Abstract: This paper discusses the development of wireless
structure control of an induction motor scalar drives. This was
realised up on the wireless WiFi networks. This strategy of control is
ensured by the use of Wireless ad hoc networks and a virtual network
interface based on VNC which is used to make possible to take the
remote control of a PC connected on a wireless Ethernet network.
Verification of the proposed strategy of control is provided by
experimental realistic tests on scalar controlled induction motor
drives. The experimental results of the implementations with their
analysis are detailed.
Abstract: Locality Sensitive Hashing (LSH) is one of the most
promising techniques for solving nearest neighbour search problem in
high dimensional space. Euclidean LSH is the most popular variation
of LSH that has been successfully applied in many multimedia
applications. However, the Euclidean LSH presents limitations that
affect structure and query performances. The main limitation of the
Euclidean LSH is the large memory consumption. In order to achieve
a good accuracy, a large number of hash tables is required. In this
paper, we propose a new hashing algorithm to overcome the storage
space problem and improve query time, while keeping a good
accuracy as similar to that achieved by the original Euclidean LSH.
The Experimental results on a real large-scale dataset show that the
proposed approach achieves good performances and consumes less
memory than the Euclidean LSH.
Abstract: Naive Bayes Nearest Neighbor (NBNN) and its variants, i,e., local NBNN and the NBNN kernels, are local feature-based classifiers that have achieved impressive performance in image classification. By exploiting instance-to-class (I2C) distances (instance means image/video in image/video classification), they avoid quantization errors of local image descriptors in the bag of words (BoW) model. However, the performances of NBNN, local NBNN and the NBNN kernels have not been validated on video analysis. In this paper, we introduce these three classifiers into human action recognition and conduct comprehensive experiments on the benchmark KTH and the realistic HMDB datasets. The results shows that those I2C based classifiers consistently outperform the SVM classifier with the BoW model.
Abstract: The prediction of transmembrane helical segments
(TMHs) in membrane proteins is an important field in the
bioinformatics research. In this paper, a method based on discrete
wavelet transform (DWT) has been developed to predict the number
and location of TMHs in membrane proteins. PDB coded as 1F88 was
chosen as an example to describe the prediction of the number and
location of TMHs in membrane proteins by using this method. One
group of test data sets that contain total 19 protein sequences was
utilized to access the effect of this method. Compared with the
prediction results of DAS, PRED-TMR2, SOSUI, HMMTOP2.0 and
TMHMM2.0, the obtained results indicate that the presented method
has higher prediction accuracy.
Abstract: Along with increasing development of generation of supersonic planes especially fighters and request for increasing the performance and maneuverability scientists and engineers suggested the delta and double delta wing design. One of the areas which was necessary to be researched, was the Aerodynamic review of this type of wings in high angles of attack at low speeds that was very important in landing and takeoff the planes and maneuvers. Leading Edges of the wings,cause the separation flow from wing surface and then formation of powerful vortex with high rotational speed which studing the mechanism and location of formation and also the position of the vortex breakdown in high angles of attack is very important. In this research, a double delta wing with 76o/45o sweep angles at high angle of attack in steady state and incompressible flow were numerically analyzed with Fluent software. With analaysis of the numerical results, we arrived the most important characteristic of the double delta wings which is keeping of lift at high angles of attacks.
Abstract: After the terrorist attack on September 11, 2001 in
U.S., the container security issue got high attention, especially by U.S.
government, which deployed a lot of measures to promote or improve
security systems. U.S. government not only enhances its national
security system, but allies with other countries against the potential
terrorist attacks in the future. For example CSI (Container Security
Initiative), it encourages foreign ports outside U.S. to become CSI
ports as a part of U.S. anti-terrorism network. Although promotion of
the security could partly reach the goal of anti-terrorism, that will
influence the efficiency of container supply chain, which is the main
concern when implementing the inspection measurements. This paper
proposes a quick estimation methodology for an inspection service
rate by a berth allocation heuristic such that the inspection activities
will not affect the original container supply chain. Theoretical and
simulation results show this approach is effective.
Abstract: This paper presents an online method that learns the
corresponding points of an object from un-annotated grayscale images
containing instances of the object. In the first image being
processed, an ensemble of node points is automatically selected
which is matched in the subsequent images. A Bayesian posterior
distribution for the locations of the nodes in the images is formed.
The likelihood is formed from Gabor responses and the prior assumes
the mean shape of the node ensemble to be similar in a translation
and scale free space. An association model is applied for separating
the object nodes and background nodes. The posterior distribution is
sampled with Sequential Monte Carlo method. The matched object
nodes are inferred to be the corresponding points of the object
instances. The results show that our system matches the object nodes
as accurately as other methods that train the model with annotated
training images.
Abstract: The aim of this paper is to exhibit some properties of
local topologies of an IVS. Also, we Introduce ISG structure as an
interesting structure of semigroups in IVSs.
Abstract: As a by-product of its "cyberspace" status, electronic
commerce is global, encompassing a whole range of B2C
relationships which need to be approached with solutions provided at
a local level while remaining viable when applied to global issues.
Today, the European Union seems to be endowed with a reliable
legal framework for consumer protection. A question which remains,
however, is enforcement of this protection. This is probably a matter
of time and awareness from both parties in the B2C relationship.
Business should realize that enhancing trust in the minds of
consumers is more than a question of technology; it is a question of
best practice. Best practice starts with the online service of high
street banks as well as with the existence of a secure, user-friendly
and cost-effective payment system. It also includes the respect of
privacy and the use of smart cards as well as enhancing privacy
technologies and fair information practice. In sum, only by offering
this guarantee of privacy and security will the consumer be assured
that, in cyberspace, his/her interests will be protected in the same
manner as in a traditional commercial environment.
Abstract: Innovational development of regions in Russia is generally faced with the essential influence from federal and local authorities. The organization of effective mechanism of innovation development (and self-development) is impossible without establishment of defined institutional conditions in the analyzed field. Creative utilization of scientific concepts and information should merge, giving rise to continuing innovation and advanced production. The paper presents an analysis of institutional conditions in the field of creation and development of innovation activity infrastructure and transferring of knowledge and skills between different economic agents in Russia. Knowledge is mainly privately owned, developed through R&D investments and incorporated into technology or a product. Innovation infrastructure is a strong concentration mechanism of advanced facilities, which are mainly located inside large agglomerations or city-regions in order to benefit from scale effects in both input markets (human capital, private financial capital) and output markets (higher education services, research services). The empirical results of the paper show that in the presence of more efficient innovation and knowledge transfer and transcoding system and of a more open attitude of economic agents towards innovation, the innovation and knowledge capacity of regional economy is much higher.
Abstract: In Secondary Surveillance Radar (SSR) systems, it is
more difficult to locate and recognise aircrafts in the neighbourhood of civil airports since aerial traffic becomes greater. Here, we propose to apply a recent Blind Source Separation (BSS) algorithm based
on Time-Frequency Analysis, in order to separate messages sent by different aircrafts and falling in the same radar beam in reception. The above source separation method involves joint-diagonalization
of a set of smoothed version of spatial Wigner-Ville distributions.
The technique makes use of the difference in the t-f signatures of the nonstationary sources to be separated. Consequently, as the SSR sources emit different messages at different frequencies, the above fitted to this new application. We applied the technique in simulation to separate SSR replies. Results are provided at the end
of the paper.
Abstract: This paper presents a computational study of the separated flow in a planer asymmetric diffuser. The steady RANS equations for turbulent incompressible fluid flow and six turbulence closures are used in the present study. The commercial software code, FLUENT 6.3.26, was used for solving the set of governing equations using various turbulence models. Five of the used turbulence models are available directly in the code while the v2-f turbulence model was implemented via User Defined Scalars (UDS) and User Defined Functions (UDF). A series of computational analysis is performed to assess the performance of turbulence models at different grid density. The results show that the standard k-ω, SST k-ω and v2-f models clearly performed better than other models when an adverse pressure gradient was present. The RSM model shows an acceptable agreement with the velocity and turbulent kinetic energy profiles but it failed to predict the location of separation and attachment points. The standard k-ε and the low-Re k- ε delivered very poor results.
Abstract: The present report describes the characteristics of
damages and behavior of reinforced concrete buildings during the
tsunami action. The discussion is based on the field damage survey in
selected cities located on the coast of the zone affected by the Great
East Japan Earthquake on March 11, 2011. This earthquake is the most
powerful know earthquake that has hit Japan with a magnitude 9.0 and
with epicenter located at 129 km of Sendai city (off the coast). The
earthquake triggered a destructive tsunami with run up height of up to
40 meters that mainly affect cities located on the Pacific Ocean coast of
the Tohoku region (north-east region of Japan). Reinforced concrete
buildings in general resist the tsunami without collapse however the
non-structural elements like panels and ceilings were severely
damaged. The analysis of damages has permitted to understand the
behavior of RC buildings under tsunami attack, and has also permitted
to establish recommendations for their use to take refuge from tsunami
in places where natural topography makes impossible to reach hilltops
or other safer places.
Abstract: In this paper, for the understanding of the phytoplankton dynamics in marine ecosystem, a susceptible and an infected class of phytoplankton population is considered in spatiotemporal domain.
Here, the susceptible phytoplankton is growing logistically and the
growth of infected phytoplankton is due to the instantaneous Holling
type-II infection response function. The dynamics are studied in terms of the local and global stabilities for the system and further
explore the possibility of Hopf -bifurcation, taking the half saturation period as (i.e., ) the bifurcation parameter in temporal domain.
It is also observe that the reaction diffusion system exhibits spatiotemporal
chaos and pattern formation in phytoplankton dynamics,
which is particularly important role play for the spatially extended phytoplankton system. Also the effect of the diffusion coefficient
on the spatial system for both one and two dimensional case is obtained. Furthermore, we explore the higher-order stability analysis
of the spatial phytoplankton system for both linear and no-linear system. Finally, few numerical simulations are carried out for pattern
formation.
Abstract: In the context of spectrum surveillance, a new method
to recover the code of spread spectrum signal is presented, while the
receiver has no knowledge of the transmitter-s spreading sequence. In
our previous paper, we used Genetic algorithm (GA), to recover
spreading code. Although genetic algorithms (GAs) are well known
for their robustness in solving complex optimization problems, but
nonetheless, by increasing the length of the code, we will often lead
to an unacceptable slow convergence speed. To solve this problem we
introduce Particle Swarm Optimization (PSO) into code estimation in
spread spectrum communication system. In searching process for
code estimation, the PSO algorithm has the merits of rapid
convergence to the global optimum, without being trapped in local
suboptimum, and good robustness to noise. In this paper we describe
how to implement PSO as a component of a searching algorithm in
code estimation. Swarm intelligence boasts a number of advantages
due to the use of mobile agents. Some of them are: Scalability, Fault
tolerance, Adaptation, Speed, Modularity, Autonomy, and
Parallelism. These properties make swarm intelligence very attractive
for spread spectrum code estimation. They also make swarm
intelligence suitable for a variety of other kinds of channels. Our
results compare between swarm-based algorithms and Genetic
algorithms, and also show PSO algorithm performance in code
estimation process.
Abstract: The pollutant removal efficiency of the Intermittently
Decanted Extended Aeration (IDEA) wastewater treatment system at
Curtin University Sarawak Campus, and conventional activated
sludge wastewater treatment system at a local resort, Resort A, is
monitored. The influent and effluent characteristics are tested during
wet and dry weather conditions, and peak and off peak periods. For
the wastewater treatment systems at Curtin Sarawak and Resort A,
during dry weather and peak season, it was found that the BOD5
concentration in the influent is 121.7mg/L and 80.0mg/L
respectively, and in the effluent, 18.7mg/L and and 18.0mg/L
respectively. Analysis of the performance of the IDEA treatment
system showed that the operational costs can be minimized by 3%, by
decreasing the number of operating cycles. As for the treatment
system in Resort A, by utilizing a smaller capacity air blower, a
saving of 12% could be made in the operational costs.
Abstract: The Partitioned Global Address Space (PGAS) programming
paradigm offers ease-of-use in expressing parallelism
through a global shared address space while emphasizing performance
by providing locality awareness through the partitioning of
this address space. Therefore, the interest in PGAS programming
languages is growing and many new languages have emerged and
are becoming ubiquitously available on nearly all modern parallel
architectures. Recently, new parallel machines with multiple cores
are designed for targeting high performance applications. Most of the
efforts have gone into benchmarking but there are a few examples of
real high performance applications running on multicore machines.
In this paper, we present and evaluate a parallelization technique
for implementing a local DNA sequence alignment algorithm using
a PGAS based language, UPC (Unified Parallel C) on a chip
multithreading architecture, the UltraSPARC T1.
Abstract: Ti-6Al-4V alloy has demonstrated a high strength to
weight ratio as well as good properties at high temperature. The
successful application of the alloy in some important areas depends
on suitable joining techniques. Friction welding has many
advantageous features to be chosen for joining Titanium alloys. The
present work investigates the feasibility of producing similar metal
joints of this Titanium alloy by rotary friction welding method. The
joints are produced at three different speeds and the performances of
the welded joints are evaluated by conducting microstructure studies,
Vickers Hardness and tensile tests at the joints. It is found that the
weld joints produced are sound and the ductile fractures in the tensile
weld specimens occur at locations away from the welded joints. It is
also found that a rotational speed of 1500 RPM can produce a very
good weld, with other parameters kept constant.
Abstract: The wrinkling of a thin elastic bi-annular plate with piecewise-constant mechanical properties, subjected to radial stretching, is considered. The critical wrinkling stretching loading and the corresponding wrinkling patterns are extensively investigated, together with the roles played by both the geometrical and mechanical parameters.
Abstract: The consumption capability of people in China has
been a big issue to tourism business. Due to the increasing of China
tourists, Taiwan-s government rescinded the category of people in
China and opened up the non-stopped airline from China to Taiwan.
The “one-day traveling style between China and Taiwan" has formed,
hoping to bring business to Taiwan. Night market, which shows
foreigners the very local character of Taiwan, contains various
merchandise for consumers to purchase. With the increasing numbers
of non-stopped airline, visiting Taiwan-s night markets has also been
one of major activities to China-s tourists. The purpose of the present
study is to understand the consumer behavior of China tourists in
tourist night markets in Taipei and analyze that if their shopping
motives cause the different shopping behaviors and post-purchase
satisfaction and revisiting intention. The results reveled that for the
China tourists, the motives of significant influence to the shopping
behaviors. Also, the shopping behaviors significant influence to the
whole satisfaction and the whole satisfaction significant influence to
post-purchase behavior.