Abstract: We present a new algorithm for nonlinear dimensionality reduction that consistently uses global information, and that enables understanding the intrinsic geometry of non-convex manifolds. Compared to methods that consider only local information, our method appears to be more robust to noise. Unlike most methods that incorporate global information, the proposed approach automatically handles non-convexity of the data manifold. We demonstrate the performance of our algorithm and compare it to state-of-the-art methods on synthetic as well as real data.
Abstract: Security management has changed from the
management of security equipments and useful interface to manager.
It analyzes the whole security conditions of network and preserves the
network services from attacks. Secure router technology has security
functions, such as intrusion detection, IPsec(IP Security) and access
control, are applied to legacy router for secure networking. It controls
an unauthorized router access and detects an illegal network intrusion.
This paper relates to a security engine management of router based on
a security policy, which is the definition of security function against a
network intrusion. This paper explains the security policy and designs
the structure of security engine management framework.
Abstract: Education in the modern world provides the socioeconomic
progress of society. In today's society, where the presence
of large middle class ensures its stability and is a symbol of
resolution of hidden economic problems, education is an integral part
of formation and reproduction of the middle class. This article presents part of results of the sociological study conducted under the
project "Kazakhstan model of education: international experience and national traditions" supported by the Foundation of the First President
of Republic of Kazakhstan - Leader of the Nation to determine the
ratio of students to the transformations of the educational system. The
authors conclude that the Kazakhstani system of education, passing
through the transformation processes, improving the quality of
educational programs and trying to correspond to the international
standards, not yet in full range, but begins to perform important
functions in the formation of the middle class.
Abstract: XML data consists of a very flexible tree-structure
which makes it difficult to support the storing and retrieving of XML
data. The node numbering scheme is one of the most popular
approaches to store XML in relational databases. Together with the
node numbering storage scheme, structural joins can be used to
efficiently process the hierarchical relationships in XML. However, in
order to process a tree-structured XPath query containing several
hierarchical relationships and conditional sentences on XML data,
many structural joins need to be carried out, which results in a high
query execution cost. This paper introduces mechanisms to reduce the
XPath queries including branch nodes into a much more efficient form
with less numbers of structural joins. A two step approach is proposed.
The first step merges duplicate nodes in the tree-structured query and
the second step divides the query into sub-queries, shortens the paths
and then merges the sub-queries back together. The proposed
approach can highly contribute to the efficient execution of XML
queries. Experimental results show that the proposed scheme can
reduce the query execution cost by up to an order of magnitude of the
original execution cost.
Abstract: In this paper, the vessel inscribed trigonometry (VITM) for the vessel progression orientation (VPO) is proposed in the two-dimensional fundus image. The VPO is a major factor in the optic disc (OD) detection which is a basic process in the retina analysis. To measure the VPO, skeletons of vessel are used. First, the vessels are classified into three classes as vessel end, vessel branch and vessel stem. And the chain code maps of VS are generated. Next, two farthest neighborhoods of each point on VS are searched by the proposed angle restriction. Lastly, a gradient of the straight line between two farthest neighborhoods is estimated to measure the VPO. VITM is validated by comparing with manual results and 2D Gaussian templates. It is confirmed that VPO of the proposed mensuration is correct enough to detect OD from the results of experiment which applied VITM to detect OD in fundus images.
Abstract: Face recognition in the infrared spectrum has attracted a lot of interest in recent years. Many of the techniques used in infrared are based on their visible counterpart, especially linear techniques like PCA and LDA. In this work, we introduce a probabilistic Bayesian framework for face recognition in the infrared spectrum. In the infrared spectrum, variations can occur between face images of the same individual due to pose, metabolic, time changes, etc. Bayesian approaches permit to reduce intrapersonal variation, thus making them very interesting for infrared face recognition. This framework is compared with classical linear techniques. Non linear techniques we developed recently for infrared face recognition are also presented and compared to the Bayesian face recognition framework. A new approach for infrared face extraction based on SVM is introduced. Experimental results show that the Bayesian technique is promising and lead to interesting results in the infrared spectrum when a sufficient number of face images is used in an intrapersonal learning process.
Abstract: Due to its capability to resist jamming signals, chirp
spread spectrum (CSS) technique has attracted much attention in
the area of wireless communications. However, there has been little
rigorous analysis for the performance of the CSS communication
system in jamming environments. In this paper, we present analytic
results on the performance of a CSS system by deriving symbol
error rate (SER) expressions for a CSS M-ary phase shift keying
(MPSK) system in the presence of broadband and tone jamming
signals, respectively. The numerical results show that the empirical
SER closely agrees with the analytic result.
Abstract: In this paper, zigbee communication based wireless energy surveillance system is presented. The proposed system consists of multiple energy surveillance devices and an energy surveillance monitor. Each different standby power-off value of electric device is set automatically by using learning function of energy surveillance device. Thus adaptive standby power-off function provides user convenience and it maximizes the energy savings. Also, power consumption monitoring function is helpful to reduce inefficient energy consumption in home. The zigbee throughput simulator is designed to evaluate minimum transmission power and maximum allowable information quantity in the proposed system. The test result of prototype has been satisfied all the requirements. The proposed system has confirmed that can be used as an intelligent energy surveillance system for energy savings in home or office.
Abstract: Recently, much research has been conducted for
security for wireless sensor networks and ubiquitous computing.
Security issues such as authentication and data integrity are major
requirements to construct sensor network systems. Advanced
Encryption Standard (AES) is considered as one of candidate
algorithms for data encryption in wireless sensor networks. In this
paper, we will present the hardware architecture to implement low
power AES crypto module. Our low power AES crypto module has
optimized architecture of data encryption unit and key schedule unit
which could be applicable to wireless sensor networks. We also details
low power design methods used to design our low power AES crypto
module.
Abstract: The renewable energy has been attracting attention as
a new alternative energy due to the problem of environmental
pollution and resource depletion. In particular, daylighting and PV
system are regarded as the solutions. In this paper, the hybrid
dimming control system supplied by solar cell and daylighting
system was designed. Daylighting system is main source and PV
system is spare source. PV system operates the LED lamp which
supports daylighting system because daylighting system is unstable
due to the variation of irradiance. In addition, PV system has a role
charging batteries. Battery charging has a benefit that PV system
operate LED lamp in the bad weather. However, LED lamp always
can`t turn on that-s why dimming control system was designed. In
particular, the solar charging robot was designed to check the
interior irradiance intensity. These systems and the application of
the solar charging robot are expected to contribute developing
alternative energy in the near future.
Abstract: Microarrays have become the effective, broadly used tools in biological and medical research to address a wide range of problems, including classification of disease subtypes and tumors. Many statistical methods are available for analyzing and systematizing these complex data into meaningful information, and one of the main goals in analyzing gene expression data is the detection of samples or genes with similar expression patterns. In this paper, we express and compare the performance of several clustering methods based on data preprocessing including strategies of normalization or noise clearness. We also evaluate each of these clustering methods with validation measures for both simulated data and real gene expression data. Consequently, clustering methods which are common used in microarray data analysis are affected by normalization and degree of noise and clearness for datasets.
Abstract: A high precision temperature insensitive current and voltage reference generator is presented. It is specifically developed for temperature compensated oscillator. The circuit, designed using MXIC 0.5um CMOS technology, has an operating voltage that ranges from 2.6V to 5V and generates a voltage of 1.21V and a current of 6.38 ӴA. It exhibits a variation of ±0.3nA for the current reference and a stable output for voltage reference as the temperature is varied from 0°C to 70°C. The power supply rejection ratio obtained without any filtering capacitor at 100Hz and 10MHz is -30dB and -12dB respectively.
Abstract: Feature-based registration is an effective technique for clinical use, because it can greatly reduce computational costs. However, this technique, which estimates the transformation by using feature points extracted from two images, may cause misalignments. To handle with this limitation, we propose to extract the salient edges and extracted control points (CP) of medical images by using efficiency of multiresolution representation of data nonsubsampled contourlet transform (NSCT) that finds the best feature points. The MR images were first decomposed using the NSCT, and then Edge and CP were extracted from bandpass directional subband of NSCT coefficients and some proposed rules. After edge and CP extraction, mutual information was adopted for the registration of feature points and translation parameters are calculated by using particle swarm optimization (PSO). The experimental results showed that the proposed method produces totally accurate performance for registration medical CT-MR images.
Abstract: ebXML (Electronic Business using eXtensible
Markup Language) is an e-business standard, sponsored by
UN/CEFACT and OASIS, which enables enterprises to exchange
business messages, conduct trading relationships, communicate
data in common terms and define and register business
processes. While there is tremendous e-business value in the
ebXML, security remains an unsolved problem and one of the
largest barriers to adoption. XML security technologies emerging
recently have extensibility and flexibility suitable for security
implementation such as encryption, digital signature, access
control and authentication.
In this paper, we propose ebXML business transaction models
that allow trading partners to securely exchange XML based
business transactions by employing XML security technologies.
We show how each XML security technology meets the ebXML
standard by constructing the test software and validating messages
between the trading partners.
Abstract: Numerical analysis of flow characteristics and
separation efficiency in a high-efficiency cyclone has been performed.
Several models based on the experimental observation for a design
purpose were proposed. However, the model is only estimated the
cyclone's performance under the limited environments; it is difficult to
obtain a general model for all types of cyclones. The purpose of this
study is to find out the flow characteristics and separation efficiency
numerically. The Reynolds stress model (RSM) was employed instead
of a standard k-ε or a k-ω model which was suitable for isotropic
turbulence and it could predict the pressure drop and the Rankine
vortex very well. For small particles, there were three significant
components (entrance of vortex finder, cone, and dust collector) for
the particle separation. In the present work, the particle re-entraining
phenomenon from the dust collector to the cyclone body was observed
after considerable time. This re-entrainment degraded the separation
efficiency and was one of the significant factors for the separation
efficiency of the cyclone.
Abstract: Adapting various sensor devices to communicate
within sensor networks empowers us by providing range of
possibilities. The sensors in sensor networks need to know their
measurable belief of trust for efficient and safe communication. In this
paper, we suggested a trust model using fuzzy logic in sensor network.
Trust is an aggregation of consensus given a set of past interaction
among sensors. We applied our suggested model to sensor networks in
order to show how trust mechanisms are involved in communicating
algorithm to choose the proper path from source to destination.
Abstract: The intention of this lessons is to assess the probability
of optical coherence tomography (OCT) for biometric recognition.
The OCT is the foundation on an optical signal acquisition and
processing method and has the micrometer-resolution. In this study,
we used the porcine skin for verifying the abovementioned means. The
porcine tissue was sound acknowledged for structural and
immunohistochemical similarity with human skin, so it could be
suitable for pre-clinical trial as investigational specimen. For this
reason, it was tattooed by the tattoo machine with the tattoo-pigment.
We detected the pattern of the tattooed skin by the OCT according to
needle speed. The result was consistent with the histology images.
This result showed that the OCT was effective to examine the tattooed
skin section noninvasively. It might be available to identify
morphological changes inside the skin.
Abstract: In this paper, we propose disease diagnosis hardware
architecture by using Hypernetworks technique. It can be used to
diagnose 3 different diseases (SPECT Heart, Leukemia, Prostate
cancer). Generally, the disparate diseases require specified diagnosis
hardware model for each disease. Using similarities of three diseases
diagnosis processor, we design diagnosis processor that can diagnose
three different diseases. Our proposed architecture that is combining
three processors to one processor can reduce hardware size without
decrease of the accuracy.
Abstract: In recent years, an increased competition and lower profit margins have necessitated a focus on improving the performance of the product development process, an area that traditionally have been excluded from detailed steering and evaluation. A systematic improvement requires a good understanding of the current performance, wherefore the interest for product development performance measurement has increased dramatically. This paper presents a case study that evaluates the performance of the product development performance measurement system used in a Swedish company that is a part of a global corporate group. The study is based on internal documentation and eighteen in-depth interviews with stakeholders involved in the product development process. The results from the case study includes a description of what metrics that are in use, how these are employed, and its affect on the quality of the performance measurement system. Especially, the importance of having a well-defined process proved to have a major impact on the quality of the performance measurement system in this particular case.
Abstract: The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.