Abstract: Set covering problem is a classical problem in
computer science and complexity theory. It has many applications,
such as airline crew scheduling problem, facilities location problem,
vehicle routing, assignment problem, etc. In this paper, three
different techniques are applied to solve set covering problem.
Firstly, a mathematical model of set covering problem is introduced
and solved by using optimization solver, LINGO. Secondly, the
Genetic Algorithm Toolbox available in MATLAB is used to solve
set covering problem. And lastly, an ant colony optimization method
is programmed in MATLAB programming language. Results
obtained from these methods are presented in tables. In order to
assess the performance of the techniques used in this project, the
benchmark problems available in open literature are used.
Abstract: This research documents a qualitative study of
selected Native Americans who have successfully graduated from
mainstream higher education institutions. The research framework
explored the Bicultural Identity Formation Model as a means of
understanding the expressions of the students' adaptations to
mainstream education. This approach lead to an awareness of how
the participants in the study used specific cultural and social
strategies to enhance their educational success and also to an
awareness of how they coped with cultural dissonance to achieve a
new academic identity. Research implications impact a larger
audience of bicultural, foreign, or international students experiencing
cultural dissonance.
Abstract: There exists an injective, information-preserving function
that maps a semantic network (i.e a directed labeled network)
to a directed network (i.e. a directed unlabeled network). The edge
label in the semantic network is represented as a topological feature
of the directed network. Also, there exists an injective function that
maps a directed network to an undirected network (i.e. an undirected
unlabeled network). The edge directionality in the directed network
is represented as a topological feature of the undirected network.
Through function composition, there exists an injective function that
maps a semantic network to an undirected network. Thus, aside from
space constraints, the semantic network construct does not have any
modeling functionality that is not possible with either a directed
or undirected network representation. Two proofs of this idea will
be presented. The first is a proof of the aforementioned function
composition concept. The second is a simpler proof involving an
undirected binary encoding of a semantic network.
Abstract: This paper proposes, for the first time, how the
challenges facing the guard-band designs including the margin
assist-circuits scheme for the screening-test in the coming process
generations should be addressed. The increased screening error
impacts are discussed based on the proposed statistical analysis
models. It has been shown that the yield-loss caused by the
misjudgment on the screening test would become 5-orders of
magnitude larger than that for the conventional one when the
amplitude of random telegraph noise (RTN) caused variations
approaches to that of random dopant fluctuation. Three fitting methods
to approximate the RTN caused complex Gamma mixtures
distributions by the simple Gaussian mixtures model (GMM) are
proposed and compared. It has been verified that the proposed
methods can reduce the error of the fail-bit predictions by 4-orders of
magnitude.
Abstract: Rutting is one of the major load-related distresses in airport flexible pavements. Rutting in paving materials develop gradually with an increasing number of load applications, usually appearing as longitudinal depressions in the wheel paths and it may be accompanied by small upheavals to the sides. Significant research has been conducted to determine the factors which affect rutting and how they can be controlled. Using the experimental design concepts, a series of tests can be conducted while varying levels of different parameters, which could be the cause for rutting in airport flexible pavements. If proper experimental design is done, the results obtained from these tests can give a better insight into the causes of rutting and the presence of interactions and synergisms among the system variables which have influence on rutting. Although traditionally, laboratory experiments are conducted in a controlled fashion to understand the statistical interaction of variables in such situations, this study is an attempt to identify the critical system variables influencing airport flexible pavement rut depth from a statistical DoE perspective using real field data from a full-scale test facility. The test results do strongly indicate that the response (rut depth) has too much noise in it and it would not allow determination of a good model. From a statistical DoE perspective, two major changes proposed for this experiment are: (1) actual replication of the tests is definitely required, (2) nuisance variables need to be identified and blocked properly. Further investigation is necessary to determine possible sources of noise in the experiment.
Abstract: The experiments were performed in a batch set up
under different concentrations of Cu (II) (0.2 g.l-1 to 0.9 g.l-1), pH (4-
6), temperatures (20oC – 40oC) with varying teak leaves powder (as
biosorbent) dosage of 0.3 g.l-1 to 0.5 g.l-1. The kinetics of interactions
were tested with pseudo first order Lagergran equation and the value
for k1 was found to be 6.909 x 10-3 min-1. The biosorption data gave
a good fit with Langmuir and Fruendlich isotherms and the Langmuir
monolayer capacity (qm) was found to be 166.78 mg. g-1. Similarly
the Freundlich adsorption capacity (Kf) was estimated as 2.49 l g-1.
The mean values of the thermodynamic parameters ΔH, ΔS, and ΔG
were -62.42 KJ. mol-1, -0.219 KJ.mol-1 K-1 and -1.747 KJ.mol-1 at
293 K from a solution containing 0.4 g l-1 of Cu(II) showing the
biosorption to be thermodynamically favourable. These results show
good potentiality of using teak leaves as a biosorbent for the removal
of Cu(II) from aqueous solutions.
Abstract: This research uses computational linguistics, an area of study that employs a computer to process natural language, and aims at discerning the patterns that exist in declarative sentences used in technical texts. The approach is mathematical, and the focus is on instructional texts found on web pages. The technique developed by the author and named the MAYA Semantic Technique is used here and organized into four stages. In the first stage, the parts of speech in each sentence are identified. In the second stage, the subject of the sentence is determined. In the third stage, MAYA performs a frequency analysis on the remaining words to determine the verb and its object. In the fourth stage, MAYA does statistical analysis to determine the content of the web page. The advantage of the MAYA Semantic Technique lies in its use of mathematical principles to represent grammatical operations which assist processing and accuracy if performed on unambiguous text. The MAYA Semantic Technique is part of a proposed architecture for an entire web-based intelligent tutoring system. On a sample set of sentences, partial semantics derived using the MAYA Semantic Technique were approximately 80% accurate. The system currently processes technical text in one domain, namely Cµ programming. In this domain all the keywords and programming concepts are known and understood.
Abstract: Like other external sorting algorithms, the presented
algorithm is a two step algorithm including internal and external
steps. The first part of the algorithm is like the other similar
algorithms but second part of that is including a new easy
implementing method which has reduced the vast number of inputoutput
operations saliently. As decreasing processor operating time
does not have any effect on main algorithm speed, any improvement
in it should be done through decreasing the number of input-output
operations. This paper propose an easy algorithm for choose the
correct record location of the final list. This decreases the time
complexity and makes the algorithm faster.
Abstract: We have modeled the effect of a graded band gap
window on the performance of a single junction AlxGa1-xAs/GaAs
solar cell. First, we study the electrical characteristics of a single
junction AlxGa1-xAs/GaAs solar cell, by employing an optimized
structure for this solar cell, we show that grading the band gap of the
window can increase the conversion efficiency of the solar cell by
about 1.5%, and can also improve the quantum efficiency of the solar
cell especially at shorter wavelengths.
Abstract: Ambient hydrolysis products in moist air and
hydrolysis kinetics in argon with humidity of RH1.5% for
polycrystalline LiH powders and sintered bulks were investigated by
X-ray diffraction, Raman spectroscopy and gravimetry. The results
showed that the hydrolysis products made up a layered structure of
LiOH•H2O/LiOH/Li2O from surface of the sample to inside. In low
humid argon atmosphere, the primary hydrolysis product was Li2O
rather than LiOH. The hydrolysis kinetic curves of LiH bulks present a
paralinear shape, which could be explained by the “Layer Diffusion
Control" model. While a three-stage hydrolysis kinetic profile was
observed for LiH powders under the same experimental conditions.
The first two sections were similar to that of the bulk samples, and the
third section also presents a linear reaction kinetics but with a smaller
reaction rate compared to the second section because of a larger
exothermic effect for the hydrolysis reaction of LiH powder.
Abstract: Wireless capsule endoscopy provides real-time images in the digestive tract. Capsule images are usually low resolution and are diverse images due to travel through various regions of human body. Color information has been a primary reference in predicting abnormalities such as bleeding. Often color is not sufficient for this purpose. In this study, we took morphological shapes into account as additional, but important criterion. First, we processed gastric images in order to indentify various objects in the image. Then, we analyzed color information in the object. In this way, we could remove unnecessary information and increase the accuracy. Compared to our previous investigations, we could handle images of various degrees of brightness and improve our diagnostic algorithm.
Abstract: Visual secret sharing (VSS) was proposed by Naor and Shamir in 1995. Visual secret sharing schemes encode a secret image into two or more share images, and single share image can’t obtain any information about the secret image. When superimposes the shares, it can restore the secret by human vision. Due to the traditional VSS have some problems like pixel expansion and the cost of sophisticated. And this method only can encode one secret image. The schemes of encrypting more secret images by random grids into two shares were proposed by Chen et al. in 2008. But when those restored secret images have much distortion, those schemes are almost limited in decoding. In the other words, if there is too much distortion, we can’t encrypt too much information. So, if we can adjust distortion to very small, we can encrypt more secret images. In this paper, four new algorithms which based on Chang et al.’s scheme be held in 2010 are proposed. First algorithm can adjust distortion to very small. Second algorithm distributes the distortion into two restored secret images. Third algorithm achieves no distortion for special secret images. Fourth algorithm encrypts three secret images, which not only retain the advantage of VSS but also improve on the problems of decoding.
Abstract: The paper deals with the analysis of the dynamic
response of footbridges under human - induced dynamic loads.
This is a frequently occurring and often dominant load for
footbridges as it stems from the very purpose of a footbridge - to
convey pedestrian. Due to the emergence of new materials and
advanced engineering technology, slender footbridges are
increasingly becoming popular to satisfy the modern transportation
needs and the aesthetical requirements of the society. These
structures however are always lively with low stiffness, low mass,
low damping and low natural frequencies. As a consequence, they are
prone to vibration induced by human activities and can suffer severe
vibration serviceability problems, particularly in the lateral direction.
Pedestrian bridges are designed according to first and second limit
states, these are the criteria involved in response to static design load.
However, it is necessary to assess the dynamic response of bridge
design load on pedestrians and assess it impact on the comfort of the
user movement. Usually the load is considered a person or a small
group which can be assumed in perfect motion synchronization.
Already one person or small group can excite significant vibration of
the deck. In order to calculate the dynamic response to the movement
of people, designer needs available and suitable computational model
and criteria. For the calculation program ANSYS based on finite
element method was used.
Abstract: This article discusses the prospects of participation of
the Republic of Kazakhstan in Hague Conference on Private
International Law on the unification of collision law in the
international trade.
The article analyzes some conventions on international trade. The
appropriate conclusions based on the opinions of scientists and
experts in this field have been made. First, all issues presented in the
form of gaps or spaces in conventions should be the subject to direct
negotiations in the course of the activities of Hague Conference, and
have a comprehensive feature, be transparent and taken under
simplified procedure.
Secondly, one should not underestimate the value of conventions
that do not become active due to various reasons and having a
positive impact on the development and improvement of national
legislation and practice in the field of private international law.
Thirdly, Kazakhstan has to reconsider its attitude to Hague
Conference, having become its full member and aiming at providing
constructive and fruitful cooperation with both the organization itself
and its member states.
Abstract: As the Social network game(SNG) is rising
dramatically worldwide, an interesting aspect has appeared in the
demographic analysis. That is the ratio of the game users by gender.
Although the ratio of male and female users in online game was
60:40% previously, the ratio of male and female users in SNG stood at
47:53% which shows that the ratio of female users is higher than that
of male users. Here, it should be noted that 35% in those 53% female
users are the first-time users of game. This fact suggests that women
who were not interested in game previously has taken an interest in
SNG. Notwithstanding this issue, there have been little studies on the
female users of SNG although there are many studies that analyzed the
tendency of female users- online game play. This study conducted the
analyzed how the game-playing tendency of SNG gamers was
manifested in the game by gender. For that, this study will identify the
tendency of SNG users by gender based on the preceding studies that
analyzed the online game users by gender. The subject of this study
was confined to the farm and urban construction simulation games
which were offered based on the mobile application platform.
Regarding the methodology of study, the first focus group
interview(FGI) was conducted with the male and female users who
had played games on Social network service(SNS) until recently. Later,
the second one-on-one in-depth interview was conducted to gain an
insight into the psychological state of the subjects.
Abstract: In this paper, a novel scheme is proposed for Ownership Identification and Color Image Authentication by deploying Cryptography & Digital Watermarking. The color image is first transformed from RGB to YST color space exclusively designed for watermarking. Followed by color space transformation, each channel is divided into 4×4 non-overlapping blocks with selection of central 2×2 sub-blocks. Depending upon the channel selected two to three LSBs of each central 2×2 sub-block are set to zero to hold the ownership, authentication and recovery information. The size & position of sub-block is important for correct localization, enhanced security & fast computation. As YS ÔèÑ T so it is suitable to embed the recovery information apart from the ownership and authentication information, therefore 4×4 block of T channel along with ownership information is then deployed by SHA160 to compute the content based hash that is unique and invulnerable to birthday attack or hash collision instead of using MD5 that may raise the condition i.e. H(m)=H(m'). For recovery, intensity mean of 4x4 block of each channel is computed and encoded upto eight bits. For watermark embedding, key based mapping of blocks is performed using 2DTorus Automorphism. Our scheme is oblivious, generates highly imperceptible images with correct localization of tampering within reasonable time and has the ability to recover the original work with probability of near one.
Abstract: The main objective of this work is to provide a fault detection and isolation based on Markov parameters for residual generation and a neural network for fault classification. The diagnostic approach is accomplished in two steps: In step 1, the system is identified using a series of input / output variables through an identification algorithm. In step 2, the fault is diagnosed comparing the Markov parameters of faulty and non faulty systems. The Artificial Neural Network is trained using predetermined faulty conditions serves to classify the unknown fault. In step 1, the identification is done by first formulating a Hankel matrix out of Input/ output variables and then decomposing the matrix via singular value decomposition technique. For identifying the system online sliding window approach is adopted wherein an open slit slides over a subset of 'n' input/output variables. The faults are introduced at arbitrary instances and the identification is carried out in online. Fault residues are extracted making a comparison of the first five Markov parameters of faulty and non faulty systems. The proposed diagnostic approach is illustrated on benchmark problems with encouraging results.
Abstract: Deciding the numerous parameters involved in
designing a competent artificial neural network is a complicated task.
The existence of several options for selecting an appropriate
architecture for neural network adds to this complexity, especially
when different applications of heterogeneous natures are concerned.
Two completely different applications in engineering and medical
science were selected in the present study including prediction of
workpiece's surface roughness in ultrasonic-vibration assisted turning
and papilloma viruses oncogenicity. Several neural network
architectures with different parameters were developed for each
application and the results were compared. It was illustrated in this
paper that some applications such as the first one mentioned above
are apt to be modeled by a single network with sufficient accuracy,
whereas others such as the second application can be best modeled
by different expert networks for different ranges of output.
Development of knowledge about the essentials of neural networks
for different applications is regarded as the cornerstone of
multidisciplinary network design programs to be developed as a
means of reducing inconsistencies and the burden of the user
intervention.
Abstract: Two completely different approaches for a Gigabit
Ethernet compliant stream transmission over 50m of 1mm PMMA SI-POF have been experimentally demonstrated and are compared in this paper. The first solution is based on a commercial RC-LED
transmission and a careful optimization of the physical layer architecture, realized during the POF-PLUS EU Project. The second solution exploits the performance of an edge-emitting laser at the
transmitter side in order to avoid any sort of electrical equalization at the receiver side.
Abstract: Processing the data by computers and performing
reasoning tasks is an important aim in Computer Science. Semantic
Web is one step towards it. The use of ontologies to enhance the
information by semantically is the current trend. Huge amount of
domain specific, unstructured on-line data needs to be expressed in
machine understandable and semantically searchable format.
Currently users are often forced to search manually in the results
returned by the keyword-based search services. They also want to use
their native languages to express what they search. In this paper, an
ontology-based automated question answering system on software
test documents domain is presented. The system allows users to enter
a question about the domain by means of natural language and
returns exact answer of the questions. Conversion of the natural
language question into the ontology based query is the challenging
part of the system. To be able to achieve this, a new algorithm
regarding free text to ontology based search engine query conversion
is proposed. The algorithm is based on investigation of suitable
question type and parsing the words of the question sentence.