Abstract: An unsupervised classification algorithm is derived
by modeling observed data as a mixture of several mutually
exclusive classes that are each described by linear combinations of
independent non-Gaussian densities. The algorithm estimates the
data density in each class by using parametric nonlinear functions
that fit to the non-Gaussian structure of the data. This improves
classification accuracy compared with standard Gaussian mixture
models. When applied to textures, the algorithm can learn basis
functions for images that capture the statistically significant structure
intrinsic in the images. We apply this technique to the problem of
unsupervised texture classification and segmentation.
Abstract: This article investigates a contribution of synthesized visual speech. Synthesis of visual speech expressed by a computer consists in an animation in particular movements of lips. Visual speech is also necessary part of the non-manual component of a sign language. Appropriate methodology is proposed to determine the quality and the accuracy of synthesized visual speech. Proposed methodology is inspected on Czech speech. Hence, this article presents a procedure of recording of speech data in order to set a synthesis system as well as to evaluate synthesized speech. Furthermore, one option of the evaluation process is elaborated in the form of a perceptual test. This test procedure is verified on the measured data with two settings of the synthesis system. The results of the perceptual test are presented as a statistically significant increase of intelligibility evoked by real and synthesized visual speech. Now, the aim is to show one part of evaluation process which leads to more comprehensive evaluation of the sign speech synthesis system.
Abstract: Accounts of language acquisition differ significantly in their treatment of the role of prediction in language learning. In particular, nativist accounts posit that probabilistic learning about words and word sequences has little to do with how children come to use language. The accuracy of this claim was examined by testing whether distributional probabilities and frequency contributed to how well 3-4 year olds repeat simple word chunks. Corresponding chunks were the same length, expressed similar content, and were all grammatically acceptable, yet the results of the study showed marked differences in performance when overall distributional frequency varied. It was found that a distributional model of language predicted the empirical findings better than a number of other models, replicating earlier findings and showing that children attend to distributional probabilities in an adult corpus. This suggested that language is more prediction-and-error based, rather than on abstract rules which nativist camps suggest.
Abstract: Among all geo-hydrological relationships, rainfallrunoff
relationship is of utmost importance in any hydrological
investigation and water resource planning. Spatial variation, lag time
involved in obtaining areal estimates for the basin as a whole can
affect the parameterization in design stage as well as in planning
stage. In conventional hydrological processing of data, spatial aspect
is either ignored or interpolated at sub-basin level. Temporal
variation when analysed for different stages can provide clues for its
spatial effectiveness. The interplay of space-time variation at pixel
level can provide better understanding of basin parameters.
Sustenance of design structures for different return periods and their
spatial auto-correlations should be studied at different geographical
scales for better management and planning of water resources.
In order to understand the relative effect of spatio-temporal
variation in hydrological data network, a detailed geo-hydrological
analysis of Betwa river catchment falling in Lower Yamuna Basin is
presented in this paper. Moreover, the exact estimates about the
availability of water in the Betwa river catchment, especially in the
wake of recent Betwa-Ken linkage project, need thorough scientific
investigation for better planning. Therefore, an attempt in this
direction is made here to analyse the existing hydrological and
meteorological data with the help of SPSS, GIS and MS-EXCEL
software. A comparison of spatial and temporal correlations at subcatchment
level in case of upper Betwa reaches has been made to
demonstrate the representativeness of rain gauges. First, flows at
different locations are used to derive correlation and regression
coefficients. Then, long-term normal water yield estimates based on
pixel-wise regression coefficients of rainfall-runoff relationship have
been mapped. The areal values obtained from these maps can
definitely improve upon estimates based on point-based
extrapolations or areal interpolations.
Abstract: Nano MgO has been synthesized by hydration and
dehydration method by modifies the commercial MgO. The prepared
MgO had been investigated as a heterogeneous base catalyst for
transesterification process for biodiesel production using palm oil.
TGA, FT-IR and XRD results obtained from this study lie each other
and proved in the formation of nano MgO from decomposition of
Mg(OH)2. This study proved that the prepared nano MgO was a
better base transesterification catalyst compared to commercial MgO.
The nano MgO calcined at 600ºC had gives the highest conversion of
51.3% of palm oil to biodiesel.
Abstract: In the present Jordan hotels scenario, service quality is
a vital competitive policy to keep customer support and build great
base. Hotels are trying to win customer loyalty by providing enhanced
quality services. This paper attempts to examine the impact of tourism
service quality dimension in the Jordanian five star hotels. A total of
322 surveys were administrated to tourists who were staying at three
branches Marriott hotel in Jordan. The results show that dimensions of
service quality such as empathy, reliability, responsiveness and
tangibility significantly predict customer loyalty. Specifically, among
the dimension of tourism service quality, the most significant predictor
of customer loyalty is tangibility. This paper implies that five star
hotels in Jordan should also come forward and try their best to present
better tourism service quality to win back their customers- loyalty.
Abstract: In this study is presented a general methodology to
predict the performance of a continuous near-critical fluid extraction
process to remove compounds from aqueous solutions using hollow
fiber membrane contactors. A comprehensive 2D mathematical
model was developed to study Porocritical extraction process. The
system studied in this work is a membrane based extractor of ethanol
and acetone from aqueous solutions using near-critical CO2.
Predictions of extraction percentages obtained by simulations have
been compared to the experimental values reported by Bothun et al.
[5]. Simulations of extraction percentage of ethanol and acetone
show an average difference of 9.3% and 6.5% with the experimental
data, respectively. More accurate predictions of the extraction of
acetone could be explained by a better estimation of the transport
properties in the aqueous phase that controls the extraction of this
solute.
Abstract: Nowadays, the demand for high product quality
focuses extensive attention to the quality of machined surface. The
(CNC) milling machine facilities provides a wide variety of
parameters set-up, making the machining process on the glass
excellent in manufacturing complicated special products compared to
other machining processes. However, the application of grinding
process on the CNC milling machine could be an ideal solution to
improve the product quality, but adopting the right machining
parameters is required. In glass milling operation, several machining
parameters are considered to be significant in affecting surface
roughness. These parameters include the lubrication pressure, spindle
speed, feed rate and depth of cut. In this research work, a fuzzy logic
model is offered to predict the surface roughness of a machined
surface in glass milling operation using CBN grinding tool. Four
membership functions are allocated to be connected with each input
of the model. The predicted results achieved via fuzzy logic model
are compared to the experimental result. The result demonstrated
settlement between the fuzzy model and experimental results with the
93.103% accuracy.
Abstract: From past many decades human beings are suffering
from plethora of natural disasters. Occurrence of disasters is a
frequent process; it changes conceptual myths as more and more
advancement are made. Although we are living in technological era
but in developing countries like Pakistan disasters are shaped by
socially constructed roles. The need is to understand the most
vulnerable group of society i.e. females; their issues are complex in
nature because of undermined gender status in the society. There is a
need to identify maximum issues regarding females and to enhance
the achievement of millennium development goals (MDGs). Gender
issues are of great concern all around the globe including Pakistan.
Here female visibility in society is low, and also during disasters, the
failure to understand the reality that concentrates on double burden
including productive and reproductive care. Women have to
contribute a lot in society so we need to make them more disaster
resilient. For this non-structural measures like awareness, trainings
and education must be carried out. In rural and in urban settings in
any disaster like earthquake or flood, elements like gender
perspective, their age, physical health, demographic issues contribute
towards vulnerability. In Pakistan the gender issues in disasters were
of less concern before 2005 earthquake and 2010 floods. Significant
achievements are made after 2010 floods when gender and child cell
was created to provide all facilities to women and girls. The aim of
the study is to highlight all necessary facilities in a disaster to build
coping mechanism in females from basic rights till advance level
including education.
Abstract: Several methods have been proposed for color image
compression but the reconstructed image had very low signal to noise
ratio which made it inefficient. This paper describes a lossy
compression technique for color images which overcomes the
drawbacks. The technique works on spatial domain where the pixel
values of RGB planes of the input color image is mapped onto two
dimensional planes. The proposed technique produced better results
than JPEG2000, 2DPCA and a comparative study is reported based
on the image quality measures such as PSNR and MSE.Experiments
on real time images are shown that compare this methodology with
previous ones and demonstrate its advantages.
Abstract: A water surface slope limiting scheme is tested and
compared with the water depth slope limiter for the solution of one
dimensional shallow water equations with bottom slope source term.
Numerical schemes based on the total variation diminishing Runge-
Kutta discontinuous Galerkin finite element method with slope
limiter schemes based on water surface slope and water depth are
used to solve one-dimensional shallow water equations. For each
slope limiter, three different Riemann solvers based on HLL, LF, and
Roe flux functions are used. The proposed water surface based slope
limiter scheme is easy to implement and shows better conservation
property compared to the slope limiter based on water depth. Of the
three flux functions, the Roe approximation provides the best results
while the LF function proves to be least suitable when used with
either slope limiter scheme.
Abstract: Since DVB-RCS has been successively implemented, the mobile communication on the multi-beam satellite communication is attractive attention. And the DVB-RCS standard sets up to support mobility of a RCST. In the case of the spot-beam satellite system, the received signal strength does not differ largely between the center and the boundary of the beam. Thus, the RSS based handoff detection algorithm is not benefit to the satellite system as a terrestrial system. Therefore we propose an Adaptive handoff detection algorithm based on RCST mobility information. Our handoff detection algorithm not only can be used as centralized handoff detection algorithm but also removes uncertainties of handoff due to the variation of RSS. Performances were compared with RSS based handoff algorithm. Simulation results show that the proposed handoff detection algorithm not only achieved better handoff and link degradation rate, but also achieved better forward link spectral efficiency.
Abstract: Design should be viewed concurrently by three ways
as transformation, flow and value generation. An innovative approach
to solve design – related problems is described as the integrated
product - process design. As a foundation for a formal framework
consisting of organizing principles and techniques, Work Structuring
has been developed to guide efforts in the integration that enhances
the development of operation and process design in alignment with
product design.
Vietnam construction projects are facing many delays, and cost
overruns caused mostly by design related problems. A better design
management that integrates product and process design could resolve
these problems. A questionnaire survey and in – depth interviews
were used to investigate the feasibility of applying Work Structuring
to construction projects in Vietnam.
The purpose of this paper is to present the research results and to
illustrate the possible problems and potential solutions when Work
Structuring is implemented to construction projects in Vietnam.
Abstract: Integrative teaching methodology is based on
connecting and summarizing knowledge from different subjects in
order to create better understanding of different disciplines and
improvement of competences in general. Integrative teaching
methodology was implemented and realised during one academic
year in 17 Latvian schools according with specially worked out
programme by specialists of different fields for adaptation in social
environment of children and young people with learning, cognitive
functions and motor disorders. Implemented integrative teaching
methodology consisted from three subsections which were
specialised for adaptation in social environment, improvement of
cognitive functions and improvement and harmonization of
personality. The results of investigation showed that the use of
integrative teaching methodology is an effective way for
improvement of learning motivation and negotiation of learning
disorders of different age schoolchildren.
Abstract: This article presents the results of researchrelated to the assessment protocol weightedcumulative expected transmission time (WCETT)applied to cognitive radio networks.The development work was based on researchdone by different authors, we simulated a network,which communicates wirelessly, using a licensedchannel, through which other nodes are notlicensed, try to transmit during a given time nodeuntil the station's owner begins its transmission.
Abstract: This is the second part of the paper. It, aside from the
core subroutine test reported previously, focuses on the simulation of
turbulence governed by the full STF Navier-Stokes equations on a
large scale. Law of the wall is found plausible in this study as a model
of the boundary layer dynamics. Model validations proceed to
include velocity profiles of a stationary turbulent Couette flow, pure
sloshing flow simulations, and the identification of water-surface
inclination due to fluid accelerations. Errors resulting from the
irrotational and hydrostatic assumptions are explored when studying
a wind-driven water circulation with no shakings. Illustrative
examples show that this numerical strategy works for the simulation
of sloshing-shear mixed flow in a 3-D rigid rectangular base tank.
Abstract: Multiple sequence alignment is a fundamental part in
many bioinformatics applications such as phylogenetic analysis.
Many alignment methods have been proposed. Each method gives a
different result for the same data set, and consequently generates a
different phylogenetic tree. Hence, the chosen alignment method
affects the resulting tree. However in the literature, there is no
evaluation of multiple alignment methods based on the comparison of
their phylogenetic trees. This work evaluates the following eight
aligners: ClustalX, T-Coffee, SAGA, MUSCLE, MAFFT, DIALIGN,
ProbCons and Align-m, based on their phylogenetic trees (test trees)
produced on a given data set. The Neighbor-Joining method is used
to estimate trees. Three criteria, namely, the dNNI, the dRF and the
Id_Tree are established to test the ability of different alignment
methods to produce closer test tree compared to the reference one
(true tree). Results show that the method which produces the most
accurate alignment gives the nearest test tree to the reference tree.
MUSCLE outperforms all aligners with respect to the three criteria
and for all datasets, performing particularly better when sequence
identities are within 10-20%. It is followed by T-Coffee at lower
sequence identity (30%), trees scores of all methods
become similar.
Abstract: Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.
Abstract: Magnesium alloys have gained increased attention in recent years in automotive, electronics, and medical industry. This because of magnesium alloys have better properties than aluminum alloys and steels in respects of their low density and high strength to weight ratio. However, the main problems of magnesium alloy welding are the crack formation and the appearance of porosity during the solidification. This paper proposes a unique technique to weld two thin sheets of AZ31B magnesium alloy using a paste containing Ag nanoparticles. The paste containing Ag nanoparticles of 5 nm in average diameter and an organic solvent was used to coat the surface of AZ31B thin sheet. The coated sheet was heated at 100 °C for 60 s to evaporate the solvent. The dried sheet was set as a lower AZ31B sheet on the jig, and then lap fillet welding was carried out by using a pulsed Nd:YAG laser in a closed box filled with argon gas. The characteristics of the microstructure and the corrosion behavior of the joints were analyzed by opticalmicroscopy (OM), energy dispersive spectrometry (EDS), electron probe micro-analyzer (EPMA), scanning electron microscopy (SEM), and immersion corrosion test. The experimental results show that the wrought AZ31B magnesium alloy can be joined successfully using Ag nanoparticles. Ag nanoparticles insert promote grain refinement, narrower the HAZ width and wider bond width compared to weld without and insert. Corrosion rate of welded AZ31B with Ag nanoparticles reduced up to 44 % compared to base metal. The improvement of corrosion resistance of welded AZ31B with Ag nanoparticles due to finer grains and large grain boundaries area which consist of high Al content. β-phase Mg17Al12 could serve as effective barrier and suppressed further propagation of corrosion. Furthermore, Ag distribution in fusion zone provide much more finer grains and may stabilize the magnesium solid solution making it less soluble or less anodic in aqueous
Abstract: As the disfunctions of the information society and
social development progress, intrusion problems such as malicious
replies, spam mail, private information leakage, phishing, and
pharming, and side effects such as the spread of unwholesome
information and privacy invasion are becoming serious social
problems. Illegal access to information is also becoming a problem as
the exchange and sharing of information increases on the basis of the
extension of the communication network. On the other hand, as the
communication network has been constructed as an international,
global system, the legal response against invasion and cyber-attack
from abroad is facing its limit. In addition, in an environment where
the important infrastructures are managed and controlled on the basis
of the information communication network, such problems pose a
threat to national security. Countermeasures to such threats are
developed and implemented on a yearly basis to protect the major
infrastructures of information communication. As a part of such
measures, we have developed a methodology for assessing the
information protection level which can be used to establish the
quantitative object setting method required for the improvement of the
information protection level.