Abstract: This paper undertakes the problem of optimal
capacitor placement in a distribution system. The problem is how to
optimally determine the locations to install capacitors, the types and
sizes of capacitors to he installed and, during each load level,the
control settings of these capacitors in order that a desired objective
function is minimized while the load constraints,network constraints
and operational constraints (e.g. voltage profile) at different load
levels are satisfied. The problem is formulated as a combinatorial
optimization problem with a nondifferentiable objective function.
Four solution mythologies based on algorithms (GA),tabu search
(TS), and hybrid GA-SA algorithms are presented.The solution
methodologies are preceded by a sensitivity analysis to select the
candidate capacitor installation locations.
Abstract: Multi-residue analysis method for penicillins was
developed and validated in bovine muscle, chicken, milk, and flatfish.
Detection was based on liquid chromatography tandem mass
spectrometry (LC/MS/MS). The developed method was validated for
specificity, precision, recovery, and linearity. The analytes were
extracted with 80% acetonitrile and clean-up by a single
reversed-phase solid-phase extraction step. Six penicillins presented
recoveries higher than 76% with the exception of Amoxicillin
(59.7%). Relative standard deviations (RSDs) were not more than
10%. LOQs values ranged from 0.1 and to 4.5 ug/kg. The method was
applied to 128 real samples. Benzylpenicillin was detected in 15
samples and Cloxacillin was detected in 7 samples. Oxacillin was
detected in 2 samples. But the detected levels were under the MRL
levels for penicillins in samples.
Abstract: This paper describes a method to improve the robustness of a face recognition system based on the combination of two compensating classifiers. The face images are preprocessed by the appearance-based statistical approaches such as Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA). LDA features of the face image are taken as the input of the Radial Basis Function Network (RBFN). The proposed approach has been tested on the ORL database. The experimental results show that the LDA+RBFN algorithm has achieved a recognition rate of 93.5%
Abstract: This research proposes a methodology for patent-citation-based technology input-output analysis by applying the patent information to input-output analysis developed for the dependencies among different industries. For this analysis, a technology relationship matrix and its components, as well as input and technology inducement coefficients, are constructed using patent information. Then, a technology inducement coefficient is calculated by normalizing the degree of citation from certain IPCs to the different IPCs (International patent classification) or to the same IPCs. Finally, we construct a Dependency Structure Matrix (DSM) based on the technology inducement coefficient to suggest a useful application for this methodology.
Abstract: The goal of this research is discovering the
determinants of the success or failure of external cooperation in small
and medium enterprises (SMEs). For this, a survey was given to 190
SMEs that experienced external cooperation within the last 3 years. A
logistic regression model was used to derive organizational or strategic
characteristics that significantly influence whether external
collaboration of domestic SMEs is successful or not. Results suggest
that research and development (R&D) features in general
characteristics (both idea creation and discovering market
opportunities) that focused on and emphasized indirected-market
stakeholders (such as complementary companies and affiliates) and
strategies in innovative strategic characteristics raise the probability of
successful external cooperation. This can be used meaningfully to
build a policy or strategy for inducing successful external cooperation
or to understand the innovation of SMEs.
Abstract: This paper propose the robust character segmentation method for license plate with topological transform such as twist,rotation. The first step of the proposed method is to find a candidate region for character and license plate. The character or license plate
must be appeared as closed loop in the edge image. In the case of
detecting candidate for character region, the evaluation of detected
region is using topological relationship between each character. When
this method decides license plate candidate region, character features
in the region with binarization are used. After binarization for the detected candidate region, each character region is decided again. In
this step, each character region is fitted more than previous step. In the
next step, the method checks other character regions with different
scale near the detected character regions, because most license plates
have license numbers with some meaningful characters around them.
The method uses perspective projection for geometrical normalization.
If there is topological distortion in the character region, the method
projects the region on a template which is defined as standard license
plate using perspective projection. In this step, the method is able to
separate each number region and small meaningful characters. The
evaluation results are tested with a number of test images.
Abstract: To measure the thickness of the subcutaneous adipose
tissue layer, a non-invasive optical measurement system (λ=1300 nm)
is introduced. Animal and human subjects are used for the
experiments. The results of human subjects are compared with the data
of ultrasound device measurements, and a high correlation (r=0.94 for
n=11) is observed. There are two modes in the corresponding signals
measured by the optical system, which can be explained by
two-layered and three-layered tissue models. If the target tissue is
thinner than the critical thickness, detected data using diffuse
reflectance method follow the three-layered tissue model, so the data
increase as the thickness increases. On the other hand, if the target
tissue is thicker than the critical thickness, the data follow the
two-layered tissue model, so they decrease as the thickness increases.
Abstract: Electronic seal is an electronic device to check the
authenticity and integrity of freight containers at the point of arrival.
While RFID-based eSeals are gaining more acceptances and there are
also some standardization processes for these devices, a recent
research revealed that the current RFID-based eSeals are vulnerable to
various attacks. In this paper, we provide a feasible solution to
enhance the security of active RFID-based eSeals. Our approach is to
use an authentication and key agreement protocol between eSeal and
reader device, enabling data encryption and integrity check. Our
protocol is based on the use of block cipher AES, which is reasonable
since a block cipher can also be used for many other security purposes
including data encryption and pseudo-random number generation. Our
protocol is very simple, and it is applicable to low-end active RFID
eSeals.
Abstract: In this paper, we propose a method of alter duration in
frequency domain that control prosody in real time after pitch
alteration. If there has a method to alteration duration freely among
prosody information, that may used in several fields such as speech
impediment person's pronunciation proof reading or language study.
The pitch alteration method used control prosody altered by PSOLA
synthesis method which is in time domain processing method.
However, the duration of pitch alteration speech is changed by the
frequency domain. In this paper, we altered the duration with the
method of duration alteration by Fast Fourier Transformation in
frequency domain. Consequently, the intelligibility of the pitch and
duration are controlled has a slight decrease than the case when only
pitch is changed, but the proposed algorithm obtained the higher MOS
score about naturalness.
Abstract: Recently, with the appearance of smart cards, many
user authentication protocols using smart card have been proposed to
mitigate the vulnerabilities in user authentication process. In 2004,
Das et al. proposed a ID-based user authentication protocol that is
secure against ID-theft and replay attack using smart card. In 2009,
Wang et al. showed that Das et al.-s protocol is not secure to randomly
chosen password attack and impersonation attack, and proposed an
improved protocol. Their protocol provided mutual authentication and
efficient password management. In this paper, we analyze the security
weaknesses and point out the vulnerabilities of Wang et al.-s protocol.
Abstract: Accident in spent fuel pool (SFP) of Fukushima
Daiichi Unit 4 showed the importance of continuous monitoring of the
key environmental parameters such as water temperature, water level,
and radiation level in the SFP at accident conditions. Because the SFP
water temperature is one of the key parameters indicating SFP
conditions, its behavior at accident conditions shall be understood to
prepare appropriate measures. This study estimated temporal change
in the SFP water temperature at Kori Unit 1 with 587 MWe for 1 hour
after initiation of a loss-of-pool-cooling accident. For the estimation,
ANSYS CFX 13.0 code was used. The estimation showed that the
increasing rate of the water temperature was 3.90C per hour and the
SFP water temperature could reach 1000C in 25.6 hours after the
initiation of loss-of-pool-cooling accident.
Abstract: In a wireless communication system, a
predistorter(PD) is often employed to alleviate nonlinear distortions
due to operating a power amplifier near saturation, thereby improving
the system performance and reducing the interference to adjacent
channels. This paper presents a new adaptive polynomial digital
predistorter(DPD). The proposed DPD uses Coordinate Rotation
Digital Computing(CORDIC) processors and PD process by pipelined
architecture. It is simpler and faster than conventional adaptive
polynomial DPD. The performance of the proposed DPD is proved by
MATLAB simulation.
Abstract: In this study, a longitudinal joint connection was
proposed for the short-span slab-type modular bridges with rapid
construction. The slab-type modular bridge consists of a number of
precast slab modules and has the joint connection between the
modules in the longitudinal direction of the bridge. A finite element
based parameter analysis was conducted to design the shape and the
dimensions of the longitudinal joint connection. Numbers of shear
keys within the joint, height and depth of the shear key, tooth angle,
and the spacing were considered as the design parameters. Using the
local cracking load at the corner of the shear key and the
cross-sectional area of the joint, an efficiency factor was proposed to
evaluate the effectiveness of the longitudinal joint connection. The
dimensions of shear key were determined by comparing the cracking
loads and the efficiency factors obtained from the finite element
analysis.
Abstract: In order to provide existing SOAP (Simple Object
Access Protocol)-based Web services with users who are familiar with
REST (REpresentational State Transfer)-style Web services, this
paper proposes Web service providing method using Web service
transformation. This enables SOAP-based service providers to define
rules for mapping from RESTful Web services to SOAP-based ones.
Using these mapping rules, HTTP request messages for RESTful
services are converted automatically into SOAP-based service
invocations. Web service providers need not develop duplicate
RESTful services and they can avoid programming mediation
modules per service. Furthermore, they need not equip mediation
middleware like ESB (Enterprise Service Bus) only for the purpose of
transformation of two different Web service styles.