Abstract: Performance of any continuous speech recognition system is highly dependent on performance of the acoustic models. Generally, development of the robust spoken language technology relies on the availability of large amounts of data. Common way to cope with little data for training each state of Markov models is treebased state tying. This tying method applies contextual questions to tie states. Manual procedure for question generation suffers from human errors and is time consuming. Various automatically generated questions are used to construct decision tree. There are three approaches to generate questions to construct HMMs based on decision tree. One approach is based on misrecognized phonemes, another approach basically uses feature table and the other is based on state distributions corresponding to context-independent subword units. In this paper, all these methods of automatic question generation are applied to the decision tree on FARSDAT corpus in Persian language and their results are compared with those of manually generated questions. The results show that automatically generated questions yield much better results and can replace manually generated questions in Persian language.
Abstract: Although, all high school students in Japan are required to learn informatics, many of them do not learn this topic sufficiently. In response to this situation, we propose a support package for high school informatics classes. To examine what students learned and if they sufficiently understood the context of the lessons, a questionnaire survey was distributed to 186 students. We analyzed the results of the questionnaire and determined the weakest units, which were “basic computer configuration” and “memory and secondary storage”. We then developed a package for teaching these units. We propose that our package be applied in high school classrooms.
Abstract: Developers need to evaluate software's performance to make software efficient. This paper suggests a performance evaluation system for embedded software. The suggested system consists of code analyzer, testing agents, data analyzer, and report viewer. The code analyzer inserts additional code dependent on target system into source code and compiles the source code. The testing agents execute performance test. The data analyzer translates raw-level results data to class-level APIs for reporting viewer. The report viewer offers users graphical report views by using the APIs. We hope that the suggested tool will be useful for embedded-related software development,because developers can easily and intuitively analyze software's performance and resource utilization.
Abstract: This paper describes the design process and the realtime validation of an innovative autonomous mid-air flight and landing system developed by the Italian Aerospace Research Center in the framework of the Italian national funded project TECVOL (Technologies for the Autonomous Flight). In the paper it is provided an insight of the whole development process of the system under study. In particular, the project framework is illustrated at first, then the functional context and the adopted design and testing approach are described, and finally the on-ground validation test rig on purpose designed is addressed in details. Furthermore, the hardwarein- the-loop validation of the autonomous mid-air flight and landing system by means of the real-time test rig is described and discussed.
Abstract: A manufacturing feature can be defined simply as a
geometric shape and its manufacturing information to create the shape.
In a feature-based process planning system, feature library plays an
important role in the extraction of manufacturing features with their
proper manufacturing information. However, to manage the
manufacturing information flexibly, it is important to build a feature
library that is easy to modify. In this paper, a Wiki-based feature
library is proposed.
Abstract: The aim of this study is to identify the conditions of
implementation for reconfigurability in summarizing past flexible
manufacturing systems (FMS) research by drawing overall
conclusions from many separate High Performance Manufacturing
(HPM) studies. Meta-analysis will be applied to links between HPM
programs and their practices related to FMS and manufacturing
performance with particular reference to responsiveness performance.
More specifically, an application of meta-analysis will be made with
reference to two of the main steps towards the development of an
empirically-tested theory: testing the adequacy of the measurement of
variables and testing the linkages between the variables.
Abstract: The measurements of 226Ra, 232Th and 40K using
gamma spectrometry and radon concentration and exhalation rates
measurements using solid state nuclear track (LR-115, Type-II
plastic) detectors are used to asses a first order exposure risk for the
persons residing in Fatehbad and Hissar districts of Western Haryana,
India. The concentration of Radium, Thorium and Potassium in the
soil samples varies from 13.37 Bq m-3 to 24.67 Bq m-3, 34.67 Bq m-3
to 67.34 Bq m-3 and 298.78 Bq m-3 to 405.67 Bq m-3 respectively
with average values of 18.78, 47.35 and 361.57 Bq m-3 respectively.
The radium equivalent activity (Raeq) calculated for the same soil
samples varies from 92.72 Bq m-3 to 140.6 Bq m-3 with an average
value of 111.80 Bq m-3. The values of absorbed dose and annual
effective dose (indoors and outdoors) are found to vary from 44.18
nGy h-1 to 65.23 nGy h-1, 0.22 mSv y-1 to 0.32 mSv y-1 and 0.05 mSv
y-1 to 0.08 mSv y-1 respectively. The radon concentration and
exhalation rates have also been reported. The radium equivalent
activities in all the soil samples were found to be lower than the limit
(370 Bq kg-1) set in the Organization for Economic Cooperation and
Development (OECD) report and the value of Hex in all the samples
is less than unity.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: This paper discusses aspects of re-design of loadshedding
schemes with respect to actual developments in the Kosovo
power system. Load-shedding is a type of emergency control that is
designed to ensure system stability by reducing power system load to
match the power generation supply. This paper presents a new
adaptive load-shedding scheme that provides emergency protection
against excess frequency decline, in cases when the Kosovo power
system might be disconnected from the regional transmission
network. The proposed load-shedding scheme uses the local
frequency rate information to adapt the load-shedding pattern to suit
the size and location of the occurring disturbance. The proposed
scheme is tested in a software simulation on a large scale PSS/E
model which represents nine power system areas of Southeast Europe
including the Kosovo power system.
Abstract: This paper analysis the integrated use of safety monitoring with the domestic and international latest research on rail safety protection system, and focus on the implementation of an organic whole system, with the monitoring and early warning, risk assessment, predictive control and emergency rescue system. The system framework, contents and system structure of Security system is proposed completely. It-s pointed out that the Security system is a negative feedback system composed of by safety monitoring and warning system, risk assessment and emergency rescue system. Safety monitoring and warning system focus on the monitoring target monitoring, early warning, tracking, integration of decision-making, for objective and subjective risks factors. Risk assessment system analysis the occurrence of a major Security risk mechanism, determines the standard of the future short, medium and long term safety conditions, and give prop for development of safety indicators, accident analysis and safety standards. Emergency rescue system is with the goal of rapid and effective rescue work for accident, to minimize casualties and property losses.
Abstract: Periphyton development and composition were
studied in three different treatments: (i) two fishpond units of
wetland-type wastewater treatment pond systems, (ii) two fishponds
in combined intensive-extensive fish farming systems and (iii) three
traditional polyculture fishponds. Results showed that amounts of
periphyton developed in traditional polyculture fishponds (iii) were
different compared to the other treatments (i and ii), where the main
function of ponds was stated wastewater treatment. Negative
correlation was also observable between water quality parameters
and periphyton production. The lower trophity, halobity and
saprobity level of ponds indicated higher amount of periphyton. The
dry matter content of periphyton was significantly higher in the
samples, which were developed in traditional polyculture fishponds
(2.84±3.02 g m-2 day-1, whereby the ash content in dry matter 74%),
than samples taken from (i) (1.60±2.32 g m-2 day-1, 61%) and (ii)
fishponds (0.65±0.45 g m-2 day-1, 81%).
Abstract: Quantitative researching on the degree of incidence between the logistics industry and relevant macroscopic system elements is the basis of reasonable and scientific policy on industrial development. In the light of the macro-level, the logistics industry system is consisted of multiple macroscopic agents such as macro-economic, infrastructure, social environment, market demanding, the traditional industry, industry life cycle, policy , system and so on. This paper studies the grey incidence among the macroscopic agents in the logistics industry system. It is demonstrated that the releasing of the logistics services from the logistics outsourcing enterprises determines the growth of the logistics size. Although the information and communication technology is able to promote the formation of the modern logistics industry to some extent, the development of the modern logistics industry depends more on the development of national economy and the investment in the capital assets of the logistics industry.
Abstract: Aspheric optical components are an alternative to the use of conventional lenses in the implementation of imaging systems for the visible range. Spherical lenses are capable of producing aberrations. Therefore, they are not able to focus all the light into a single point. Instead, aspherical lenses correct aberrations and provide better resolution even with compact lenses incorporating a small number of lenses.
Metrology of these components is very difficult especially when the resolution requirements increase and insufficient or complexity of conventional tools requires the development of specific approaches to characterization.
This work is part of the problem existed because the objectives are the study and comparison of different methods used to measure surface rays hybrid aspherical lenses.
Abstract: Promoting critical thinking (CT) in an educational
setting has been appraised in order to enhance learning and
intellectual skills. In this study, a pedagogical course in a vocational
teacher education program in Turkey was designed by integrating CT
skill-based strategies/activities into the course content and CT skills
were means leading to intended course objectives. The purpose of the
study was to evaluate the importance of the course objectives, the
attainment of the objectives, and the effectiveness of teachinglearning
strategies/activities from prospective teachers- points of
view. The results revealed that although the students mostly
considered the course objectives important, they did not feel
competent in the attainment of all objectives especially in those
related to the main topic of Learning and those requiring higher order
thinking skills. On the other hand, the students considered the course
activities effective for learning and for the development of thinking
skills, especially, in interpreting, comparing, questioning,
contrasting, and forming relationships.
Abstract: In this paper the development of a software to
encrypt messages with asymmetric cryptography is presented. In
particular, is used the RSA (Rivest, Shamir and Adleman) algorithm
to encrypt alphanumeric information. The software allows to
generate different public keys from two prime numbers provided by
the user, the user must then select a public-key to generate the
corresponding private-key. To encrypt the information, the user must
provide the public-key of the recipient as well as the message to be
encrypted. The generated ciphertext can be sent through an insecure
channel, so that would be very difficult to be interpreted by an
intruder or attacker. At the end of the communication, the recipient
can decrypt the original message if provide his/her public-key and
his/her corresponding private-key.
Abstract: In this paper, the techniques for estimating the
residual stress in high velocity oxy fuel thermal spray coatings have
been discussed and compared. The development trend and the last
investigation have been studied. It is seemed that the there is not
effective study on the effect of the peening action in HVOF
analytically and numerically.
Abstract: The compressive strength development through
polymerization process of alkaline solution and fly ash blended with Microwave Incinerated Rice Husk Ash (MIRHA) is described in this
paper. Three curing conditions, which are hot gunny curing, ambient
curing, and external humidity curing are investigated to obtain the suitable curing condition for cast in situ provision. Fly ash was
blended with MIRHA at 3%, 5%, and 7% to identify the effect of blended mixes to the compressive strength and microstructure
properties of geopolymer concrete. Compressive strength results
indicated an improvement in the strength development with external humidity curing concrete samples compared to hot gunny curing and
ambient curing. Blended mixes also presented better performance
than control mixes. Improvement of interfacial transition zone (ITZ)
and micro structure in external humidity concrete samples were also
identified compared to hot gunny and ambient curing.
Abstract: This paper discusses the causal explanation capability
of QRIOM, a tool aimed at supporting learning of organic chemistry
reactions. The development of the tool is based on the hybrid use of
Qualitative Reasoning (QR) technique and Qualitative Process
Theory (QPT) ontology. Our simulation combines symbolic,
qualitative description of relations with quantity analysis to generate
causal graphs. The pedagogy embedded in the simulator is to both
simulate and explain organic reactions. Qualitative reasoning through
a causal chain will be presented to explain the overall changes made
on the substrate; from initial substrate until the production of final
outputs. Several uses of the QPT modeling constructs in supporting
behavioral and causal explanation during run-time will also be
demonstrated. Explaining organic reactions through causal graph
trace can help improve the reasoning ability of learners in that their
conceptual understanding of the subject is nurtured.
Abstract: User-Centered Design (UCD), Usability Engineering (UE) and Participatory Design (PD) are the common Human- Computer Interaction (HCI) approaches that are practiced in the software development process, focusing towards issues and matters concerning user involvement. It overlooks the organizational perspective of HCI integration within the software development organization. The Management Information Systems (MIS) perspective of HCI takes a managerial and organizational context to view the effectiveness of integrating HCI in the software development process. The Human-Centered Design (HCD) which encompasses all of the human aspects including aesthetic and ergonomic, is claimed as to provide a better approach in strengthening the HCI approaches to strengthen the software development process. In determining the effectiveness of HCD in the software development process, this paper presents the findings of a content analysis of HCI approaches by viewing those approaches as a technology which integrates user requirements, ranging from the top management to other stake holder in the software development process. The findings obtained show that HCD approach is a technology that emphasizes on human, tools and knowledge in strengthening the HCI approaches to strengthen the software development process in the quest to produce a sustainable, usable and useful software product.
Abstract: Recently, the RFID (Radio Frequency
Identification) technology attracts the world market attention as
essential technology for ubiquitous environment. The RFID
market has focused on transponders and reader development.
But that concern has shifted to RFID software like as
high-valued e-business applications, RFID middleware and
related development tools. However, due to the high sensitivity
of data and service transaction within the RFID network,
security consideration must be addressed. In order to guarantee
trusted e-business based on RFID technology, we propose a
security enhanced RFID middleware system. Our proposal is
compliant with EPCglobal ALE (Application Level Events),
which is standard interface for middleware and its clients. We
show how to provide strengthened security and trust by
protecting transported data between middleware and its client,
and stored data in middleware. Moreover, we achieve the
identification and service access control against illegal service
abuse. Our system enables secure RFID middleware service
and trusted e-business service.