Abstract: Based on the Lagrangian for the Gross –Pitaevskii
equation as derived by H. Sakaguchi and B.A Malomed [5] we have
derived a double well model for the nonlinear optical lattice. This
model explains the various features of nonlinear optical lattices.
Further, from this model we obtain and simulate the probability for
tunneling from one well to another which agrees with experimental
results [4].
Abstract: In this paper, using the Gaines and Mawhin,s continuation theorem of coincidence degree theory on time scales, the existence of periodic solutions for a two-prey one-predator system is studied. Some sufficient conditions for the existence of positive periodic solutions are obtained. The results provide unified existence theorems of periodic solution for the continuous differential equations and discrete difference equations.
Abstract: There has been gradual progress of late in construction projects, particularly in big-scale megaprojects. Due to the long-term construction period, however, with large-scale budget investment, lack of construction management technologies, and increase in the incomplete elements of project schedule management, a plan to conduct efficient operations and to ensure business safety is required. In particular, as the project management information system (PMIS) is meant for managing a single project centering on the construction phase, there is a limitation in the management of program-scale businesses like megaprojects. Thus, a program management information system (PgMIS) that includes program-level management technologies is needed to manage multiple projects. In this study, a support tool was developed for managing the cost and schedule information occurring in the construction phase, at the program level. In addition, a case study on the developed support tool was conducted to verify the usability of the system. With the use of the developed support tool program, construction managers can monitor the progress of the entire project and of the individual subprojects in real time.
Abstract: In the paper, the performance of quasi-synchronous
CDMA (QS-CDMA) system, which can allow an increased timing
error in synchronized access, is discussed. Average BER performance
of the system is analyzed in the condition of different access timing
error and different asynchronous users by simulation in AWGN
channel. The results show that QS-CDMA system is shown to have
great performance gain over the asynchronous system when access
timing error is within a few chips and asynchronous users is tolerable.
However, with access timing error increasing and asynchronous users
increasing, the performance of QS-CDMA will degrade. Also, we can
determine the number of tolerable asynchronous users for different
access timing error by simulation figures.
Abstract: Many supervised induction algorithms require discrete
data, even while real data often comes in a discrete
and continuous formats. Quality discretization of continuous
attributes is an important problem that has effects on speed,
accuracy and understandability of the induction models. Usually,
discretization and other types of statistical processes are applied
to subsets of the population as the entire population is practically
inaccessible. For this reason we argue that the discretization
performed on a sample of the population is only an estimate of
the entire population. Most of the existing discretization methods,
partition the attribute range into two or several intervals using
a single or a set of cut points. In this paper, we introduce a
technique by using resampling (such as bootstrap) to generate
a set of candidate discretization points and thus, improving the
discretization quality by providing a better estimation towards
the entire population. Thus, the goal of this paper is to observe
whether the resampling technique can lead to better discretization
points, which opens up a new paradigm to construction of
soft decision trees.
Abstract: In this paper a numerical simulation of electric and
hydrodynamic fields distribution in an electrofilter for dielectric
liquids cell is made. The simulation is made with the purpose to
determine the trajectory of particles that moves under the action of
external force in an electric and hydrodynamic field created inside of
an electrofilter for dielectric liquids. Particle trajectory is analyzed
for a dielectric liquid-solid particles suspension.
Abstract: Class cohesion is an important object-oriented
software quality attribute. It indicates how much the members in a
class are related. Assessing the class cohesion and improving the
class quality accordingly during the object-oriented design phase
allows for cheaper management of the later phases. In this paper, the
notion of distance between pairs of methods and pairs of attribute
types in a class is introduced and used as a basis for introducing a
novel class cohesion metric. The metric considers the methodmethod,
attribute-attribute, and attribute-method direct interactions.
It is shown that the metric gives more sensitive values than other
well-known design-based class cohesion metrics.
Abstract: Throughout the world, the Islamic way of banking and
financing is increasing. The same trend is also visible in Pakistan, where the Islamic banking sector is increasing in size and volume
each year. The question immediately arises as why the Pakistanis patronize the Islamic banking system? This study was carried out to
find whether following the Islamic rules in finance is the main factor for such selection or whether other factors such as customer service,
location, banking hour, physical facilities of the bank etc also have
importance. The study was carried by distributing questionnaire and
200 responses were collected from the clients of Islamic banks. The result showed that the service quality and other factors are as
important as following the Islamic rules for finance to retain old ustomers and catch new customers. The result is important and
Islamic banks can take actions accordingly to look after both the factors
Abstract: An ontology is widely used in many kinds of applications as a knowledge representation tool for domain knowledge. However, even though an ontology schema is well prepared by domain experts, it is tedious and cost-intensive to add instances into the ontology. The most confident and trust-worthy way to add instances into the ontology is to gather instances from tables in the related Web pages. In automatic populating of instances, the primary task is to find the most proper concept among all possible concepts within the ontology for a given table. This paper proposes a novel method for this problem by defining the similarity between the table and the concept using the overlap of their properties. According to a series of experiments, the proposed method achieves 76.98% of accuracy. This implies that the proposed method is a plausible way for automatic ontology population from Web tables.
Abstract: At any point of time, a power system operating
condition should be stable, meeting various operational criteria and it
should also be secure in the event of any credible contingency. Present
day power systems are being operated closer to their stability limits
due to economic and environmental constraints. Maintaining a stable
and secure operation of a power system is therefore a very important
and challenging issue. Voltage instability has been given much
attention by power system researchers and planners in recent years,
and is being regarded as one of the major sources of power system
insecurity. Voltage instability phenomena are the ones in which the
receiving end voltage decreases well below its normal value and does
not come back even after setting restoring mechanisms such as VAR
compensators, or continues to oscillate for lack of damping against the
disturbances. Reactive power limit of power system is one of the major
causes of voltage instability. This paper investigates the effects of
coordinated series capacitors (SC) with static VAR compensators
(SVC) on steady-state voltage stability of a power system. Also, the
influence of the presence of series capacitor on static VAR
compensator controller parameters and ratings required to stabilize
load voltages at certain values are highlighted.
Abstract: A Ground Control System (GCS), which controls Unmanned Aerial Vehicles (UAVs) and monitors their missionrelated data, is one of the major components of UAVs. In fact, some traditional GCSs were built on an expensive, complicated hardware infrastructure with workstations and PCs. In contrast, a GCS on a portable device – such as an Android phone or tablet – takes advantage of its light-weight hardware and the rich User Interface supported by the Android Operating System. We implemented that kind of GCS and called it Ground System Software (GSS) in this paper. In operation, our GSS communicates with UAVs or other GSS via TCP/IP connection to get mission-related data, visualizes it on the device-s screen, and saves the data in its own database. Our study showed that this kind of system will become a potential instrument in UAV-related systems and this kind of topic will appear in many research studies in the near future.
Abstract: Land use change, if not based on proper scientific
investigation affects other physical, chemical, and biological
properties of soil and leading to increased destruction and erosion. It
was imperative to study the effects of changing rangelands to
farmlands on some Soil quality indexes. Undisturbed soil samples
were collected from the depths of 0-10 and 10-30 centimeter in
pasture with good vegetation cover(GP), pasture with medium
vegetation cover(MP), abandoned dry land farming(ADF) and
degraded dry land farming(DDF) land uses in Ghareh Aghaj
watershed of Isfahan province. The results revealed that organic
matter(OM), cation exchange capacity(CEC) and available
potassium(AK) decreasing in the depth of 0-10 centimeter were 66.6,
38.8 and 70 percent and in the depth of 10-30 centimeter were 58,
61.4 and 83.5 percent respectively in DDF comparison with GP.
Concerning to the results, it seems that land use change can decrease
soil quality and increase soil degradation and lead in undesirable
consequences.
Abstract: World has entered in 21st century. The technology of
computer graphics and digital cameras is prevalent. High resolution
display and printer are available. Therefore high resolution images
are needed in order to produce high quality display images and high
quality prints. However, since high resolution images are not usually
provided, there is a need to magnify the original images. One
common difficulty in the previous magnification techniques is that of
preserving details, i.e. edges and at the same time smoothing the data
for not introducing the spurious artefacts. A definitive solution to this
is still an open issue. In this paper an image magnification using
adaptive interpolation by pixel level data-dependent geometrical
shapes is proposed that tries to take into account information about
the edges (sharp luminance variations) and smoothness of the image.
It calculate threshold, classify interpolation region in the form of
geometrical shapes and then assign suitable values inside
interpolation region to the undefined pixels while preserving the
sharp luminance variations and smoothness at the same time.
The results of proposed technique has been compared qualitatively
and quantitatively with five other techniques. In which the qualitative
results show that the proposed method beats completely the Nearest
Neighbouring (NN), bilinear(BL) and bicubic(BC) interpolation. The
quantitative results are competitive and consistent with NN, BL, BC
and others.
Abstract: Many new experimental films which were free from conventional movie forms have appeared since Nubellbak Movement in the late 1950s. Forty years after the movement started, on March 13th, 1995, on the 100th anniversary of the birth of film, the declaration called Dogme 95, was issued in Copenhagen, Denmark. It aimed to create a new style of avant-garde film, and showed a tendency toward being anti-Hollywood and anti-genre, which were against the highly popular Hollywood trend of movies based on large-scale investment. The main idea of Dogme 95 is the opposition to 'the writer's doctrine' that a film should be the artist's individual work and to 'the overuse of technology' in film. The key figures declared ten principles called 'Vow of Chastity', by which new movie forms were to be produced. Interview (2000), directed by Byunhyuk, was made in 2000, five years after Dogme 95 was declared. This movie was dedicated as the first Asian Dogme. This study will survey the relationship between Korean film and the Vow of Chastity through the Korean films released in theaters from a viewpoint of technology and content. It also will call attention to its effects on and significance to Korean film in modern society.
Abstract: This paper introduces an automatic voice classification
system for the diagnosis of individual constitution based on Sasang
Constitutional Medicine (SCM) in Traditional Korean Medicine
(TKM). For the developing of this algorithm, we used the voices of
309 female speakers and extracted a total of 134 speech features from
the voice data consisting of 5 sustained vowels and one sentence. The
classification system, based on a rule-based algorithm that is derived
from a non parametric statistical method, presents 3 types of decisions:
reserved, positive and negative decisions. In conclusion, 71.5% of the
voice data were diagnosed by this system, of which 47.7% were
correct positive decisions and 69.7% were correct negative decisions.
Abstract: The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
Abstract: Many firms implemented various initiatives such as outsourced manufacturing which could make a supply chain (SC) more vulnerable to various types of disruptions. So managing risk has become a critical component of SC management. Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer only point-based solutions that deal with a limited set of risks. This research aims to reinforce SC risk management by proposing an integrated approach. SC risks are identified and a risk index classification structure is created. Then we develop a SC risk assessment approach based on the analytic network process (ANP) and the VIKOR methods under the fuzzy environment where the vagueness and subjectivity are handled with linguistic terms parameterized by triangular fuzzy numbers. By using FANP, risks weights are calculated and then inserted to the FVIKOR to rank the SC members and find the most risky partner.
Abstract: Two algorithms are proposed to reduce the storage requirements for mammogram images. The input image goes through a shrinking process that converts the 16-bit images to 8-bits by using pixel-depth conversion algorithm followed by enhancement process. The performance of the algorithms is evaluated objectively and subjectively. A 50% reduction in size is obtained with no loss of significant data at the breast region.
Abstract: In this paper, the Tabu search algorithm is used to
solve a transportation problem which consists of determining the
shortest routes with the appropriate vehicle capacity to facilitate the
travel of the students attending the University of Mauritius. The aim
of this work is to minimize the total cost of the distance travelled by
the vehicles in serving all the customers. An initial solution is
obtained by the TOUR algorithm which basically constructs a giant
tour containing all the customers and partitions it in an optimal way
so as to produce a set of feasible routes. The Tabu search algorithm
then makes use of a search procedure, a swapping procedure and the
intensification and diversification mechanism to find the best set of
feasible routes.
Abstract: The essence of the 21st century is knowledge economy. Knowledge has become the key resource of economic growth and social development. Construction industry is no exception. Because of the characteristic of complexity, project manager can't depend only on information management. The only way to improve the level of construction project management is to set up a kind of effective knowledge accumulation mechanism. This paper first introduced the IFC standard and the concept of ontology. Then put forward the construction method of the architectural engineering domain ontology based on IFC. And finally build up the concepts, properties and the relationship between the concepts of the ontology. The deficiency of this paper is also pointed out.