This paper provides an in-depth study of Wireless
Sensor Network (WSN) application to monitor and control the
swiftlet habitat. A set of system design is designed and developed
that includes the hardware design of the nodes, Graphical User
Interface (GUI) software, sensor network, and interconnectivity for
remote data access and management. System architecture is proposed
to address the requirements for habitat monitoring. Such applicationdriven
design provides and identify important areas of further work
in data sampling, communications and networking. For this
monitoring system, a sensor node (MTS400), IRIS and Micaz radio
transceivers, and a USB interfaced gateway base station of Crossbow
(Xbow) Technology WSN are employed. The GUI of this monitoring
system is written using a Laboratory Virtual Instrumentation
Engineering Workbench (LabVIEW) along with Xbow Technology
drivers provided by National Instrument. As a result, this monitoring
system is capable of collecting data and presents it in both tables and
waveform charts for further analysis. This system is also able to send
notification message by email provided Internet connectivity is
available whenever changes on habitat at remote sites (swiftlet farms)
occur. Other functions that have been implemented in this system
are the database system for record and management purposes; remote
access through the internet using LogMeIn software. Finally, this
research draws a conclusion that a WSN for monitoring swiftlet
habitat can be effectively used to monitor and manage swiftlet
farming industry in Sarawak.
Abstract: In the recent past Learning Classifier Systems have
been successfully used for data mining. Learning Classifier System
(LCS) is basically a machine learning technique which combines
evolutionary computing, reinforcement learning, supervised or
unsupervised learning and heuristics to produce adaptive systems. A
LCS learns by interacting with an environment from which it
receives feedback in the form of numerical reward. Learning is
achieved by trying to maximize the amount of reward received. All
LCSs models more or less, comprise four main components; a finite
population of condition–action rules, called classifiers; the
performance component, which governs the interaction with the
environment; the credit assignment component, which distributes the
reward received from the environment to the classifiers accountable
for the rewards obtained; the discovery component, which is
responsible for discovering better rules and improving existing ones
through a genetic algorithm. The concatenate of the production rules
in the LCS form the genotype, and therefore the GA should operate
on a population of classifier systems. This approach is known as the
'Pittsburgh' Classifier Systems. Other LCS that perform their GA at
the rule level within a population are known as 'Mitchigan' Classifier
Systems. The most predominant representation of the discovered
knowledge is the standard production rules (PRs) in the form of IF P
THEN D. The PRs, however, are unable to handle exceptions and do
not exhibit variable precision. The Censored Production Rules
(CPRs), an extension of PRs, were proposed by Michalski and
Winston that exhibit variable precision and supports an efficient
mechanism for handling exceptions. A CPR is an augmented
production rule of the form: IF P THEN D UNLESS C, where
Censor C is an exception to the rule. Such rules are employed in
situations, in which conditional statement IF P THEN D holds
frequently and the assertion C holds rarely. By using a rule of this
type we are free to ignore the exception conditions, when the
resources needed to establish its presence are tight or there is simply
no information available as to whether it holds or not. Thus, the IF P
THEN D part of CPR expresses important information, while the
UNLESS C part acts only as a switch and changes the polarity of D
to ~D. In this paper Pittsburgh style LCSs approach is used for
automated discovery of CPRs. An appropriate encoding scheme is
suggested to represent a chromosome consisting of fixed size set of
CPRs. Suitable genetic operators are designed for the set of CPRs
and individual CPRs and also appropriate fitness function is proposed
that incorporates basic constraints on CPR. Experimental results are
presented to demonstrate the performance of the proposed learning
classifier system.
Abstract: Link reliability and transmitted power are two important design constraints in wireless network design. Error control coding (ECC) is a classic approach used to increase link reliability and to lower the required transmitted power. It provides coding gain, resulting in transmitter energy savings at the cost of added decoder power consumption. But the choice of ECC is very critical in the case of wireless sensor network (WSN). Since the WSNs are energy constraint in nature, both the BER and power consumption has to be taken into count. This paper develops a step by step approach in finding suitable error control codes for WSNs. Several simulations are taken considering different error control codes and the result shows that the RS(31,21) fits both in BER and power consumption criteria.