180
10009980
Open Science Philosophy and Paradigm of Scientific Research
Abstract: This paper presents the open science philosophy and paradigm of scientific research on how to transform classical research and innovation approaches. Open science is the practice of providing free and unrestricted online access to the products of scholarly research. Open science advocates for the immediate and unrestricted online access to published, peer-reviewed research in digital format. Open science research is made available for free in perpetuity and includes guidelines and/or licenses that communicate how researchers and readers can share and re-use the digital content. The emergence of open science has changed the scholarly research and publishing landscape, making research more broadly accessible to academic and non-academic audiences alike. Consequently, open science philosophy and its practice are discussed to cover all aspects of cyberscience in the context of research and innovation excellence for the benefit of global society.
Digital Article Identifier (DOI):
179
11065
Sliding Mode Based Behavior Control
Abstract: In this work, we suggested a new approach for the
control of a mobile robot capable of being a building block of an
intelligent agent. This approach includes obstacle avoidance and goal
tracking implemented as two different sliding mode controllers. A
geometry based behavior arbitration is proposed for fusing the two
outputs. Proposed structure is tested on simulations and real robot.
Results have confirmed the high performance of the method.
Digital Article Identifier (DOI):
178
11774
A New Block-based NLMS Algorithm and Its Realization in Block Floating Point Format
Abstract: we propose a new normalized LMS (NLMS) algorithm, which gives satisfactory performance in certain applications in comaprison with con-ventional NLMS recursion. This new algorithm can be treated as a block based simplification of NLMS algorithm with significantly reduced number of multi¬ply and accumulate as well as division operations. It is also shown that such a recursion can be easily implemented in block floating point (BFP) arithmetic, treating the implementational issues much efficiently. In particular, the core challenges of a BFP realization to such adaptive filters are mainly considered in this regard. A global upper bound on the step size control parameter of the new algorithm due to BFP implementation is also proposed to prevent overflow in filtering as well as weight updating operations jointly.
Digital Article Identifier (DOI):
177
4501
T-DOF PID Controller Design using Characteristic Ratio Assignment Method for Quadruple Tank Process
Abstract: A control system design with Characteristic Ratio
Assignment (CRA) is proven that effective for SISO control design.
But the control system design for MIMO via CRA is not concrete
procedure. In this paper presents the control system design method
for quadruple-tank process via CRA. By using the decentralized
method for both minimum phase and non-minimum phase are made.
The results from PI and PID controller design via CRA can be
illustrated the validity of our approach by MATLAB.
Digital Article Identifier (DOI):
176
2218
Computer Verification in Cryptography
Abstract: In this paper we explore the application of a formal proof system to verification problems in cryptography. Cryptographic properties concerning correctness or security of some cryptographic algorithms are of great interest. Beside some basic lemmata, we explore an implementation of a complex function that is used in cryptography. More precisely, we describe formal properties of this implementation that we computer prove. We describe formalized probability distributions (o--algebras, probability spaces and condi¬tional probabilities). These are given in the formal language of the formal proof system Isabelle/HOL. Moreover, we computer prove Bayes' Formula. Besides we describe an application of the presented formalized probability distributions to cryptography. Furthermore, this paper shows that computer proofs of complex cryptographic functions are possible by presenting an implementation of the Miller- Rabin primality test that admits formal verification. Our achievements are a step towards computer verification of cryptographic primitives. They describe a basis for computer verification in cryptography. Computer verification can be applied to further problems in crypto-graphic research, if the corresponding basic mathematical knowledge is available in a database.
Digital Article Identifier (DOI):
175
14524
A method of Authentication for Quantum Networks
Abstract: Quantum cryptography offers a way of key agreement,
which is unbreakable by any external adversary. Authentication is
of crucial importance, as perfect secrecy is worthless if the identity
of the addressee cannot be ensured before sending important information.
Message authentication has been studied thoroughly, but no
approach seems to be able to explicitly counter meet-in-the-middle
impersonation attacks. The goal of this paper is the development of
an authentication scheme being resistant against active adversaries
controlling the communication channel. The scheme is built on top
of a key-establishment protocol and is unconditionally secure if built
upon quantum cryptographic key exchange. In general, the security
is the same as for the key-agreement protocol lying underneath.
Digital Article Identifier (DOI):
174
1883
Generalisation of Kipnis and Shamir Cryptanalysis of the HFE public key cryptosystem
Abstract: In [4], Kipnis and Shamir have cryptanalised
a version of HFE of degree 2. In this paper, we describe the
generalization of this attack of HFE of degree more than 2.
We are based on Fourier Transformation to acheive partially
this attack.
Digital Article Identifier (DOI):
173
7308
The PARADIGMA Approach for Cooperative Work in the Medical Domain
Abstract: PARADIGMA (PARticipative Approach to DIsease
Global Management) is a pilot project which aims to develop and
demonstrate an Internet based reference framework to share scientific
resources and findings in the treatment of major diseases.
PARADIGMA defines and disseminates a common methodology and
optimised protocols (Clinical Pathways) to support service functions
directed to patients and individuals on matters like prevention, posthospitalisation
support and awareness. PARADIGMA will provide a
platform of information services - user oriented and optimised
against social, cultural and technological constraints - supporting the
Health Care Global System of the Euro-Mediterranean Community
in a continuous improvement process.
Digital Article Identifier (DOI):
172
14909
Facial Expressions Animation and Lip Tracking Using Facial Characteristic Points and Deformable Model
Abstract: Face and facial expressions play essential roles in
interpersonal communication. Most of the current works on the facial
expression recognition attempt to recognize a small set of the
prototypic expressions such as happy, surprise, anger, sad, disgust
and fear. However the most of the human emotions are
communicated by changes in one or two of discrete features. In this
paper, we develop a facial expressions synthesis system, based on the
facial characteristic points (FCP's) tracking in the frontal image
sequences. Selected FCP's are automatically tracked using a crosscorrelation
based optical flow. The proposed synthesis system uses a
simple deformable facial features model with a few set of control
points that can be tracked in original facial image sequences.
Digital Article Identifier (DOI):
171
4107
Fuzzy Predictive Pursuit Guidance in the Homing Missiles
Abstract: A fuzzy predictive pursuit guidance is proposed as an
alternative to the conventional methods. The purpose of this scheme
is to obtain a stable and fast guidance. The noise effects must be
reduced in homing missile guidance to get an accurate control. An
aerodynamic missile model is simulated first and a fuzzy predictive
pursuit control algorithm is applied to reduce the noise effects. The
performance of this algorithm is compared with the performance of
the classical proportional derivative control. Stability analysis of the
proposed guidance method is performed and compared with the
stability properties of other guidance methods. Simulation results
show that the proposed method provides the satisfying performance.
Digital Article Identifier (DOI):
170
6504
Determination of Optimum Length of Framesand Number of Vectors to Compress ECG Signals
Abstract: In this study, to compress ECG signals, KLT (Karhunen-
Loeve Transform) method has been used. The purpose of this method is to
perform effective ECG coding by a correlation between the length of frames
and the number of vectors of ECG signals.
Digital Article Identifier (DOI):
169
2154
Traceable Watermarking System using SoC for Digital Cinema Delivery
Abstract: As the development of digital technology is increasing,
Digital cinema is getting more spread.
However, content copy and attack against the digital cinema becomes
a serious problem. To solve the above security problem, we propose
“Additional Watermarking" for digital cinema delivery system. With
this proposed “Additional watermarking" method, we protect content
copyrights at encoder and user side information at decoder. It realizes
the traceability of the watermark embedded at encoder.
The watermark is embedded into the random-selected frames using
Hash function. Using it, the embedding position is distributed by Hash
Function so that third parties do not break off the watermarking
algorithm.
Finally, our experimental results show that proposed method is much
better than the convenient watermarking techniques in terms of
robustness, image quality and its simple but unbreakable algorithm.
Digital Article Identifier (DOI):
168
5822
3D Shape Modelling of Left Ventricle: Towards Correlation of Myocardial Scintigraphy Data and Coronarography Result
Abstract: The myocardial sintigraphy is an imaging modality which provides functional informations. Whereas, coronarography modality gives useful informations about coronary arteries anatomy. In case of coronary artery disease (CAD), the coronarography can not determine precisely which moderate lesions (artery reduction between 50% and 70%), known as the “gray zone", are haemodynamicaly significant. In this paper, we aim to define the relationship between the location and the degree of the stenosis in coronary arteries and the observed perfusion on the myocardial scintigraphy. This allows us to model the impact evolution of these stenoses in order to justify a coronarography or to avoid it for patients suspected being in the gray zone. Our approach is decomposed in two steps. The first step consists in modelling a coronary artery bed and stenoses of different location and degree. The second step consists in modelling the left ventricle at stress and at rest using the sphercical harmonics model and myocardial scintigraphic data. We use the spherical harmonics descriptors to analyse left ventricle model deformation between stress and rest which permits us to conclude if ever an ischemia exists and to quantify it.
Digital Article Identifier (DOI):
167
10008337
The Feedback Control for Distributed Systems
Abstract: We study the problem of synthesis of lumped sources
control for the objects with distributed parameters on the basis of
continuous observation of phase state at given points of object. In the
proposed approach the phase state space (phase space) is beforehand
somehow partitioned at observable points into given subsets (zones).
The synthesizing control actions therewith are taken from the class of
piecewise constant functions. The current values of control actions
are determined by the subset of phase space that contains the
aggregate of current states of object at the observable points (in these
states control actions take constant values). In the paper such
synthesized control actions are called zone control actions. A
technique to obtain optimal values of zone control actions with the
use of smooth optimization methods is given. With this aim, the
formulas of objective functional gradient in the space of zone control
actions are obtained.
Digital Article Identifier (DOI):
166
9234
Intelligent Solutions for Umbrella Systems in Telecommunication Supervision Systems
Abstract: This paper indicate the importance of
telecommunications supervision systems (TSS), integrating
heterogeneous TSS into single system thru umbrella systems,
introduces the structure, features, requirements of TSS and TSS
related intelligent solutions.
Digital Article Identifier (DOI):
165
4230
The Usefulness of Logical Structure in Flexible Document Categorization
Abstract: This paper presents a new approach for automatic
document categorization. Exploiting the logical structure of the
document, our approach assigns a HTML document to one or more
categories (thesis, paper, call for papers, email, ...). Using a set of
training documents, our approach generates a set of rules used to
categorize new documents. The approach flexibility is carried out
with rule weight association representing your importance in the
discrimination between possible categories. This weight is
dynamically modified at each new document categorization. The
experimentation of the proposed approach provides satisfactory
results.
Digital Article Identifier (DOI):
164
15277
Knowledge Based Wear Particle Analysis
Abstract: The paper describes a knowledge based system for
analysis of microscopic wear particles. Wear particles contained in
lubricating oil carry important information concerning machine
condition, in particular the state of wear. Experts (Tribologists) in the
field extract this information to monitor the operation of the machine
and ensure safety, efficiency, quality, productivity, and economy of
operation. This procedure is not always objective and it can also be
expensive. The aim is to classify these particles according to their
morphological attributes of size, shape, edge detail, thickness ratio,
color, and texture, and by using this classification thereby predict
wear failure modes in engines and other machinery. The attribute
knowledge links human expertise to the devised Knowledge Based
Wear Particle Analysis System (KBWPAS). The system provides an
automated and systematic approach to wear particle identification
which is linked directly to wear processes and modes that occur in
machinery. This brings consistency in wear judgment prediction
which leads to standardization and also less dependence on
Tribologists.
Digital Article Identifier (DOI):
163
4278
Modified Fuzzy PID Control for Networked Control Systems with Random Delays
Abstract: To deal with random delays in Networked Control System (NCS), Modified Fuzzy PID Controller is introduced in this paper to implement real-time control adaptively. Via adjusting the control signal dynamically, the system performance is improved. In this paper, the design process and the ultimate simulation results are represented. Finally, examples and corresponding comparisons prove the significance of this method.
Digital Article Identifier (DOI):
162
333
Robust H State-Feedback Control for Uncertain Fuzzy Markovian Jump Systems: LMI-Based Design
Abstract: This paper investigates the problem of designing a robust state-feedback controller for a class of uncertain Markovian jump nonlinear systems that guarantees the L2-gain from an exogenous input to a regulated output is less than or equal to a prescribed value. First, we approximate this class of uncertain Markovian jump nonlinear systems by a class of uncertain Takagi-Sugeno fuzzy models with Markovian jumps. Then, based on an LMI approach, LMI-based sufficient conditions for the uncertain Markovian jump nonlinear systems to have an H performance are derived. An illustrative example is used to illustrate the effectiveness of the proposed design techniques.
Digital Article Identifier (DOI):
161
14792
Approximation Algorithm for the Shortest Approximate Common Superstring Problem
Abstract: The Shortest Approximate Common Superstring
(SACS) problem is : Given a set of strings f={w1, w2, ... , wn},
where no wi is an approximate substring of wj, i ≠ j, find a shortest
string Sa, such that, every string of f is an approximate substring of
Sa. When the number of the strings n>2, the SACS problem becomes
NP-complete. In this paper, we present a greedy approximation
SACS algorithm. Our algorithm is a 1/2-approximation for the SACS
problem. It is of complexity O(n2*(l2+log(n))) in computing time,
where n is the number of the strings and l is the length of a string.
Our SACS algorithm is based on computation of the Length of the
Approximate Longest Overlap (LALO).
Digital Article Identifier (DOI):
160
6135
On Problem of Parameters Identification of Dynamic Object
Abstract: In this paper, some problem formulations of dynamic object parameters recovery described by non-autonomous system of ordinary differential equations with multipoint unshared edge conditions are investigated. Depending on the number of additional conditions the problem is reduced to an algebraic equations system or to a problem of quadratic programming. With this purpose the paper offers a new scheme of the edge conditions transfer method called by conditions shift. The method permits to get rid from differential links and multipoint unshared initially-edge conditions. The advantage of the proposed approach is concluded by capabilities of reduction of a parametric identification problem to essential simple problems of the solution of an algebraic system or quadratic programming.
Digital Article Identifier (DOI):
159
8652
An Analysis of Blackouts for Electric Power Transmission Systems
Abstract: In this paper an analysis of blackouts in electric power
transmission systems is implemented using a model and studied in
simple networks with a regular topology. The proposed model
describes load demand and network improvements evolving on a
slow timescale as well as the fast dynamics of cascading overloads
and outages.
Digital Article Identifier (DOI):
158
7180
Forecasting Fraudulent Financial Statements using Data Mining
Abstract: This paper explores the effectiveness of machine
learning techniques in detecting firms that issue fraudulent financial
statements (FFS) and deals with the identification of factors
associated to FFS. To this end, a number of experiments have been
conducted using representative learning algorithms, which were
trained using a data set of 164 fraud and non-fraud Greek firms in the
recent period 2001-2002. The decision of which particular method to
choose is a complicated problem. A good alternative to choosing
only one method is to create a hybrid forecasting system
incorporating a number of possible solution methods as components
(an ensemble of classifiers). For this purpose, we have implemented
a hybrid decision support system that combines the representative
algorithms using a stacking variant methodology and achieves better
performance than any examined simple and ensemble method. To
sum up, this study indicates that the investigation of financial
information can be used in the identification of FFS and underline the
importance of financial ratios.
Digital Article Identifier (DOI):
157
14136
Data Preprocessing for Supervised Leaning
Abstract: Many factors affect the success of Machine Learning
(ML) on a given task. The representation and quality of the instance
data is first and foremost. If there is much irrelevant and redundant
information present or noisy and unreliable data, then knowledge
discovery during the training phase is more difficult. It is well known
that data preparation and filtering steps take considerable amount of
processing time in ML problems. Data pre-processing includes data
cleaning, normalization, transformation, feature extraction and
selection, etc. The product of data pre-processing is the final training
set. It would be nice if a single sequence of data pre-processing
algorithms had the best performance for each data set but this is not
happened. Thus, we present the most well know algorithms for each
step of data pre-processing so that one achieves the best performance
for their data set.
Digital Article Identifier (DOI):
156
1891
Automatic Recognition of Emotionally Coloured Speech
Abstract: Emotion in speech is an issue that has been attracting
the interest of the speech community for many years, both in the
context of speech synthesis as well as in automatic speech
recognition (ASR). In spite of the remarkable recent progress in
Large Vocabulary Recognition (LVR), it is still far behind the
ultimate goal of recognising free conversational speech uttered by
any speaker in any environment. Current experimental tests prove
that using state of the art large vocabulary recognition systems the
error rate increases substantially when applied to
spontaneous/emotional speech. This paper shows that recognition
rate for emotionally coloured speech can be improved by using a
language model based on increased representation of emotional
utterances.
Digital Article Identifier (DOI):
155
1900
Words Reordering based on Statistical Language Model
Abstract: There are multiple reasons to expect that detecting the
word order errors in a text will be a difficult problem, and detection
rates reported in the literature are in fact low. Although grammatical
rules constructed by computer linguists improve the performance of
grammar checker in word order diagnosis, the repairing task is still
very difficult. This paper presents an approach for repairing word
order errors in English text by reordering words in a sentence and
choosing the version that maximizes the number of trigram hits
according to a language model. The novelty of this method concerns
the use of an efficient confusion matrix technique for reordering the
words. The comparative advantage of this method is that works with
a large set of words, and avoids the laborious and costly process of
collecting word order errors for creating error patterns.
Digital Article Identifier (DOI):
154
2948
A Proposed Framework for Visualization to Teach Computer Science
Abstract: Computer programming is considered a very difficult
course by many computer science students. The reasons for the
difficulties include cognitive load involved in programming,
different learning styles of students, instructional methodology and
the choice of the programming languages. To reduce the difficulties
the following have been tried: pair programming, program
visualization, different learning styles etc. However, these efforts
have produced limited success. This paper reviews the problem and
proposes a framework to help students overcome the difficulties
involved.
Digital Article Identifier (DOI):
153
13215
Decision Support System “Crop-9-DSS“ for Identified Crops
Abstract: Application of Expert System in the area of agriculture would take the form of Integrated Crop Management decision aids and would encompass water management, fertilizer management, crop protection systems and identification of implements. In order to remain competitive, the modern farmer often relies on agricultural specialists and advisors to provide information for decision-making. An expert system normally composed of a knowledge base (information, heuristics, etc.), inference engine (analyzes knowledge base), and end user interface (accepting inputs, generating outputs). Software named 'CROP-9-DSS' incorporating all modern features like, graphics, photos, video clippings etc. has been developed. This package will aid as a decision support system for identification of pest and diseases with control measures, fertilizer recommendation system, water management system and identification of farm implements for leading crops of Kerala (India) namely Coconut, Rice, Cashew, Pepper, Banana, four vegetables like Amaranthus, Bhindi, Brinjal and Cucurbits. 'CROP-9-DSS' will act as an expert system to agricultural officers, scientists in the field of agriculture and extension workers for decision-making and help them in suggesting suitable recommendations.
Digital Article Identifier (DOI):
152
487
Reducing Cognitive Load in Learning Computer Programming
Abstract: Many difficulties are faced in the process of learning
computer programming. This paper will propose a system framework
intended to reduce cognitive load in learning programming. In first
section focus is given on the process of learning and the
shortcomings of the current approaches to learning programming.
Finally the proposed prototype is suggested along with the
justification of the prototype. In the proposed prototype the concept
map is used as visualization metaphor. Concept maps are similar to
the mental schema in long term memory and hence it can reduce
cognitive load well. In addition other method such as part code
method is also proposed in this framework to can reduce cognitive
load.
Digital Article Identifier (DOI):
151
2516
Electromagnetic Imaging of Inhomogeneous Dielectric Cylinders Buried in a Slab Mediumby TE Wave Illumination
Abstract: The electromagnetic imaging of inhomogeneous
dielectric cylinders buried in a slab medium by transverse electric
(TE) wave illumination is investigated. Dielectric cylinders of
unknown permittivities are buried in second space and scattered a
group of unrelated waves incident from first space where the scattered
field is recorded. By proper arrangement of the various unrelated
incident fields, the difficulties of ill-posedness and nonlinearity are
circumvented, and the permittivity distribution can be reconstructed
through simple matrix operations. The algorithm is based on the
moment method and the unrelated illumination method. Numerical
results are given to demonstrate the capability of the inverse
algorithm. Good reconstruction is obtained even in the presence of
additive Gaussian random noise in measured data. In addition, the
effect of noise on the reconstruction result is also investigated.
Digital Article Identifier (DOI):
150
4881
Impact of Metallic Furniture on UWB Channel Statistical Characteristics by BER
Abstract: The bit error rate (BER) performance for ultra-wide
band (UWB) indoor communication with impact of metallic furniture
is investigated. The impulse responses of different indoor
environments for any transmitter and receiver location are computed
by shooting and bouncing ray/image and inverse Fourier transform
techniques. By using the impulse responses of these multipath
channels, the BER performance for binary pulse amplitude
modulation (BPAM) impulse radio UWB communication system are
calculated. Numerical results have shown that the multi-path effect
by the metallic cabinets is an important factor for BER performance.
Also the outage probability for the UWB multipath environment with
metallic cabinets is more serious (about 18%) than with wooden
cabinets. Finally, it is worth noting that in these cases the present
work provides not only comparative information but also quantitative
information on the performance reduction.
Digital Article Identifier (DOI):
149
940
A Novel FFT-Based Frequency Offset Estimator for OFDM Systems
Abstract: This paper proposes a novel frequency offset (FO) estimator for orthogonal frequency division multiplexing. Simplicity is most significant feature of this algorithm and can be repeated to achieve acceptable accuracy. Also fractional and integer part of FO is estimated jointly with use of the same algorithm. To do so, instead of using conventional algorithms that usually use correlation function, we use DFT of received signal. Therefore, complexity will be reduced and we can do synchronization procedure by the same hardware that is used to demodulate OFDM symbol. Finally, computer simulation shows that the accuracy of this method is better than other conventional methods.
Digital Article Identifier (DOI):
148
7319
Bandwidth Allocation for ABR Service in Cellular Networks
Abstract: Available Bit Rate Service (ABR) is the lower priority
service and the better service for the transmission of data. On wireline
ATM networks ABR source is always getting the feedback from
switches about increase or decrease of bandwidth according to the
changing network conditions and minimum bandwidth is guaranteed.
In wireless networks guaranteeing the minimum bandwidth is really a
challenging task as the source is always in mobile and traveling from
one cell to another cell. Re establishment of virtual circuits from start
to end every time causes the delay in transmission. In our proposed
solution we proposed the mechanism to provide more available
bandwidth to the ABR source by re-usage of part of old Virtual
Channels and establishing the new ones. We want the ABR source to
transmit the data continuously (non-stop) inorderto avoid the delay.
In worst case scenario at least minimum bandwidth is to be allocated.
In order to keep the data flow continuously, priority is given to the
handoff ABR call against new ABR call.
Digital Article Identifier (DOI):
147
707
Adaptive Radio Resource Allocation for Multiple Traffic OFDMA Broadband Wireless Access System
Abstract: In this paper, an adaptive radio resource allocation
(RRA) algorithm applying to multiple traffic OFDMA system is
proposed, which distributes sub-carrier and loading bits among users
according to their different QoS requirements and traffic class. By
classifying and prioritizing the users based on their traffic
characteristic and ensuring resource for higher priority users, the
scheme decreases tremendously the outage probability of the users
requiring a real time transmission without impact on the spectrum
efficiency of system, as well as the outage probability of data users is
not increased compared with the RRA methods published.
Digital Article Identifier (DOI):
146
4125
Bandwidth Allocation in Mobile ATM Cellular Networks
Abstract: Bandwidth allocation in wired network is less complex
and to allocate bandwidth in wireless networks is complex and
challenging, due to the mobility of source end system.This paper
proposes a new approach to bandwidth allocation to higher and lower
priority mobile nodes.In our proposal bandwidth allocation to new
mobile node is based on bandwidth utilization of existing mobile
nodes.The first section of the paper focuses on introduction to
bandwidth allocation in wireless networks and presents the existing
solutions available for allocation of bandwidth. The second section
proposes the new solution for the bandwidth allocation to higher and
lower priority nodes. Finally this paper ends with the analytical
evaluation of the proposed solution.
Digital Article Identifier (DOI):
145
2751
Downlink Scheduling and Radio Resource Allocation in Adaptive OFDMA Wireless Communication Systems for User-Individual QoS
Abstract: In this paper, we address the problem of adaptive radio
resource allocation (RRA) and packet scheduling in the downlink of a
cellular OFDMA system, and propose a downlink multi-carrier
proportional fair (MPF) scheduler and its joint with adaptive RRA
algorithm to distribute radio resources among multiple users according
to their individual QoS requirements. The allocation and scheduling
objective is to maximize the total throughput, while at the same time
maintaining the fairness among users. The simulation results
demonstrate that the methods presented provide for user more explicit
fairness relative to RRA algorithm, but the joint scheme achieves the
higher sum-rate capacity with flexible parameters setting compared
with MPF scheduler.
Digital Article Identifier (DOI):
144
15266
Combinatorial Approach to Reliability Evaluation of Network with Unreliable Nodes and Unreliable Edges
Abstract: Estimating the reliability of a computer network has been a subject of great interest. It is a well known fact that this problem is NP-hard. In this paper we present a very efficient combinatorial approach for Monte Carlo reliability estimation of a network with unreliable nodes and unreliable edges. Its core is the computation of some network combinatorial invariants. These invariants, once computed, directly provide pure and simple framework for computation of network reliability. As a specific case of this approach we obtain tight lower and upper bounds for distributed network reliability (the so called residual connectedness reliability). We also present some simulation results.
Digital Article Identifier (DOI):
143
1542
PAPR Reduction Method for OFDM Signalby Using Dummy Sub-carriers
Abstract: One of the disadvantages of using OFDM is the larger
peak to averaged power ratio (PAPR) in its time domain signal. The
larger PAPR signal would course the fatal degradation of bit error
rate performance (BER) due to the inter-modulation noise in the nonlinear
channel. This paper proposes an improved DSI (Dummy
Sequence Insertion) method, which can achieve the better PAPR and
BER performances. The feature of proposed method is to optimize
the phase of each dummy sub-carrier so as to reduce the PAPR
performance by changing all predetermined phase coefficients in the
time domain signal, which is calculated for data sub-carriers and
dummy sub-carriers separately. To achieve the better PAPR
performance, this paper also proposes to employ the time-frequency
domain swapping algorithm for fine adjustment of phase coefficient
of the dummy subcarriers, which can achieve the less complexity of
processing and achieves the better PAPR and BER performances
than those for the conventional DSI method. This paper presents
various computer simulation results to verify the effectiveness of
proposed method as comparing with the conventional methods in the
non-linear channel.
Digital Article Identifier (DOI):
142
10162
Overload Control in a SIP Signaling Network
Abstract: The Internet telephony employs a new type of Internet communication on which a mutual communication is realized by establishing sessions. Session Initiation Protocol (SIP) is used to establish sessions between end-users. For unreliable transmission (UDP), SIP message should be retransmitted when it is lost. The retransmissions increase a load of the SIP signaling network, and sometimes lead to performance degradation when a network is overloaded. The paper proposes an overload control for a SIP signaling network to protect from a performance degradation. Introducing two thresholds in a queue of a SIP proxy server, the SIP proxy server detects a congestion. Once congestion is detected, a SIP signaling network restricts to make new calls. The proposed overload control is evaluated using the network simulator (ns-2). With simulation results, the paper shows the proposed overload control works well.
Digital Article Identifier (DOI):
141
3510
Models to Customise Web Service Discovery Result using Static and Dynamic Parameters
Abstract: This paper presents three models which enable the
customisation of Universal Description, Discovery and Integration
(UDDI) query results, based on some pre-defined and/or real-time
changing parameters. These proposed models detail the requirements,
design and techniques which make ranking of Web service discovery
results from a service registry possible. Our contribution is two fold:
First, we present an extension to the UDDI inquiry capabilities. This
enables a private UDDI registry owner to customise or rank the query
results, based on its business requirements. Second, our proposal
utilises existing technologies and standards which require minimal
changes to existing UDDI interfaces or its data structures. We believe
these models will serve as valuable reference for enhancing the
service discovery methods within a private UDDI registry
environment.
Digital Article Identifier (DOI):
140
9012
Packet Losses Interpretation in Mobile Internet
Abstract: The mobile users with Laptops need to have an
efficient access to i.e. their home personal data or to the Internet from
any place in the world, regardless of their location or point of
attachment, especially while roaming outside the home subnet. An
efficient interpretation of packet losses problem that is encountered
from this roaming is to the centric of all aspects in this work, to be
over-highlighted. The main previous works, such as BER-systems,
Amigos, and ns-2 implementation that are considered to be in
conjunction with that problem under study are reviewed and
discussed. Their drawbacks and limitations, of stopping only at
monitoring, and not to provide an actual solution for eliminating or
even restricting these losses, are mentioned. Besides that, the
framework around which we built a Triple-R sequence as a costeffective
solution to eliminate the packet losses and bridge the gap
between subnets, an area that until now has been largely neglected, is
presented. The results show that, in addition to the high bit error rate
of wireless mobile networks, mainly the low efficiency of mobile-IP
registration procedure is a direct cause of these packet losses.
Furthermore, the output of packet losses interpretation resulted an
illustrated triangle of the registration process. This triangle should be
further researched and analyzed in our future work.
Digital Article Identifier (DOI):
139
12360
System Concept for Low Analog Complexity and High-IF Superposition Heterodyne Receivers
Abstract: For today-s and future wireless communications applications,
more and more data traffic has to be transmitted with
growing speed and quality demands. The analog front-end of any
mobile device has to cope with very hard specifications regardless
which transmission standard has to be supported. State-of-the-art
analog front-end implementations are reaching the limit of technical
feasibility. For that reason, alternative front-end architectures could
support a continuing development of mobile communications e.g.,
six-port-based front-ends [1], [2].
In this article we propose an analog front-end with high intermediate
frequency and which utilizes additive mixing instead
of multiplicative mixing. The system architecture is presented and
several spurious effects as well as their influence on the system
dimensioning are discussed. Furthermore, several issues concerning
the technical feasibility are provided and some simulation results
are discussed which show the principle functionality of the proposed
superposition heterodyne receiver.
Digital Article Identifier (DOI):
138
1026
PetriNets Manipulation to Reduce Roaming Duration: Criterion to Improve Handoff Management
Abstract: IETF RFC 2002 originally introduced the wireless
Mobile-IP protocol to support portable IP addresses for mobile
devices that often change their network access points to the Internet.
The inefficiency of this protocol mainly within the handoff
management produces large end-to-end packet delays, during
registration process, and further degrades the system efficiency due to
packet losses between subnets. The criterion to initiate a simple and
fast full-duplex connection between the home agent and foreign
agent, to reduce the roaming duration, is a very important issue to be
considered by a work in this paper. State-transition Petri-Nets of the
modeling scenario-based CIA: communication inter-agents procedure
as an extension to the basic Mobile-IP registration process was
designed and manipulated. The heuristic of configuration file during
practical Setup session for registration parameters, on Cisco platform
Router-1760 using IOS 12.3 (15)T is created. Finally, stand-alone
performance simulations results from Simulink Matlab, within each
subnet and also between subnets, are illustrated for reporting better
end-to-end packet delays. Results verified the effectiveness of our
Mathcad analytical manipulation and experimental implementation. It
showed lower values of end-to-end packet delay for Mobile-IP using
CIA procedure. Furthermore, it reported packets flow between
subnets to improve packet losses between subnets.
Digital Article Identifier (DOI):
137
14897
QoS Expectations in IP Networks: A Practical View
Abstract: Traditionally, Internet has provided best-effort service to every user regardless of its requirements. However, as Internet becomes universally available, users demand more bandwidth and applications require more and more resources, and interest has developed in having the Internet provide some degree of Quality of Service. Although QoS is an important issue, the question of how it will be brought into the Internet has not been solved yet. Researches, due to the rapid advances in technology are proposing new and more desirable capabilities for the next generation of IP infrastructures. But neither all applications demand the same amount of resources, nor all users are service providers. In this way, this paper is the first of a series of papers that presents an architecture as a first step to the optimization of QoS in the Internet environment as a solution to a SMSE's problem whose objective is to provide public service to internet with certain Quality of Service expectations. The service provides new business opportunities, but also presents new challenges. We have designed and implemented a scalable service framework that supports adaptive bandwidth based on user demands, and the billing based on usage and on QoS. The developed application has been evaluated and the results show that traffic limiting works at optimum and so it does exceeding bandwidth distribution. However, some considerations are done and currently research is under way in two basic areas: (i) development and testing new transfer protocols, and (ii) developing new strategies for traffic improvements based on service differentiation.
Digital Article Identifier (DOI):
136
12380
Bandwidth Optimization through Dynamic Routing in ATM Networks: Genetic Algorithm and Tabu Search Approach
Abstract: Asynchronous Transfer Mode (ATM) is widely used
in telecommunications systems to send data, video and voice at a
very high speed. In ATM network optimizing the bandwidth through
dynamic routing is an important consideration. Previous research
work shows that traditional optimization heuristics result in suboptimal
solution. In this paper we have explored non-traditional
optimization technique. We propose comparison of two such
algorithms - Genetic Algorithm (GA) and Tabu search (TS), based on
non-traditional Optimization approach, for solving the dynamic
routing problem in ATM networks which in return will optimize the
bandwidth. The optimized bandwidth could mean that some
attractive business applications would become feasible such as high
speed LAN interconnection, teleconferencing etc. We have also
performed a comparative study of the selection mechanisms in GA
and listed the best selection mechanism and a new initialization
technique which improves the efficiency of the GA.
Digital Article Identifier (DOI):
135
459
Using Ontology Search in the Design of Class Diagram from Business Process Model
Abstract: Business process model describes process flow of a
business and can be seen as the requirement for developing a
software application. This paper discusses a BPM2CD guideline
which complements the Model Driven Architecture concept by
suggesting how to create a platform-independent software model in
the form of a UML class diagram from a business process model. An
important step is the identification of UML classes from the business
process model. A technique for object-oriented analysis called
domain analysis is borrowed and key concepts in the business
process model will be discovered and proposed as candidate classes
for the class diagram. The paper enhances this step by using ontology
search to help identify important classes for the business domain. As
ontology is a source of knowledge for a particular domain which
itself can link to ontologies of related domains, the search can give a
refined set of candidate classes for the resulting class diagram.
Digital Article Identifier (DOI):
134
15551
Layout Based Spam Filtering
Abstract: Due to the constant increase in the volume of information available to applications in fields varying from medical diagnosis to web search engines, accurate support of similarity becomes an important task. This is also the case of spam filtering techniques where the similarities between the known and incoming messages are the fundaments of making the spam/not spam decision. We present a novel approach to filtering based solely on layout, whose goal is not only to correctly identify spam, but also warn about major emerging threats. We propose a mathematical formulation of the email message layout and based on it we elaborate an algorithm to separate different types of emails and find the new, numerically relevant spam types.
Digital Article Identifier (DOI):
133
2028
An Enhanced Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm
Abstract: With the exponential growth of networked system and
application such as eCommerce, the demand for effective internet
security is increasing. Cryptology is the science and study of systems
for secret communication. It consists of two complementary fields of
study: cryptography and cryptanalysis. The application of genetic
algorithms in the cryptanalysis of knapsack ciphers is suggested by
Spillman [7]. In order to improve the efficiency of genetic algorithm
attack on knapsack cipher, the previously published attack was
enhanced and re-implemented with variation of initial assumptions
and results are compared with Spillman results. The experimental
result of research indicates that the efficiency of genetic algorithm
attack on knapsack cipher can be improved with variation of initial
assumption.
Digital Article Identifier (DOI):
132
5064
Measuring Process Component Design on Achieving Managerial Goals
Abstract: Process-oriented software development is a new
software development paradigm in which software design is modeled
by a business process which is in turn translated into a process
execution language for execution. The building blocks of this
paradigm are software units that are composed together to work
according to the flow of the business process. This new paradigm
still exhibits the characteristic of the applications built with the
traditional software component technology. This paper discusses an
approach to apply a traditional technique for software component
fabrication to the design of process-oriented software units, called
process components. These process components result from
decomposing a business process of a particular application domain
into subprocesses, and these process components can be reused to
design the business processes of other application domains. The
decomposition considers five managerial goals, namely cost
effectiveness, ease of assembly, customization, reusability, and
maintainability. The paper presents how to design or decompose
process components from a business process model and measure
some technical features of the design that would affect the
managerial goals. A comparison between the measurement values
from different designs can tell which process component design is
more appropriate for the managerial goals that have been set. The
proposed approach can be applied in Web Services environment
which accommodates process-oriented software development.
Digital Article Identifier (DOI):
131
9049
The Auto-Tuning PID Controller for Interacting Water Level Process
Abstract: This paper presents the approach to design the Auto-
Tuning PID controller for interactive Water Level Process using
integral step response. The Integral Step Response (ISR) is the
method to model a dynamic process which can be done easily,
conveniently and very efficiently. Therefore this method is advantage
for design the auto tune PID controller. Our scheme uses the root
locus technique to design PID controller. In this paper MATLAB is
used for modeling and testing of the control system. The
experimental results of the interacting water level process can be
satisfyingly illustrated the transient response and the steady state
response.
Digital Article Identifier (DOI):
130
7599
A Framework for Product Development Process including HW and SW Components
Abstract: This paper proposes a framework for product
development including hardware and software components. It
provides separation of hardware dependent software, modifications of
current product development process, and integration of software
modules with existing product configuration models and assembly
product structures. In order to decide the dependent software, the
framework considers product configuration modules and engineering
changes of associated software and hardware components. In order to
support efficient integration of the two different hardware and
software development, a modified product development process is
proposed. The process integrates the dependent software development
into product development through the interchanges of specific product
information. By using existing product data models in Product Data
Management (PDM), the framework represents software as modules
for product configurations and software parts for product structure.
The framework is applied to development of a robot system in order to
show its effectiveness.
Digital Article Identifier (DOI):
129
10513
FPGA-based Systems for Evolvable Hardware
Abstract: Since 1992, year where Hugo de Garis has published
the first paper on Evolvable Hardware (EHW), a period of intense
creativity has followed. It has been actively researched, developed
and applied to various problems. Different approaches have been
proposed that created three main classifications: extrinsic, mixtrinsic
and intrinsic EHW. Each of these solutions has a real interest.
Nevertheless, although the extrinsic evolution generates some
excellent results, the intrinsic systems are not so advanced. This
paper suggests 3 possible solutions to implement the run-time
configuration intrinsic EHW system: FPGA-based Run-Time
Configuration system, JBits-based Run-Time Configuration system
and Multi-board functional-level Run-Time Configuration system.
The main characteristic of the proposed architectures is that they are
implemented on Field Programmable Gate Array. A comparison of
proposed solutions demonstrates that multi-board functional-level
run-time configuration is superior in terms of scalability, flexibility
and the implementation easiness.
Digital Article Identifier (DOI):
128
13205
Hybrid Markov Game Controller Design Algorithms for Nonlinear Systems
Abstract: Markov games can be effectively used to design
controllers for nonlinear systems. The paper presents two novel
controller design algorithms by incorporating ideas from gametheory
literature that address safety and consistency issues of the
'learned' control strategy. A more widely used approach for
controller design is the H∞ optimal control, which suffers from high
computational demand and at times, may be infeasible. We generate
an optimal control policy for the agent (controller) via a simple
Linear Program enabling the controller to learn about the unknown
environment. The controller is facing an unknown environment and
in our formulation this environment corresponds to the behavior rules
of the noise modeled as the opponent. Proposed approaches aim to
achieve 'safe-consistent' and 'safe-universally consistent' controller
behavior by hybridizing 'min-max', 'fictitious play' and 'cautious
fictitious play' approaches drawn from game theory. We empirically
evaluate the approaches on a simulated Inverted Pendulum swing-up
task and compare its performance against standard Q learning.
Digital Article Identifier (DOI):
127
10421
Feasibility of the Evolutionary Algorithm using Different Behaviours of the Mutation Rate to Design Simple Digital Logic Circuits
Abstract: The evolutionary design of electronic circuits, or
evolvable hardware, is a discipline that allows the user to
automatically obtain the desired circuit design. The circuit
configuration is under the control of evolutionary algorithms. Several
researchers have used evolvable hardware to design electrical
circuits. Every time that one particular algorithm is selected to carry
out the evolution, it is necessary that all its parameters, such as
mutation rate, population size, selection mechanisms etc. are tuned in
order to achieve the best results during the evolution process. This
paper investigates the abilities of evolution strategy to evolve digital
logic circuits based on programmable logic array structures when
different mutation rates are used. Several mutation rates (fixed and
variable) are analyzed and compared with each other to outline the
most appropriate choice to be used during the evolution of
combinational logic circuits. The experimental results outlined in this
paper are important as they could be used by every researcher who
might need to use the evolutionary algorithm to design digital logic
circuits.
Digital Article Identifier (DOI):
126
10964
2D and 3D Finite Element Method Packages of CEMTool for Engineering PDE Problems
Abstract: CEMTool is a command style design and analyzing
package for scientific and technological algorithm and a matrix based
computation language. In this paper, we present new 2D & 3D
finite element method (FEM) packages for CEMTool. We discuss
the detailed structures and the important features of pre-processor,
solver, and post-processor of CEMTool 2D & 3D FEM packages. In
contrast to the existing MATLAB PDE Toolbox, our proposed FEM
packages can deal with the combination of the reserved words. Also,
we can control the mesh in a very effective way. With the introduction
of new mesh generation algorithm and fast solving technique, our
FEM packages can guarantee the shorter computational time than
MATLAB PDE Toolbox. Consequently, with our new FEM packages,
we can overcome some disadvantages or limitations of the existing
MATLAB PDE Toolbox.
Digital Article Identifier (DOI):
125
14894
Trajectory-Based Modified Policy Iteration
Abstract: This paper presents a new problem solving approach
that is able to generate optimal policy solution for finite-state
stochastic sequential decision-making problems with high data
efficiency. The proposed algorithm iteratively builds and improves
an approximate Markov Decision Process (MDP) model along with
cost-to-go value approximates by generating finite length trajectories
through the state-space. The approach creates a synergy between an
approximate evolving model and approximate cost-to-go values to
produce a sequence of improving policies finally converging to the
optimal policy through an intelligent and structured search of the
policy space. The approach modifies the policy update step of the
policy iteration so as to result in a speedy and stable convergence to
the optimal policy. We apply the algorithm to a non-holonomic
mobile robot control problem and compare its performance with
other Reinforcement Learning (RL) approaches, e.g., a) Q-learning,
b) Watkins Q(λ), c) SARSA(λ).
Digital Article Identifier (DOI):
124
2298
Vision-based Network System for Industrial Applications
Abstract: This paper presents the communication network for
machine vision system to implement to control systems and logistics
applications in industrial environment. The real-time distributed over
the network is very important for communication among vision node,
image processing and control as well as the distributed I/O node. A
robust implementation both with respect to camera packaging and
data transmission has been accounted. This network consists of a
gigabit Ethernet network and a switch with integrated fire-wall is
used to distribute the data and provide connection to the imaging
control station and IEC-61131 conform signal integration comprising
the Modbus TCP protocol. The real-time and delay time properties
each part on the network were considered and worked out in this
paper.
Digital Article Identifier (DOI):
123
10651
Neuro-Hybrid Models for Automotive System Identification
Abstract: In automotive systems almost all steps concerning the
calibration of several control systems, e.g., low idle governor or
boost pressure governor, are made with the vehicle because the timeto-
production and cost requirements on the projects do not allow for
the vehicle analysis necessary to build reliable models. Here is
presented a procedure using parametric and NN (neural network)
models that enables the generation of vehicle system models based
on normal ECU engine control unit) vehicle measurements. These
models are locally valid and permit pre and follow-up calibrations so
that, only the final calibrations have to be done with the vehicle.
Digital Article Identifier (DOI):
122
7067
Chilean Wines Classification based only on Aroma Information
Abstract: Results of Chilean wine classification based on the
information provided by an electronic nose are reported in this paper.
The classification scheme consists of two parts; in the first stage,
Principal Component Analysis is used as feature extraction method to
reduce the dimensionality of the original information. Then, Radial
Basis Functions Neural Networks is used as pattern recognition
technique to perform the classification. The objective of this study is
to classify different Cabernet Sauvignon, Merlot and Carménère wine
samples from different years, valleys and vineyards of Chile.
Digital Article Identifier (DOI):
121
11728
Solving Partially Monotone Problems with Neural Networks
Abstract: In many applications, it is a priori known that the
target function should satisfy certain constraints imposed by, for
example, economic theory or a human-decision maker. Here we
consider partially monotone problems, where the target variable
depends monotonically on some of the predictor variables but not all.
We propose an approach to build partially monotone models based
on the convolution of monotone neural networks and kernel
functions. The results from simulations and a real case study on
house pricing show that our approach has significantly better
performance than partially monotone linear models. Furthermore, the
incorporation of partial monotonicity constraints not only leads to
models that are in accordance with the decision maker's expertise,
but also reduces considerably the model variance in comparison to
standard neural networks with weight decay.
Digital Article Identifier (DOI):
120
14932
Neural Network Imputation in Complex Survey Design
Abstract: Missing data yields many analysis challenges. In case of complex survey design, in addition to dealing with missing data, researchers need to account for the sampling design to achieve useful inferences. Methods for incorporating sampling weights in neural network imputation were investigated to account for complex survey designs. An estimate of variance to account for the imputation uncertainty as well as the sampling design using neural networks will be provided. A simulation study was conducted to compare estimation results based on complete case analysis, multiple imputation using a Markov Chain Monte Carlo, and neural network imputation. Furthermore, a public-use dataset was used as an example to illustrate neural networks imputation under a complex survey design
Digital Article Identifier (DOI):
119
990
An ensemble of Weighted Support Vector Machines for Ordinal Regression
Abstract: Instead of traditional (nominal) classification we investigate
the subject of ordinal classification or ranking. An enhanced
method based on an ensemble of Support Vector Machines (SVM-s)
is proposed. Each binary classifier is trained with specific weights
for each object in the training data set. Experiments on benchmark
datasets and synthetic data indicate that the performance of our
approach is comparable to state of the art kernel methods for
ordinal regression. The ensemble method, which is straightforward
to implement, provides a very good sensitivity-specificity trade-off
for the highest and lowest rank.
Digital Article Identifier (DOI):
118
11491
Application of Feed Forward Neural Networks in Modeling and Control of a Fed-Batch Crystallization Process
Abstract: This paper is focused on issues of nonlinear dynamic process modeling and model-based predictive control of a fed-batch sugar crystallization process applying the concept of artificial neural networks as computational tools. The control objective is to force the operation into following optimal supersaturation trajectory. It is achieved by manipulating the feed flow rate of sugar liquor/syrup, considered as the control input. A feed forward neural network (FFNN) model of the process is first built as part of the controller structure to predict the process response over a specified (prediction) horizon. The predictions are supplied to an optimization procedure to determine the values of the control action over a specified (control) horizon that minimizes a predefined performance index. The control task is rather challenging due to the strong nonlinearity of the process dynamics and variations in the crystallization kinetics. However, the simulation results demonstrated smooth behavior of the control actions and satisfactory reference tracking.
Digital Article Identifier (DOI):
117
3462
Combined Sewer Overflow forecasting with Feed-forward Back-propagation Artificial Neural Network
Abstract: A feed-forward, back-propagation Artificial Neural
Network (ANN) model has been used to forecast the occurrences of
wastewater overflows in a combined sewerage reticulation system.
This approach was tested to evaluate its applicability as a method
alternative to the common practice of developing a complete
conceptual, mathematical hydrological-hydraulic model for the
sewerage system to enable such forecasts. The ANN approach
obviates the need for a-priori understanding and representation of the
underlying hydrological hydraulic phenomena in mathematical terms
but enables learning the characteristics of a sewer overflow from the
historical data.
The performance of the standard feed-forward, back-propagation
of error algorithm was enhanced by a modified data normalizing
technique that enabled the ANN model to extrapolate into the
territory that was unseen by the training data. The algorithm and the
data normalizing method are presented along with the ANN model
output results that indicate a good accuracy in the forecasted sewer
overflow rates. However, it was revealed that the accurate
forecasting of the overflow rates are heavily dependent on the
availability of a real-time flow monitoring at the overflow structure
to provide antecedent flow rate data. The ability of the ANN to
forecast the overflow rates without the antecedent flow rates (as is
the case with traditional conceptual reticulation models) was found to
be quite poor.
Digital Article Identifier (DOI):
116
4048
Performance Evaluation of Neural Network Prediction for Data Prefetching in Embedded Applications
Abstract: Embedded systems need to respect stringent real
time constraints. Various hardware components included in such
systems such as cache memories exhibit variability and therefore
affect execution time. Indeed, a cache memory access from an
embedded microprocessor might result in a cache hit where the
data is available or a cache miss and the data need to be fetched
with an additional delay from an external memory. It is therefore
highly desirable to predict future memory accesses during
execution in order to appropriately prefetch data without incurring
delays. In this paper, we evaluate the potential of several artificial
neural networks for the prediction of instruction memory
addresses. Neural network have the potential to tackle the nonlinear
behavior observed in memory accesses during program
execution and their demonstrated numerous hardware
implementation emphasize this choice over traditional forecasting
techniques for their inclusion in embedded systems. However,
embedded applications execute millions of instructions and
therefore millions of addresses to be predicted. This very
challenging problem of neural network based prediction of large
time series is approached in this paper by evaluating various neural
network architectures based on the recurrent neural network
paradigm with pre-processing based on the Self Organizing Map
(SOM) classification technique.
Digital Article Identifier (DOI):
115
4055
Enhancing Multi-Frame Images Using Self-Delaying Dynamic Networks
Abstract: This paper presents the use of a newly created network
structure known as a Self-Delaying Dynamic Network (SDN) to
create a high resolution image from a set of time stepped input
frames. These SDNs are non-recurrent temporal neural networks
which can process time sampled data. SDNs can store input data
for a lifecycle and feature dynamic logic based connections between
layers. Several low resolution images and one high resolution image
of a scene were presented to the SDN during training by a Genetic
Algorithm. The SDN was trained to process the input frames in order
to recreate the high resolution image. The trained SDN was then used
to enhance a number of unseen noisy image sets. The quality of high
resolution images produced by the SDN is compared to that of high
resolution images generated using Bi-Cubic interpolation. The SDN
produced images are superior in several ways to the images produced
using Bi-Cubic interpolation.
Digital Article Identifier (DOI):
114
11692
An Optical Flow Based Segmentation Method for Objects Extraction
Abstract: This paper describes a segmentation algorithm based
on the cooperation of an optical flow estimation method with edge
detection and region growing procedures.
The proposed method has been developed as a pre-processing
stage to be used in methodologies and tools for video/image indexing
and retrieval by content. The addressed problem consists in
extracting whole objects from background for producing images of
single complete objects from videos or photos. The extracted images
are used for calculating the object visual features necessary for both
indexing and retrieval processes.
The first task of the algorithm exploits the cues from motion
analysis for moving area detection. Objects and background are then
refined using respectively edge detection and region growing
procedures. These tasks are iteratively performed until objects and
background are completely resolved.
The developed method has been applied to a variety of indoor and
outdoor scenes where objects of different type and shape are
represented on variously textured background.
Digital Article Identifier (DOI):
113
7172
A Self Configuring System for Object Recognition in Color Images
Abstract: System MEMORI automatically detects and recognizes rotated and/or rescaled versions of the objects of a database within digital color images with cluttered background. This task is accomplished by means of a region grouping algorithm guided by heuristic rules, whose parameters concern some geometrical properties and the recognition score of the database objects. This paper focuses on the strategies implemented in MEMORI for the estimation of the heuristic rule parameters. This estimation, being automatic, makes the system a highly user-friendly tool.
Digital Article Identifier (DOI):
112
13027
Evaluation of Mixed-Mode Stress Intensity Factor by Digital Image Correlation and Intelligent Hybrid Method
Abstract: Displacement measurement was conducted on compact normal and shear specimens made of acrylic homogeneous material subjected to mixed-mode loading by digital image correlation. The intelligent hybrid method proposed by Nishioka et al. was applied to the stress-strain analysis near the crack tip. The accuracy of stress-intensity factor at the free surface was discussed from the viewpoint of both the experiment and 3-D finite element analysis. The surface images before and after deformation were taken by a CMOS camera, and we developed the system which enabled the real time stress analysis based on digital image correlation and inverse problem analysis. The great portion of processing time of this system was spent on displacement analysis. Then, we tried improvement in speed of this portion. In the case of cracked body, it is also possible to evaluate fracture mechanics parameters such as the J integral, the strain energy release rate, and the stress-intensity factor of mixed-mode. The 9-points elliptic paraboloid approximation could not analyze the displacement of submicron order with high accuracy. The analysis accuracy of displacement was improved considerably by introducing the Newton-Raphson method in consideration of deformation of a subset. The stress-intensity factor was evaluated with high accuracy of less than 1% of the error.
Digital Article Identifier (DOI):
111
5985
Weighted k-Nearest-Neighbor Techniques for High Throughput Screening Data
Abstract: The k-nearest neighbors (knn) is a simple but effective method of classification. In this paper we present an extended version of this technique for chemical compounds used in High Throughput Screening, where the distances of the nearest neighbors can be taken into account. Our algorithm uses kernel weight functions as guidance for the process of defining activity in screening data. Proposed kernel weight function aims to combine properties of graphical structure and molecule descriptors of screening compounds. We apply the modified knn method on several experimental data from biological screens. The experimental results confirm the effectiveness of the proposed method.
Digital Article Identifier (DOI):
110
14762
Massive Lesions Classification using Features based on Morphological Lesion Differences
Abstract: Purpose of this work is the development of an
automatic classification system which could be useful for radiologists
in the investigation of breast cancer. The software has been designed
in the framework of the MAGIC-5 collaboration.
In the automatic classification system the suspicious regions with
high probability to include a lesion are extracted from the image as
regions of interest (ROIs). Each ROI is characterized by some
features based on morphological lesion differences.
Some classifiers as a Feed Forward Neural Network, a K-Nearest
Neighbours and a Support Vector Machine are used to distinguish the
pathological records from the healthy ones.
The results obtained in terms of sensitivity (percentage of
pathological ROIs correctly classified) and specificity (percentage of
non-pathological ROIs correctly classified) will be presented through
the Receive Operating Characteristic curve (ROC). In particular the
best performances are 88% ± 1 of area under ROC curve obtained
with the Feed Forward Neural Network.
Digital Article Identifier (DOI):
109
10586
Artificial Intelligence Techniques applied to Biomedical Patterns
Abstract: Pattern recognition is the research area of Artificial
Intelligence that studies the operation and design of systems that
recognize patterns in the data. Important application areas are image
analysis, character recognition, fingerprint classification, speech
analysis, DNA sequence identification, man and machine
diagnostics, person identification and industrial inspection. The
interest in improving the classification systems of data analysis is
independent from the context of applications. In fact, in many
studies it is often the case to have to recognize and to distinguish
groups of various objects, which requires the need for valid
instruments capable to perform this task. The objective of this article
is to show several methodologies of Artificial Intelligence for data
classification applied to biomedical patterns. In particular, this work
deals with the realization of a Computer-Aided Detection system
(CADe) that is able to assist the radiologist in identifying types of
mammary tumor lesions. As an additional biomedical application of
the classification systems, we present a study conducted on blood
samples which shows how these methods may help to distinguish
between carriers of Thalassemia (or Mediterranean Anaemia) and
healthy subjects.
Digital Article Identifier (DOI):
108
5907
A New Hybrid RMN Image Segmentation Algorithm
Abstract: The development of aid's systems for the medical
diagnosis is not easy thing because of presence of inhomogeneities in
the MRI, the variability of the data from a sequence to the other as
well as of other different source distortions that accentuate this
difficulty. A new automatic, contextual, adaptive and robust
segmentation procedure by MRI brain tissue classification is
described in this article. A first phase consists in estimating the
density of probability of the data by the Parzen-Rozenblatt method.
The classification procedure is completely automatic and doesn't
make any assumptions nor on the clusters number nor on the
prototypes of these clusters since these last are detected in an
automatic manner by an operator of mathematical morphology called
skeleton by influence zones detection (SKIZ). The problem of
initialization of the prototypes as well as their number is transformed
in an optimization problem; in more the procedure is adaptive since it
takes in consideration the contextual information presents in every
voxel by an adaptive and robust non parametric model by the
Markov fields (MF). The number of bad classifications is reduced by
the use of the criteria of MPM minimization (Maximum Posterior
Marginal).
Digital Article Identifier (DOI):
107
3423
AGHAZ : An Expert System Based approach for the Translation of English to Urdu
Abstract: Machine Translation (MT 3) of English text to its Urdu equivalent is a difficult challenge. Lot of attempts has been made, but a few limited solutions are provided till now. We present a direct approach, using an expert system to translate English text into its equivalent Urdu, using The Unicode Standard, Version 4.0 (ISBN 0-321-18578-1) Range: 0600–06FF. The expert system works with a knowledge base that contains grammatical patterns of English and Urdu, as well as a tense and gender-aware dictionary of Urdu words (with their English equivalents).
Digital Article Identifier (DOI):
106
8695
Data Mining on the Router Logs for Statistical Application Classification
Abstract: With the advance of information technology in the
new era the applications of Internet to access data resources has
steadily increased and huge amount of data have become accessible
in various forms. Obviously, the network providers and agencies,
look after to prevent electronic attacks that may be harmful or may
be related to terrorist applications. Thus, these have facilitated the
authorities to under take a variety of methods to protect the special
regions from harmful data. One of the most important approaches is
to use firewall in the network facilities. The main objectives of
firewalls are to stop the transfer of suspicious packets in several
ways. However because of its blind packet stopping, high process
power requirements and expensive prices some of the providers are
reluctant to use the firewall. In this paper we proposed a method to
find a discriminate function to distinguish between usual packets and
harmful ones by the statistical processing on the network router logs.
By discriminating these data, an administrator may take an approach
action against the user. This method is very fast and can be used
simply in adjacent with the Internet routers.
Digital Article Identifier (DOI):
105
13036
Electrocardiogram Signal Compression Using Multiwavelet Transform
Abstract: In this paper we are to find the optimum
multiwavelet for compression of electrocardiogram (ECG)
signals. At present, it is not well known which multiwavelet is
the best choice for optimum compression of ECG. In this
work, we examine different multiwavelets on 24 sets of ECG
data with entirely different characteristics, selected from MITBIH
database. For assessing the functionality of the different
multiwavelets in compressing ECG signals, in addition to
known factors such as Compression Ratio (CR), Percent Root
Difference (PRD), Distortion (D), Root Mean Square Error
(RMSE) in compression literature, we also employed the
Cross Correlation (CC) criterion for studying the
morphological relations between the reconstructed and the
original ECG signal and Signal to reconstruction Noise Ratio
(SNR). The simulation results show that the cardbal2 by the
means of identity (Id) prefiltering method to be the best
effective transformation.
Digital Article Identifier (DOI):
104
9804
Packet Forwarding with Multiprotocol Label Switching
Abstract: MultiProtocol Label Switching (MPLS) is an
emerging technology that aims to address many of the existing issues
associated with packet forwarding in today-s Internetworking
environment. It provides a method of forwarding packets at a high
rate of speed by combining the speed and performance of Layer 2
with the scalability and IP intelligence of Layer 3. In a traditional IP
(Internet Protocol) routing network, a router analyzes the destination
IP address contained in the packet header. The router independently
determines the next hop for the packet using the destination IP
address and the interior gateway protocol. This process is repeated at
each hop to deliver the packet to its final destination. In contrast, in
the MPLS forwarding paradigm routers on the edge of the network
(label edge routers) attach labels to packets based on the forwarding
Equivalence class (FEC). Packets are then forwarded through the
MPLS domain, based on their associated FECs , through swapping
the labels by routers in the core of the network called label switch
routers. The act of simply swapping the label instead of referencing
the IP header of the packet in the routing table at each hop provides
a more efficient manner of forwarding packets, which in turn allows
the opportunity for traffic to be forwarded at tremendous speeds and
to have granular control over the path taken by a packet. This paper
deals with the process of MPLS forwarding mechanism,
implementation of MPLS datapath , and test results showing the
performance comparison of MPLS and IP routing. The discussion
will focus primarily on MPLS IP packet networks – by far the
most common application of MPLS today.
Digital Article Identifier (DOI):
103
13028
Discrimination of Alcoholic Subjects using Second Order Autoregressive Modelling of Brain Signals Evoked during Visual Stimulus Perception
Abstract: In this paper, a second order autoregressive (AR)
model is proposed to discriminate alcoholics using single trial
gamma band Visual Evoked Potential (VEP) signals using 3 different
classifiers: Simplified Fuzzy ARTMAP (SFA) neural network (NN),
Multilayer-perceptron-backpropagation (MLP-BP) NN and Linear
Discriminant (LD). Electroencephalogram (EEG) signals were
recorded from alcoholic and control subjects during the presentation
of visuals from Snodgrass and Vanderwart picture set. Single trial
VEP signals were extracted from EEG signals using Elliptic filtering
in the gamma band spectral range. A second order AR model was
used as gamma band VEP exhibits pseudo-periodic behaviour and
second order AR is optimal to represent this behaviour. This
circumvents the requirement of having to use some criteria to choose
the correct order. The averaged discrimination errors of 2.6%, 2.8%
and 11.9% were given by LD, MLP-BP and SFA classifiers. The
high LD discrimination results show the validity of the proposed
method to discriminate between alcoholic subjects.
Digital Article Identifier (DOI):
102
10839
Effects of Hidden Unit Sizes and Autoregressive Features in Mental Task Classification
Abstract: Classification of electroencephalogram (EEG) signals
extracted during mental tasks is a technique that is actively pursued
for Brain Computer Interfaces (BCI) designs. In this paper, we
compared the classification performances of univariateautoregressive
(AR) and multivariate autoregressive (MAR) models
for representing EEG signals that were extracted during different
mental tasks. Multilayer Perceptron (MLP) neural network (NN)
trained by the backpropagation (BP) algorithm was used to classify
these features into the different categories representing the mental
tasks. Classification performances were also compared across
different mental task combinations and 2 sets of hidden units (HU): 2
to 10 HU in steps of 2 and 20 to 100 HU in steps of 20. Five different
mental tasks from 4 subjects were used in the experimental study and
combinations of 2 different mental tasks were studied for each
subject. Three different feature extraction methods with 6th order
were used to extract features from these EEG signals: AR
coefficients computed with Burg-s algorithm (ARBG), AR
coefficients computed with stepwise least square algorithm (ARLS)
and MAR coefficients computed with stepwise least square
algorithm. The best results were obtained with 20 to 100 HU using
ARBG. It is concluded that i) it is important to choose the suitable
mental tasks for different individuals for a successful BCI design, ii)
higher HU are more suitable and iii) ARBG is the most suitable
feature extraction method.
Digital Article Identifier (DOI):
101
1828
A Cumulative Learning Approach to Data Mining Employing Censored Production Rules (CPRs)
Abstract: Knowledge is indispensable but voluminous knowledge becomes a bottleneck for efficient processing. A great challenge for data mining activity is the generation of large number of potential rules as a result of mining process. In fact sometimes result size is comparable to the original data. Traditional data mining pruning activities such as support do not sufficiently reduce the huge rule space. Moreover, many practical applications are characterized by continual change of data and knowledge, thereby making knowledge voluminous with each change. The most predominant representation of the discovered knowledge is the standard Production Rules (PRs) in the form If P Then D. Michalski & Winston proposed Censored Production Rules (CPRs), as an extension of production rules, that exhibit variable precision and supports an efficient mechanism for handling exceptions. A CPR is an augmented production rule of the form: If P Then D Unless C, where C (Censor) is an exception to the rule. Such rules are employed in situations in which the conditional statement 'If P Then D' holds frequently and the assertion C holds rarely. By using a rule of this type we are free to ignore the exception conditions, when the resources needed to establish its presence, are tight or there is simply no information available as to whether it holds or not. Thus the 'If P Then D' part of the CPR expresses important information while the Unless C part acts only as a switch changes the polarity of D to ~D. In this paper a scheme based on Dempster-Shafer Theory (DST) interpretation of a CPR is suggested for discovering CPRs from the discovered flat PRs. The discovery of CPRs from flat rules would result in considerable reduction of the already discovered rules. The proposed scheme incrementally incorporates new knowledge and also reduces the size of knowledge base considerably with each episode. Examples are given to demonstrate the behaviour of the proposed scheme. The suggested cumulative learning scheme would be useful in mining data streams.
Digital Article Identifier (DOI):
100
6645
Finding a Solution, all Solutions, or the Most Probable Solution to a Temporal Interval Algebra Network
Abstract: Over the years, many implementations have been
proposed for solving IA networks. These implementations are
concerned with finding a solution efficiently. The primary goal of
our implementation is simplicity and ease of use.
We present an IA network implementation based on finite domain
non-binary CSPs, and constraint logic programming. The
implementation has a GUI which permits the drawing of arbitrary IA
networks. We then show how the implementation can be extended to
find all the solutions to an IA network. One application of finding all
the solutions, is solving probabilistic IA networks.
Digital Article Identifier (DOI):
99
15253
Cluster Analysis for the Statistical Modeling of Aesthetic Judgment Data Related to Comics Artists
Abstract: We compare three categorical data clustering
algorithms with respect to the problem of classifying cultural data
related to the aesthetic judgment of comics artists. Such a
classification is very important in Comics Art theory since the
determination of any classes of similarities in such kind of data will
provide to art-historians very fruitful information of Comics Art-s
evolution. To establish this, we use a categorical data set and we
study it by employing three categorical data clustering algorithms.
The performances of these algorithms are compared each other,
while interpretations of the clustering results are also given.
Digital Article Identifier (DOI):
98
8910
Interactive Concept-based Search using MOEA:The Hierarchical Preferences Case
Abstract: An IEC technique is described for a multi-objective
search of conceptual solutions. The survivability of solutions is
influenced by both model-based fitness and subjective human
preferences. The concepts- preferences are articulated via a hierarchy
of sub-concepts. The suggested method produces an objectivesubjective
front. Academic example is employed to demonstrate the
proposed approach.
Digital Article Identifier (DOI):
97
8264
SVM-Based Detection of SAR Images in Partially Developed Speckle Noise
Abstract: Support Vector Machine (SVM) is a statistical
learning tool that was initially developed by Vapnik in 1979 and later
developed to a more complex concept of structural risk minimization
(SRM). SVM is playing an increasing role in applications to
detection problems in various engineering problems, notably in
statistical signal processing, pattern recognition, image analysis, and
communication systems. In this paper, SVM was applied to the
detection of SAR (synthetic aperture radar) images in the presence of
partially developed speckle noise. The simulation was done for single
look and multi-look speckle models to give a complete overlook and
insight to the new proposed model of the SVM-based detector. The
structure of the SVM was derived and applied to real SAR images
and its performance in terms of the mean square error (MSE) metric
was calculated. We showed that the SVM-detected SAR images have
a very low MSE and are of good quality. The quality of the
processed speckled images improved for the multi-look model.
Furthermore, the contrast of the SVM detected images was higher
than that of the original non-noisy images, indicating that the SVM
approach increased the distance between the pixel reflectivity levels
(the detection hypotheses) in the original images.
Digital Article Identifier (DOI):
96
3105
Detection of Ultrasonic Images in the Presence of a Random Number of Scatterers: A Statistical Learning Approach
Abstract: Support Vector Machine (SVM) is a statistical learning tool that was initially developed by Vapnik in 1979 and later developed to a more complex concept of structural risk minimization (SRM). SVM is playing an increasing role in applications to detection problems in various engineering problems, notably in statistical signal processing, pattern recognition, image analysis, and communication systems. In this paper, SVM was applied to the detection of medical ultrasound images in the presence of partially developed speckle noise. The simulation was done for single look and multi-look speckle models to give a complete overlook and insight to the new proposed model of the SVM-based detector. The structure of the SVM was derived and applied to clinical ultrasound images and its performance in terms of the mean square error (MSE) metric was calculated. We showed that the SVM-detected ultrasound images have a very low MSE and are of good quality. The quality of the processed speckled images improved for the multi-look model. Furthermore, the contrast of the SVM detected images was higher than that of the original non-noisy images, indicating that the SVM approach increased the distance between the pixel reflectivity levels (detection hypotheses) in the original images.
Digital Article Identifier (DOI):
95
7179
Extracting Single Trial Visual Evoked Potentials using Selective Eigen-Rate Principal Components
Abstract: In single trial analysis, when using Principal
Component Analysis (PCA) to extract Visual Evoked Potential
(VEP) signals, the selection of principal components (PCs) is an
important issue. We propose a new method here that selects only
the appropriate PCs. We denote the method as selective eigen-rate
(SER). In the method, the VEP is reconstructed based on the rate
of the eigen-values of the PCs. When this technique is applied on
emulated VEP signals added with background
electroencephalogram (EEG), with a focus on extracting the
evoked P3 parameter, it is found to be feasible. The improvement
in signal to noise ratio (SNR) is superior to two other existing
methods of PC selection: Kaiser (KSR) and Residual Power (RP).
Though another PC selection method, Spectral Power Ratio (SPR)
gives a comparable SNR with high noise factors (i.e. EEGs), SER
give more impressive results in such cases. Next, we applied SER
method to real VEP signals to analyse the P3 responses for
matched and non-matched stimuli. The P3 parameters extracted
through our proposed SER method showed higher P3 response for
matched stimulus, which confirms to the existing neuroscience
knowledge. Single trial PCA using KSR and RP methods failed to
indicate any difference for the stimuli.
Digital Article Identifier (DOI):
94
8311
Lessons to Management from the Control Loop Phenomenon
Abstract: In a none-super-competitive environment the concepts
of closed system, management control remains to be the dominant
guiding concept to management. The merits of closed loop have been
the sources of most of the management literature and culture for
many decades. It is a useful exercise to investigate and poke into the
dynamics of the control loop phenomenon and draws some lessons to
use for refining the practice of management. This paper examines the
multitude of lessons abstracted from the behavior of the Input /output
/feedback control loop model, which is the core of control theory.
There are numerous lessons that can be learned from the insights this
model would provide and how it parallels the management dynamics
of the organization. It is assumed that an organization is basically a
living system that interacts with the internal and external variables. A
viable control loop is the one that reacts to the variation in the
environment and provide or exert a corrective action. In managing
organizations this is reflected in organizational structure and
management control practices. This paper will report findings that
were a result of examining several abstract scenarios that are
exhibited in the design, operation, and dynamics of the control loop
and how they are projected on the functioning of the organization.
Valuable lessons are drawn in trying to find parallels and new
paradigms, and how the control theory science is reflected in the
design of the organizational structure and management practices. The
paper is structured in a logical and perceptive format. Further
research is needed to extend these findings.
Keywords: Management theory,
control theory,
feed back,
input/output,
strategy,
change,
information technology,
informationsystems,
IS,
organizational environment,
organizations,
opensystems,
closed systems.
Digital Article Identifier (DOI):
93
1514
Degeneracy of MIS under the Conditions of Instability: A Mathematical Formulation
Abstract: It has been always observed that the effectiveness of
MIS as a support tool for management decisions degenerate after
time of implementation, despite the substantial investments being
made. This is true for organizations at the initial stages of MIS
implementations, manual or computerized. A survey of a sample of
middle to top managers in business and government institutions was
made. A large ratio indicates that the MIS has lost its impact on the
day-to-day operations, and even the response lag time expands
sometimes indefinitely. The data indicates an infant mortality
phenomenon of the bathtub model. Reasons may be monotonous
nature of MIS delivery, irrelevance, irreverence, timeliness, and lack
of adequate detail. All those reasons collaborate to create a degree of
degeneracy. We investigate and model as a bathtub model the
phenomenon of MIS degeneracy that inflicts the MIS systems and
renders it ineffective. A degeneracy index is developed to identify
the status of the MIS system and possible remedies to prevent the
onset of total collapse of the system to the point of being useless.
Digital Article Identifier (DOI):
92
10595
The Use of Complex Contourlet Transform on Fusion Scheme
Abstract: Image fusion aims to enhance the perception
of a scene by combining important information captured by
different sensors. Dual-Tree Complex Wavelet (DT-CWT) has been
thouroughly investigated for image fusion, since it takes advantages
of approximate shift invariance and direction selectivity. But it can
only handle limited direction information. To allow a more flexible
directional expansion for images, we propose a novel fusion scheme,
referred to as complex contourlet transform (CCT). It successfully
incorporates directional filter banks (DFB) into DT-CWT. As a result
it efficiently deal with images containing contours and textures,
whereas it retains the property of shift invariance. Experimental
results demonstrated that the method features high quality fusion
performance and can facilitate many image processing applications.
Digital Article Identifier (DOI):
91
7817
Genetic Content-Based MP3 Audio Watermarking in MDCT Domain
Abstract: In this paper a novel scheme for watermarking digital
audio during its compression to MPEG-1 Layer III format is
proposed. For this purpose we slightly modify some of the selected
MDCT coefficients, which are used during MPEG audio
compression procedure. Due to the possibility of modifying different
MDCT coefficients, there will be different choices for embedding the
watermark into audio data, considering robustness and transparency
factors. Our proposed method uses a genetic algorithm to select the
best coefficients to embed the watermark. This genetic selection is
done according to the parameters that are extracted from the
perceptual content of the audio to optimize the robustness and
transparency of the watermark. On the other hand the watermark
security is increased due to the random nature of the genetic
selection. The information of the selected MDCT coefficients that
carry the watermark bits, are saves in a database for future extraction
of the watermark. The proposed method is suitable for online MP3
stores to pursue illegal copies of musical artworks. Experimental
results show that the detection ratio of the watermarks at the bitrate
of 128kbps remains above 90% while the inaudibility of the
watermark is preserved.
Digital Article Identifier (DOI):
90
15576
High Speed Video Transmission for Telemedicine using ATM Technology
Abstract: In this paper, we study statistical multiplexing of VBR
video in ATM networks. ATM promises to provide high speed realtime
multi-point to central video transmission for telemedicine
applications in rural hospitals and in emergency medical services.
Video coders are known to produce variable bit rate (VBR) signals
and the effects of aggregating these VBR signals need to be
determined in order to design a telemedicine network infrastructure
capable of carrying these signals. We first model the VBR video
signal and simulate it using a generic continuous-data autoregressive
(AR) scheme. We carry out the queueing analysis by the Fluid
Approximation Model (FAM) and the Markov Modulated Poisson
Process (MMPP). The study has shown a trade off: multiplexing
VBR signals reduces burstiness and improves resource utilization,
however, the buffer size needs to be increased with an associated
economic cost. We also show that the MMPP model and the Fluid
Approximation model fit best, respectively, the cell region and the
burst region. Therefore, a hybrid MMPP and FAM completely
characterizes the overall performance of the ATM statistical
multiplexer. The ramifications of this technology are clear: speed,
reliability (lower loss rate and jitter), and increased capacity in video
transmission for telemedicine. With migration to full IP-based
networks still a long way to achieving both high speed and high
quality of service, the proposed ATM architecture will remain of
significant use for telemedicine.
Digital Article Identifier (DOI):
89
11054
Data Transmission Reliability in Short Message Integrated Distributed Monitoring Systems
Abstract: Short message integrated distributed monitoring systems (SM-DMS) are growing rapidly in wireless communication applications in various areas, such as electromagnetic field (EMF) management, wastewater monitoring, and air pollution supervision, etc. However, delay in short messages often makes the data embedded in SM-DMS transmit unreliably. Moreover, there are few regulations dealing with this problem in SMS transmission protocols. In this study, based on the analysis of the command and data requirements in the SM-DMS, we developed a processing model for the control center to solve the delay problem in data transmission. Three components of the model: the data transmission protocol, the receiving buffer pool method, and the timer mechanism were described in detail. Discussions on adjusting the threshold parameter in the timer mechanism were presented for the adaptive performance during the runtime of the SM-DMS. This model optimized the data transmission reliability in SM-DMS, and provided a supplement to the data transmission reliability protocols at the application level.
Digital Article Identifier (DOI):
88
7068
The Design and Implementation of Classifying Bird Sounds
Abstract: This Classifying Bird Sounds (chip notes) project-s
purpose is to reduce the unwanted noise from recorded bird sound
chip notes, design a scheme to detect differences and similarities
between recorded chip notes, and classify bird sound chip notes. The
technologies of determining the similarities of sound waves have
been used in communication, sound engineering and wireless sound
applications for many years. Our research is focused on the similarity
of chip notes, which are the sounds from different birds. The program
we use is generated by Microsoft Cµ.
Digital Article Identifier (DOI):
87
3224
A Hybrid Approach to Fault Detection and Diagnosis in a Diesel Fuel Hydrotreatment Process
Abstract: It is estimated that the total cost of abnormal
conditions to US process industries is around $20 billion dollars in
annual losses. The hydrotreatment (HDT) of diesel fuel in petroleum
refineries is a conversion process that leads to high profitable
economical returns. However, this is a difficult process to control
because it is operated continuously, with high hydrogen pressures
and it is also subject to disturbances in feed properties and catalyst
performance. So, the automatic detection of fault and diagnosis plays
an important role in this context. In this work, a hybrid approach
based on neural networks together with a pos-processing
classification algorithm is used to detect faults in a simulated HDT
unit. Nine classes (8 faults and the normal operation) were correctly
classified using the proposed approach in a maximum time of 5
minutes, based on on-line data process measurements.
Digital Article Identifier (DOI):
86
9700
Efficient Secured Lossless Coding of Medical Images– Using Modified Runlength Coding for Character Representation
Abstract: Lossless compression schemes with secure
transmission play a key role in telemedicine applications that helps in
accurate diagnosis and research. Traditional cryptographic algorithms
for data security are not fast enough to process vast amount of data.
Hence a novel Secured lossless compression approach proposed in
this paper is based on reversible integer wavelet transform, EZW
algorithm, new modified runlength coding for character
representation and selective bit scrambling. The use of the lifting
scheme allows generating truly lossless integer-to-integer wavelet
transforms. Images are compressed/decompressed by well-known
EZW algorithm. The proposed modified runlength coding greatly
improves the compression performance and also increases the
security level. This work employs scrambling method which is fast,
simple to implement and it provides security. Lossless compression
ratios and distortion performance of this proposed method are found
to be better than other lossless techniques.
Digital Article Identifier (DOI):
85
8860
Application of Functional Network to Solving Classification Problems
Abstract: In this paper two models using a functional network
were employed to solving classification problem. Functional networks
are generalized neural networks, which permit the specification of
their initial topology using knowledge about the problem at hand. In
this case, and after analyzing the available data and their relations, we
systematically discuss a numerical analysis method used for
functional network, and apply two functional network models to
solving XOR problem. The XOR problem that cannot be solved with
two-layered neural network can be solved by two-layered functional
network, which reveals a potent computational power of functional
networks, and the performance of the proposed model was validated
using classification problems.
Digital Article Identifier (DOI):
84
8462
Ensembling Classifiers – An Application toImage Data Classification from Cherenkov Telescope Experiment
Abstract: Ensemble learning algorithms such as AdaBoost and
Bagging have been in active research and shown improvements in
classification results for several benchmarking data sets with mainly
decision trees as their base classifiers. In this paper we experiment to
apply these Meta learning techniques with classifiers such as random
forests, neural networks and support vector machines. The data sets
are from MAGIC, a Cherenkov telescope experiment. The task is to
classify gamma signals from overwhelmingly hadron and muon
signals representing a rare class classification problem. We compare
the individual classifiers with their ensemble counterparts and
discuss the results. WEKA a wonderful tool for machine learning has
been used for making the experiments.
Digital Article Identifier (DOI):
83
9559
A Novel Security Framework for the Web System
Abstract: In this paper, a framework is presented trying to make
the most secure web system out of the available generic and web
security technology which can be used as a guideline for
organizations building their web sites. The framework is designed to
provide necessary security services, to address the known security
threats, and to provide some cover to other security problems
especially unknown threats. The requirements for the design are
discussed which guided us to the design of secure web system. The
designed security framework is then simulated and various quality of
service (QoS) metrics are calculated to measure the performance of
this system.
Digital Article Identifier (DOI):
82
2017
Linux based Embedded Node for Capturing, Compression and Streaming of Digital Audio and Video
Abstract: A prototype for audio and video capture and compression in real time on a Linux platform has been developed. It is able to visualize both the captured and the compressed video at the same time, as well as the captured and compressed audio with the goal of comparing their quality. As it is based on free code, the final goal is to run it in an embedded system running Linux. Therefore, we would implement a node to capture and compress such multimedia information. Thus, it would be possible to consider the project within a larger one aimed at live broadcast of audio and video using a streaming server which would communicate with our node. Then, we would have a very powerful and flexible system with several practical applications.
Digital Article Identifier (DOI):
81
13542
Real-Time Testing of Steel Strip Welds based on Bayesian Decision Theory
Abstract: One of the main trouble in a steel strip manufacturing
line is the breakage of whatever weld carried out between steel coils,
that are used to produce the continuous strip to be processed. A weld
breakage results in a several hours stop of the manufacturing line. In
this process the damages caused by the breakage must be repaired.
After the reparation and in order to go on with the production it will
be necessary a restarting process of the line. For minimizing this
problem, a human operator must inspect visually and manually each
weld in order to avoid its breakage during the manufacturing process.
The work presented in this paper is based on the Bayesian decision
theory and it presents an approach to detect, on real-time, steel strip
defective welds. This approach is based on quantifying the tradeoffs
between various classification decisions using probability and the
costs that accompany such decisions.
Digital Article Identifier (DOI):
80
11112
Using Genetic Algorithms in Closed Loop Identification of the Systems with Variable Structure Controller
Abstract: This work presents a recursive identification algorithm. This algorithm relates to the identification of closed loop system with Variable Structure Controller. The approach suggested includes two stages. In the first stage a genetic algorithm is used to obtain the parameters of switching function which gives a control signal rich in commutations (i.e. a control signal whose spectral characteristics are closest possible to those of a white noise signal). The second stage consists in the identification of the system parameters by the instrumental variable method and using the optimal switching function parameters obtained with the genetic algorithm. In order to test the validity of this algorithm a simulation example is presented.
Digital Article Identifier (DOI):
79
5691
A Multi Steps Algorithm for Sperm Segmentation in Microscopic Image
Abstract: Nothing that an effective cure for infertility happens
when we can find a unique solution, a great deal of study has been
done in this field and this is a hot research subject for to days study.
So we could analyze the men-s seaman and find out about fertility
and infertility and from this find a true cure for this, since this will be
a non invasive and low risk procedure, it will be greatly welcomed.
In this research, the procedure has been based on few Algorithms
enhancement and segmentation of images which has been done on
the images taken from microscope in different fertility institution and
have obtained a suitable result from the computer images which in
turn help us to distinguish these sperms from fluids and its
surroundings.
Digital Article Identifier (DOI):
78
2868
Adaptive Subchannel Allocation for MC-CDMA System
Abstract: Multicarrier code-division multiple-access is one of the
effective techniques to gain its multiple access capability, robustness
against fading, and to mitigate the ISI. In this paper, we propose an
improved mulcarrier CDMA system with adaptive subchannel
allocation. We analyzed the performance of our proposed system in
frequency selective fading environment with narrowband interference
existing and compared it with that of parallel transmission over many
subchannels (namely, conventional MC-CDMA scheme) and
DS-CDMA system. Simulation results show that adaptive subchannel
allocation scheme, when used in conventional multicarrier CDMA
system, the performance will be greatly improved.
Digital Article Identifier (DOI):
77
5250
Performance Analysis of QS-CDMA Systems
Abstract: In the paper, the performance of quasi-synchronous
CDMA (QS-CDMA) system, which can allow an increased timing
error in synchronized access, is discussed. Average BER performance
of the system is analyzed in the condition of different access timing
error and different asynchronous users by simulation in AWGN
channel. The results show that QS-CDMA system is shown to have
great performance gain over the asynchronous system when access
timing error is within a few chips and asynchronous users is tolerable.
However, with access timing error increasing and asynchronous users
increasing, the performance of QS-CDMA will degrade. Also, we can
determine the number of tolerable asynchronous users for different
access timing error by simulation figures.
Digital Article Identifier (DOI):
76
4977
Speaker Identification using Neural Networks
Abstract: The speech signal conveys information about the
identity of the speaker. The area of speaker identification is
concerned with extracting the identity of the person speaking the
utterance. As speech interaction with computers becomes more
pervasive in activities such as the telephone, financial transactions
and information retrieval from speech databases, the utility of
automatically identifying a speaker is based solely on vocal
characteristic. This paper emphasizes on text dependent speaker
identification, which deals with detecting a particular speaker from a
known population. The system prompts the user to provide speech
utterance. System identifies the user by comparing the codebook of
speech utterance with those of the stored in the database and lists,
which contain the most likely speakers, could have given that speech
utterance. The speech signal is recorded for N speakers further the
features are extracted. Feature extraction is done by means of LPC
coefficients, calculating AMDF, and DFT. The neural network is
trained by applying these features as input parameters. The features
are stored in templates for further comparison. The features for the
speaker who has to be identified are extracted and compared with the
stored templates using Back Propogation Algorithm. Here, the
trained network corresponds to the output; the input is the extracted
features of the speaker to be identified. The network does the weight
adjustment and the best match is found to identify the speaker. The
number of epochs required to get the target decides the network
performance.
Digital Article Identifier (DOI):
75
11834
Multiuser Detection in CDMA Fast Fading Multipath Channel using Heuristic Genetic Algorithms
Abstract: In this paper, a simple heuristic genetic algorithm is
used for Multistage Multiuser detection in fast fading environments.
Multipath channels, multiple access interference (MAI) and near far
effect cause the performance of the conventional detector to degrade.
Heuristic Genetic algorithms, a rapidly growing area of artificial
intelligence, uses evolutionary programming for initial search, which
not only helps to converge the solution towards near optimal
performance efficiently but also at a very low complexity as
compared with optimal detector. This holds true for Additive White
Gaussian Noise (AWGN) and multipath fading channels.
Experimental results are presented to show the superior performance
of the proposed techque over the existing methods.
Digital Article Identifier (DOI):
74
13482
Intelligent System for Breast Cancer Prognosis using Multiwavelet Packets and Neural Network
Abstract: This paper presents an approach for early breast
cancer diagnostic by employing combination of artificial neural
networks (ANN) and multiwaveletpacket based subband image
decomposition. The microcalcifications correspond to high-frequency
components of the image spectrum, detection of microcalcifications
is achieved by decomposing the mammograms into different
frequency subbands,, reconstructing the mammograms from the
subbands containing only high frequencies. For this approach we
employed different types of multiwaveletpacket. We used the result
as an input of neural network for classification. The proposed
methodology is tested using the Nijmegen and the Mammographic
Image Analysis Society (MIAS) mammographic databases and
images collected from local hospitals. Results are presented as the
receiver operating characteristic (ROC) performance and are
quantified by the area under the ROC curve.
Digital Article Identifier (DOI):
73
161
An Expert System for Car Failure Diagnosis
Abstract: Car failure detection is a complicated process and
requires high level of expertise. Any attempt of developing an expert
system dealing with car failure detection has to overcome various
difficulties. This paper describes a proposed knowledge-based
system for car failure detection. The paper explains the need for an
expert system and the some issues on developing knowledge-based
systems, the car failure detection process and the difficulties involved
in developing the system. The system structure and its components
and their functions are described. The system has about 150 rules for
different types of failures and causes. It can detect over 100 types of
failures. The system has been tested and gave promising results.
Digital Article Identifier (DOI):
72
9331
Extracting Multiword Expressions in Machine Translation from English to Urdu using Relational Data Approach
Abstract: Machine Translation, (hereafter in this document
referred to as the "MT") faces a lot of complex problems from its
origination. Extracting multiword expressions is also one of the
complex problems in MT. Finding multiword expressions during
translating a sentence from English into Urdu, through existing
solutions, takes a lot of time and occupies system resources. We have
designed a simple relational data approach, in which we simply set a
bit in dictionary (database) for multiword, to find and handle
multiword expression. This approach handles multiword efficiently.
Digital Article Identifier (DOI):
71
9111
Going beyond Social Maternage.The Principle of Brotherhood in the Community Psychology's Intervention
Abstract: The aim of this paper is to study in depth some methodological aspects of social interventation, focusing on desirable passage from social maternage method to peer advocacy method. For this purpose, we intend analyze social and organizative components, that affect operator's professional action and that are part of his psychological environment, besides the physical and social one. In fact, operator's interventation should not be limited to a pure supply of techniques, nor to take shape as improvised action, but “full of good purposes".
Digital Article Identifier (DOI):
70
5179
Marital Duration and Sexual Frequency among the Muslim and Santal Couples in Rural Bangladesh: A Cross-Cultural Perspective
Abstract: Age and sex are biological terms that are socioculturally
constructed for marriage and marital sexual behavior in
every society. Marriage is a universal norm that makes legitimate
sexual behavior between a man and a woman in marital life cycle to
gain bio-social purposes. Cross-cultural studies reveal that marital
sexual frequency as a part of marital sexual behavior not only varies
within the couple-s life cycle, but also varies between and among
couples in diverse cultures. The purpose of the study was to compare
marital sexual frequency in association with age status and length of
marital relationship between Muslim and Santal couples in rural
Bangladesh. For this we assumed that (1) Santal culture compared to
Muslim culture preferred earlier age at marriage for meeting marital
sexual purposes in rural Bangladesh; (2) Marital duration among the
Muslim couples was higher than that among the Santal couples; (3)
Sexual frequency among the younger couples in both the ethnic
communities was higher than the older couples; (4) Sexual frequency
across the Muslim couples- marital life cycle was higher than that the
Santal couples- marital life cycle. In so doing, 288 active couples
(145 for Muslim and 143 for Santal) selected by cluster random
sampling were interviewed with questionnaire method. The findings
of Independent Samples T Test on age at marriage, current age,
marital duration and sexual frequency independently reveal that there
were significant differences in sexual frequency not only across the
couples- life cycle but also vary between the Muslim and Santal
couples in relation to marital duration. The results of Pearson-s Inter-
Correlation Coefficients reveal that although age at marriage, current
age and marital duration for husband and wife were significantly
positive correlated with each other between the communities, there
were significantly negative correlation between the age at marriage,
current age, marital duration and sexual frequency among the
selected couples between the communities.
Digital Article Identifier (DOI):
69
8351
Manufacturers-Retailers: The New Actor in the U.S. Furniture Industry. Characteristics and Implications for the Chinese Furniture Industry
Abstract: Since the 1990s the American furniture industry faces a transition period. Manufacturers, one of its most important actors made its entrance into the retail industry. This shift has had deep consequences not only for the American furniture industry as a whole, but also for other international furniture industries, especially the Chinese. The present work aims to analyze this actor based on the distinction provided by the Global Commodity Chain Theory. It stresses its characteristics, structure, operational way and importance for both the U.S. and the Chinese furniture industries.
Digital Article Identifier (DOI):
68
10627
Lessons from Applying XP Methodology to Business Requirements Engineering in Developing Countries Context
Abstract: Most standard software development methodologies
are often not applied to software projects in many developing
countries of the world. The approach generally practice is close to
what eXtreme Programming (XP) is likely promoting, just keep
coding and testing as the requirement evolves. XP is an agile
software process development methodology that has inherent
capability for improving efficiency of Business Software
Development (BSD). XP can facilitate Business-to-Development
(B2D) relationship due to its customer-oriented advocate. From
practitioner point of view, we applied XP to BSD and result shows
that customer involvement has positive impact on productivity, but
can as well frustrate the success of the project. In an effort to
promote software engineering practice in developing countries of
Africa, we present the experiment performed, lessons learned,
problems encountered and solution adopted in applying XP
methodology to BSD.
Digital Article Identifier (DOI):
67
11698
Learning Human-Like Color Categorization through Interaction
Abstract: Human perceives color in categories, which may be
identified using color name such as red, blue, etc. The categorization
is unique for each human being. However despite the individual
differences, the categorization is shared among members in society.
This allows communication among them, especially when using
color name. Sociable robot, to live coexist with human and become
part of human society, must also have the shared color
categorization, which can be achieved through learning. Many
works have been done to enable computer, as brain of robot, to learn
color categorization. Most of them rely on modeling of human color
perception and mathematical complexities. Differently, in this work,
the computer learns color categorization through interaction with
humans. This work aims at developing the innate ability of the
computer to learn the human-like color categorization. It focuses on
the representation of color categorization and how it is built and
developed without much mathematical complexity.
Digital Article Identifier (DOI):
66
10278
Integrating Computational Intelligence Techniques and Assessment Agents in ELearning Environments
Abstract: In this contribution an innovative platform is being
presented that integrates intelligent agents and evolutionary
computation techniques in legacy e-learning environments. It
introduces the design and development of a scalable and
interoperable integration platform supporting:
I) various assessment agents for e-learning environments,
II) a specific resource retrieval agent for the provision of
additional information from Internet sources matching the
needs and profile of the specific user and
III) a genetic algorithm designed to extract efficient information
(classifying rules) based on the students- answering input
data.
The agents are implemented in order to provide intelligent
assessment services based on computational intelligence techniques
such as Bayesian Networks and Genetic Algorithms.
The proposed Genetic Algorithm (GA) is used in order to extract
efficient information (classifying rules) based on the students-
answering input data. The idea of using a GA in order to fulfil this
difficult task came from the fact that GAs have been widely used in
applications including classification of unknown data.
The utilization of new and emerging technologies like web
services allows integrating the provided services to any web based
legacy e-learning environment.
Digital Article Identifier (DOI):
65
14541
Optimization of a Three-Term Backpropagation Algorithm Used for Neural Network Learning
Abstract: The back-propagation algorithm calculates the weight
changes of an artificial neural network, and a two-term algorithm
with a dynamically optimal learning rate and a momentum factor
is commonly used. Recently the addition of an extra term, called a
proportional factor (PF), to the two-term BP algorithm was proposed.
The third term increases the speed of the BP algorithm. However,
the PF term also reduces the convergence of the BP algorithm, and
optimization approaches for evaluating the learning parameters are
required to facilitate the application of the three terms BP algorithm.
This paper considers the optimization of the new back-propagation
algorithm by using derivative information. A family of approaches
exploiting the derivatives with respect to the learning rate, momentum
factor and proportional factor is presented. These autonomously
compute the derivatives in the weight space, by using information
gathered from the forward and backward procedures. The three-term
BP algorithm and the optimization approaches are evaluated using
the benchmark XOR problem.
Digital Article Identifier (DOI):
64
14477
A Kernel Based Rejection Method for Supervised Classification
Abstract: In this paper we are interested in classification problems
with a performance constraint on error probability. In such
problems if the constraint cannot be satisfied, then a rejection option
is introduced. For binary labelled classification, a number of SVM
based methods with rejection option have been proposed over the
past few years. All of these methods use two thresholds on the SVM
output. However, in previous works, we have shown on synthetic data
that using thresholds on the output of the optimal SVM may lead to
poor results for classification tasks with performance constraint. In
this paper a new method for supervised classification with rejection
option is proposed. It consists in two different classifiers jointly
optimized to minimize the rejection probability subject to a given
constraint on error rate. This method uses a new kernel based linear
learning machine that we have recently presented. This learning
machine is characterized by its simplicity and high training speed
which makes the simultaneous optimization of the two classifiers
computationally reasonable. The proposed classification method with
rejection option is compared to a SVM based rejection method
proposed in recent literature. Experiments show the superiority of
the proposed method.
Digital Article Identifier (DOI):
63
6068
Comparative Study of Some Adaptive Fuzzy Algorithms for Manipulator Control
Abstract: The problem of manipulator control is a highly
complex problem of controlling a system which is multi-input, multioutput,
non-linear and time variant. In this paper some adaptive
fuzzy, and a new hybrid fuzzy control algorithm have been
comparatively evaluated through simulations, for manipulator
control. The adaptive fuzzy controllers consist of self-organizing,
self-tuning, and coarse/fine adaptive fuzzy schemes. These
controllers are tested for different trajectories and for varying
manipulator parameters through simulations. Various performance
indices like the RMS error, steady state error and maximum error are
used for comparison. It is observed that the self-organizing fuzzy
controller gives the best performance. The proposed hybrid fuzzy
plus integral error controller also performs remarkably well, given its
simple structure.
Digital Article Identifier (DOI):
62
10747
Vision Based Robotic Interception in Industrial Manipulation Tasks
Abstract: In this paper, a solution is presented for a robotic
manipulation problem in industrial settings. The problem is sensing
objects on a conveyor belt, identifying the target, planning and
tracking an interception trajectory between end effector and the
target. Such a problem could be formulated as combining object
recognition, tracking and interception. For this purpose, we integrated
a vision system to the manipulation system and employed tracking
algorithms. The control approach is implemented on a real industrial
manipulation setting, which consists of a conveyor belt, objects
moving on it, a robotic manipulator, and a visual sensor above the
conveyor. The trjectory for robotic interception at a rendezvous point
on the conveyor belt is analytically calculated. Test results show that
tracking the raget along this trajectory results in interception and
grabbing of the target object.
Digital Article Identifier (DOI):
61
11968
RANFIS : Rough Adaptive Neuro-Fuzzy Inference System
Abstract: The paper presents a new hybridization methodology involving Neural, Fuzzy and Rough Computing. A Rough Sets based approximation technique has been proposed based on a certain Neuro – Fuzzy architecture. A New Rough Neuron composition consisting of a combination of a Lower Bound neuron and a Boundary neuron has also been described. The conventional convergence of error in back propagation has been given away for a new framework based on 'Output Excitation Factor' and an inverse input transfer function. The paper also presents a brief comparison of performances, of the existing Rough Neural Networks and ANFIS architecture against the proposed methodology. It can be observed that the rough approximation based neuro-fuzzy architecture is superior to its counterparts.
Digital Article Identifier (DOI):
60
951
A Novel Genetic Algorithm Designed for Hardware Implementation
Abstract: A new genetic algorithm, termed the 'optimum individual monogenetic genetic algorithm' (OIMGA), is presented whose properties have been deliberately designed to be well suited to hardware implementation. Specific design criteria were to ensure fast access to the individuals in the population, to keep the required silicon area for hardware implementation to a minimum and to incorporate flexibility in the structure for the targeting of a range of applications. The first two criteria are met by retaining only the current optimum individual, thereby guaranteeing a small memory requirement that can easily be stored in fast on-chip memory. Also, OIMGA can be easily reconfigured to allow the investigation of problems that normally warrant either large GA populations or individuals many genes in length. Local convergence is achieved in OIMGA by retaining elite individuals, while population diversity is ensured by continually searching for the best individuals in fresh regions of the search space. The results given in this paper demonstrate that both the performance of OIMGA and its convergence time are superior to those of a range of existing hardware GA implementations.
Digital Article Identifier (DOI):
59
886
Multi-board Run-time Reconfigurable Implementation of Intrinsic Evolvable Hardware
Abstract: A multi-board run-time reconfigurable (MRTR)
system for evolvable hardware (EHW) is introduced with the aim to
implement on hardware the bidirectional incremental evolution (BIE)
method. The main features of this digital intrinsic EHW solution rely
on the multi-board approach, the variable chromosome length
management and the partial configuration of the reconfigurable
circuit. These three features provide a high scalability to the solution.
The design has been written in VHDL with the concern of not being
platform dependant in order to keep a flexibility factor as high as
possible. This solution helps tackling the problem of evolving
complex task on digital configurable support.
Digital Article Identifier (DOI):
58
15489
Incorporating Semantic Similarity Measure in Genetic Algorithm : An Approach for Searching the Gene Ontology Terms
Abstract: The most important property of the Gene Ontology is
the terms. These control vocabularies are defined to provide
consistent descriptions of gene products that are shareable and
computationally accessible by humans, software agent, or other
machine-readable meta-data. Each term is associated with
information such as definition, synonyms, database references, amino
acid sequences, and relationships to other terms. This information has
made the Gene Ontology broadly applied in microarray and
proteomic analysis. However, the process of searching the terms is
still carried out using traditional approach which is based on keyword
matching. The weaknesses of this approach are: ignoring semantic
relationships between terms, and highly depending on a specialist to
find similar terms. Therefore, this study combines semantic similarity
measure and genetic algorithm to perform a better retrieval process
for searching semantically similar terms. The semantic similarity
measure is used to compute similitude strength between two terms.
Then, the genetic algorithm is employed to perform batch retrievals
and to handle the situation of the large search space of the Gene
Ontology graph. The computational results are presented to show the
effectiveness of the proposed algorithm.
Digital Article Identifier (DOI):
57
5739
An Evolutionary Statistical Learning Theory
Abstract: Statistical learning theory was developed by Vapnik. It
is a learning theory based on Vapnik-Chervonenkis dimension. It also
has been used in learning models as good analytical tools. In general, a
learning theory has had several problems. Some of them are local
optima and over-fitting problems. As well, statistical learning theory
has same problems because the kernel type, kernel parameters, and
regularization constant C are determined subjectively by the art of
researchers. So, we propose an evolutionary statistical learning theory
to settle the problems of original statistical learning theory.
Combining evolutionary computing into statistical learning theory,
our theory is constructed. We verify improved performances of an
evolutionary statistical learning theory using data sets from KDD cup.
Digital Article Identifier (DOI):
56
8869
Extended Least Squares LS–SVM
Abstract: Among neural models the Support Vector Machine
(SVM) solutions are attracting increasing attention, mostly because
they eliminate certain crucial questions involved by neural network
construction. The main drawback of standard SVM is its high
computational complexity, therefore recently a new technique, the
Least Squares SVM (LS–SVM) has been introduced. In this paper we
present an extended view of the Least Squares Support Vector
Regression (LS–SVR), which enables us to develop new
formulations and algorithms to this regression technique. Based on
manipulating the linear equation set -which embodies all information
about the regression in the learning process- some new methods are
introduced to simplify the formulations, speed up the calculations
and/or provide better results.
Digital Article Identifier (DOI):
55
12099
Neural Network-Based Control Strategies Applied to a Fed-Batch Crystallization Process
Abstract: This paper is focused on issues of process modeling
and two model based control strategies of a fed-batch sugar
crystallization process applying the concept of artificial neural
networks (ANNs). The control objective is to force the operation into
following optimal supersaturation trajectory. It is achieved by
manipulating the feed flow rate of sugar liquor/syrup, considered as
the control input. The control task is rather challenging due to the
strong nonlinearity of the process dynamics and variations in the
crystallization kinetics. Two control alternatives are considered –
model predictive control (MPC) and feedback linearizing control
(FLC). Adequate ANN process models are first built as part of the
controller structures. MPC algorithm outperforms the FLC approach
with respect to satisfactory reference tracking and smooth control
action. However, the MPC is computationally much more involved
since it requires an online numerical optimization, while for the FLC
an analytical control solution was determined.
Digital Article Identifier (DOI):
54
15450
Creativity: A Motivational Tool for Interest and Conceptual Understanding in Science Education
Abstract: This qualitative, quantitative mixed-method study explores how students- motivation and interest in creative hands-on activities affected their conceptual understanding of science. The objectives of this research include developing a greater understanding about how creative activities, incorporated into the classroom as instructional strategies, increase student motivation and their learning or mastery of science concepts. The creative activities are viewed as a motivational tool, a specific type of task, which have an impact on student goals. Pre-and-post tests, pre-and-post interviews, and student responses measure motivational-goal theory variables, interest in the activity, and conceptual change. Implications for education and future research will be discussed.
Digital Article Identifier (DOI):
53
671
"A Call for School Diversity": A Practical Response to the Supreme Court Decision on Race and American Schools
Abstract: American public schools should be the place that reflects America-s diverse society. The recent Supreme Court decision to discontinue the use of race as a factor in school admission policies has caused major setbacks in America-s effort to repair its racial divide, to improve public schools, and to provide opportunities for all people, regardless of race or creed. However, educators should not allow such legal decision to hinder their ability to teach children tolerance of others in schools and classrooms in America.
Digital Article Identifier (DOI):
52
12695
An Approach to Control Design for Nonlinear Systems via Two-stage Formal Linearization and Two-type LQ Controls
Abstract: In this paper we consider a nonlinear control design for
nonlinear systems by using two-stage formal linearization and twotype
LQ controls. The ordinary LQ control is designed on almost
linear region around the steady state point. On the other region,
another control is derived as follows. This derivation is based on
coordinate transformation twice with respect to linearization functions
which are defined by polynomials. The linearized systems can be
made up by using Taylor expansion considered up to the higher order.
To the resulting formal linear system, the LQ control theory is applied
to obtain another LQ control. Finally these two-type LQ controls
are smoothly united to form a single nonlinear control. Numerical
experiments indicate that this control show remarkable performances
for a nonlinear system.
Digital Article Identifier (DOI):
51
5812
Comparison between Batteries and Fuel Cells for Photovoltaic System Backup
Abstract: Batteries and fuel cells contain a great potential to back up severe photovoltaic power fluctuations under inclement weather conditions. In this paper comparison between batteries and fuel cells is carried out in detail only for their PV power backup options, so their common attributes and different attributes is discussed. Then, the common and different attributes are compared; accordingly, the fuel cell is selected as the backup of Photovoltaic system. Finally, environmental evaluation of the selected hybrid plant was made in terms of plant-s land requirement and lifetime CO2 emissions, and then compared with that of the conventional fossilfuel power generating forms.
Digital Article Identifier (DOI):
50
9374
Dynamic Load Modeling for KHUZESTAN Power System Voltage Stability Studies
Abstract: Based on the component approach, three kinds of
dynamic load models, including a single –motor model, a two-motor
model and composite load model have been developed for the
stability studies of Khuzestan power system. The study results are
presented in this paper. Voltage instability is a dynamic phenomenon
and therefore requires dynamic representation of the power system
components. Industrial loads contain a large fraction of induction
machines. Several models of different complexity are available for
the description investigations. This study evaluates the dynamic
performances of several dynamic load models in combination with
the dynamics of a load changing transformer. Case study is steel
industrial substation in Khuzestan power systems.
Digital Article Identifier (DOI):
49
9676
A Neuro Adaptive Control Strategy for Movable Power Source of Proton Exchange Membrane Fuel Cell Using Wavelets
Abstract: Movable power sources of proton exchange
membrane fuel cells (PEMFC) are the important research done in the
current fuel cells (FC) field. The PEMFC system control influences
the cell performance greatly and it is a control system for industrial
complex problems, due to the imprecision, uncertainty and partial
truth and intrinsic nonlinear characteristics of PEMFCs. In this paper
an adaptive PI control strategy using neural network adaptive Morlet
wavelet for control is proposed. It is based on a single layer feed
forward neural networks with hidden nodes of adaptive morlet
wavelet functions controller and an infinite impulse response (IIR)
recurrent structure. The IIR is combined by cascading to the network
to provide double local structure resulting in improving speed of
learning. The proposed method is applied to a typical 1 KW PEMFC
system and the results show the proposed method has more accuracy
against to MLP (Multi Layer Perceptron) method.
Digital Article Identifier (DOI):
48
7324
An Interval-Based Multi-Attribute Decision Making Approach for Electric Utility Resource Planning
Abstract: This paper presents an interval-based multi-attribute
decision making (MADM) approach in support of the decision
process with imprecise information. The proposed decision
methodology is based on the model of linear additive utility function
but extends the problem formulation with the measure of composite
utility variance. A sample study concerning with the evaluation of
electric generation expansion strategies is provided showing how the
imprecise data may affect the choice toward the best solution and
how a set of alternatives, acceptable to the decision maker (DM),
may be identified with certain confidence.
Digital Article Identifier (DOI):
47
5304
Load Modeling for Power Flow and Transient Stability Computer Studies at BAKHTAR Network
Abstract: A method has been developed for preparing load
models for power flow and stability. The load modeling
(LOADMOD) computer software transforms data on load class mix,
composition, and characteristics into the from required for
commonly–used power flow and transient stability simulation
programs. Typical default data have been developed for load
composition and characteristics. This paper defines LOADMOD
software and describes the dynamic and static load modeling
techniques used in this software and results of initial testing for
BAKHTAR power system.
Digital Article Identifier (DOI):
46
12936
Decoupled, Reduced Order Model for Double Output Induction Generator Using Integral Manifolds and Iterative Separation Theory
Abstract: In this paper presents a technique for developing the
computational efficiency in simulating double output induction
generators (DOIG) with two rotor circuits where stator transients are
to be included. Iterative decomposition is used to separate the flux–
Linkage equations into decoupled fast and slow subsystems, after
which the model order of the fast subsystems is reduced by
neglecting the heavily damped fast transients caused by the second
rotor circuit using integral manifolds theory. The two decoupled
subsystems along with the equation for the very slowly changing slip
constitute a three time-scale model for the machine which resulted in
increasing computational speed. Finally, the proposed method of
reduced order in this paper is compared with the other conventional
methods in linear and nonlinear modes and it is shown that this
method is better than the other methods regarding simulation
accuracy and speed.
Digital Article Identifier (DOI):
45
11850
Evaluation of Fuzzy ARTMAP with DBSCAN in VLSI Application
Abstract: The various applications of VLSI circuits in highperformance
computing, telecommunications, and consumer
electronics has been expanding progressively, and at a very hasty
pace. This paper describes a new model for partitioning a circuit
using DBSCAN and fuzzy ARTMAP neural network. The first step
is concerned with feature extraction, where we had make use
DBSCAN algorithm. The second step is the classification and is
composed of a fuzzy ARTMAP neural network. The performance of
both approaches is compared using benchmark data provided by
MCNC standard cell placement benchmark netlists. Analysis of the
investigational results proved that the fuzzy ARTMAP with
DBSCAN model achieves greater performance then only fuzzy
ARTMAP in recognizing sub-circuits with lowest amount of
interconnections between them The recognition rate using fuzzy
ARTMAP with DBSCAN is 97.7% compared to only fuzzy
ARTMAP.
Digital Article Identifier (DOI):
44
717
Ensemble Learning with Decision Tree for Remote Sensing Classification
Abstract: In recent years, a number of works proposing the
combination of multiple classifiers to produce a single
classification have been reported in remote sensing literature. The
resulting classifier, referred to as an ensemble classifier, is
generally found to be more accurate than any of the individual
classifiers making up the ensemble. As accuracy is the primary
concern, much of the research in the field of land cover
classification is focused on improving classification accuracy. This
study compares the performance of four ensemble approaches
(boosting, bagging, DECORATE and random subspace) with a
univariate decision tree as base classifier. Two training datasets,
one without ant noise and other with 20 percent noise was used to
judge the performance of different ensemble approaches. Results
with noise free data set suggest an improvement of about 4% in
classification accuracy with all ensemble approaches in
comparison to the results provided by univariate decision tree
classifier. Highest classification accuracy of 87.43% was achieved
by boosted decision tree. A comparison of results with noisy data
set suggests that bagging, DECORATE and random subspace
approaches works well with this data whereas the performance of
boosted decision tree degrades and a classification accuracy of
79.7% is achieved which is even lower than that is achieved (i.e.
80.02%) by using unboosted decision tree classifier.
Digital Article Identifier (DOI):
43
4537
A Comparison of the Nonparametric Regression Models using Smoothing Spline and Kernel Regression
Abstract: This paper study about using of nonparametric
models for Gross National Product data in Turkey and Stanford heart
transplant data. It is discussed two nonparametric techniques called
smoothing spline and kernel regression. The main goal is to compare
the techniques used for prediction of the nonparametric regression
models. According to the results of numerical studies, it is concluded
that smoothing spline regression estimators are better than those of
the kernel regression.
Digital Article Identifier (DOI):
42
8942
Coefficient of Parentage for Crop Hybridization
Abstract: Hybridization refers to the crossing breeding of two
plants. Coefficient of Parentage (COP) is used by the plant breeders
to determine the genetic diversity across various varieties so as to
incorporate the useful characters of the two varieties to develop a
new crop variety with particular useful characters. Genetic Diversity
is the prerequisite for any cultivar development program. Genetic
Diversity depends upon the pedigree information of the varieties
based on particular levels. Pedigree refers to the parents of a
particular variety at various levels. This paper discusses the searching
and analyses of different possible pairs of varieties selected on the
basis of morphological characters, Climatic conditions and Nutrients
so as to obtain the most optimal pair that can produce the required
crossbreed variety. An algorithm was developed to determine the
coefficient of parentage (COP) between the selected wheat varieties.
Dummy values were used wherever actual data was not available.
Digital Article Identifier (DOI):
41
12944
Modeling of Single-Particle Impact in Abrasive Water Jet Machining
Abstract: This work presents a study on the abrasive water jet
(AWJ) machining. An explicit finite element analysis (FEA) of
single abrasive particle impact on stainless steel 1.4304 (AISI 304) is
conducted. The abrasive water jet machining is modeled by FEA
software ABAQUS/CAE. Shapes of craters in FEM simulation
results were used and compared with the previous experimental and
FEM works by means of crater sphericity. The influence of impact
angle and particle velocity was observed. Adaptive mesh domain is
used to model the impact zone. Results are in good agreement with
those obtained from the experimental and FEM simulation. The
crater-s depth is also obtained for different impact angle and abrasive
particle velocities.
Digital Article Identifier (DOI):
40
15969
Faster FPGA Routing Solution using DNA Computing
Abstract: There are many classical algorithms for finding
routing in FPGA. But Using DNA computing we can solve the routes
efficiently and fast. The run time complexity of DNA algorithms is
much less than other classical algorithms which are used for solving
routing in FPGA. The research in DNA computing is in a primary
level. High information density of DNA molecules and massive
parallelism involved in the DNA reactions make DNA computing a
powerful tool. It has been proved by many research accomplishments
that any procedure that can be programmed in a silicon computer can
be realized as a DNA computing procedure. In this paper we have
proposed two tier approaches for the FPGA routing solution. First,
geometric FPGA detailed routing task is solved by transforming it
into a Boolean satisfiability equation with the property that any
assignment of input variables that satisfies the equation specifies a
valid routing. Satisfying assignment for particular route will result in
a valid routing and absence of a satisfying assignment implies that
the layout is un-routable. In second step, DNA search algorithm is
applied on this Boolean equation for solving routing alternatives
utilizing the properties of DNA computation. The simulated results
are satisfactory and give the indication of applicability of DNA
computing for solving the FPGA Routing problem.
Digital Article Identifier (DOI):
39
3843
Conceptual Multidimensional Model
Abstract: The data is available in abundance in any business
organization. It includes the records for finance, maintenance,
inventory, progress reports etc. As the time progresses, the data keep
on accumulating and the challenge is to extract the information from
this data bank. Knowledge discovery from these large and complex
databases is the key problem of this era. Data mining and machine
learning techniques are needed which can scale to the size of the
problems and can be customized to the application of business. For
the development of accurate and required information for particular
problem, business analyst needs to develop multidimensional models
which give the reliable information so that they can take right
decision for particular problem. If the multidimensional model does
not possess the advance features, the accuracy cannot be expected.
The present work involves the development of a Multidimensional
data model incorporating advance features. The criterion of
computation is based on the data precision and to include slowly
change time dimension. The final results are displayed in graphical
form.
Digital Article Identifier (DOI):
38
3671
Various Speech Processing Techniques For Speech Compression And Recognition
Abstract: Years of extensive research in the field of speech
processing for compression and recognition in the last five decades,
resulted in a severe competition among the various methods and
paradigms introduced. In this paper we include the different representations
of speech in the time-frequency and time-scale domains
for the purpose of compression and recognition. The examination of
these representations in a variety of related work is accomplished.
In particular, we emphasize methods related to Fourier analysis
paradigms and wavelet based ones along with the advantages and
disadvantages of both approaches.
Digital Article Identifier (DOI):
37
11870
Response of Fully Backed Sandwich Beams to Low Velocity Transverse Impact
Abstract: This paper describes analysis of low velocity transverse impact on fully backed sandwich beams with composite faces from Eglass/epoxy and cores from Polyurethane or PVC. Indentation on sandwich beams has been analyzed with the existing theories and modeled with the FE code ABAQUS, also loadings have been done experimentally to verify theoretical results. Impact on fully backed has been modeled in two cases of impactor energy with SDOF model (single-degree-of-freedom) and indentation stiffness: lower energy for elastic indentation of sandwich beams and higher energy for plastic area in indentation. Impacts have been modeled by ABAQUS. Impact results can describe response of beam in terms of core and faces thicknesses, core material, indentor energy and energy absorbed. The foam core is modeled using the crushable foam material model and response of the foam core is experimentally characterized in uniaxial compression with higher velocity loading to define quasi impact behaviour.
Digital Article Identifier (DOI):
36
6053
A Study of Indentation Energy in Three Points Bending of Sandwich beams with Composite Laminated Faces and Foam Core
Abstract: This paper deals with analysis of flexural stiffness,
indentation and their energies in three point loading of sandwich
beams with composite faces from Eglass/epoxy and cores from
Polyurethane or PVC. Energy is consumed in three stages of
indentation in laminated beam, indentation of sandwich beam and
bending of sandwich beam. Theory of elasticity is chosen to present
equations for indentation of laminated beam, then these equations
have been corrected to offer better results. An analytical model has
been used assuming an elastic-perfectly plastic compressive behavior
of the foam core. Classical theory of beam is used to describe three
point bending. Finite element (FE) analysis of static indentation
sandwich beams is performed using the FE code ABAQUS. The
foam core is modeled using the crushable foam material model and
response of the foam core is experimentally characterized in uniaxial
compression.
Three point bending and indentation have been done
experimentally in two cases of low velocity and higher velocity
(quasi-impact) of loading. Results can describe response of beam in
terms of core and faces thicknesses, core material, indentor diameter,
energy absorbed, and length of plastic area in the testing. The
experimental results are in good agreement with the analytical and
FE analyses. These results can be used as an introduction for impact
loading and energy absorbing of sandwich structures.
Digital Article Identifier (DOI):
35
1844
Virtual Scene based on VRML and Java
Abstract: VRML( The virtual reality modeling language) is a standard language used to build up 3D virtualized models. The quick development of internet technology and computer manipulation has promoted the commercialization of reality virtualization. VRML, thereof, is expected to be the most effective framework of building up virtual reality. This article has studied plans to build virtualized scenes based on the technology of virtual reality and Java programe, and introduced how to execute real-time data transactions of VRML file and Java programe by applying Script Node, in doing so we have the VRML interactivity being strengthened.
Digital Article Identifier (DOI):
34
14700
Diagnosis of Inter Turn Fault in the Stator of Synchronous Generator Using Wavelet Based ANFIS
Abstract: In this paper, Wavelet based ANFIS for finding inter
turn fault of generator is proposed. The detector uniquely responds to
the winding inter turn fault with remarkably high sensitivity.
Discrimination of different percentage of winding affected by inter
turn fault is provided via ANFIS having an Eight dimensional input
vector. This input vector is obtained from features extracted from
DWT of inter turn faulty current leaving the generator phase
winding. Training data for ANFIS are generated via a simulation of
generator with inter turn fault using MATLAB. The proposed
algorithm using ANFIS is giving satisfied performance than ANN
with selected statistical data of decomposed levels of faulty current.
Digital Article Identifier (DOI):
33
9010
Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network
Abstract: The objective of this paper is to a design of pattern
classification model based on the back-propagation (BP) algorithm for
decision support system. Standard BP model has done full connection
of each node in the layers from input to output layers. Therefore, it
takes a lot of computing time and iteration computing for good
performance and less accepted error rate when we are doing some
pattern generation or training the network.
However, this model is using exclusive connection in between
hidden layer nodes and output nodes. The advantage of this model is
less number of iteration and better performance compare with standard
back-propagation model. We simulated some cases of classification
data and different setting of network factors (e.g. hidden layer number
and nodes, number of classification and iteration). During our
simulation, we found that most of simulations cases were satisfied by
BP based using exclusive connection network model compared to
standard BP. We expect that this algorithm can be available to
identification of user face, analysis of data, mapping data in between
environment data and information.
Digital Article Identifier (DOI):
32
7206
User Pattern Learning Algorithm based MDSS(Medical Decision Support System) Framework under Ubiquitous
Abstract: In this paper, we present user pattern learning
algorithm based MDSS (Medical Decision support system) under
ubiquitous. Most of researches are focus on hardware system, hospital
management and whole concept of ubiquitous environment even
though it is hard to implement. Our objective of this paper is to design
a MDSS framework. It helps to patient for medical treatment and
prevention of the high risk patient (COPD, heart disease, Diabetes).
This framework consist database, CAD (Computer Aided diagnosis
support system) and CAP (computer aided user vital sign prediction
system). It can be applied to develop user pattern learning algorithm
based MDSS for homecare and silver town service. Especially this
CAD has wise decision making competency. It compares current vital
sign with user-s normal condition pattern data. In addition, the CAP
computes user vital sign prediction using past data of the patient. The
novel approach is using neural network method, wireless vital sign
acquisition devices and personal computer DB system. An intelligent
agent based MDSS will help elder people and high risk patients to
prevent sudden death and disease, the physician to get the online
access to patients- data, the plan of medication service priority (e.g.
emergency case).
Digital Article Identifier (DOI):
31
2098
Application of Hermite-Rodriguez Functions to Pulse Shaping Analog Filter Design
Abstract: In this paper, we consider the design of pulse shaping
filter using orthogonal Hermite-Rodriguez basis functions. The pulse
shaping filter design problem has been formulated and solved as a
quadratic programming problem with linear inequality constraints.
Compared with the existing approaches reported in the literature, the
use of Hermite-Rodriguez functions offers an effective alternative to
solve the constrained filter synthesis problem. This is demonstrated
through a numerical example which is concerned with the design of
an equalization filter for a digital transmission channel.
Digital Article Identifier (DOI):
30
14793
Mobility Management Enhancement for Transferring AAA Context in Mobile Grid
Abstract: Adapting wireless devices to communicate within grid
networks empowers us by providing range of possibilities.. These
devices create a mechanism for consumers and publishers to create
modern networks with or without peer device utilization. Emerging
mobile networks creates new challenges in the areas of reliability,
security, and adaptability. In this paper, we propose a system
encompassing mobility management using AAA context transfer for
mobile grid networks. This system ultimately results in seamless task
processing and reduced packet loss, communication delays,
bandwidth, and errors.
Digital Article Identifier (DOI):
29
7155
DEVS Modeling of Network Vulnerability
Abstract: As network components grow larger and more diverse,
and as securing them on a host-by-host basis grow more difficult, more
sites are turning to a network security model. We concentrate on
controlling network access to various hosts and the services they offer,
rather than on securing them one by one with a network security model.
We present how the policy rules from vulnerabilities stored in SVDB
(Simulation based Vulnerability Data Base) are inducted, and how to
be used in PBN. In the network security environment, each simulation
model is hierarchically designed by DEVS (Discrete EVent system
Specification) formalism.
Digital Article Identifier (DOI):
28
2785
Home-Network Security Model in Ubiquitous Environment
Abstract: Social interest and demand on Home-Network has
been increasing greatly. Although various services are being
introduced to respond to such demands, they can cause serious
security problems when linked to the open network such as Internet.
This paper reviews the security requirements to protect the service
users with assumption that the Home-Network environment is
connected to Internet and then proposes the security model based on
the requirement. The proposed security model can satisfy most of the
requirements and further can be dynamically applied to the future
ubiquitous Home-Networks.
Digital Article Identifier (DOI):
27
4172
Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
Abstract: As the disfunctions of the information society and
social development progress, intrusion problems such as malicious
replies, spam mail, private information leakage, phishing, and
pharming, and side effects such as the spread of unwholesome
information and privacy invasion are becoming serious social
problems. Illegal access to information is also becoming a problem as
the exchange and sharing of information increases on the basis of the
extension of the communication network. On the other hand, as the
communication network has been constructed as an international,
global system, the legal response against invasion and cyber-attack
from abroad is facing its limit. In addition, in an environment where
the important infrastructures are managed and controlled on the basis
of the information communication network, such problems pose a
threat to national security. Countermeasures to such threats are
developed and implemented on a yearly basis to protect the major
infrastructures of information communication. As a part of such
measures, we have developed a methodology for assessing the
information protection level which can be used to establish the
quantitative object setting method required for the improvement of the
information protection level.
Digital Article Identifier (DOI):
26
13891
Aeroelastic Response for Pure Plunging Motion of a Typical Section Due to Sharp Edged Gust, Using Jones Approximation Aerodynamics
Abstract: This paper presents investigation effects of a sharp edged gust on aeroelastic behavior and time-domain response of a typical section model using Jones approximate aerodynamics for pure plunging motion. Flutter analysis has been done by using p and p-k methods developed for presented finite-state aerodynamic model for a typical section model (airfoil). Introduction of gust analysis as a linear set of ordinary differential equations in a simplified procedure has been carried out by using transformation into an eigenvalue problem.
Digital Article Identifier (DOI):
25
5160
Vibration Base Identification of Impact Force Using Genetic Algorithm
Abstract: This paper presents the identification of the impact
force acting on a simply supported beam. The force identification is
an inverse problem in which the measured response of the structure is
used to determine the applied force. The identification problem is
formulated as an optimization problem and the genetic algorithm is
utilized to solve the optimization problem. The objective function is
calculated on the difference between analytical and measured
responses and the decision variables are the location and magnitude
of the applied force. The results from simulation show the
effectiveness of the approach and its robustness vs. the measurement
noise and sensor location.
Digital Article Identifier (DOI):
24
9237
Analytical Solution of Stress Distribution ona Hollow Cylindrical Fiber of a Composite with Cylindrical Volume Element under Axial Loading
Abstract: The study of the stress distribution on a hollow
cylindrical fiber placed in a composite material is considered in this
work and an analytical solution for this stress distribution has been
constructed. Finally some parameters such as fiber-s thickness and
fiber-s length are considered and their effects on the distribution of
stress have been investigated. For finding the governing relations,
continuity equations for the axisymmetric problem in cylindrical
coordinate (r,o,z) are considered. Then by assuming some conditions
and solving the governing equations and applying the boundary
conditions, an equation relates the stress applied to the representative
volume element with the stress distribution on the fiber has been
found.
Digital Article Identifier (DOI):
23
4418
Limit Analysis of FGM Circular Plates Subjected to Arbitrary Rotational Symmetric Loads
Abstract: The limit load carrying capacity of functionally
graded materials (FGM) circular plates subjected to an arbitrary
rotationally symmetric loading has been computed. It is provided that
the plate material behaves rigid perfectly plastic and obeys either the
Square or the Tresca yield criterion. To this end the upper and lower
bound principles of limit analysis are employed to determine the
exact value for the limiting load. The correctness of the result are
verified and finally limiting loads for two examples namely; through
radius and through thickness FGM circular plates with simply
supported edges are calculated, respectively and moreover, the values
of critical loading factor are determined.
Digital Article Identifier (DOI):
22
11160
Turbine Speed Variation Study in Gas Power Plant for an Active Generator
Abstract: This research deals with investigations on the “Active
Generator" under rotor speed variations and output frequency
control. It runs at turbine speed and it is connected to a three phase
electrical power grid which has its own frequency different from
turbine frequency. In this regard the set composed of a four phase
synchronous generator and a natural commutated matrix converter
(NCMC) made with thyristors, is called active generator. It replaces a
classical mechanical gearbox which introduces many drawbacks. The
main idea in this article is the presentation of frequency control at
grid side when turbine runs at variable speed. Frequency control has
been done by linear and step variations of the turbine speed. Relation
between turbine speed (frequency) and main grid zero sequence
voltage frequency is presented.
Digital Article Identifier (DOI):
21
1009
Using the Polynomial Approximation Algorithm in the Algorithm 2 for Manipulator's Control in an Unknown Environment
Abstract: The Algorithm 2 for a n-link manipulator movement amidst arbitrary unknown static obstacles for a case when a sensor system supplies information about local neighborhoods of different points in the configuration space is presented. The Algorithm 2 guarantees the reaching of a target position in a finite number of steps. The Algorithm 2 is reduced to a finite number of calls of a subroutine for planning a trajectory in the presence of known forbidden states. The polynomial approximation algorithm which is used as the subroutine is presented. The results of the Algorithm2 implementation are given.
Digital Article Identifier (DOI):
20
11176
Numerical Study of Transient Laminar Natural Convection Cooling of high Prandtl Number Fluids in a Cubical Cavity: Influence of the Prandtl Number
Abstract: This paper presents and discusses the numerical simulations of transient laminar natural convection cooling of high Prandtl number fluids in cubical cavities, in which the six walls of the cavity are subjected to a step change in temperature. The effect of the fluid Prandtl number on the heat transfer coefficient is studied for three different fluids (Golden Syrup, Glycerin and Glycerin-water solution 50%). The simulations are performed at two different Rayleigh numbers (5·106 and 5·107) and six different Prandtl numbers (3 · 105 ≥Pr≥ 50). Heat conduction through the cavity glass walls is also considered. The propsed correlations of the averaged heat transfer coefficient (N u) showed that it is dependant on the initial Ra and almost independent on P r. The instantaneous flow patterns, temperature contours and time evolution of volume averaged temperature and heat transfer coefficient are presented and analyzed.
Digital Article Identifier (DOI):
19
7993
Numerical Simulation of Flow and Combustionin an Axisymmetric Internal Combustion Engine
Abstract: Improving the performance of internal combustion
engines is one of the major concerns of researchers. Experimental
studies are more expensive than computational studies. Also using
computational techniques allows one to obtain all the required data
for the cylinder, some of which could not be measured. In this study,
an axisymmetric homogeneous charged spark ignition engine was
modeled. Fluid motion and combustion process were investigated
numerically. Turbulent flow conditions were considered. Standard k-
ε turbulence model for fluid flow and eddy break-up model for
turbulent combustion were utilized. The effects of valve angle on the
fluid flow and combustion are analyzed for constant air/fuel and
compression ratios. It is found that, velocities and strength of tumble
increases in-cylinder flow and due to increase in turbulence strength,
the flame propagation is faster for small valve angles.
Digital Article Identifier (DOI):
18
11533
Self-Organizing Maps in Evolutionary Approachmeant for Dimensioning Routes to the Demand
Abstract: We present a non standard Euclidean vehicle
routing problem adding a level of clustering, and we revisit the use
of self-organizing maps as a tool which naturally handles such
problems. We present how they can be used as a main operator
into an evolutionary algorithm to address two conflicting
objectives of route length and distance from customers to bus stops
minimization and to deal with capacity constraints. We apply the
approach to a real-life case of combined clustering and vehicle
routing for the transportation of the 780 employees of an
enterprise. Basing upon a geographic information system we
discuss the influence of road infrastructures on the solutions
generated.
Digital Article Identifier (DOI):
17
12846
Coupling Phenomenon between the Lightning and High Voltage Networks
Abstract: When a lightning strike falls near an overhead power
line, the intense electromagnetic field radiated by the current of the
lightning return stroke coupled with power lines and there induced
transient overvoltages, which can cause a back-flashover in electrical
network. The indirect lightning represents a major danger owing to
the fact that it is more frequent than that which results from the direct
strikes.
In this paper we present an analysis of the electromagnetic
coupling between an external electromagnetic field generated by the
lightning and an electrical overhead lines, so we give an important
and original contribution: We are based on our experimental
measurements which we carried in the high voltage laboratories of
EPFL in Switzerland during the last trimester of 2005, on the recent
works of other authors and with our mathematical improvement a
new particular analytical expression of the electromagnetic field
generated by the lightning return stroke was developed and presented
in this paper. The results obtained by this new electromagnetic field
formulation were compared with experimental results and give a
reasonable approach.
Digital Article Identifier (DOI):
16
6222
Qualitative Modelling for Ferromagnetic Hysteresis Cycle
Abstract: In determining the electromagnetic properties of
magnetic materials, hysteresis modeling is of high importance. Many
models are available to investigate those characteristics but they tend
to be complex and difficult to implement. In this paper a new
qualitative hysteresis model for ferromagnetic core is presented,
based on the function approximation capabilities of adaptive neuro
fuzzy inference system (ANFIS). The proposed ANFIS model
combined the neural network adaptive capabilities and the fuzzy
logic qualitative approach can restored the hysteresis curve with a
little RMS error. The model accuracy is good and can be easily
adapted to the requirements of the application by extending or
reducing the network training set and thus the required amount of
measurement data.
Digital Article Identifier (DOI):
15
2537
Array Data Transformation for Source Code Obfuscation
Abstract: Obfuscation is a low cost software protection
methodology to avoid reverse engineering and re engineering of
applications. Source code obfuscation aims in obscuring the source
code to hide the functionality of the codes. This paper proposes an
Array data transformation in order to obfuscate the source code
which uses arrays. The applications using the proposed data
structures force the programmer to obscure the logic manually. It
makes the developed obscured codes hard to reverse engineer and
also protects the functionality of the codes.
Digital Article Identifier (DOI):
14
257
Implementing Knowledge Transfer Solution through Web-based Help Desk System
Abstract: Knowledge management is a process taking any steps
that needed to get the most out of available knowledge resources.
KM involved several steps; capturing the knowledge discovering
new knowledge, sharing the knowledge and applied the knowledge in
the decision making process. In applying the knowledge, it is not
necessary for the individual that use the knowledge to comprehend it
as long as the available knowledge is used in guiding the decision
making and actions. When an expert is called and he provides stepby-
step procedure on how to solve the problems to the caller, the
expert is transferring the knowledge or giving direction to the caller.
And the caller is 'applying' the knowledge by following the
instructions given by the expert. An appropriate mechanism is
needed to ensure effective knowledge transfer which in this case is
by telephone or email. The problem with email and telephone is that
the knowledge is not fully circulated and disseminated to all users. In
this paper, with related experience of local university Help Desk, it is
proposed the usage of Information Technology (IT)to effectively
support the knowledge transfer in the organization. The issues
covered include the existing knowledge, the related works, the
methodology used in defining the knowledge management
requirements as well the overview of the prototype.
Digital Article Identifier (DOI):
13
14352
Generalized Predictive Control of Batch Polymerization Reactor
Abstract: This paper describes the application of a model
predictive controller to the problem of batch reactor temperature
control. Although a great deal of work has been done to improve
reactor throughput using batch sequence control, the control of the
actual reactor temperature remains a difficult problem for many
operators of these processes. Temperature control is important as
many chemical reactions are sensitive to temperature for formation of
desired products. This controller consist of two part (1) a nonlinear
control method GLC (Global Linearizing Control) to create a linear
model of system and (2) a Model predictive controller used to obtain
optimal input control sequence. The temperature of reactor is tuned
to track a predetermined temperature trajectory that applied to the
batch reactor. To do so two input signals, electrical powers and the
flow of coolant in the coil are used. Simulation results show that the
proposed controller has a remarkable performance for tracking
reference trajectory while at the same time it is robust against noise
imposed to system output.
Digital Article Identifier (DOI):
12
14718
New VLSI Architecture for Motion Estimation Algorithm
Abstract: This paper presents an efficient VLSI architecture
design to achieve real time video processing using Full-Search Block
Matching (FSBM) algorithm. The design employs parallel bank
architecture with minimum latency, maximum throughput, and full
hardware utilization. We use nine parallel processors in our
architecture and each controlled by a state machine. State machine
control implementation makes the design very simple and cost
effective. The design is implemented using VHDL and the
programming techniques we incorporated makes the design
completely programmable in the sense that the search ranges and the
block sizes can be varied to suit any given requirements. The design
can operate at frequencies up to 36 MHz and it can function in QCIF
and CIF video resolution at 1.46 MHz and 5.86 MHz, respectively.
Digital Article Identifier (DOI):
11
8530
Speaker Independent Quranic Recognizer Basedon Maximum Likelihood Linear Regression
Abstract: An automatic speech recognition system for the
formal Arabic language is needed. The Quran is the most formal
spoken book in Arabic, it is spoken all over the world. In this
research, an automatic speech recognizer for Quranic based speakerindependent
was developed and tested. The system was developed
based on the tri-phone Hidden Markov Model and Maximum
Likelihood Linear Regression (MLLR). The MLLR computes a set
of transformations which reduces the mismatch between an initial
model set and the adaptation data. It uses the regression class tree, as
well as, estimates a set of linear transformations for the mean and
variance parameters of a Gaussian mixture HMM system. The 30th
Chapter of the Quran, with five of the most famous readers of the
Quran, was used for the training and testing of the data. The chapter
includes about 2000 distinct words. The advantages of using the
Quranic verses as the database in this developed recognizer are the
uniqueness of the words and the high level of orderliness between
verses. The level of accuracy from the tested data ranged 68 to 85%.
Digital Article Identifier (DOI):
10
13269
Comparison of Compression Ability Using DCT and Fractal Technique on Different Imaging Modalities
Abstract: Image compression is one of the most important
applications Digital Image Processing. Advanced medical imaging
requires storage of large quantities of digitized clinical data. Due to
the constrained bandwidth and storage capacity, however, a medical
image must be compressed before transmission and storage. There
are two types of compression methods, lossless and lossy. In Lossless
compression method the original image is retrieved without any
distortion. In lossy compression method, the reconstructed images
contain some distortion. Direct Cosine Transform (DCT) and Fractal
Image Compression (FIC) are types of lossy compression methods.
This work shows that lossy compression methods can be chosen for
medical image compression without significant degradation of the
image quality. In this work DCT and Fractal Compression using
Partitioned Iterated Function Systems (PIFS) are applied on different
modalities of images like CT Scan, Ultrasound, Angiogram, X-ray
and mammogram. Approximately 20 images are considered in each
modality and the average values of compression ratio and Peak
Signal to Noise Ratio (PSNR) are computed and studied. The quality
of the reconstructed image is arrived by the PSNR values. Based on
the results it can be concluded that the DCT has higher PSNR values
and FIC has higher compression ratio. Hence in medical image
compression, DCT can be used wherever picture quality is preferred
and FIC is used wherever compression of images for storage and
transmission is the priority, without loosing picture quality
diagnostically.
Digital Article Identifier (DOI):
9
9864
Fuzzy Based Problem-Solution Data Structureas a Data Oriented Model for ABS Controlling
Abstract: The anti-lock braking systems installed on vehicles
for safe and effective braking, are high-order nonlinear and timevariant.
Using fuzzy logic controllers increase efficiency of such
systems, but impose a high computational complexity as well. The
main concept introduced by this paper is reducing computational
complexity of fuzzy controllers by deploying problem-solution data
structure. Unlike conventional methods that are based on
calculations, this approach is based on data oriented modeling.
Digital Article Identifier (DOI):
8
4249
Gain Tuning Fuzzy Controller for an Optical Disk Drive
Abstract: Since the driving speed and control accuracy of
commercial optical disk are increasing significantly, it needs an
efficient controller to monitor the track seeking and following
operations of the servo system for achieving the desired data
extracting response. The nonlinear behaviors of the actuator and servo
system of the optical disk drive will influence the laser spot
positioning. Here, the model-free fuzzy control scheme is employed to
design the track seeking servo controller for a d.c. motor driving
optical disk drive system. In addition, the sliding model control
strategy is introduced into the fuzzy control structure to construct a
1-D adaptive fuzzy rule intelligent controller for simplifying the
implementation problem and improving the control performance. The
experimental results show that the steady state error of the track
seeking by using this fuzzy controller can maintain within the track
width (1.6 μm ). It can be used in the track seeking and track
following servo control operations.
Digital Article Identifier (DOI):
7
8243
A New Color Image Database for Benchmarking of Automatic Face Detection and Human Skin Segmentation Techniques
Abstract: This paper presents a new color face image database
for benchmarking of automatic face detection algorithms and human
skin segmentation techniques. It is named the VT-AAST image
database, and is divided into four parts. Part one is a set of 286 color
photographs that include a total of 1027 faces in the original format
given by our digital cameras, offering a wide range of difference in
orientation, pose, environment, illumination, facial expression and
race. Part two contains the same set in a different file format. The
third part is a set of corresponding image files that contain human
colored skin regions resulting from a manual segmentation
procedure. The fourth part of the database has the same regions
converted into grayscale. The database is available on-line for
noncommercial use. In this paper, descriptions of the database
development, organization, format as well as information needed for
benchmarking of algorithms are depicted in detail.
Digital Article Identifier (DOI):
6
7475
Limit Cycle Behaviour of a Neural Controller with Delayed Bang-Bang Feedback
Abstract: It is well known that a linear dynamic system including
a delay will exhibit limit cycle oscillations when a bang-bang sensor
is used in the feedback loop of a PID controller. A similar behaviour
occurs when a delayed feedback signal is used to train a neural
network. This paper develops a method of predicting this behaviour
by linearizing the system, which can be shown to behave in a manner
similar to an integral controller. Using this procedure, it is possible
to predict the characteristics of the neural network driven limit cycle
to varying degrees of accuracy, depending on the information known
about the system. An application is also presented: the intelligent
control of a spark ignition engine.
Digital Article Identifier (DOI):
5
10370
Water Quality and Freshwater Fish Diversity at Khao Luang National Park, Thailand
Abstract: Water quality and freshwater fish diversity from nine
waterfalls at Khao Luang National Park, Thailand was examined.
Streams were shallow, fast flowing with clear water and rocky and
sandy substrate. The mean water quality of waterfalls at Khao Luang
National Park were as following pH 7.50, air temperature 24.27 °C,
water temperature 26.37 °C, dissolved oxygen 7.88 mg/l, hardness
4.44-21.33 mg/l, alkalinity 3.55-11.88 mg/(as CaCO3). Twenty fish
species were found at Khao Luang National Park belonging to nine
families. A cluster analysis of water quality at Khao Luang National
Park revealed that waterfalls at Khao Luang National Park were
divided into two groups: A and B. Group A composed of two
waterfalls (i.e. Aie Kaew and Wangmaipak) that flew to the Gulf of
Thailand side. Group B composed of seven waterfalls (i.e. Promlok,
Kalom, Nuafa, Suankun, Soidaw, Suanhai, and Thapae) that flew to
the Andaman Sea side (Fig. 2) .The Cyprinids represented the major
species in all the waterfalls comprising of 45%.
Digital Article Identifier (DOI):
4
598
Seasonal Prevalence of Aedes aegypti and Ae.albopictus in Three Topographical Areas of Southern Thailand
Abstract: This study investigated the seasonal prevalence of
Aedes aegypti and Ae. albopictus larvae in three topographical areas
(i.e. mangrove, rice paddy and mountainous areas). Samples were
collected from 300 households in both wet and dry seasons in nine
districts in Nakhon Si Thammarat province. Ae. aegypti and Ae.
albopictus were found in 21 out of 29 types of water containers in
mangrove, rice paddy and mountainous areas. Ae. aegypti and Ae.
albopictus laid eggs in different container types depending on season
and topographical areas. Ae. aegypti larvae were found most in metal
box in mangrove and mountainous areas in wet season. Ae.
albopictus larvae were also found most in metal box in mangrove and
mountainous areas in both wet and dry seasons. All Ae. albopictus
larval indices were higher than Ae. aegypti larval indices in all three
topographical areas and both seasons. HI and BI did not differ in
three topographical areas but differed between Aedes sp. HI for both
Ae. aegypti and Ae. albopictus in all three topographical areas in both
seasons were greater than 10 %, except Aedes aegypti in rice paddy
area in wet season. This indicated high risks of DHF transmission in
these areas.
Digital Article Identifier (DOI):
3
8039
Climatic Factors Affecting on Influenza Casesin Nakhon Si Thammarat
Abstract: This study investigated the climatic factors associated
with Influenza incidence in Nakhon Si Thammarat, Southern
Thailand. Climatic factors comprised of the amount of rainfall,
percent of rainy days, relative humidity, wind speed, maximum,
minimum temperatures and temperature difference. A multiple
stepwise regression technique was used to fit the statistical model.
The result showed that the temperature difference and percent of
rainy days were positively associated with Influenza incidence in
Nakhon Si Thammarat.
Digital Article Identifier (DOI):
2
11255
Determining of Threshold Levels of Burst by Burst AQAM/CDMA in Slow Rayleigh Fading Environments
Abstract: In this paper, we are going to determine the threshold levels of adaptive modulation in a burst by burst CDMA system by a suboptimum method so that the above method attempts to increase the average bit per symbol (BPS) rate of transceiver system by switching between the different modulation modes in variable channel condition. In this method, we choose the minimum values of average bit error rate (BER) and maximum values of average BPS on different values of average channel signal to noise ratio (SNR) and then calculate the relative threshold levels of them, so that when the instantaneous SNR increases, a higher order modulation be employed for increasing throughput and vise-versa when the instantaneous SNR decreases, a lower order modulation be employed for improvement of BER. In transmission step, by this adaptive modulation method, in according to comparison between obtained estimation of pilot symbols and a set of above suboptimum threshold levels, above system chooses one of states no transmission, BPSK, 4QAM and square 16QAM for modulation of data. The expected channel in this paper is a slow Rayleigh fading.
Digital Article Identifier (DOI):
1
14904
Receive and Transmit Array Antenna Spacingand Their Effect on the Performance of SIMO and MIMO Systems by using an RCS Channel Model
Abstract: In this paper, the effect of receive and/or transmit
antenna spacing on the performance (BER vs. SNR) of multipleantenna
systems is determined by using an RCS (Radar Cross
Section) channel model. In this physical model, the scatterers
existing in the propagation environment are modeled by their RCS so
that the correlation of the receive signal complex amplitudes, i.e.,
both magnitude and phase, can be estimated. The proposed RCS
channel model is then compared with classical models.
Digital Article Identifier (DOI):