Abstract: Since dealing with high dimensional data is
computationally complex and sometimes even intractable, recently
several feature reductions methods have been developed to reduce
the dimensionality of the data in order to simplify the calculation
analysis in various applications such as text categorization, signal
processing, image retrieval, gene expressions and etc. Among feature
reduction techniques, feature selection is one the most popular
methods due to the preservation of the original features.
In this paper, we propose a new unsupervised feature selection
method which will remove redundant features from the original
feature space by the use of probability density functions of various
features. To show the effectiveness of the proposed method, popular
feature selection methods have been implemented and compared.
Experimental results on the several datasets derived from UCI
repository database, illustrate the effectiveness of our proposed
methods in comparison with the other compared methods in terms of
both classification accuracy and the number of selected features.
Abstract: As far as the latest technological improvements are concerned, digital systems more become popular than the past. Despite this growing demand to the digital systems, content copy and attack against the digital cinema contents becomes a serious problem. To solve the above security problem, we propose “traceable watermarking using Hash functions for digital cinema system. Digital Cinema is a great application for traceable watermarking since it uses watermarking technology during content play as well as content transmission. The watermark is embedded into the randomly selected movie frames using CRC-32 techniques. CRC-32 is a Hash function. Using it, the embedding position is distributed by Hash Function so that any party cannot break off the watermarking or will not be able to change. Finally, our experimental results show that proposed DWT watermarking method using CRC-32 is much better than the convenient watermarking techniques in terms of robustness, image quality and its simple but unbreakable algorithm.
Abstract: As increasing importance of symbiosis and cooperation among mobile communication industries, the mobile ecosystem has been especially highlighted in academia and practice. The structure of mobile ecosystem is quite complex and the ecological role of actors is important to understand that structure. In this respect, this study aims to explore structure of mobile ecosystem in the case of Korea using inter-industry network analysis. Then, the ecological roles in mobile ecosystem are identified using centrality measures as a result of network analysis: degree of centrality, closeness, and betweenness. The result shows that the manufacturing and service industries are separate. Also, the ecological roles of some actors are identified based on the characteristics of ecological terms: keystone, niche, and dominator. Based on the result of this paper, we expect that the policy makers can formulate the future of mobile industry and healthier mobile ecosystem can be constructed.
Abstract: This paper presents a novel approach to assessing textile porosity by the application of the image analysis techniques. The images of different types of sample fabrics, taken through a microscope when the fabric is placed over a constant light source,transfer the problem into the image analysis domain. Indeed, porosity can thus be expressed in terms of a brightness percentage index calculated on the digital microscope image. Furthermore, it is meaningful to compare the brightness percentage index with the air permeability and the tightness indices of each fabric type. We have experimentally shown that there exists an approximately linear relation between brightness percentage and air permeability indices.
Abstract: In wavelet regression, choosing threshold value is a crucial issue. A too large value cuts too many coefficients resulting in over smoothing. Conversely, a too small threshold value allows many coefficients to be included in reconstruction, giving a wiggly estimate which result in under smoothing. However, the proper choice of threshold can be considered as a careful balance of these principles. This paper gives a very brief introduction to some thresholding selection methods. These methods include: Universal, Sure, Ebays, Two fold cross validation and level dependent cross validation. A simulation study on a variety of sample sizes, test functions, signal-to-noise ratios is conducted to compare their numerical performances using three different noise structures. For Gaussian noise, EBayes outperforms in all cases for all used functions while Two fold cross validation provides the best results in the case of long tail noise. For large values of signal-to-noise ratios, level dependent cross validation works well under correlated noises case. As expected, increasing both sample size and level of signal to noise ratio, increases estimation efficiency.
Abstract: The problem of robust fuzzy control for a class of
nonlinear fuzzy impulsive singular perturbed systems with
time-varying delay is investigated by employing Lyapunov functions.
The nonlinear delay system is built based on the well-known T–S
fuzzy model. The so-called parallel distributed compensation idea is
employed to design the state feedback controller. Sufficient conditions
for global exponential stability of the closed-loop system are derived
in terms of linear matrix inequalities (LMIs), which can be easily
solved by LMI technique. Some simulations illustrate the effectiveness
of the proposed method.
Abstract: The 15-a-side Fiji rugby team trains well in preparations for any rugby competition but rarely performs to expectations. In order to help the Fiji local based rugby players to identify some key basic areas in improving their performance, a series of workshops were conducted to assess their nutritional status and dietary habits in relation to energy demand during rugby matches. The nutrition workshop included the administration of questionnaires to 19 local based rugby players, requesting the following information: usual food intakes, training camp food intakes, carbohydrate loading, pre-game meals and post-game meals. The study revealed that poor eating habits of the players resulted in the low carbohydrate intake, which may have contributed to increase levels of fatigue leading to loss of stamina even before the second half of the game. It appears that the diet of most 15-a-side players does not provide enough energy to enable them to last the full eightyminutes of the game.
Abstract: As a primitive assumption, if a new information
system is able to remind users their old work habits, it should have a
better opportunity to be accepted, adopted and finally, utilized. In
this paper some theoretical concepts borrowed from psychodynamic
theory e.g. ego defenses are discussed to show how such resemblance
can be made without necessarily affecting the performance of the
new system. The main assertion is a new system should somehow
imitate old work habits, not literally, but through following their
paces in terms of the order of habitual tensional states including
stimulation, defensive actions and satisfactions.
Abstract: In this paper, a mathematical model for data object replication in ad hoc networks is formulated. The derived model is general, flexible and adaptable to cater for various applications in ad hoc networks. We propose a game theoretical technique in which players (mobile hosts) continuously compete in a non-cooperative environment to improve data accessibility by replicating data objects. The technique incorporates the access frequency from mobile hosts to each data object, the status of the network connectivity, and communication costs. The proposed technique is extensively evaluated against four well-known ad hoc network replica allocation methods. The experimental results reveal that the proposed approach outperforms the four techniques in both the execution time and solution quality
Abstract: To motivate users to adopt and use information
systems effectively, the nature of motivation should be carefully
investigated. People are usually motivated within ongoing processes
which include a chain of states such as perception, stimulation,
motivation, actions and reactions and finally, satisfaction. This study
assumes that the relevant motivation processes should be executed in
a proper and continuous manner to be able to persistently motivate
and re-motivate people in organizational settings and towards
information systems. On this basis, the study attempts to propose
possible relationships between this process-nature view of
motivation in terms of the common chain of states and the nearly
unique properties of information systems as is perceived by users in
the sense of a knowledgeable and authoritative entity. In the
conclusion section, some guidelines for practitioners are suggested to
ease their tasks for motivating people to adopt and use information
systems.
Abstract: A new Meta heuristic approach called "Randomized gravitational emulation search algorithm (RGES)" for solving vertex covering problems has been designed. This algorithm is found upon introducing randomization concept along with the two of the four primary parameters -velocity- and -gravity- in physics. A new heuristic operator is introduced in the domain of RGES to maintain feasibility specifically for the vertex covering problem to yield best solutions. The performance of this algorithm has been evaluated on a large set of benchmark problems from OR-library. Computational results showed that the randomized gravitational emulation search algorithm - based heuristic is capable of producing high quality solutions. The performance of this heuristic when compared with other existing heuristic algorithms is found to be excellent in terms of solution quality.
Abstract: This paper presents a new technique for generating sets of synthetic classifiers to evaluate abstract-level combination methods. The sets differ in terms of both recognition rates of the individual classifiers and degree of similarity. For this purpose, each abstract-level classifier is considered as a random variable producing one class label as the output for an input pattern. From the initial set of classifiers, new slightly different sets are generated by applying specific operators, which are defined at the purpose. Finally, the sets of synthetic classifiers have been used to estimate the performance of combination methods for abstract-level classifiers. The experimental results demonstrate the effectiveness of the proposed approach.
Abstract: The most influential programming paradigm today
is object oriented (OO) programming and it is widely used in
education and industry. Recognizing the importance of equipping
students with OO knowledge and skills, it is not surprising that most
Computer Science degree programs offer OO-related courses. How
do we assess whether the students have acquired the right objectoriented
skills after they have completed their OO courses? What are
object oriented skills? Currently none of the current assessment
techniques would be able to provide this answer. Traditional forms of
OO programming assessment provide a ways for assigning numerical
scores to determine letter grades. But this rarely reveals information
about how students actually understand OO concept. It appears
reasonable that a better understanding of how to define and assess
OO skills is needed by developing a criterion referenced model. It is
even critical in the context of Malaysia where there is currently a
growing concern over the level of competency of Malaysian IT
graduates in object oriented programming. This paper discussed the
approach used to develop the criterion-referenced assessment model.
The model can serve as a guideline when conducting OO
programming assessment as mentioned. The proposed model is
derived by using Goal Questions Metrics methodology, which helps
formulate the metrics of interest. It concluded with a few suggestions
for further study.
Abstract: Boron minerals are very useful for various industrial
activities, such as glass industry and detergent industry, due to its
mechanical and chemical properties. During the production of boron
compounds, many of these are introduced into the environment in the
form of waste. Boron is also an important micro nutrient for the
plants to vegetate but if it exists in high concentrations, it could have
toxic effects. The maximum boron level in drinking water for human
health is given as 0.3 mg/L in World Health Organization (WHO)
standards. The toxic effects of boron should be noted especially for
dry regions, thus, in recent years, increasing attention has been paid
to remove the boron from waste waters. In this study, boron removal
is implemented by ion exchange process using Amberlite IRA-743
resin. Amberlite IRA-743 resin is a boron specific resin and it
belongs to the polymerizate sorbent group within the aminopolyol
functional group. Batch studies were performed to investigate the
effects of various experimental parameters, such as adsorbent dose,
initial concentration and pH, on the removal of boron. It is found
that, when the adsorbent dose increases removal of boron from the
liquid phase increases. However, an increase in the initial
concentration decreases the removal of boron. The effective pH
values for removal of boron are determined between 8.5 and 9.
Equilibrium isotherms were also analyzed by Langmuir and
Freundlich isotherm models. The Langmuir isotherm is obeyed better
than the Freundlich isotherm.
Abstract: In the present work, we propose a new method for
solving the matrix equation AXB=F . The new method can
be considered as a generalized form of the well-known global full
orthogonalization method (Gl-FOM) for solving multiple linear
systems. Hence, the method will be called extended Gl-FOM (EGl-
FOM). For implementing EGl-FOM, generalized forms of block
Krylov subspace and global Arnoldi process are presented. Finally,
some numerical experiments are given to illustrate the efficiency of
our new method.
Abstract: In countries with hot climates, air-conditioning forms
a large proportion of annual peak electrical demand, requiring
expansion of power plants to meet the peak demand, which goes
unused most of the time. Use of well-designed cool storage can offset
the peak demand to a large extent. In this study, an air conditioning
system with naturally stratified storage tank was designed,
constructed and tested. A new type of diffuser was designed and used
in this study. Factors that influence the performance of chilled water
storage tanks were investigated. The results indicated that stratified
storage tank consistently stratified well without any physical barrier.
Investigation also showed that storage efficiency decreased with
increasing flow rate due to increased mixing of warm and chilled
water. Diffuser design and layout primarily affected the mixing near
the inlet diffuser and the extent of this mixing had primary influence
on the shape of the thermocline. The heat conduction through tank
walls and through the thermocline caused widening of mixed volume.
Thermal efficiency of stratified storage tanks was as high as 90
percent, which indicates that stratified tanks can effectively be used
as a load management technique.
Abstract: We present a theory for optimal filtering of infinite sets of random signals. There are several new distinctive features of the proposed approach. First, we provide a single optimal filter for processing any signal from a given infinite signal set. Second, the filter is presented in the special form of a sum with p terms where each term is represented as a combination of three operations. Each operation is a special stage of the filtering aimed at facilitating the associated numerical work. Third, an iterative scheme is implemented into the filter structure to provide an improvement in the filter performance at each step of the scheme. The final step of the concerns signal compression and decompression. This step is based on the solution of a new rank-constrained matrix approximation problem. The solution to the matrix problem is described in this paper. A rigorous error analysis is given for the new filter.
Abstract: In this paper we propose a Particle Swarm heuristic
optimized Multi-Antenna (MA) system. Efficient MA systems
detection is performed using a robust stochastic evolutionary
computation algorithm based on movement and intelligence of
swarms. This iterative particle swarm optimized (PSO) detector
significantly reduces the computational complexity of conventional
Maximum Likelihood (ML) detection technique. The simulation
results achieved with this proposed MA-PSO detection algorithm
show near optimal performance when compared with ML-MA
receiver. The performance of proposed detector is convincingly
better for higher order modulation schemes and large number of
antennas where conventional ML detector becomes non-practical.
Abstract: Change in impedance of an encircling coil is obtained
in the present paper for the case where the electric conductivity and
magnetic permeability of a metal cylindrical tube depend on the
radial coordinate. The system of equations for the vector potential is
solved by means of the Fourier cosine transform. The solution is
expressed in terms of improper integral containing modified Bessel
functions of complex order.
Abstract: In this paper a new cost function for blind equalization
is proposed. The proposed cost function, referred to as the modified
maximum normalized cumulant criterion (MMNC), is an extension
of the previously proposed maximum normalized cumulant criterion
(MNC). While the MNC requires a separate phase recovery system
after blind equalization, the MMNC performs joint blind equalization
and phase recovery. To achieve this, the proposed algorithm
maximizes a cost function that considers both amplitude and phase of
the equalizer output. The simulation results show that the proposed
algorithm has an improved channel equalization effect than the MNC
algorithm and simultaneously can correct the phase error that the
MNC algorithm is unable to do. The simulation results also show that
the MMNC algorithm has lower complexity than the MNC algorithm.
Moreover, the MMNC algorithm outperforms the MNC algorithm
particularly when the symbols block size is small.