Abstract: Historic preservation areas are extremely vulnerable to disasters because they are home to many vulnerable people and contain many closely spaced wooden houses. However, the narrow streets in these regions have historic meaning, which means that they cannot be widened and can become blocked easily during large disasters. Here, we describe our efforts to establish a methodology for the planning of evacuation route sin such historic preservation areas. In particular, this study aims to clarify the effectiveness of measures intended to secure two-way evacuation routes for vulnerable people during large disasters in a historic area preserved under the Cultural Properties Protection Law, Japan.
Abstract: The Virtual Reality (VR) is becoming increasingly
important for business, education, and entertainment, therefore VR
technology have been applied for training purposes in the areas of
military, safety training and flying simulators. In particular, the
superior and high reliability VR training system is very important in
immersion. Manipulation training in immersive virtual environments
is difficult partly because users must do without the hap contact with
real objects they rely on in the real world to orient themselves and
their manipulated.
In this paper, we create a convincing questionnaire of immersion
and an experiment to assess the influence of immersion on
performance in VR training system. The Immersion Questionnaire
(IQ) included spatial immersion, Psychological immersion, and
Sensory immersion. We show that users with a training system
complete visual attention and detection of signals. Twenty subjects
were allocated to a factorial design consisting of two different VR
systems (Desktop VR and Projector VR). The results indicated that
different VR representation methods significantly affected the
participants- Immersion dimensions.
Abstract: Reverse engineering of full-genomic interaction networks based on compendia of expression data has been successfully applied for a number of model organisms. This study adapts these approaches for an important non-model organism: The major human fungal pathogen Candida albicans. During the infection process, the pathogen can adapt to a wide range of environmental niches and reversibly changes its growth form. Given the importance of these processes, it is important to know how they are regulated. This study presents a reverse engineering strategy able to infer fullgenomic interaction networks for C. albicans based on a linear regression, utilizing the sparseness criterion (LASSO). To overcome the limited amount of expression data and small number of known interactions, we utilize different prior-knowledge sources guiding the network inference to a knowledge driven solution. Since, no database of known interactions for C. albicans exists, we use a textmining system which utilizes full-text research papers to identify known regulatory interactions. By comparing with these known regulatory interactions, we find an optimal value for global modelling parameters weighting the influence of the sparseness criterion and the prior-knowledge. Furthermore, we show that soft integration of prior-knowledge additionally improves the performance. Finally, we compare the performance of our approach to state of the art network inference approaches.
Abstract: The distinction among urban, periurban and rural areas represents a classical example of uncertainty in land classification. Satellite images, geostatistical analysis and all kinds of spatial data are very useful in urban sprawl studies, but it is important to define precise rules in combining great amounts of data to build complex knowledge about territory. Rough Set theory may be a useful method to employ in this field. It represents a different mathematical approach to uncertainty by capturing the indiscernibility. Two different phenomena can be indiscernible in some contexts and classified in the same way when combining available information about them. This approach has been applied in a case of study, comparing the results achieved with both Map Algebra technique and Spatial Rough Set. The study case area, Potenza Province, is particularly suitable for the application of this theory, because it includes 100 municipalities with different number of inhabitants and morphologic features.
Abstract: Swarm principles are increasingly being used to design controllers for the coordination of multi-robot systems or, in general, multi-agent systems. This paper proposes a two-dimensional Lagrangian swarm model that enables the planar agents, modeled as point masses, to swarm whilst effectively avoiding each other and obstacles in the environment. A novel method, based on an extended Lyapunov approach, is used to construct the model. Importantly, the Lyapunov method ensures a form of practical stability that guarantees an emergent behavior, namely, a cohesive and wellspaced swarm with a constant arrangement of individuals about the swarm centroid. Computer simulations illustrate this basic feature of collective behavior. As an application, we show how multiple planar mobile unicycle-like robots swarm to eventually form patterns in which their velocities and orientations stabilize.
Abstract: The role of neighborhood center as semi public (the
balance space) is disappeared in bonding between private and public
in new urbanism. In this way, a hierarchical principle in the
traditional neighborhood center appears to create or develop the
conditions for residents` relationships and belonging. This paper
evaluates significant of hierarchical principles of the neighborhood
center in residents` territoriality and its factors. In this way Miandeh
neighborhood center from Boshrooyeh city was determined as a case
study area. Results indicated that a hierarchical principle is the best
instrument to improve the territoriality as the subcomponent of place
belonging in residents. The findings help the urban designer to
revitalization the neighborhoods and proceedings in organization of
physical space.
Abstract: The forest stand consisted of four layers. The species
composition between the third and the bottom layers was almost
similar, whereas it was almost exclusive between the top and the lower
three layers. The values of Shannon-s index H' and Pielou-s index
J ' tended to increase from the bottom layer upward, except for
H' -value of the top layer. The values of H' and J ' were 4.21 bit
and 0.73, respectively, for the total stand. High woody species
diversity of the forest depended on large trees in the upper layers,
which trend was different from a subtropical evergreen broadleaf
forest grown in silicate habitat in the northern part of Okinawa Island.
The spatial distribution of trees was overlapped between the third and
the bottom layers, whereas it was independent or slightly exclusive
between the top and the lower three layers. Mean tree weight of each
layer decreased from the top toward the bottom layer, whereas the
corresponding tree density increased from the top downward. This
relationship was analogous to the process of self-thinning plant
populations.
Abstract: The design of an active leg orthosis for tumble
protection is proposed in this paper. The orthosis would be applied to
assist elders or invalids in rebalancing while they fall unexpectedly.
We observe the regain balance motion of healthy and youthful people,
and find the difference to elders or invalids. First, the physical model
of leg would be established, and we consider the leg motions are
achieve through four joints (phalanx stem, ankle, knee, and hip joint)
and five links (phalanges, talus, tibia, femur, and hip bone). To
formulate the dynamic equations, the coordinates which can clearly
describe the position in 3D space are first defined accordance with the
human movement of leg, and the kinematics and dynamics of the leg
movement can be formulated based on the robotics. For the purpose,
assisting elders and invalids in avoiding tumble, the posture variation
of unbalance and regaining balance motion are recorded by the
motion-capture image system, and the trajectory is taken as the desire
one. Then we calculate the force and moment of each joint based on
the leg motion model through programming MATLAB code. The
results would be primary information of the active leg orthosis design
for tumble protection.
Abstract: Covering approximation spaces is a class of important
generalization of approximation spaces. For a subset X of a covering
approximation space (U, C), is X definable or rough? The
answer of this question is uncertain, which depends on covering
approximation operators endowed on (U, C). Note that there are many
various covering approximation operators, which can be endowed
on covering approximation spaces. This paper investigates covering
approximation spaces endowed ten covering approximation operators
respectively, and establishes some relations among definable subsets,
inner definable subsets and outer definable subsets in covering approximation
spaces, which deepens some results on definable subsets
in approximation spaces.
Abstract: Ontologies are broadly used in the context of networked home environments. With ontologies it is possible to define and store context information, as well as to model different kinds of physical environments. Ontologies are central to networked home environments as they carry the meaning. However, ontologies and the OWL language is complex. Several ontology visualization approaches have been developed to enhance the understanding of ontologies. The domain of networked home environments sets some special requirements for the ontology visualization approach. The visualization tool presented here, visualizes ontologies in a domain-specific way. It represents effectively the physical structures and spatial relationships of networked home environments. In addition, it provides extensive interaction possibilities for editing and manipulating the visualization. The tool shortens the gap from beginner to intermediate OWL ontology reader by visualizing instances in their actual locations and making OWL ontologies more interesting and concrete, and above all easier to comprehend.
Abstract: Three dimensional analysis of thermal model in laser
full penetration welding, Nd:YAG, by transparent mode DP600 alloy
steel 1.25mm of thickness and gap of 0.1mm. Three models studied
the influence of thermal dependent temperature properties, thermal
independent temperature and the effect of peak value of specific heat
at phase transformation temperature, AC1, on the transient
temperature. Another seven models studied the influence of
discretization, meshes on the temperature distribution in weld plate.
It is shown that for the effects of thermal properties, the errors less
4% of maximum temperature in FZ and HAZ have identified. The
minimum value of discretization are at least one third increment per
radius for temporal discretization and the spatial discretization
requires two elements per radius and four elements through thickness
of the assembled plate, which therefore represent the minimum
requirements of modeling for the laser welding in order to get
minimum errors less than 5% compared to the fine mesh.
Abstract: In this paper a novel scheme for watermarking digital
audio during its compression to MPEG-1 Layer III format is
proposed. For this purpose we slightly modify some of the selected
MDCT coefficients, which are used during MPEG audio
compression procedure. Due to the possibility of modifying different
MDCT coefficients, there will be different choices for embedding the
watermark into audio data, considering robustness and transparency
factors. Our proposed method uses a genetic algorithm to select the
best coefficients to embed the watermark. This genetic selection is
done according to the parameters that are extracted from the
perceptual content of the audio to optimize the robustness and
transparency of the watermark. On the other hand the watermark
security is increased due to the random nature of the genetic
selection. The information of the selected MDCT coefficients that
carry the watermark bits, are saves in a database for future extraction
of the watermark. The proposed method is suitable for online MP3
stores to pursue illegal copies of musical artworks. Experimental
results show that the detection ratio of the watermarks at the bitrate
of 128kbps remains above 90% while the inaudibility of the
watermark is preserved.
Abstract: The main purpose of this study is to analyze the
relationship of leisure agriculture park visitors on tourist destination
image, environmental perception, travel experiences and revisiting
willingness. This study used questionnaires to Xinshe leisure
agriculture park visitors- targeted convenience sampling manner total
of 636 valid questionnaires. Valid questionnaires by descriptive
statistics, correlation analysis and multiple regression analysis, the
study found that: 1. The agricultural park visitors- correlations exist
between the destination image, perception of the environment, tourism
experience and revisiting willingness. 2."Excellent facilities and
services", "space atmosphere comfortable" and "the spacious paternity
outdoor space" imagery, of visitors- "revisiting willingness predict. 3.
Visitors- in leisure agriculture park "environmental perception" and
"travel experience, future revisiting willingness predict. According to
the analysis of the results, the study not only operate on the
recommendations of the leisure farm owners also provide follow-up
study direction for future researchers.
Abstract: This paper proposes a novel game theoretical
technique to address the problem of data object replication in largescale
distributed computing systems. The proposed technique draws
inspiration from computational economic theory and employs the
extended Vickrey auction. Specifically, players in a non-cooperative
environment compete for server-side scarce memory space to
replicate data objects so as to minimize the total network object
transfer cost, while maintaining object concurrency. Optimization of
such a cost in turn leads to load balancing, fault-tolerance and
reduced user access time. The method is experimentally evaluated
against four well-known techniques from the literature: branch and
bound, greedy, bin-packing and genetic algorithms. The experimental
results reveal that the proposed approach outperforms the four
techniques in both the execution time and solution quality.
Abstract: This paper presents a novel approach for representing
the spatio-temporal topology of the camera network with overlapping
and non-overlapping fields of view (FOVs). The topology is
determined by tracking moving objects and establishing object
correspondence across multiple cameras. To track people successfully
in multiple camera views, we used the Merge-Split (MS) approach for
object occlusion in a single camera and the grid-based approach for
extracting the accurate object feature. In addition, we considered the
appearance of people and the transition time between entry and exit
zones for tracking objects across blind regions of multiple cameras
with non-overlapping FOVs. The main contribution of this paper is to
estimate transition times between various entry and exit zones, and to
graphically represent the camera topology as an undirected weighted
graph using the transition probabilities.
Abstract: One of the main concerns about parallel mechanisms
is the presence of singular points within their workspaces. In singular
positions the mechanism gains or loses one or several degrees of
freedom. It is impossible to control the mechanism in singular
positions. Therefore, these positions have to be avoided. This is a
vital need especially in computer controlled machine tools designed
and manufactured on the basis of parallel mechanisms. This need has
to be taken into consideration when selecting design parameters. A
prerequisite to this is a thorough knowledge about the effect of
design parameters and constraints on singularity. In this paper,
quality condition index was introduced as a criterion for evaluating
singularities of different configurations of a hexapod mechanism
obtainable by different design parameters. It was illustrated that this
method can effectively be employed to obtain the optimum
configuration of hexapod mechanism with the aim of avoiding
singularity within the workspace. This method was then employed to
design the hexapod table of a CNC milling machine.
Abstract: Applying corona wind as a novel technique can lead
to a great level of heat and mass transfer augmentation by using very
small amount of energy. Enhancement of forced flow evaporation
rate by applying electric field (corona wind) has been experimentally
evaluated in this study. Corona wind produced by a fine wire
electrode which is charged with positive high DC voltage impinges
to water surface and leads to evaporation enhancement by disturbing
the saturated air layer over water surface. The study was focused on
the effect of corona wind velocity, electrode spacing and air flow
velocity on the level of evaporation enhancement. Two sets of
experiments, i.e. with and without electric field, have been
conducted. Data obtained from the first experiment were used as
reference for evaluation of evaporation enhancement at the presence
of electric field. Applied voltages ranged from corona threshold
voltage to spark over voltage at 1 kV increments. The results showed
that corona wind has great enhancement effect on water evaporation
rate, but its effectiveness gradually diminishes by increasing air flow
velocity. Maximum enhancements were 7.3 and 3.6 for air velocities
of 0.125 and 1.75 m/s, respectively.
Abstract: We propose a novel graphical technique (SVision) for
intrusion detection, which pictures the network as a community of
hosts independently roaming in a 3D space defined by the set of
services that they use. The aim of SVision is to graphically cluster
the hosts into normal and abnormal ones, highlighting only the ones
that are considered as a threat to the network. Our experimental
results using DARPA 1999 and 2000 intrusion detection and
evaluation datasets show the proposed technique as a good candidate
for the detection of various threats of the network such as vertical
and horizontal scanning, Denial of Service (DoS), and Distributed
DoS (DDoS) attacks.
Abstract: The general idea behind the filter is to average a pixel
using other pixel values from its neighborhood, but simultaneously to
take care of important image structures such as edges. The main
concern of the proposed filter is to distinguish between any variations
of the captured digital image due to noise and due to image structure.
The edges give the image the appearance depth and sharpness. A
loss of edges makes the image appear blurred or unfocused.
However, noise smoothing and edge enhancement are traditionally
conflicting tasks. Since most noise filtering behaves like a low pass
filter, the blurring of edges and loss of detail seems a natural
consequence. Techniques to remedy this inherent conflict often
encompass generation of new noise due to enhancement.
In this work a new fuzzy filter is presented for the noise reduction
of images corrupted with additive noise. The filter consists of three
stages. (1) Define fuzzy sets in the input space to computes a fuzzy
derivative for eight different directions (2) construct a set of IFTHEN
rules by to perform fuzzy smoothing according to
contributions of neighboring pixel values and (3) define fuzzy sets in
the output space to get the filtered and edged image.
Experimental results are obtained to show the feasibility of the
proposed approach with two dimensional objects.