Abstract: The transformation of vocal characteristics aims at
modifying voice such that the intelligibility of aphonic voice is
increased or the voice characteristics of a speaker (source speaker) to
be perceived as if another speaker (target speaker) had uttered it. In
this paper, the current state-of-the-art voice characteristics
transformation methodology is reviewed. Special emphasis is placed
on voice transformation methodology and issues for improving the
transformed speech quality in intelligibility and naturalness are
discussed. In particular, it is suggested to use the modulation theory
of speech as a base for research on high quality voice transformation.
This approach allows one to separate linguistic, expressive, organic
and perspective information of speech, based on an analysis of how
they are fused when speech is produced. Therefore, this theory
provides the fundamentals not only for manipulating non-linguistic,
extra-/paralinguistic and intra-linguistic variables for voice
transformation, but also for paving the way for easily transposing the
existing voice transformation methods to emotion-related voice
quality transformation and speaking style transformation. From the
perspectives of human speech production and perception, the popular
voice transformation techniques are described and classified them
based on the underlying principles either from the speech production
or perception mechanisms or from both. In addition, the advantages
and limitations of voice transformation techniques and the
experimental manipulation of vocal cues are discussed through
examples from past and present research. Finally, a conclusion and
road map are pointed out for more natural voice transformation
algorithms in the future.
Abstract: Many experimental results suggest that more precise
spike timing is significant in neural information processing. We
construct a self-organization model using the spatiotemporal patterns,
where Spike-Timing Dependent Plasticity (STDP) tunes the
conduction delays between neurons. We show that the fluctuation of
conduction delays causes globally continuous and locally distributed
firing patterns through the self-organization.
Abstract: Ontology Matching is a task needed in various applica-tions, for example for comparison or merging purposes. In literature,many algorithms solving the matching problem can be found, butmost of them do not consider instances at all. Mappings are deter-mined by calculating the string-similarity of labels, by recognizinglinguistic word relations (synonyms, subsumptions etc.) or by ana-lyzing the (graph) structure. Due to the facts that instances are oftenmodeled within the ontology and that the set of instances describesthe meaning of the concepts better than their meta information,instances should definitely be incorporated into the matching process.In this paper several novel instance-based matching algorithms arepresented which enhance the quality of matching results obtainedwith common concept-based methods. Different kinds of formalismsare use to classify concepts on account of their instances and finallyto compare the concepts directly.KeywordsInstances, Ontology Matching, Semantic Web
Abstract: The knowledge base of welding defect recognition is
essentially incomplete. This characteristic determines that the recognition results do not reflect the actual situation. It also has a further influence on the classification of welding quality. This paper is
concerned with the study of a rough set based method to reduce the influence and improve the classification accuracy. At first, a rough set
model of welding quality intelligent classification has been built. Both condition and decision attributes have been specified. Later on, groups
of the representative multiple compound defects have been chosen
from the defect library and then classified correctly to form the
decision table. Finally, the redundant information of the decision table has been reducted and the optimal decision rules have been reached. By this method, we are able to reclassify the misclassified defects to
the right quality level. Compared with the ordinary ones, this method
has higher accuracy and better robustness.
Abstract: The article is about government programs and projects
and their description which are aimed at improving the socioeconomic
situation in the Republic of Kazakhstan. A brief historical
overview, as well as information about current socio-economic,
political and transitional contexts of the country are provided. Two
theories were described in the article to inform this descriptive study.
According to the United Nation's Development Reports for 2005 and
2011, the country's human development index (HDI) rose by several
points despite the socio-economic and political imbalances taking
place in the republic since it gained its independence in 1991. It is
stated in the article that government support programs are one of the
crucial factors that increase the population welfare which in its turn
may lead to reduction of social crisis processes in the country.
Abstract: In our modern world, more physical transactions are being substituted by electronic transactions (i.e. banking, shopping, and payments), many businesses and companies are performing most of their operations through the internet. Instead of having a physical commerce, internet visitors are now adapting to electronic commerce (e-Commerce). The ability of web users to reach products worldwide can be greatly benefited by creating friendly and personalized online business portals. Internet visitors will return to a particular website when they can find the information they need or want easily. Dealing with this human conceptualization brings the incorporation of Artificial/Computational Intelligence techniques in the creation of customized portals. From these techniques, Fuzzy-Set technologies can make many useful contributions to the development of such a human-centered endeavor as e-Commerce. The main objective of this paper is the implementation of a Paradigm for the Intelligent Design and Operation of Human-Computer interfaces. In particular, the paradigm is quite appropriate for the intelligent design and operation of software modules that display information (such Web Pages, graphic user interfaces GUIs, Multimedia modules) on a computer screen. The human conceptualization of the user personal information is analyzed throughout a Cascaded Fuzzy Inference (decision-making) System to generate the User Ascribe Qualities, which identify the user and that can be used to customize portals with proper Web links.
Abstract: The paper attempts a synthesis of problems relating to
municipal waste management in Nigeria and proposes a conceptual
knowledge management approach for tackling municipal waste
problems in cities across Nigeria. The application of knowledge
management approach and strategy is crucial for inculcating a change
of attitude towards improving the management of waste. The paper is
a review of existing literatures, information, policies and data on
municipal waste management in Nigeria. The inefficient management
of waste by individuals, households, consumers and waste
management companies can be attributed to inadequate information
on waste management benefits, lack of producers- involvement in
waste management as well as poor implementation of government
policies. The paper presents an alternative approach providing
solutions promoting efficient municipal waste management.
Abstract: This study uses GIS (Geographic Information
Systems) to conduct an evaluation of the degree of the sufficiency of
public green spaces such as parks and urban green areas as an
indicator of the density of metropolitan areas, in particular the Chubu
metropolitan area, in Japan. To that end, it first grasps the distribution
situation of green spaces in the three metropolitan areas in Japan,
especially in the Chubu metropolitan area, using GIS digital maps.
And based on this result, it conducts a GIS evaluation of the degree of
sufficiency of public green spaces and arranges the result for every
distance belt from the central part to compare and exam for every
distance belt away from the center in the Chubu metropolitan area.
Furthermore, after pointing out the insufficient areas of public green
spaces based on the result, it also proposes the improvement policy
which can be introduced in the Chubu metropolitan area.
Abstract: Over the past decade, mobile has experienced a
revolution that will ultimately change the way we communicate.All
these technologies have a common denominator exploitation of
computer information systems, but their operation can be tedious
because of problems with heterogeneous data sources.To overcome
the problems of heterogeneous data sources, we propose to use a
technique of adding an extra layer interfacing applications of
management or supervision at the different data sources.This layer
will be materialized by the implementation of a mediator between
different host applications and information systems frequently used
hierarchical and relational manner such that the heterogeneity is
completely transparent to the VoIP platform.
Abstract: The increase in energy demand has raised concerns
over adverse impacts on the environment from energy generation. It
is important to understand the status of energy consumption for
institutions such as Curtin Sarawak to ensure the sustainability of
energy usage, and also to reduce its costs. In this study, a preliminary
audit framework was developed and was conducted around the
Malaysian campus to obtain information such as the number and
specifications of electrical appliances, built-up area and ambient
temperature to understand the relationship of these factors with
energy consumption. It was found that the number and types of
electrical appliances, population and activities in the campus
impacted the energy consumption of Curtin Sarawak directly.
However, the built-up area and ambient temperature showed no clear
correlation with energy consumption. An investigation of the diurnal
and seasonal energy consumption of the campus was also carried out.
From the data, recommendations were made to improve the energy
efficiency of the campus.
Abstract: Serious games have proven to be a useful instrument
to engage learners and increase motivation. Nevertheless, a broadly
accepted, practical instructional design approach to serious games
does not exist. In this paper, we introduce the use of an instructional
design model that has not been applied to serious games yet, and has
some advantages compared to other design approaches. We present
the case of mechanics mechatronics education to illustrate the close
match with timing and role of knowledge and information that the
instructional design model prescribes and how this has been
translated to a rigidly structured game design. The structured
approach answers the learning needs of applicable knowledge within
the target group. It combines advantages of simulations with
strengths of entertainment games to foster learner-s motivation in the
best possible way. A prototype of the game will be evaluated along a
well-respected evaluation method within an advanced test setting
including test and control group.
Abstract: This paper presents the results of an analytical study
on the seismic response of a Multi-Span-Simply-Supported precast
bridge in Washington State. The bridge was built in the early 1960's
along Interstate 5 and was widened the first time in 1979 and the
second time in 2001. The primary objective of this research project
is to determine the seismic vulnerability of the bridge in order to
develop the required retrofit measure. The seismic vulnerability of
the bridge is evaluated using two seismic evaluation methods
presented in the FHWA Seismic Retrofitting Manual for Highway
Bridges, Method C and Method D2. The results of the seismic
analyses demonstrate that Method C and Method D2 vary markedly
in terms of the information they provide to the bridge designer
regarding the vulnerability of the bridge columns.
Abstract: Business rules and data warehouse are concepts and
technologies that impact a wide variety of organizational tasks. In
general, each area has evolved independently, impacting application
development and decision-making. Generating knowledge from data
warehouse is a complex process. This paper outlines an approach to
ease import of information and knowledge from a data warehouse
star schema through an inference class of business rules. The paper
utilizes the Oracle database for illustrating the working of the
concepts. The star schema structure and the business rules are stored
within a relational database. The approach is explained through a
prototype in Oracle-s PL/SQL Server Pages.
Abstract: Random Oracle Model (ROM) is an effective method
for measuring the practical security of cryptograph. In this paper, we
try to use it into information hiding system (IHS). Because IHS has its
own properties, the ROM must be modified if it is used into IHS.
Firstly, we fully discuss why and how to modify each part of ROM
respectively. The main changes include: 1) Divide the attacks that IHS
may be suffered into two phases and divide the attacks of each phase
into several kinds. 2) Distinguish Oracles and Black-boxes clearly. 3)
Define Oracle and four Black-boxes that IHS used. 4) Propose the
formalized adversary model. And 5) Give the definition of judge.
Secondly, based on ROM of IHS, the security against known original
cover attack (KOCA-KOCA-security) is defined. Then, we give an
actual information hiding scheme and prove that it is
KOCA-KOCA-secure. Finally, we conclude the paper and propose the
open problems of further research.
Abstract: Real-time 3D applications have to guarantee
interactive rendering speed. There is a restriction for the number of
polygons which is rendered due to performance of a graphics hardware
or graphics algorithms. Generally, the rendering performance will be
drastically increased when handling only the dynamic 3d models,
which is much fewer than the static ones. Since shapes and colors of
the static objects don-t change when the viewing direction is fixed, the
information can be reused. We render huge amounts of polygon those
cannot handled by conventional rendering techniques in real-time by
using a static object image and merging it with rendering result of the
dynamic objects. The performance must be decreased as a
consequence of updating the static object image including removing
an static object that starts to move, re-rending the other static objects
being overlapped by the moving ones. Based on visibility of the object
beginning to move, we can skip the updating process. As a result, we
enhance rendering performance and reduce differences of rendering
speed between each frame. Proposed method renders total
200,000,000 polygons that consist of 500,000 dynamic polygons and
the rest are static polygons in about 100 frames per second.
Abstract: In the current research, we present an operation framework and protection mechanism to facilitate secure environment to protect mobile agents against tampering. The system depends on the presence of an authentication authority. The advantage of the proposed system is that security measures is an integral part of the design, thus common security retrofitting problems do not arise. This is due to the presence of AlGamal encryption mechanism to protect its confidential content and any collected data by the agent from the visited host . So that eavesdropping on information from the agent is no longer possible to reveal any confidential information. Also the inherent security constraints within the framework allow the system to operate as an intrusion detection system for any mobile agent environment. The mechanism is tested for most of the well known severe attacks against agents and networked systems. The scheme proved a promising performance that makes it very much recommended for the types of transactions that needs highly secure environments, e. g., business to business.
Abstract: This paper is concerned with motion recognition based fuzzy WP(Wavelet Packet) feature extraction approach from Vicon physical data sets. For this purpose, we use an efficient fuzzy mutual-information-based WP transform for feature extraction. This method estimates the required mutual information using a novel approach based on fuzzy membership function. The physical action data set includes 10 normal and 10 aggressive physical actions that measure the human activity. The data have been collected from 10 subjects using the Vicon 3D tracker. The experiments consist of running, seating, and walking as physical activity motion among various activities. The experimental results revealed that the presented feature extraction approach showed good recognition performance.
Abstract: In the project FleGSens, a wireless sensor network
(WSN) for the surveillance of critical areas and properties is currently developed which incorporates mechanisms to ensure information
security. The intended prototype consists of 200 sensor nodes for
monitoring a 500m long land strip. The system is focused on ensuring
integrity and authenticity of generated alarms and availability in the
presence of an attacker who may even compromise a limited number
of sensor nodes. In this paper, two of the main protocols developed
in the project are presented, a tracking protocol to provide secure
detection of trespasses within the monitored area and a protocol for secure detection of node failures. Simulation results of networks
containing 200 and 2000 nodes as well as the results of the first prototype comprising a network of 16 nodes are presented. The focus of the simulations and prototype are functional testing of the protocols
and particularly demonstrating the impact and cost of several attacks.
Abstract: Within the framework of a method of the information
theory it is offered statistics and probabilistic model for definition of
cause-and-effect relations in the coupled multicomponent
subsystems. The quantitative parameter which is defined through
conditional and unconditional entropy functions is introduced. The
method is applied to the analysis of the experimental data on
dynamics of change of the chemical elements composition of plants
organs (roots, reproductive organs, leafs and stems). Experiment is
directed on studying of temporal processes of primary soil formation
and their connection with redistribution dynamics of chemical
elements in plant organs. This statistics and probabilistic model
allows also quantitatively and unambiguously to specify the
directions of the information streams on plant organs.
Abstract: We present analysis of spatial patterns of generic
disease spread simulated by a stochastic long-range correlation SIR
model, where individuals can be infected at long distance in a power
law distribution. We integrated various tools, namely perimeter,
circularity, fractal dimension, and aggregation index to characterize
and investigate spatial pattern formations. Our primary goal was to
understand for a given model of interest which tool has an advantage
over the other and to what extent. We found that perimeter and
circularity give information only for a case of strong correlation–
while the fractal dimension and aggregation index exhibit the growth
rule of pattern formation, depending on the degree of the correlation
exponent (β). The aggregation index method used as an alternative
method to describe the degree of pathogenic ratio (α). This study may
provide a useful approach to characterize and analyze the pattern
formation of epidemic spreading