Segmental and Subsegmental Lung Vessel Segmentation in CTA Images

In this paper, a novel and fast algorithm for segmental and subsegmental lung vessel segmentation is introduced using Computed Tomography Angiography images. This process is quite important especially at the detection of pulmonary embolism, lung nodule, and interstitial lung disease. The applied method has been realized at five steps. At the first step, lung segmentation is achieved. At the second one, images are threshold and differences between the images are detected. At the third one, left and right lungs are gathered with the differences which are attained in the second step and Exact Lung Image (ELI) is achieved. At the fourth one, image, which is threshold for vessel, is gathered with the ELI. Lastly, identifying and segmentation of segmental and subsegmental lung vessel have been carried out thanks to image which is obtained in the fourth step. The performance of the applied method is found quite well for radiologists and it gives enough results to the surgeries medically.

Adaptive Network Intrusion Detection Learning: Attribute Selection and Classification

In this paper, a new learning approach for network intrusion detection using naïve Bayesian classifier and ID3 algorithm is presented, which identifies effective attributes from the training dataset, calculates the conditional probabilities for the best attribute values, and then correctly classifies all the examples of training and testing dataset. Most of the current intrusion detection datasets are dynamic, complex and contain large number of attributes. Some of the attributes may be redundant or contribute little for detection making. It has been successfully tested that significant attribute selection is important to design a real world intrusion detection systems (IDS). The purpose of this study is to identify effective attributes from the training dataset to build a classifier for network intrusion detection using data mining algorithms. The experimental results on KDD99 benchmark intrusion detection dataset demonstrate that this new approach achieves high classification rates and reduce false positives using limited computational resources.

Turfgrass Quality Changes from Season to Season on Perennial Ryegrass (lolium perenne l.) Genotypes Collected from Natural Flora

Perennial ryegrass (Lolium perenne L.) plants are cultivated for lawn constitution and as forage plants. Considerable number of perennial ryegrass genotypes are present in the flora of our country and they present substantial was performed based on a Project supported bu TUBITAK (Project numver : 106O159) and perannial ryegrass genotypes from 8 provinces were collected during 2006. Seeds of perennial ryegrass were collected from 48 different locations. Populations of turfgrass seeds in flowerpots to be 20 and 1 cm deep greenhouse were sown in three replications at 07.07.2007.Then the growth of turfgrass seedlings in the greenhouse in pots showed sufficiently separated from the plants were planted in each population. Plants planted in the garden of the observation scale of 1-9 was evaluated by the quality, 1 = the weakest / worst, 6 = acceptable and 9 = superior or considered as an ideal. Essentially only recognized in assessing the quality of the color of grass, but the color, density, uniformity, texture (texture), illness or environmental stresses are evaluated as a combination reaction. Turfgrass quality 15.11.2007, 19.03.2008, 27.05.2008, 27.11.2008, 07.03.2009 and 02.06.2009 have been 6 times to be in order. Observations made regarding the quality of grass; 3 years according to seasonal environments turf quality genotypes belonging to 14 different populations were found to be 7.5 and above are reserved for future use in breeding works.The number of genotypes belonging to 41 populations in terms of turfgrass quality was determined as 7.9 of 3 year average seasonal. Argıthan between Doğanhisar (Konya) is located 38.09 latitude and 31.40 longitude, altitude 1158 m in the set that population numbered 41.

An Efficient Algorithm for Motion Detection Based Facial Expression Recognition using Optical Flow

One of the popular methods for recognition of facial expressions such as happiness, sadness and surprise is based on deformation of facial features. Motion vectors which show these deformations can be specified by the optical flow. In this method, for detecting emotions, the resulted set of motion vectors are compared with standard deformation template that caused by facial expressions. In this paper, a new method is introduced to compute the quantity of likeness in order to make decision based on the importance of obtained vectors from an optical flow approach. For finding the vectors, one of the efficient optical flow method developed by Gautama and VanHulle[17] is used. The suggested method has been examined over Cohn-Kanade AU-Coded Facial Expression Database, one of the most comprehensive collections of test images available. The experimental results show that our method could correctly recognize the facial expressions in 94% of case studies. The results also show that only a few number of image frames (three frames) are sufficient to detect facial expressions with rate of success of about 83.3%. This is a significant improvement over the available methods.

Deficiencies of Lung Segmentation Techniques using CT Scan Images for CAD

Segmentation is an important step in medical image analysis and classification for radiological evaluation or computer aided diagnosis. This paper presents the problem of inaccurate lung segmentation as observed in algorithms presented by researchers working in the area of medical image analysis. The different lung segmentation techniques have been tested using the dataset of 19 patients consisting of a total of 917 images. We obtained datasets of 11 patients from Ackron University, USA and of 8 patients from AGA Khan Medical University, Pakistan. After testing the algorithms against datasets, the deficiencies of each algorithm have been highlighted.

Effective Methodology for Security Risk Assessment of Computer Systems

Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodologies leading to the selection of a proper methodology to fulfill these requirements. Then, a detailed analysis of the most effective methodology is accomplished, presenting numerical examples to demonstrate how easy it is to use.

The Story of Mergers and Acquisitions: Using Narrative Theory to Understand the Uncertainty of Organizational Change

This paper examines the influence of communication form on employee uncertainty during mergers and acquisitions (M&As). Specifically, the author uses narrative theory to analyze how narrative organizational communication affects the three components of uncertainty – decreased predictive, explanatory, and descriptive ability. It is hypothesized that employees whose organizations use narrative M&A communication will have greater predictive, explanatory, and descriptive abilities than employees of organizations using non-narrative M&A communication. This paper contributes to the stream of research examining uncertainty during mergers and acquisitions and argues that narratives are an effective means of managing uncertainty in the mergers and acquisitions context.

Enhancing the Quality of Learning by Using an Innovative Approach for Teaching Energy in Secondary Schools

This paper presents the results of the authors in designing, experimenting, assessing and transferring an innovative approach to energy education in secondary schools, aimed to enhance the quality of learning in terms of didactic curricula and pedagogic methods. The training is online delivered to youngsters via e-Books and portals specially designed for this purpose or by learning by doing via interactive games. An online educational methodology is available teachers.

Application of Fluorescent Pseudomonads Inoculant Formulations on Vigna mungo through Field Trial

Vermiculite was used to develop inorganic carrier-based formulations of fluorescent pseudomonad strains R62 and R81. The effect of bio-inoculation of fluorescent pseudomonad strains R62 and R81 (plant growth promoting and biocontrol agent) on growth responses of Vigna-mungo under field condition was enumerated. The combined bioinoculation of these two organisms in a formuation increased the pods yield by 300% in comparison to the control crop. There was also significant increment in the other plant growth responses such as dry root weight, dry shoot weight, shoot length and number of branches per plant.

Supply Chain Management and E-Commerce Technology Adoption among Logistics Service Providers in Malaysia

Logistics is part of the supply chain processes that plans, implements, and controls the efficient and effective forward and reverse flow and storage of goods, services, and related information between the point of origin and the point of consumption in order to meet customer requirements. This research aims to investigate the current status and future direction of the use of Information Technology (IT) for logistics, focusing on Supply Chain Management (SCM) and E-Commerce adoption in Malaysia. Therefore, this research stresses on the type of technology being adopted, factors, benefits and barriers affecting the innovation in SCM and E-Commerce technology adoption among Logistics Service Providers (LSP). A mailed questionnaire survey was conducted to collect data from 265 logistics companies in Johor. The research revealed a high level of SCM technology adoption among LSP as they had adopted SCM technology in various business processes while they perceived a high level of benefits from SCM adoption.

The Building Thermal Performance and Carbon Sequestration Evaluation for Psophocarpus tetrogonobulus on Biofaçade Wall in the Tropical Environment

Plants are commonly known for its positive correlation in reducing temperature. Since it can benefit buildings by modifying the microclimate, it-s also believed capable of reducing the internal temperature. Various experiments have been done in Universiti Sains Malaysia, Penang to investigate the comparison in thermal benefits between two rooms, one being a typical control room (exposed wall) and the other a biofacade room (plant shaded wall). The investigations were conducted during non-rainy season for approximately a month. Climbing plant Psophocarpus tetrogonobulus from legume species was selected as insulation for the biofacade wall. Conclusions were made on whether the biofacade can be used to tackle the energy efficiency, based on the parameters taken into consideration.

Fuzzy Control of a Three Phase ThyristorizedInduction Motor

Nowadays the control of stator voltage at a constant frequency is one of the traditional and low expense methods in order to control the speed of induction motors near its nominal speed. The torque of induction motor is a nonlinear function of the firing angle, phase angle and speed. In this paper the speed control of induction motor regarding various load torque and under different conditions will be investigated based on a fuzzy controller with inverse training.

A Distributed Cognition Framework to Compare E-Commerce Websites Using Data Envelopment Analysis

This paper presents an approach based on the adoption of a distributed cognition framework and a non parametric multicriteria evaluation methodology (DEA) designed specifically to compare e-commerce websites from the consumer/user viewpoint. In particular, the framework considers a website relative efficiency as a measure of its quality and usability. A website is modelled as a black box capable to provide the consumer/user with a set of functionalities. When the consumer/user interacts with the website to perform a task, he/she is involved in a cognitive activity, sustaining a cognitive cost to search, interpret and process information, and experiencing a sense of satisfaction. The degree of ambiguity and uncertainty he/she perceives and the needed search time determine the effort size – and, henceforth, the cognitive cost amount – he/she has to sustain to perform his/her task. On the contrary, task performing and result achievement induce a sense of gratification, satisfaction and usefulness. In total, 9 variables are measured, classified in a set of 3 website macro-dimensions (user experience, site navigability and structure). The framework is implemented to compare 40 websites of businesses performing electronic commerce in the information technology market. A questionnaire to collect subjective judgements for the websites in the sample was purposely designed and administered to 85 university students enrolled in computer science and information systems engineering undergraduate courses.

Inhibitory Effect of Lactic Acid and Nisin on Bacterial Spoilage of Chilled Shrimp

Lactic acid alone and its combined application with nisin were evaluated for reducing population of naturally occurring microorganisms on chilled shrimp. Fresh shrimps were dipped in 0, 1.0% and 2.0% (v/v) lactic acid alone and their combined application with 0.04 (g/L/kg) nisin solution for 10 min. Total plate counts of aerobic bacteria (TPCs), Psychrotrophic counts, population of Pseudomonas spp., H2S producing bacteria and Lactic acid bacteria (LAB) on shrimps were determined during storage at 4 °C. The results indicated that total plate counts were 2.91 and 2.63 log CFU/g higher on untreated shrimps after 7 and 14 days of storage, respectively, than on shrimps treated with 2.0% lactic acid combined with 0.04 (g/L/kg) nisin. Both concentrations of lactic acid indicated significant reduction on Pseudomonas counts during storage, while 2.0% lactic acid combined with nisin indicated the highest reduction. In addition, H2S producing bacteria were more sensitive to high concentration of lactic acid combined with nisin during storage.

Photogrammetry and GIS Integration for Archaeological Documentation of Ahl-Alkahf, Jordan

Protection and proper management of archaeological heritage are an essential process of studying and interpreting the generations present and future. Protecting the archaeological heritage is based upon multidiscipline professional collaboration. This study aims to gather data by different sources (Photogrammetry and Geographic Information System (GIS)) integrated for the purpose of documenting one the of significant archeological sites (Ahl-Alkahf, Jordan). 3D modeling deals with the actual image of the features, shapes and texture to represent reality as realistically as possible by using texture. The 3D coordinates that result of the photogrammetric adjustment procedures are used to create 3D-models of the study area. Adding Textures to the 3D-models surfaces gives a 'real world' appearance to the displayed models. GIS system combined all data, including boundary maps, indicating the location of archeological sites, transportation layer, digital elevation model and orthoimages. For realistic representation of the study area, 3D - GIS model prepared, where efficient generation, management and visualization of such special data can be achieved.

Toward a New Simple Analytical Formulation of Navier-Stokes Equations

Incompressible Navier-Stokes equations are reviewed in this work. Three-dimensional Navier-Stokes equations are solved analytically. The Mathematical derivation shows that the solutions for the zero and constant pressure gradients are similar. Descriptions of the proposed formulation and validation against two laminar experiments and three different turbulent flow cases are reported in this paper. Even though, the analytical solution is derived for nonreacting flows, it could reproduce trends for cases including combustion.

Investigating Intrusion Detection Systems in MANET and Comparing IDSs for Detecting Misbehaving Nodes

As mobile ad hoc networks (MANET) have different characteristics from wired networks and even from standard wireless networks, there are new challenges related to security issues that need to be addressed. Due to its unique features such as open nature, lack of infrastructure and central management, node mobility and change of dynamic topology, prevention methods from attacks on them are not enough. Therefore intrusion detection is one of the possible ways in recognizing a possible attack before the system could be penetrated. All in all, techniques for intrusion detection in old wireless networks are not suitable for MANET. In this paper, we classify the architecture for Intrusion detection systems that have so far been introduced for MANETs, and then existing intrusion detection techniques in MANET presented and compared. We then indicate important future research directions.

Investigation on Yield and Fruit Quality of Some Cultivated Strawberry in Iran

fifteen cultivars of Strawberries (Queen Eliza, Sequia, Paros, Mcdonance, Selva, Chandler, Mrak, Ten beauty, Aliso, Pajero, Kordestan, Camarosa, Blackmore, Gaviota and Fresno) were investigated in 2011, under hydroponic system condition. Yield and fruit Firmness was determinate. Chemical analyses of soluble solids content (SSC), titratable acidity (TA), ascorbic acid (AA) and pH were done. 4 cultivars (Aliso, Selva, Paros and Gaviota) yielded more than 250 g/plant, while cultivar Black more, Fresno and Kordestan produced less than 100g/plant. The amounts of fruit firmness indicated that 'Camarosa' fruit was firmer than others cultivars. Cultivar 'Fresno' had the highest pH (3.27). Ttitratable acidity varied from 1.03g/l00g for cultivar 'Sequia' and 'Gaviota' to 1.48g/l00g for cultivar 'Chandler'. Fresno, Kordestan, Aliso and Chandler showed the highest soluble solid concentration. Ascorbic acid averaged for most cultivars between 30.26 and 79.73 mg/100gf.w. Present results showed that different cultivars of strawberry contain highly variable in fruit quality.

Analysis of Program PRIME at Brazil

Policies that support entrepreneurship are keys to the generation of new business. In Brazil, seed capital, installation of technology parks, programs and zero interest financing, economic subsidy as Program First Innovative Company (PRIME) are examples of incentive policies. For the implementation of PRIME, in particular the Brazilian Innovation Agency (FINEP) decentralized operationalization so that business incubators could select innovative projects. This paper analyzes the program PRIME Business Incubator Center of the State of Sergipe (CISE) after calculating the mean and standard deviation of the grades obtained by companies in the factors of innovation, market potential, financial return economic, market strategy and staff and application of the Mann-Whitney test.

An Infrared Investigation on Surface Species over Iron-Based Catalysts: Implications for Oxygenates Formation

The nature of adsorbed species on catalytic surface over an industrial precipitated iron-based high temperature catalyst during FTS was investigated by in-situ DRIFTS and chemical trapping. The formulation of the mechanism of oxygenates formation and key intermediates were also discussed. Numerous oxygenated precursors and crucial intermediates were found by in-situ DRIFTS, such as surface acetate, acetyl and methoxide. The results showed that adsorbed molecules on surface such as methanol or acetaldehyde could react with basic sites such as lattice oxygen or free surface hydroxyls. Adsorbed molecules also had reactivity of oxidizing. Moreover, acetyl as a key intermediate for oxygenates was observed by investigation of CH3OH + CO and CH3I + CO + H2. Based on the nature of surface properties, the mechanism of oxygenates formation on precipitated iron-based high temperature catalyst was discussed.