Abstract: This paper starts with a critical view of beautiful female images in the mass media being frequently generated by a stereotypical Korean concept of beauty. Several female beauty myths have evolved in Korea during the present decade. Nearly all of them have formed due to a deeply-ingrained androcentric ideology which objectifies women. Mass media causes the public to hold a distorted concept about female beauty. There is a huge gap between women in reality and representative women in the mass media. It is essential to have an unbiased perception of female images presented in the mass media. Due to cosmetic advertisements projecting contemporary images of female beauty to promote products, cosmetics images will be examined in regard to female beauty myths portrayed by the mass media. This paper will analyze features of female beauty myths in Korea and their intrinsic characteristics.
Abstract: Protein residue contact map is a compact
representation of secondary structure of protein. Due to the
information hold in the contact map, attentions from researchers in
related field were drawn and plenty of works have been done
throughout the past decade. Artificial intelligence approaches have
been widely adapted in related works such as neural networks,
genetic programming, and Hidden Markov model as well as support
vector machine. However, the performance of the prediction was not
generalized which probably depends on the data used to train and
generate the prediction model. This situation shown the importance
of the features or information used in affecting the prediction
performance. In this research, support vector machine was used to
predict protein residue contact map on different combination of
features in order to show and analyze the effectiveness of the
features.
Abstract: This paper analyzes different techniques of the fine grained security of relational databases for the two variables-data accessibility and inference. Data accessibility measures the amount of data available to the users after applying a security technique on a table. Inference is the proportion of information leakage after suppressing a cell containing secret data. A row containing a secret cell which is suppressed can become a security threat if an intruder generates useful information from the related visible information of the same row. This paper measures data accessibility and inference associated with row, cell, and column level security techniques. Cell level security offers greatest data accessibility as it suppresses secret data only. But on the other hand, there is a high probability of inference in cell level security. Row and column level security techniques have least data accessibility and inference. This paper introduces cell plus innocent security technique that utilizes the cell level security method but suppresses some innocent data to dodge an intruder that a suppressed cell may not necessarily contain secret data. Four variations of the technique namely cell plus innocent 1/4, cell plus innocent 2/4, cell plus innocent 3/4, and cell plus innocent 4/4 respectively have been introduced to suppress innocent data equal to 1/4, 2/4, 3/4, and 4/4 percent of the true secret data inside the database. Results show that the new technique offers better control over data accessibility and inference as compared to the state-of-theart security techniques. This paper further discusses the combination of techniques together to be used. The paper shows that cell plus innocent 1/4, 2/4, and 3/4 techniques can be used as a replacement for the cell level security.
Abstract: Many water supply systems in Australia are currently
undergoing significant reconfiguration due to reductions in long term
average rainfall and resulting low inflows to water supply reservoirs
since the second half of the 20th century. When water supply systems
undergo change, it is necessary to develop new operating rules,
which should consider climate, because the climate change is likely
to further reduce inflows. In addition, water resource systems are
increasingly intended to be operated to meet complex and multiple
objectives representing social, economic, environmental and
sustainability criteria. This is further complicated by conflicting
preferences on these objectives from diverse stakeholders. This paper
describes a methodology to develop optimum operating rules for
complex multi-reservoir systems undergoing significant change,
considering all of the above issues. The methodology is demonstrated
using the Grampians water supply system in northwest Victoria,
Australia. Initial work conducted on the project is also presented in
this paper.
Abstract: Rainfall records of rainfall station including the
rainfall potential per hour and rainfall mass of five heavy storms are
explored, respectively from 2001 to 2010. The rationalization formula
is to investigate the capability of flood peak duration of flood
detention pond in different rainfall conditions. The stable flood
detention model is also proposed by using system dynamic control
theory to get the message of flood detention pond in this research.
When rainfall frequency of one hour rainfall duration is more than
100-year frequency which exceeds the flood detention standard of
20-year frequency for the flood detention pond, the flood peak
duration of flood detention pond is 1.7 hours at most even though the
flood detention pond with maximum drainage potential about 15.0
m3/s of pumping system is constructed. If the rainfall peak current is
more than maximum drainage potential, the flood peak duration of
flood detention pond is about 1.9 hours at most. The flood detention
pond is the key factor of stable drainage control and flood prevention.
The critical factors of flood disaster is not only rainfall mass, but also
rainfall frequency of heavy storm in different rainfall duration and
flood detention frequency of flood detention system.
Abstract: Recently, Northeast Asia has become one of the three
largest trade areas, covering approximately 30% of the total trade
volume of the world. However, the distribution facilities are saturated
due to the increase in the transportation volume within the area and
with the European countries. In order to accommodate the increase of
the transportation volume, the transportation networking with the
major countries in Northeast Asia and Europe is absolutely necessary.
The Eurasian Logistics Network will develop into an international
passenger transportation network covering the Northeast Asian region
and an international freight transportation network connecting across
Eurasia Continent. This paper surveys the changes and trend of the
distribution network in the Eurasian Region according to the political,
economic and environmental changes of the region, analyses the
distribution network according to the changes in the transportation
policies of the related countries, and provides the direction of the
development of composite transportation on the basis of the present
conditions of transportation means. The transportation means optimal
for the efficiency of transportation system are suggested to be train
ferries, sea & rail or sea & rail & sea. It is suggested to develop
diversified composite transportation means and routes within the
boundary of international cooperation system.
Abstract: Renewable energy resources are inexhaustible, clean as compared with conventional resources. Also, it is used to supply regions with no grid, no telephone lines, and often with difficult accessibility by common transport. Satellite earth stations which located in remote areas are the most important application of renewable energy. Neural control is a branch of the general field of intelligent control, which is based on the concept of artificial intelligence. This paper presents the mathematical modeling of satellite earth station power system which is required for simulating the system.Aswan is selected to be the site under consideration because it is a rich region with solar energy. The complete power system is simulated using MATLAB–SIMULINK.An artificial neural network (ANN) based model has been developed for the optimum operation of earth station power system. An ANN is trained using a back propagation with Levenberg–Marquardt algorithm. The best validation performance is obtained for minimum mean square error. The regression between the network output and the corresponding target is equal to 96% which means a high accuracy. Neural network controller architecture gives satisfactory results with small number of neurons, hence better in terms of memory and time are required for NNC implementation. The results indicate that the proposed control unit using ANN can be successfully used for controlling the satellite earth station power system.
Abstract: Stress-strain curve of inter-tube connected carbon nanotube (CNT) reinforced polymer composite under axial loading generated from molecular dynamics simulation is presented. Comparison of the response to axial mechanical loading between this composite system with composite systems reinforced by long, continuous CNTs (replicated via periodic boundary conditions) and short, discontinuous CNTs has been made. Simulation results showed that the inter-tube connection improved the mechanical properties of short discontinuous CNTs dramatically. Though still weaker than long CNT/polymer composite, more remarkable increase in the stiffness relative to the polymer was observed in the inter-tube connected CNT/polymer composite than in the discontinuous CNT/polymer composite. The manually introduced bridge break process resulted in a stress-strain curve of ductile fracture mode, which is consistent with the experimental result.
Abstract: Due to heavy energy constraints in WSNs clustering is
an efficient way to manage the energy in sensors. There are many
methods already proposed in the area of clustering and research is
still going on to make clustering more energy efficient. In our paper
we are proposing a minimum spanning tree based clustering using
divide and conquer approach. The MST based clustering was first
proposed in 1970’s for large databases. Here we are taking divide and
conquer approach and implementing it for wireless sensor networks
with the constraints attached to the sensor networks. This Divide and
conquer approach is implemented in a way that we don’t have to
construct the whole MST before clustering but we just find the edge
which will be the part of the MST to a corresponding graph and
divide the graph in clusters there itself if that edge from the graph can
be removed judging on certain constraints and hence saving lot of
computation.
Abstract: In this paper three different approaches for person
verification and identification, i.e. by means of fingerprints, face and
voice recognition, are studied. Face recognition uses parts-based
representation methods and a manifold learning approach. The
assessment criterion is recognition accuracy. The techniques under
investigation are: a) Local Non-negative Matrix Factorization
(LNMF); b) Independent Components Analysis (ICA); c) NMF with
sparse constraints (NMFsc); d) Locality Preserving Projections
(Laplacianfaces). Fingerprint detection was approached by classical
minutiae (small graphical patterns) matching through image
segmentation by using a structural approach and a neural network as
decision block. As to voice / speaker recognition, melodic cepstral
and delta delta mel cepstral analysis were used as main methods, in
order to construct a supervised speaker-dependent voice recognition
system. The final decision (e.g. “accept-reject" for a verification
task) is taken by using a majority voting technique applied to the
three biometrics. The preliminary results, obtained for medium
databases of fingerprints, faces and voice recordings, indicate the
feasibility of our study and an overall recognition precision (about
92%) permitting the utilization of our system for a future complex
biometric card.
Abstract: The overlay approach has been widely used by many service providers for Traffic Engineering (TE) in large Internet backbones. In the overlay approach, logical connections are set up between edge nodes to form a full mesh virtual network on top of the physical topology. IP routing is then run over the virtual network. Traffic engineering objectives are achieved through carefully routing logical connections over the physical links. Although the overlay approach has been implemented in many operational networks, it has a number of well-known scaling issues. This paper proposes a new approach to achieve traffic engineering without full-mesh overlaying with the help of integrated approach and equal subset split method. Traffic engineering needs to determine the optimal routing of traffic over the existing network infrastructure by efficiently allocating resource in order to optimize traffic performance on an IP network. Even though constraint-based routing [1] of Multi-Protocol Label Switching (MPLS) is developed to address this need, since it is not widely tested or debugged, Internet Service Providers (ISPs) resort to TE methods under Open Shortest Path First (OSPF), which is the most commonly used intra-domain routing protocol. Determining OSPF link weights for optimal network performance is an NP-hard problem. As it is not possible to solve this problem, we present a subset split method to improve the efficiency and performance by minimizing the maximum link utilization in the network via a small number of link weight modifications. The results of this method are compared against results of MPLS architecture [9] and other heuristic methods.
Abstract: Rainbow trout homogametic males, (XX or YY sex genotype), can be obtained, respectively, through masculinisation of genetic females or induced androgenesis. Aim of this study was to compare reproductive potential of neo-males (XX) and super-males (YY) with heterogametic males (XY). We measured spermatozoa motility parameters, sperm concentration, osmolality and characterized protein profiles in samples of stripped and testicular sperm obtained from XY and YY males, and testicular sperm of XX males. The motile spermatozoa, as measured by both subjective method and CASA, showed no differences between testicular sperm of XX males and stripped sperm of XY and YY males whereas testicular sperm of XY and YY males had significantly lower sperm motility. Result of protein densitometry showed similarities in protein profile between seminal plasma of XY and YY males and testicular fluids of XX males. Testis of XX males showed specific histological structures of cysts consists hypertrophied Sertoli cells.
Abstract: To develop a process of extracting pixel values over the using of satellite remote sensing image data in Thailand. It is a very important and effective method of forecasting rainfall. This paper presents an approach for forecasting a possible rainfall area based on pixel values from remote sensing satellite images. First, a method uses an automatic extraction process of the pixel value data from the satellite image sequence. Then, a data process is designed to enable the inference of correlations between pixel value and possible rainfall occurrences. The result, when we have a high averaged pixel value of daily water vapor data, we will also have a high amount of daily rainfall. This suggests that the amount of averaged pixel values can be used as an indicator of raining events. There are some positive associations between pixel values of daily water vapor images and the amount of daily rainfall at each rain-gauge station throughout Thailand. The proposed approach was proven to be a helpful manual for rainfall forecasting from meteorologists by which using automated analyzing and interpreting process of meteorological remote sensing data.
Abstract: The use of computer hardware and software in
education and training dates to the early 1940s, when American
researchers developed flight simulators which used analog computers
to generate simulated onboard instrument data.Computer software is
widely used to help engineers and undergraduate student solve their
problems quickly and more accurately. This paper presents the list of
computer software in geotechnical engineering.
Abstract: We introduce a logic-based framework for database
updating under constraints. In our framework, the constraints are
represented as an instantiated extended logic program. When performing
an update, database consistency may be violated. We provide
an approach of maintaining database consistency, and study the
conditions under which the maintenance process is deterministic. We
show that the complexity of the computations and decision problems
presented in our framework is in each case polynomial time.
Abstract: High Strength Concrete (HSC) is defined as concrete
that meets special combination of performance and uniformity
requirements that cannot be achieved routinely using conventional
constituents and normal mixing, placing, and curing procedures. It is
a highly complex material, which makes modeling its behavior a very
difficult task. This paper aimed to show possible applicability of
Neural Networks (NN) to predict the slump in High Strength
Concrete (HSC). Neural Network models is constructed, trained and
tested using the available test data of 349 different concrete mix
designs of High Strength Concrete (HSC) gathered from a particular
Ready Mix Concrete (RMC) batching plant. The most versatile
Neural Network model is selected to predict the slump in concrete.
The data used in the Neural Network models are arranged in a format
of eight input parameters that cover the Cement, Fly Ash, Sand,
Coarse Aggregate (10 mm), Coarse Aggregate (20 mm), Water,
Super-Plasticizer and Water/Binder ratio. Furthermore, to test the
accuracy for predicting slump in concrete, the final selected model is
further used to test the data of 40 different concrete mix designs of
High Strength Concrete (HSC) taken from the other batching plant.
The results are compared on the basis of error function (or
performance function).
Abstract: Detection of human emotions has many potential applications. One of application is to quantify attentiveness audience in order evaluate acoustic quality in concern hall. The subjective audio preference that based on from audience is used. To obtain fairness evaluation of acoustic quality, the research proposed system for multimodal emotion detection; one modality based on brain signals that measured using electroencephalogram (EEG) and the second modality is sequences of facial images. In the experiment, an audio signal was customized which consist of normal and disorder sounds. Furthermore, an audio signal was played in order to stimulate positive/negative emotion feedback of volunteers. EEG signal from temporal lobes, i.e. T3 and T4 was used to measured brain response and sequence of facial image was used to monitoring facial expression during volunteer hearing audio signal. On EEG signal, feature was extracted from change information in brain wave, particularly in alpha and beta wave. Feature of facial expression was extracted based on analysis of motion images. We implement an advance optical flow method to detect the most active facial muscle form normal to other emotion expression that represented in vector flow maps. The reduce problem on detection of emotion state, vector flow maps are transformed into compass mapping that represents major directions and velocities of facial movement. The results showed that the power of beta wave is increasing when disorder sound stimulation was given, however for each volunteer was giving different emotion feedback. Based on features derived from facial face images, an optical flow compass mapping was promising to use as additional information to make decision about emotion feedback.
Abstract: Most buildings have been using anchor bolts
commonly for installing outdoor advertising structures. Anchor bolts
of common carbon steel are widely used and often installed
indiscriminately by inadequate installation standards. In the area
where strong winds frequently blow, falling accidents of outdoor
advertising structures can occur and cause a serious disaster, which is
very dangerous and to be prevented. In this regard, the development of
high-performance anchor bolts is urgently required. In the present
study, 25Cr-8Ni-1.5Si-1Mn-0.4C alloy was produced by traditional
vacuum induction melting (VIM) for the application of anchor bolt.
The alloy composition is revealed as a duplex microstructure from
thermodynamic phase analysis by FactSage® and confirmed by
metallographic experiment. Addition of Nitrogen to the alloy was
found to reduce the ferritic phase domain and significantly increase the
hardness and the tensile strength. Microstructure observation revealed
mixed structure of austenite and ferrite with fine carbide distributed
along the grain and phase boundaries.
Abstract: Motion detection is very important in image
processing. One way of detecting motion is using optical flow.
Optical flow cannot be computed locally, since only one independent
measurement is available from the image sequence at a point, while
the flow velocity has two components. A second constraint is needed.
The method used for finding the optical flow in this project is
assuming that the apparent velocity of the brightness pattern varies
smoothly almost everywhere in the image. This technique is later
used in developing software for motion detection which has the
capability to carry out four types of motion detection. The motion
detection software presented in this project also can highlight motion
region, count motion level as well as counting object numbers. Many
objects such as vehicles and human from video streams can be
recognized by applying optical flow technique.
Abstract: Vector quantization is a powerful tool for speech
coding applications. This paper deals with LPC Coding of speech
signals which uses a new technique called Multi Switched Split
Vector Quantization, This is a hybrid of two product code vector
quantization techniques namely the Multi stage vector quantization
technique, and Switched split vector quantization technique,. Multi
Switched Split Vector Quantization technique quantizes the linear
predictive coefficients in terms of line spectral frequencies. From
results it is proved that Multi Switched Split Vector Quantization
provides better trade off between bitrate and spectral distortion
performance, computational complexity and memory requirements
when compared to Switched Split Vector Quantization, Multi stage
vector quantization, and Split Vector Quantization techniques. By
employing the switching technique at each stage of the vector
quantizer the spectral distortion, computational complexity and
memory requirements were greatly reduced. Spectral distortion was
measured in dB, Computational complexity was measured in
floating point operations (flops), and memory requirements was
measured in (floats).