Abstract: In this paper we present the first Arabic sentence
dataset for on-line handwriting recognition written on tablet pc. The
dataset is natural, simple and clear. Texts are sampled from daily
newspapers. To collect naturally written handwriting, forms are
dictated to writers. The current version of our dataset includes 154
paragraphs written by 48 writers. It contains more than 3800 words
and more than 19,400 characters. Handwritten texts are mainly
written by researchers from different research centers. In order to use
this dataset in a recognition system word extraction is needed. In this
paper a new word extraction technique based on the Arabic
handwriting cursive nature is also presented. The technique is applied
to this dataset and good results are obtained. The results can be
considered as a bench mark for future research to be compared with.
Abstract: The heat storage capacity of concrete in building shells is a major reason for excessively large electricity consumption induced by indoor air conditioning. In this research, the previously developed Smart Temperature Information Material (STIM) is embedded in two groups of exterior wall specimens (the control group contains reinforced concrete exterior walls and the experimental group consists of tiled exterior walls). Long term temperature measurements within the concrete are taken by the embedded STIM. Temperature differences between the control group and the experimental group in walls facing the four cardinal directions (east, west, south, and north) are evaluated. This study aims to provide a basic reference for the design of exterior walls and the selection of heat insulation materials.
Abstract: In the past, there were more researches of recommendation system in applied electronic commerce. However, because all circles promote information technology integrative instruction actively, the quantity of instruction resources website is more and more increasing on the Internet. But there are less website including recommendation service, especially for teachers. This study established an instruction resource recommendation website that analyzed teaching style of teachers, then provided appropriate instruction resources for teachers immediately. We used the questionnaire survey to realize teacher-s suggestions and satisfactions with the instruction resource contents and recommendation results. The study shows: (1)The website used “Transactional Ability Inventory" that realized teacher-s style and provided appropriate instruction resources for teachers in a short time, it reduced the step of data filter. (2)According to the content satisfaction of questionnaire survey, four styles teachers were almost satisfied with the contents of the instruction resources that the website recommended, thus, the conception of developing instruction resources with different teaching style is accepted. (3) According to the recommendation satisfaction of questionnaire survey, four styles teachers were almost satisfied with the recommendation service of the website, thus, the recommendation strategy that provide different results for teachers in different teaching styles is accepted.
Abstract: A multilayer self organizing neural neural network
(MLSONN) architecture for binary object extraction, guided by a beta
activation function and characterized by backpropagation of errors
estimated from the linear indices of fuzziness of the network output
states, is discussed. Since the MLSONN architecture is designed to
operate in a single point fixed/uniform thresholding scenario, it does
not take into cognizance the heterogeneity of image information in
the extraction process. The performance of the MLSONN architecture
with representative values of the threshold parameters of the beta
activation function employed is also studied. A three layer bidirectional
self organizing neural network (BDSONN) architecture
comprising fully connected neurons, for the extraction of objects from
a noisy background and capable of incorporating the underlying image
context heterogeneity through variable and adaptive thresholding,
is proposed in this article. The input layer of the network architecture
represents the fuzzy membership information of the image scene to
be extracted. The second layer (the intermediate layer) and the final
layer (the output layer) of the network architecture deal with the self
supervised object extraction task by bi-directional propagation of the
network states. Each layer except the output layer is connected to the
next layer following a neighborhood based topology. The output layer
neurons are in turn, connected to the intermediate layer following
similar topology, thus forming a counter-propagating architecture
with the intermediate layer. The novelty of the proposed architecture
is that the assignment/updating of the inter-layer connection weights
are done using the relative fuzzy membership values at the constituent
neurons in the different network layers. Another interesting feature
of the network lies in the fact that the processing capabilities of
the intermediate and the output layer neurons are guided by a beta
activation function, which uses image context sensitive adaptive
thresholding arising out of the fuzzy cardinality estimates of the
different network neighborhood fuzzy subsets, rather than resorting to
fixed and single point thresholding. An application of the proposed
architecture for object extraction is demonstrated using a synthetic
and a real life image. The extraction efficiency of the proposed
network architecture is evaluated by a proposed system transfer index
characteristic of the network.
Abstract: Multimedia security is an incredibly significant area of concern. The paper aims to discuss a robust image watermarking scheme, which can withstand geometric attacks. The source image is initially moment normalized in order to make it withstand geometric attacks. The moment normalized image is wavelet transformed. The first level wavelet transformed image is segmented into blocks if size 8x8. The product of mean and standard and standard deviation of each block is computed. The second level wavelet transformed image is divided into 8x8 blocks. The product of block mean and the standard deviation are computed. The difference between products in the two levels forms the watermark. The watermark is inserted by modulating the coefficients of the mid frequencies. The modulated image is inverse wavelet transformed and inverse moment normalized to generate the watermarked image. The watermarked image is now ready for transmission. The proposed scheme can be used to validate identification cards and financial instruments. The performance of this scheme has been evaluated using a set of parameters. Experimental results show the effectiveness of this scheme.
Abstract: The setting agent Ca(OH)2 for activation of slag
cement is used in the proportions of 0%, 2%, 4%, 6%, 8% and 10%
by various methods (substitution and addition by mass of slag
cement). The physical properties of slag cement activated by the
calcium hydroxide at anhydrous and hydrated states (fineness,
particle size distribution, consistency of the cement pastes and setting
times) were studied. The activation method by the mineral activator
of slag cement (latent hydraulicity) accelerates the hydration process
and reduces the setting times of the cement activated.
Abstract: Contrary to negative emotion regulation, coping with
positive moods have received less attention in adolescent adjustment.
However, some research has found that everyone is different on
dealing with their positive emotions, which affects their adaptation
and well-being. The purpose of the present study was to investigate
the relationship between positive emotions dampening and
internalizing behavior problems of adolescent in Taiwan. A survey
was conducted and 208 students (12 to14 years old) completed the
strengths and difficulties questionnaire (SDQ), the Affect Intensity
Measure, and the positive emotions dampening scale. Analysis
methods such as descriptive statistics, t-test, Pearson correlations and
multiple regression were adapted. The results were as follows:
Emotionality and internalizing problem behavior have significant
gender differences. Compared to boys, girls have a higher score on
negative emotionality and are at a higher risk for internalizing
symptoms. However, there are no gender differences on positive
emotion dampening. Additionally, in the circumstance that negative
emotionality acted as the control variable, positive emotion
dampening strategy was (positive) related to internalizing behavior
problems. Given the results of this study, it is suggested that coaching
deconstructive positive emotion strategies is to assist adolescents
with internalizing behavior problems is encouraged.
Abstract: Since IEC61850 substation communication standard represents the trend to develop new generations of Substation Automation System (SAS), many IED manufacturers pursue this technique and apply for KEMA. In order to put on the market to meet customer demand as fast as possible, manufacturers often apply their products only for basic environment standard certification but claim to conform to IEC61850 certification. Since verification institutes generally perform verification tests only on specific IEDs of the manufacturers, the interoperability between all certified IEDs cannot be guaranteed. Therefore the interoperability between IEDs from different manufacturers needs to be tested. Based upon the above reasons, this study applies the definitions of the information models, communication service, GOOSE functionality and Substation Configuration Language (SCL) of the IEC61850 to build the concept of communication protocols, and build the test environment. The procedures of the test of the data collection and exchange of the P2P communication mode and Client / Server communication mode in IEC61850 are outlined as follows. First, test the IED GOOSE messages communication capability from different manufacturers. Second, collect IED data from each IED with SCADA system and use HMI to display the SCADA platform. Finally, problems generally encountered in the test procedure are summarized.
Abstract: We present a prototype interactive (hyper) map of strategic, tactical, and logistic options for Supply Chain Management. The map comprises an anthology of options, broadly classified within the strategic spectrum of efficiency versus responsiveness, and according to logistic and cross-functional drivers. They are exemplified by cases in diverse industries. We seek to get all these information and ideas organized to help supply chain managers identify effective choices for specific business environments. The key and innovative linkage we introduce is the configuration of competitive forces. Instead of going through seemingly endless and isolated cases and wondering how one can borrow from them, we aim to provide a guide by force comparisons. The premise is that best practices in a different industry facing similar forces may be a most productive resource in supply chain design and planning. A prototype template is demonstrated.
Abstract: Nowadays in applications of renewable energy sources
it is important to develop powerful and energy-saving photovoltaic
converters and to keep the prescriptions of the standards. In grid
connected PV converters the obvious solution to increase the
efficiency is to reduce the switching losses. Our new developed
control method reduces the switching losses and keeps the limitations
of the harmonic distortion standards. The base idea of the method is
the utilization of 3-state control causing discontinuous current mode
at low input power. In the following sections the control theory, the
realizations and the simulation results are presented.
Abstract: Checkpointing is one of the commonly used techniques to provide fault-tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence, checkpointing protocols having lesser number of synchronization messages and fewer checkpoints are preferred in mobile environment. There are two different approaches, although not orthogonal, to checkpoint mobile computing systems namely, time-based and index-based. Our protocol is a fusion of these two approaches, though not first of its kind. In the present exposition, an index-based checkpointing protocol has been developed, which uses time to indirectly coordinate the creation of consistent global checkpoints for mobile computing systems. The proposed algorithm is non-blocking, adaptive, and does not use any control message. Compared to other contemporary checkpointing algorithms, it is computationally more efficient because it takes lesser number of checkpoints and does not need to compute dependency relationships. A brief account of important and relevant works in both the fields, time-based and index-based, has also been included in the presentation.
Abstract: This paper presents an analytical model to estimate
the cost of an optimized design of reinforced concrete isolated
footing base on structural safety. Flexural and optimized formulas for
square and rectangular footingare derived base on ACI building code
of design, material cost and optimization. The optimization
constraints consist of upper and lower limits of depth and area of
steel. Footing depth and area of reinforcing steel are to be minimized
to yield the optimal footing dimensions. Optimized footing materials
cost of concrete, reinforcing steel and formwork of the designed
sections are computed. Total cost factor TCF and other cost factors
are developed to generalize and simplify the calculations of footing
material cost. Numerical examples are presented to illustrate the
model capability of estimating the material cost of the footing for a
desired axial load.
Abstract: Restoration of endodontically treated teeth is a
common problem in dentistry, related to the fractures occurring in
such teeth and to concentration of forces little information regarding
variation of basic preparation guidelines in stress distribution has
been available. To date, there is still no agreement in the literature
about which material or technique can optimally restore
endodontically treated teeth. The aim of the present study was to
evaluate the influence of the core height and restoration materials on
corono-radicular restored upper first premolar. The first step of the
study was to achieve 3D models in order to analyze teeth, dowel and
core restorations and overlying full ceramic crowns. The FEM model
was obtained by importing the solid model into ANSYS finite
element analysis software. An occlusal load of 100 N was conducted,
and stresses occurring in the restorations, and teeth structures were
calculated. Numerical simulations provide a biomechanical
explanation for stress distribution in prosthetic restored teeth. Within
the limitations of the present study, it was found that the core height
has no important influence on the stress generated in coronoradicular
restored premolars. It can be drawn that the cervical regions
of the teeth and restorations were subjected to the highest stress
concentrations.
Abstract: Waiting times and queues are a daily problem for theme parks. Fast lines or priority queues appear as a solution for a specific segment of customers, that is, tourists who are willing to pay to avoid waiting. This paper analyzes the fast line system and explores the factors that affect the decision to purchase a fast line pass. A greater understanding of these factors may help companies to design appropriate products and services. This conceptual paper was based on a literature review in marketing and consumer behavior. Additional research was identified in related disciplines such as leisure studies, psychology, and sociology. A conceptual framework of the factors influencing the decision to purchase a fast line pass is presented.
Abstract: The determination of sugars in foods is very
significant. Their relation in fact, can affect the chemical and
sensorial quality of the matrix (e.g., sweetness, pH, total acidity,
microbial stability, global acceptability) and can provide information
on food to optimize several selected technological processes. Three
stages of ripeness (green, yellow and red) of tomatoes (Lycopersicon
Esculentum cv. Elegance) at different harvest dates were evaluated.
Fruit from all harvests were exposed to different of ozone doses
(0.25, 0.50 and 1 mg O3/g tomatoes) and clean air for 5 day at 15
°C±2 and 90-95 % relative humidity. Then, fruits were submitted for
extraction and analysis after a day from the finish of exposure of each
stage. The concentrations of the glucose and fructose increased in the
tomatoes which were subjected to ozone treatments.
Abstract: In this paper, a generalized derivatives operator n
λ,βf
introduced by the authors will be discussed. Some subordination and
superordination results involving this operator for certain normalized
analytic functions in the open unit disk will be investigated. Our
results extend corresponding previously known results.
Abstract: Article 5(3) of the Brussels I Regulation provides that a person domiciled in a Member State may be sued in another Member State in matters relating to tort, delict or quasi-delict, in the courts for the place where the harmful events occurred or may occur. For a number of years Article 5 (3) of the Brussels I Regulation has been at the centre of the debate regarding the intellectual property rights infringement over the Internet. Nothing has been done to adapt the provisions relating to non-internet cases of infringement of intellectual property rights to the context of the Internet. The author’s findings indicate that in the case of intellectual property rights infringement on the Internet, the plaintiff has the option to sue either: the court of the Member State of the event giving rise to the damage: where the publisher of the newspaper is established; the court of the Member State where the damage occurred: where defamatory article is distributed. However, it must be admitted that whilst infringement over the Internet has some similarity to multi-State defamation by means of newspapers, the position is not entirely analogous due to the cross-border nature of the Internet. A simple example which may appropriately illustrate its contentious nature is a defamatory statement published on a website accessible in different Member States, and available in different languages. Therefore, we need to answer the question: how these traditional jurisdictional rules apply in the case of intellectual property rights infringement over the Internet? Should these traditional jurisdictional rules be modified?
Abstract: Tea has several types of essential elements. Potassium,
magnesium and phosphorus are some examples of these elements.
Tea is widely used drink in Turkey, also some people puts a lemon
wedge to tea for different taste. In this study potassium, magnesium
and phosphorus contents after the hot water brewing of black and
green tea were determined by Optical Emission Spectroscopy (ICPOES).
Furthermore, how the lemon addition to teas affects the
concentrations of the potassium, magnesium and phosphorus
amount are investigated.
From the results, potassium, magnesium and phosphorus
concentrations are found as 3003.3, 597.1, 1167.2 ppm in black tea
and 3718.0, 3830.5, 376.4 ppm in green tea, respectively. After
lemon addition potassium, magnesium and phosphorus
concentrations are changed to 14930, 830.4, 1113.5 ppm in black tea
and 15460.0, 909.5, 1152.5 ppm in green tea, respectively.
It is seen that lemon addition affects some essential elements in
black and green Turkish teas.
Abstract: The purpose of the paper is to develop an informationcontrol environment for overall management and self-reconfiguration of the reconfigurable multifunctional machine tool for machining both rotation and prismatic parts and high concentration of different technological operations - turning, milling, drilling, grinding, etc. For the realization of this purpose on the basis of defined sub-processes for the implementation of the technological process, architecture of the information-search system for machine control is suggested. By using the object-oriented method, a structure and organization of the search system based on agents and manager with central control are developed. Thus conditions for identification of available information in DBs, self-reconfiguration of technological system and entire control of the reconfigurable multifunctional machine tool are created.
Abstract: In the upgrade process of enterprise information
systems, whether new systems will be success and their development
will be efficient, depends on how to deal with and utilize those legacy systems. We propose an evaluation system, which comprehensively
describes the capacity of legacy information systems in five aspects.
Then a practical legacy systems evaluation method is scripted. Base on
the evaluation result, we put forward 4 kinds of migration strategy: eliminated, maintenance, modification, encapsulating. The methods
and strategies play important roles in practice.