Abstract: Spectrum is a scarce commodity, and considering the spectrum scarcity faced by the wireless-based service providers led to high congestion levels. Technical inefficiencies from pooled, since all networks share a common pool of channels, exhausting the available channels will force networks to block the services. Researchers found that cognitive radio (CR) technology may resolve the spectrum scarcity. A CR is a self-configuring entity in a wireless networking that senses its environment, tracks changes, and frequently exchanges information with their networks. However, CRN facing challenges and condition become worst while tracks changes i.e. reallocation of another under-utilized channels while primary network user arrives. In this paper, channels or resource reallocation technique based on DNA-inspired computing algorithm for CRN has been proposed.
Abstract: The project describes the modeling of various
architectures mechatronics specifically morphologies of robots in an educational environment. Each structure developed by students of
pre-school, primary and secondary was created using the concept of
reverse engineering in a constructivist environment, to later be integrated in educational software that promotes the teaching of
educational Robotics in a virtual and economic environment.
Abstract: An unsupervised classification algorithm is derived
by modeling observed data as a mixture of several mutually
exclusive classes that are each described by linear combinations of
independent non-Gaussian densities. The algorithm estimates the
data density in each class by using parametric nonlinear functions
that fit to the non-Gaussian structure of the data. This improves
classification accuracy compared with standard Gaussian mixture
models. When applied to textures, the algorithm can learn basis
functions for images that capture the statistically significant structure
intrinsic in the images. We apply this technique to the problem of
unsupervised texture classification and segmentation.
Abstract: This paper presents an algorithm to estimate the parameters of two closely spaced sinusoids, providing a frequency resolution that is more than 800 times greater than that obtained by using the Discrete Fourier Transform (DFT). The strategy uses a highly optimized grid search approach to accurately estimate frequency, amplitude and phase of both sinusoids, keeping at the same time the computational effort at reasonable levels. The proposed method has three main characteristics: 1) a high frequency resolution; 2) frequency, amplitude and phase are all estimated at once using one single package; 3) it does not rely on any statistical assumption or constraint. Potential applications to this strategy include the difficult task of resolving coincident partials of instruments in musical signals.
Abstract: The purpose of this research was to study the inspector performance by using computer based training (CBT). Visual inspection task was printed circuit board (PCB) simulated on several types of defects. Subjects were 16 undergraduate randomly selected from King Mongkut-s University of Technology Thonburi and test for 20/20. Then, they were equally divided on performance into two groups (control and treatment groups) and were provided information before running the experiment. Only treatment group was provided feedback information after first experiment. Results revealed that treatment group was showed significantly difference at the level of 0.01. The treatment group showed high percentage on defects detected. Moreover, the attitude of inspectors on using the CBT to inspection was showed on good. These results have been showed that CBT could be used for training to improve inspector performance.
Abstract: In this paper, we present a new method for
incorporating global shift invariance in support vector machines.
Unlike other approaches which incorporate a feature extraction stage,
we first scale the image and then classify it by using the modified
support vector machines classifier. Shift invariance is achieved by
replacing dot products between patterns used by the SVM classifier
with the maximum cross-correlation value between them. Unlike the
normal approach, in which the patterns are treated as vectors, in our
approach the patterns are treated as matrices (or images). Crosscorrelation
is computed by using computationally efficient
techniques such as the fast Fourier transform. The method has been
tested on the ORL face database. The tests indicate that this method
can improve the recognition rate of an SVM classifier.
Abstract: The purpose of Grid computing is to utilize
computational power of idle resources which are distributed in
different areas. Given the grid dynamism and its decentralize
resources, there is a need for an efficient scheduler for scheduling
applications. Since task scheduling includes in the NP-hard problems
various researches have focused on invented algorithms especially
the genetic ones. But since genetic is an inherent algorithm which
searches the problem space globally and does not have the efficiency
required for local searching, therefore, its combination with local
searching algorithms can compensate for this shortcomings. The aim
of this paper is to combine the genetic algorithm and GELS (GAGELS)
as a method to solve scheduling problem by which
simultaneously pay attention to two factors of time and number of
missed tasks. Results show that the proposed algorithm can decrease
makespan while minimizing the number of missed tasks compared
with the traditional methods.
Abstract: Hypernetworks are a generalized graph structure
representing higher-order interactions between variables. We present a
method for self-organizing hypernetworks to learn an associative
memory of sentences and to recall the sentences from this memory.
This learning method is inspired by the “mental chemistry" model of
cognition and the “molecular self-assembly" technology in
biochemistry. Simulation experiments are performed on a corpus of
natural-language dialogues of approximately 300K sentences
collected from TV drama captions. We report on the sentence
completion performance as a function of the order of word-interaction
and the size of the learning corpus, and discuss the plausibility of this
architecture as a cognitive model of language learning and memory.
Abstract: The biological activity of A. pullulans isolates against
species of the genus Fusarium, bacteria of the genus Azotobacter and
pseudomonads colonizing wheat kernels was evaluated. A field
experiment was carried out in 2009-2011, in north-eastern Poland.
Winter wheat (cv. Bogatka) plants were sprayed with a cell
suspension of A. pullulans at a density of 106 - 108 per cm3 water at
the stem elongation stage and the heading stage. Untreated plants
served as control. The abundance of epiphytic yeasts, bacteria of the
genus Azotobacter, pseudomonads and Fusarium pathogens on wheat
grain was estimated at harvest and after six months’ storage. The
average size of yeast communities was significantly greater on wheat
kernels treated with a cell suspension of A. pullulans, compared with
control samples. In 2010-2011, biological control reduced the
abundance of some species of the genus Fusarium.
Abstract: A new observer based fault detection and diagnosis
scheme for predicting induction motors- faults is proposed in this
paper. Prediction of incipient faults, using different variants of
Kalman filter and their relative performance are evaluated. Only soft
faults are considered for this work. The data generation, filter
convergence issues, hypothesis testing and residue estimates are
addressed. Simulink model is used for data generation and various
types of faults are considered. A comparative assessment of the
estimates of different observers associated with these faults is
included.
Abstract: Equations with differentials relating to the inverse of an unknown function rather than to the unknown function itself are solved exactly for some special cases and numerically for the general case. Invertibility combined with differentiability over connected domains forces solutions always to be monotone. Numerical function inversion is key to all solution algorithms which either are of a forward type or a fixed point type considering whole approximate solution functions in each iteration. The given considerations are restricted to ordinary differential equations with inverted functions (ODEIs) of first order. Forward type computations, if applicable, admit consistency of order one and, under an additional accuracy condition, convergence of order one.
Abstract: This research aimed to study correlation between
work satisfaction and organization core value of officers in
Waterworks Authority, Bangkean Branch. Sample group of the study
was 112 officers who worked in the Waterworks Authority,
Bangkean Branch. Questionnaires were employed as a research tools,
while, Percentage, Mean, Standard Deviation, T-test, One-way
ANOVA, and Pearson Product Moment Correlation were claimed as
statistics used in this study. Researcher found that overall and
individual aspects of work satisfaction namely, work characteristic,
work progress, and colleagues significantly correlated with
organization core value in aspect of perception in choice of work at
0.5, 0.01, and 0.01 respectively. Also, such aspects were compatible
with income at .05 which indicated the low level of correlation, mid
low correlation respectively at the same direction, same direction,
opposite direction, and same direction, correspondingly.
Abstract: The aims of this study were to compare the
differences of being good membership behavior among faculties and
staffs of Suan Sunandha Rajabhat University with different sex, age,
income, education, marital status, and working period, and
investigate the relationships between organizational commitment and
being good membership behavior. The research methodology
employed a questionnaire as a quantitative method. The respondents
were 305 faculties and staffs of Suan Sunandha Rajabhat University.
This research used Percentage, Mean, Standard Deviation, t-test,
One-Way ANOVA Analysis of Variance, and Pearson’s Product
Moment Correlation Coefficient in data analysis. The results showed
that organizational commitment among faculties and staffs of Suan
Sunandha Rajabhat University was at a high level. In addition,
differences in sex, age, income, education, marital status, and
working period revealed differences in being good membership
behavior. The results also indicated that organizational commitment
was significantly related to being good membership behavior.
Abstract: Bicycle usage for exercise, recreation, and commuting
to work in Australia shows that pedal cycling is the fourth most
popular activity with 10.6% increase in participants between 2001
and 2007. As with other means of transport, accident and injury
becomes common although mandatory bicycle helmet wearing has
been introduced. The research aims to develop a face surrogate made
of sandwich of rigid foam and rubber sheets to represent human
facial bone under blunt impact. The facial surrogate will serve as an
important test device for further development of facial-impact
protection for cyclist. A test procedure was developed to simulate the
energy of impact and record data to evaluate the effect of impact on
facial bones. Drop tests were performed to establish a suitable
combination of materials. It was found that the sandwich structure of
rigid extruded-polystyrene foam (density of 40 kg/m3 with a pattern
of 6-mm-holes), Neoprene rubber sponge, and Abrasaflex rubber
backing, had impact characteristics comparable to that of human
facial bone. In particular, the foam thickness of 30 mm and 25 mm
was found suitable to represent human zygoma (cheekbone) and
maxilla (upper-jaw bone), respectively.
Abstract: In China, with the rapid urbanization and
industrialization, and highly accelerated economic development have
resulted in degradation of water resource. The water quality
deterioration usual result from eutrophication in most cases, so how to
dispose this type pollution water higher efficiently is an urgent task.
Hower, different with traditional technology, constructed wetlands are
effective treatment systems that can be very useful because they are
simple technology and low operational cost. A pilot-scale treatment
including constructed wetlands was constructed at XingYun Lake,
Yuxi, China, and operated as primary treatment measure before
eutrophic-lake water draining to riverine landscape. Water quality
indices were determined during the experiment, the results indicated
that treatment removal efficiencies were high for Nitrate nitrogen,
Chlorophyll–a and Algae, the final removal efficiency reached to
95.20%, 93.33% and 99.87% respectively, but the removal efficiency
of Total phosphorous and Total nitrogen only reach to 68.83% and
50.00% respectively.
Abstract: The problem addressed herein is the efficient management of the Grid/Cluster intense computation involved, when the preconditioned Bi-CGSTAB Krylov method is employed for the iterative solution of the large and sparse linear system arising from the discretization of the Modified Helmholtz-Dirichlet problem by the Hermite Collocation method. Taking advantage of the Collocation ma-trix's red-black ordered structure we organize efficiently the whole computation and map it on a pipeline architecture with master-slave communication. Implementation, through MPI programming tools, is realized on a SUN V240 cluster, inter-connected through a 100Mbps and 1Gbps ethernet network,and its performance is presented by speedup measurements included.
Abstract: The mixing of pollutions and sediments in near shore regions of natural water bodies depends heavily on the characteristics such as the strength and frequency of flow instability. In the present paper, the instability of natural convection induced by absorption of solar radiation in littoral regions is considered. Spectral analysis is conducted on the quasi-steady state flow to reveal the power and frequency modes of the instability at various positions. Results indicate that the power of instability, the number of frequency modes, the prominence of higher frequency modes, and the highest frequency mode increase with the offshore distance and/or Rayleigh number. Harmonic modes are present at relatively low Rayleigh numbers. For a given offshore distance, the position with the strongest power of instability is located adjacent to the sloping bottom while the frequency modes are the same over the local depth. As the Rayleigh number increases, the unstable region extends toward the shore.
Abstract: Modern civilization has come in recent decades into a new phase in its development, called the information society. The concept of "information society" has become one of the most common. Therefore, the attempt to understand what exactly the society we live in, what are its essential features, and possible future scenarios, is important to the social and philosophical analysis. At the heart of all these deep transformations is more increasing, almost defining role knowledge and information as play substrata of «information society». The mankind opened for itself and actively exploits a new resource – information. Information society puts forward on the arena new type of the power, at the heart of which activity – mastering by a new resource: information and knowledge. The password of the new power – intelligence as synthesis of knowledge, information and communications, the strength of mind, fundamental sociocultural values. In a postindustrial society, the power of knowledge and information is crucial in the management of the company, pushing into the background the influence of money and state coercion.
Abstract: Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.
Abstract: In this paper, the bond strength of thermal spray
coatings in high speed shafts has been studied. The metallurgical and
mechanical studies has been made on the coated samples and shaft
using optical microscopy, scanning electron microscopy (SEM).