Abstract: Task of object localization is one of the major
challenges in creating intelligent transportation. Unfortunately, in
densely built-up urban areas, localization based on GPS only
produces a large error, or simply becomes impossible. New
opportunities arise for the localization due to the rapidly emerging
concept of a wireless ad-hoc network. Such network, allows
estimating potential distance between these objects measuring
received signal level and construct a graph of distances in which
nodes are the localization objects, and edges - estimates of the
distances between pairs of nodes. Due to the known coordinates of
individual nodes (anchors), it is possible to determine the location of
all (or part) of the remaining nodes of the graph. Moreover, road
map, available in digital format can provide localization routines
with valuable additional information to narrow node location search.
However, despite abundance of well-known algorithms for solving
the problem of localization and significant research efforts, there are
still many issues that currently are addressed only partially. In this
paper, we propose localization approach based on the graph mapped
distances on the digital road map data basis. In fact, problem is
reduced to distance graph embedding into the graph representing area
geo location data. It makes possible to localize objects, in some cases
even if only one reference point is available. We propose simple
embedding algorithm and sample implementation as spatial queries
over sensor network data stored in spatial database, allowing
employing effectively spatial indexing, optimized spatial search
routines and geometry functions.
Abstract: This paper may be considered as combination of both pervasive computing and Differential GPS (global positioning satellite) which relates to control automatic traffic signals in such a
way as to pre-empt normal signal operation and permit lifesaving vehicles. Before knowing the arrival of the lifesaving vehicles from
the signal there is a chance of clearing the traffic. Traffic signal
preemption system includes a vehicle equipped with onboard computer system capable of capturing diagnostic information and
estimated location of the lifesaving vehicle using the information provided by GPS receiver connected to the onboard computer system
and transmitting the information-s using a wireless transmitter via a
wireless network. The fleet management system connected to a
wireless receiver is capable of receiving the information transmitted
by the lifesaving vehicle .A computer is also located at the
intersection uses corrected vehicle position, speed & direction
measurements, in conjunction with previously recorded data defining
approach routes to the intersection, to determine the optimum time to
switch a traffic light controller to preemption mode so that lifesaving
vehicles can pass safely. In case when the ambulance need to take a
“U" turn in a heavy traffic area we suggest a solution. Now we are
going to make use of computerized median which uses LINKED
BLOCKS (removable) to solve the above problem.
Abstract: Due to increased number of terrorist attacks in recent years, loads induced by explosions need to be incorporated in building designs. For safer performance of a structure, its foundation should have sufficient strength and stability. Therefore, prior to any reconstruction or rehabilitation of a building subjected to blast, it is important to examine adverse effects on the foundation caused by blast induced ground shocks. This paper evaluates the effects of a buried explosion on a pile foundation. It treats the dynamic response of the pile in saturated sand, using explicit dynamic nonlinear finite element software LS-DYNA. The blast induced wave propagation in the soil and the horizontal deformation of pile are presented and the results are discussed. Further, a parametric study is carried out to evaluate the effect of varying the explosive shape on the pile response. This information can be used to evaluate the vulnerability of piled foundations to credible blast events as well as develop guidance for their design.
Abstract: In this article, by means of examination of Bolshevists
Turkistanskie Vedomosti" newspaper and “Erikti Oylar Organi" and
“Turkistanskyi Vestnik" newspapers which had been published
during 1917-1918, the fact that “Turkistan Governorship" established
in city of Kokand in November of 1917, within the framework of
former tsarist Russia Turkistan general-governorship, was the legal
government formed as a requisition of people of Turkistan was
proved. An examination of these two newspapers providing
information regarding history of “Turkistan Autonomy" but having
opposite to each other views makes it possible to obtain valuable data
concerning history of autonomy which was inappropriately
misrepresented during Soviet period.
Abstract: The purposes of the study are to study and to
investigate the relationship among exposure, uses and gratifications
of television morning news among undergraduate students in
Bangkok. This study also compares differences in information
exposure, uses and gratifications of television morning news among
these students.
The research methodology employed a questionnaire as a
quantitative method. The respondents were undergraduate students at
public and private universities in Bangkok. Totally, 400 usable
questionnaires were received. Descriptive and inferential statistics
were used in data analysis.
The results indicated that information exposure of undergraduate
students in Bangkok was at a high level. Students’ uses and
gratifications were also at high level. Information exposure was
positively correlated with uses and gratifications. Uses of information
were positively correlated with satisfaction with information. The
results also showed that students with differences in sex and type of
university were not significantly different in information exposure,
and uses and gratifications.
Abstract: This paper proposes a novel architecture for developing decision support systems. Unlike conventional decision support systems, the proposed architecture endeavors to reveal the decision-making process such that humans' subjectivity can be incorporated into a computerized system and, at the same time, to preserve the capability of the computerized system in processing information objectively. A number of techniques used in developing the decision support system are elaborated to make the decisionmarking process transparent. These include procedures for high dimensional data visualization, pattern classification, prediction, and evolutionary computational search. An artificial data set is first employed to compare the proposed approach with other methods. A simulated handwritten data set and a real data set on liver disease diagnosis are then employed to evaluate the efficacy of the proposed approach. The results are analyzed and discussed. The potentials of the proposed architecture as a useful decision support system are demonstrated.
Abstract: Computer game industry has experienced exponential
growth in recent years. A game is a recreational activity involving
one or more players. Game input is information such as data,
commands, etc., which is passed to the game system at run time from
an external source. Conversely, game outputs are information which
are generated by the game system and passed to an external target,
but which is not used internally by the game. This paper identifies a
new classification scheme for game input and output, which is based
on player-s input and output. Using this, relationship table for game
input classifier and output classifier is developed.
Abstract: Study investigates the level and extent of voluntary disclosure practice in Croatia. The research was conducted on the sample of 130 medium and large companies. Findings indicate that two thirds of the companies analyzed disclose below-average number of additional information. The explanatory analyses has shown that firm size, listing status and industrial sector significantly and positively affect the level and extent of voluntary disclosure in the annual report of Croatian companies. On the other hand, profitability and ownership structure were found statistically insignificant. Unlike previous studies, this paper deals with level of voluntary disclosure of medium and large companies, as well as companies whose shares are not listed on the organized capital market, which can be found as our contribution. Also, the research makes contribution by providing the insights into voluntary disclosure practices in Croatia, as a case of macro-oriented accounting system economy, i.e. bank oriented economy with an emerging capital market.
Abstract: Real-time hand tracking is a challenging task in many
computer vision applications such as gesture recognition. This paper
proposes a robust method for hand tracking in a complex environment
using Mean-shift analysis and Kalman filter in conjunction with 3D
depth map. The depth information solve the overlapping problem
between hands and face, which is obtained by passive stereo measuring
based on cross correlation and the known calibration data of
the cameras. Mean-shift analysis uses the gradient of Bhattacharyya
coefficient as a similarity function to derive the candidate of the hand
that is most similar to a given hand target model. And then, Kalman
filter is used to estimate the position of the hand target. The results
of hand tracking, tested on various video sequences, are robust to
changes in shape as well as partial occlusion.
Abstract: Sequential pattern mining is a challenging task in data mining area with large applications. One among those applications is mining patterns from weblog. Recent times, weblog is highly dynamic and some of them may become absolute over time. In addition, users may frequently change the threshold value during the data mining process until acquiring required output or mining interesting rules. Some of the recently proposed algorithms for mining weblog, build the tree with two scans and always consume large time and space. In this paper, we build Revised PLWAP with Non-frequent Items (RePLNI-tree) with single scan for all items. While mining sequential patterns, the links related to the nonfrequent items are not considered. Hence, it is not required to delete or maintain the information of nodes while revising the tree for mining updated transactions. The algorithm supports both incremental and interactive mining. It is not required to re-compute the patterns each time, while weblog is updated or minimum support changed. The performance of the proposed tree is better, even the size of incremental database is more than 50% of existing one. For evaluation purpose, we have used the benchmark weblog dataset and found that the performance of proposed tree is encouraging compared to some of the recently proposed approaches.
Abstract: Exploring an autistic child in Elementary school is a
difficult task that must be fully thought out and the teachers should
be aware of the many challenges they face raising their child
especially the behavioral problems of autistic children. Hence there
arises a need for developing Artificial intelligence (AI)
Contemporary Techniques to help diagnosis to discover autistic
people.
In this research, we suggest designing architecture of expert
system that combine Cognitive Maps (CM) with Case Based
Reasoning technique (CBR) in order to reduce time and costs of
traditional diagnosis process for the early detection to discover
autistic children. The teacher is supposed to enter child's information
for analyzing by CM module. Then, the reasoning processor would
translate the output into a case to be solved a current problem by
CBR module. We will implement a prototype for the model as a
proof of concept using java and MYSQL.
This will be provided a new hybrid approach that will achieve new
synergies and improve problem solving capabilities in AI. And we
will predict that will reduce time, costs, the number of human errors
and make expertise available to more people who want who want to
serve autistic children and their families.
Abstract: Human activities are increasingly based on the use of remote resources and services, and on the interaction between
remotely located parties that may know little about each other. Mobile agents must be prepared to execute on different hosts with
various environmental security conditions. The aim of this paper is to
propose a trust based mechanism to improve the security of mobile
agents and allow their execution in various environments. Thus, an
adaptive trust mechanism is proposed. It is based on the dynamic interaction between the agent and the environment. Information
collected during the interaction enables generation of an environment
key. This key informs on the host-s trust degree and permits the mobile agent to adapt its execution. Trust estimation is based on
concrete parameters values. Thus, in case of distrust, the source of problem can be located and a mobile agent appropriate behavior can
be selected.
Abstract: A state of the art Speaker Identification (SI) system
requires a robust feature extraction unit followed by a speaker
modeling scheme for generalized representation of these features.
Over the years, Mel-Frequency Cepstral Coefficients (MFCC)
modeled on the human auditory system has been used as a standard
acoustic feature set for speech related applications. On a recent
contribution by authors, it has been shown that the Inverted Mel-
Frequency Cepstral Coefficients (IMFCC) is useful feature set for
SI, which contains complementary information present in high
frequency region. This paper introduces the Gaussian shaped filter
(GF) while calculating MFCC and IMFCC in place of typical
triangular shaped bins. The objective is to introduce a higher
amount of correlation between subband outputs. The performances
of both MFCC & IMFCC improve with GF over conventional
triangular filter (TF) based implementation, individually as well as
in combination. With GMM as speaker modeling paradigm, the
performances of proposed GF based MFCC and IMFCC in
individual and fused mode have been verified in two standard
databases YOHO, (Microphone Speech) and POLYCOST
(Telephone Speech) each of which has more than 130 speakers.
Abstract: Recent developments in information and
communication technologies (ICT) have created excellent conditions
for profoundly enhancing the traditional learning and teaching
practices. New modes of teaching in higher education subjects can
profoundly enhance ones ability to proactively constructing his or her
personal learning universe. These developments have contributed to
digital learning environments becoming widely available and
accessible. In addition, there is a trend towards enlargement and
specialization in higher education in Europe. With as a result that
existing Master of Science (MSc) programmes are merged or new
programmes have been established that are offered as joint MSc
programmes to students. In these joint MSc programmes, the need for
(common) digital learning environments capable of surmounting the
barriers of time and location has become evident. This paper
discusses the past and ongoing efforts to establish such common
digital learning environments in two joint MSc programmes in
Europe and discusses the way technology-based learning
environments affect the traditional way of learning.
Abstract: For Romania, the fulfilment of the obligations
undertaken as a member state of the European Union in accordance
with the Treaty of Accession requires the effective implementation of
sustainable development principles and practices, this being the only
reasonable development option, which adequately draws in on the
economic, social and environment resources. Achieving this
objective is based on a profound analysis of the realities in the
Romanian economy, which will reflect the existent situation and the
action directions for the future. The paper presents an analysis of the
Romanian economic performances compared to the EU economy,
based on the sustainable value (SV) model. The analysis highlighted
the considerable gap between Romania and the EU regarding the
sustainable capitalization of resources, the provided information
being useful to justify strategic development decisions at a micro and
macro levels.
Abstract: Gaussian mixture background model is widely used in
moving target detection of the image sequences. However, traditional
Gaussian mixture background model usually considers the time
continuity of the pixels, and establishes background through statistical
distribution of pixels without taking into account the pixels- spatial
similarity, which will cause noise, imperfection and other problems.
This paper proposes a new Gaussian mixture modeling approach,
which combines the color and gradient of the spatial information, and
integrates the spatial information of the pixel sequences to establish
Gaussian mixture background. The experimental results show that the
movement background can be extracted accurately and efficiently, and
the algorithm is more robust, and can work in real time in tracking
applications.
Abstract: A manufacturing feature can be defined simply as a
geometric shape and its manufacturing information to create the shape.
In a feature-based process planning system, feature library that
consists of pre-defined manufacturing features and the manufacturing
information to create the shape of the features, plays an important role
in the extraction of manufacturing features with their proper
manufacturing information. However, to manage the manufacturing
information flexibly, it is important to build a feature library that can
be easily modified. In this paper, the implementation of Semantic Wiki
for the development of the feature library is proposed.
Abstract: The Integrated Management of Child illnesses (IMCI) and the surveillance Health Information Systems (HIS) are related strategies that are designed to manage child illnesses and community practices of diseases. However, both strategies do not function well together because of classification incompatibilities and, as such, are difficult to use by health care personnel in rural areas where a majority of people lack the basic knowledge of interpreting disease classification from these methods. This paper discusses a single approach on how a stand-alone expert system can be used as a prompt diagnostic tool for all cases of illnesses presented. The system combines the action-oriented IMCI and the disease-oriented HIS approaches to diagnose malaria and typhoid fever in the rural areas of the Niger-delta region.
Abstract: It is important to give input information without other device in AR system. One solution is using hand for augmented reality application. Many researchers have proposed different solutions for hand interface in augmented reality. Analyze Histogram and connecting factor is can be example for that. Various Direction searching is one of robust way to recognition hand but it takes too much calculating time. And background should be distinguished with skin color. This paper proposes a hand tracking method to control the 3D object in augmented reality using depth device and skin color. Also in this work discussed relationship between several markers, which is based on relationship between camera and marker. One marker used for displaying virtual object and three markers for detecting hand gesture and manipulating the virtual object.
Abstract: Image coding based on clustering provides immediate
access to targeted features of interest in a high quality decoded
image. This approach is useful for intelligent devices, as well as for
multimedia content-based description standards. The result of image
clustering cannot be precise in some positions especially on pixels
with edge information which produce ambiguity among the clusters.
Even with a good enhancement operator based on PDE, the quality of
the decoded image will highly depend on the clustering process. In
this paper, we introduce an ambiguity cluster in image coding to
represent pixels with vagueness properties. The presence of such
cluster allows preserving some details inherent to edges as well for
uncertain pixels. It will also be very useful during the decoding phase
in which an anisotropic diffusion operator, such as Perona-Malik,
enhances the quality of the restored image. This work also offers a
comparative study to demonstrate the effectiveness of a fuzzy
clustering technique in detecting the ambiguity cluster without losing
lot of the essential image information. Several experiments have been
carried out to demonstrate the usefulness of ambiguity concept in
image compression. The coding results and the performance of the
proposed algorithms are discussed in terms of the peak signal-tonoise
ratio and the quantity of ambiguous pixels.