Abstract: The passive electrical properties of a tissue depends
on the intrinsic constituents and its structure, therefore by measuring
the complex electrical impedance of the tissue it might be possible to
obtain indicators of the tissue state or physiological activity [1].
Complete bio-impedance information relative to physiology and
pathology of a human body and functional states of the body tissue or
organs can be extracted by using a technique containing a fourelectrode
measurement setup. This work presents the estimation
measurement setup based on the four-electrode technique. First, the
complex impedance is estimated by three different estimation
techniques: Fourier, Sine Correlation and Digital De-convolution and
then estimation errors for the magnitude, phase, reactance and
resistance are calculated and analyzed for different levels of
disturbances in the observations. The absolute values of relative
errors are plotted and the graphical performance of each technique is
compared.
Abstract: To investigate some relations between higher mathe¬matics scores in Chinese graduate student entrance examination and calculus (resp. linear algebra, probability statistics) scores in subject's completion examination of Chinese university, we select 20 students as a sample, take higher mathematics score as a decision attribute and take calculus score, linear algebra score, probability statistics score as condition attributes. In this paper, we are based on rough-set theory (Rough-set theory is a logic-mathematical method proposed by Z. Pawlak. In recent years, this theory has been widely implemented in the many fields of natural science and societal science.) to investigate importance of condition attributes with respective to decision attribute and strength of condition attributes supporting decision attribute. Results of this investigation will be helpful for university students to raise higher mathematics scores in Chinese graduate student entrance examination.
Abstract: One of the most important secrets of succesful companies is the fact that cooperation with NGOs will create a good reputation for them so that they can be immunized to economic crisis. The performance of the most admired companies in the world based on the ratings of Forbes and Fortune show us that most of these firms also have close relationships with their NGOs. Today, if companies do something wrong this information spreads very quickly to do the society. If people do not like the activities of a company, it can find itself in public relations nightmare that can threaten its repuation. Since the cost of communication has dropped dramatically due to the vast use of internet, the increase in communication among stakeholders via internet makes companies more visible. These multiple and interdependent interactions among the network of stakeholders is called as the network relationships. NGOs play the role of catalyst among the stakeholders of a firm to enhance the awareness. Succesful firms are aware of this fact that NGOs have a central role in today-s business world. Firms are also aware of the fact that they can enhance their corporate reputation via cooperation with the NGOs. This fact will be illustrated in this paper by examining some of the actions of the most succesful companies in terms of their cooperations with the NGOs.
Abstract: A higher order spline interpolated contour obtained
with up-sampling of homogenously distributed coordinates for
segmentation of kidney region in different classes of ultrasound
kidney images has been developed and presented in this paper. The
performance of the proposed method is measured and compared with
modified snake model contour, Markov random field contour and
expert outlined contour. The validation of the method is made in
correspondence with expert outlined contour using maximum coordinate
distance, Hausdorff distance and mean radial distance
metrics. The results obtained reveal that proposed scheme provides
optimum contour that agrees well with expert outlined contour.
Moreover this technique helps to preserve the pixels-of-interest
which in specific defines the functional characteristic of kidney. This
explores various possibilities in implementing computer-aided
diagnosis system exclusively for US kidney images.
Abstract: There has been a growing interest in implementing humanoid avatars in networked virtual environment. However, most existing avatar communication systems do not take avatars- social backgrounds into consideration. This paper proposes a novel humanoid avatar animation system to represent personalities and facial emotions of avatars based on culture, profession, mood, age, taste, and so forth. We extract semantic keywords from the input text through natural language processing, and then the animations of personalized avatars are retrieved and displayed according to the order of the keywords. Our primary work is focused on giving avatars runtime instruction from multiple natural languages. Experiments with Chinese, Japanese and English input based on the prototype show that interactive avatar animations can be displayed in real time and be made available online. This system provides a more natural and interesting means of human communication, and therefore is expected to be used for cross-cultural communication, multiuser online games, and other entertainment applications.
Abstract: This paper presents a perturbation based search method
to solve the unconstrained binary quadratic programming problem.
The proposed algorithm was tested with some of the standard test
problems and the results are reported for 10 instances of 50, 100, 250,
& 500 variable problems. A comparison of the performance of the
proposed algorithm with other heuristics and optimization software is
made. Based on the results, it was found that the proposed algorithm
is computationally inexpensive and the solutions obtained match the
best known solutions for smaller sized problems. For larger instances,
the algorithm is capable of finding a solution within 0.11% of the
best known solution. Apart from being used as a stand-alone method,
this algorithm could also be incorporated with other heuristics to find
better solutions.
Abstract: Question answering (QA) aims at retrieving precise information from a large collection of documents. Most of the Question Answering systems composed of three main modules: question processing, document processing and answer processing. Question processing module plays an important role in QA systems to reformulate questions. Moreover answer processing module is an emerging topic in QA systems, where these systems are often required to rank and validate candidate answers. These techniques aiming at finding short and precise answers are often based on the semantic relations and co-occurrence keywords. This paper discussed about a new model for question answering which improved two main modules, question processing and answer processing which both affect on the evaluation of the system operations. There are two important components which are the bases of the question processing. First component is question classification that specifies types of question and answer. Second one is reformulation which converts the user's question into an understandable question by QA system in a specific domain. The objective of an Answer Validation task is thus to judge the correctness of an answer returned by a QA system, according to the text snippet given to support it. For validating answers we apply candidate answer filtering, candidate answer ranking and also it has a final validation section by user voting. Also this paper described new architecture of question and answer processing modules with modeling, implementing and evaluating the system. The system differs from most question answering systems in its answer validation model. This module makes it more suitable to find exact answer. Results show that, from total 50 asked questions, evaluation of the model, show 92% improving the decision of the system.
Abstract: Knowledge management (KM) is generally
considered to be a positive process in an organisation, facilitating
opportunities to achieve competitive advantage via better quality
information handling, compilation of expert know-how and rapid
response to fluctuations in the business environment. The KM
paradigm as portrayed in the literature informs the processes that can
increase intangible assets so that corporate knowledge is preserved.
However, in some instances, knowledge management exists in a
universe of dynamic tension among the conflicting needs to respect
privacy and intellectual property (IP), to guard against data theft, to
protect national security and to stay within the laws. While the
Knowledge Management literature focuses on the bright side of the
paradigm, there is also a different side in which knowledge is
distorted, suppressed or misappropriated due to personal or
organisational motives (the paradox). This paper describes the ethical
paradoxes that occur within the taxonomy and deontology of
knowledge management and suggests that recognising both the
promises and pitfalls of KM requires wisdom.
Abstract: In this research, the main aim is to investigate the
antimicrobial effectiveness of ammonyx solutions finishing on
Sweatshirt Sport with immersion method. 60 Male healthy subjects
(football player) participated in this study. They were dressed in a
Sweatshirt for 14 days and some microbes found on them were
investigated. The antimicrobial effect of different ammonyx
solutions(1/100, 1/500, 1/1000, 1/2000 v/v solutions of Ammonyx)
on the identified microbes was studied by the zone inhabitation
method in vitro. In the next step the Sweatshirt Sports were treated
with the same different solutions of ammonyx and the antimicrobial
effectiveness was assessed by colony count method in different times
and the results were compared whit untreated ones. Some mechanical
properties of treated cotton/polyester yarn that used in Sweatshirt
Sport were measured after 30 days and were compared with
untreated one. Finally after finishing, scanning electron microscopy
(SEM) was used to compare the surfaces of the finished and
unfinished specimens. The results showed the presence of five
pathogenic microbes on Sweatshirt Sports such as Escherichia coli,
Staphylococcus aureus, Aspergillus, Mucor and Candida. The
inhalation time for treated on Sweatshirt Sports improved. The
amount of colony growth on treated clothes reduced considerably
and moreover the mechanical tests results showed no significant
deterioration effect of studies properties in comparison to the
untreated yarn. The visual examination of the SEM indicated that the
antimicrobial treatments were applied usefully to fabrics.
Abstract: Given a bivariate normal sample of correlated variables,
(Xi, Yi), i = 1, . . . , n, an alternative estimator of Pearson’s correlation
coefficient is obtained in terms of the ranges, |Xi − Yi|.
An approximate confidence interval for ρX,Y is then derived, and
a simulation study reveals that the resulting coverage probabilities
are in close agreement with the set confidence levels. As well, a
new approximant is provided for the density function of R, the
sample correlation coefficient. A mixture involving the proposed
approximate density of R, denoted by hR(r), and a density function
determined from a known approximation due to R. A. Fisher is shown
to accurately approximate the distribution of R. Finally, nearly exact
density approximants are obtained on adjusting hR(r) by a 7th degree
polynomial.
Abstract: In this paper, enhanced ground proximity warning simulation and validation system is designed and implemented. First, based on square grid and sub-grid structure, the global digital terrain database is designed and constructed. Terrain data searching is implemented through querying the latitude and longitude bands and separated zones of global terrain database with the current aircraft position. A combination of dynamic scheduling and hierarchical scheduling is adopted to schedule the terrain data, and the terrain data can be read and delete dynamically in the memory. Secondly, according to the scope, distance, approach speed information etc. to the dangerous terrain in front, and using security profiles calculating method, collision threat detection is executed in real-time, and provides caution and warning alarm. According to this scheme, the implementation of the enhanced ground proximity warning simulation system is realized. Simulations are carried out to verify a good real-time in terrain display and alarm trigger, and the results show simulation system is realized correctly, reasonably and stable.
Abstract: In this paper three basic approaches and different
methods under each of them for extracting region of interest (ROI)
from stationary images are explored. The results obtained for each of
the proposed methods are shown, and it is demonstrated where each
method outperforms the other. Two main problems in ROI
extraction: the channel selection problem and the saliency reversal
problem are discussed and how best these two are addressed by
various methods is also seen. The basic approaches are 1) Saliency
based approach 2) Wavelet based approach 3) Clustering based
approach. The saliency approach performs well on images containing
objects of high saturation and brightness. The wavelet based
approach performs well on natural scene images that contain regions
of distinct textures. The mean shift clustering approach partitions the
image into regions according to the density distribution of pixel
intensities. The experimental results of various methodologies show
that each technique performs at different acceptable levels for
various types of images.
Abstract: This paper presents an economic game for sybil
detection in a distributed computing environment. Cost parameters
reflecting impacts of different sybil attacks are introduced in the sybil
detection game. The optimal strategies for this game in which both
sybil and non-sybil identities are expected to participate are devised.
A cost sharing economic mechanism called Discriminatory
Rewarding Mechanism for Sybil Detection is proposed based on this
game. A detective accepts a security deposit from each active agent,
negotiates with the agents and offers rewards to the sybils if the latter
disclose their identity. The basic objective of the detective is to
determine the optimum reward amount for each sybil which will
encourage the maximum possible number of sybils to reveal
themselves. Maintaining privacy is an important issue for the
mechanism since the participants involved in the negotiation are
generally reluctant to share their private information. The mechanism
has been applied to Tor by introducing a reputation scoring function.
Abstract: In this paper, an automatic determination algorithm for nuclear magnetic resonance (NMR) spectra of the metabolites in the living body by magnetic resonance spectroscopy (MRS) without human intervention or complicated calculations is presented. In such method, the problem of NMR spectrum determination is transformed into the determination of the parameters of a mathematical model of the NMR signal. To calculate these parameters efficiently, a new model called modified Hopfield neural network is designed. The main achievement of this paper over the work in literature [30] is that the speed of the modified Hopfield neural network is accelerated. This is done by applying cross correlation in the frequency domain between the input values and the input weights. The modified Hopfield neural network can accomplish complex dignals perfectly with out any additinal computation steps. This is a valuable advantage as NMR signals are complex-valued. In addition, a technique called “modified sequential extension of section (MSES)" that takes into account the damping rate of the NMR signal is developed to be faster than that presented in [30]. Simulation results show that the calculation precision of the spectrum improves when MSES is used along with the neural network. Furthermore, MSES is found to reduce the local minimum problem in Hopfield neural networks. Moreover, the performance of the proposed method is evaluated and there is no effect on the performance of calculations when using the modified Hopfield neural networks.
Abstract: Virtual touch screen using camera is an ordinary screen which uses a camera to imitate the touch screen by taking a picture of an indicator, e.g., finger, which is laid on the screen, converting the indicator tip position on the picture to the position on the screen, and moving the cursor on the screen to that position. In fact, the indicator is not laid on the screen directly, but it is intervened by the cover at some intervals. In spite of this gap, if the eye-indicator-camera angle is not large, the mapping from the indicator tip positions on the image to the corresponding cursor positions on the screen is not difficult and could be done with a little error. However, the larger the angle is, the bigger the error in the mapping occurs. This paper proposes cursor position estimation model for virtual touch screen using camera which could eliminate this kind of error. The proposed model (i) moves the on-screen pilot cursor to the screen position which locates on the screen at the position just behind the indicator tip when the indicator tip has been looked from the camera position, and then (ii) converts that pilot cursor position to the desirable cursor position (the position on the screen when it has been looked from the user-s eye through the indicator tip) by using the bilinear transformation. Simulation results show the correctness of the estimated cursor position by using the proposed model.
Abstract: This paper presents an analysis on the capacity and performance of MIMO-OFDM systems. The work is focused on the capacity of MIMO-OFDM systems over rician fading channel, in the case of the channel being known at the receiver only, which is more practical case of the channel. Simple expression for capacity is derived for the case of correlated rician fading. The performance of some MIMO-OFDM implementations with rician fading model is presented using an Alamouti coding scheme and Simulation results are obtained for both capacity and performance analysis.
Abstract: this paper presents a novel scheme which is capable of reducing the error rate and improves the transmission performance in the asynchronous cooperative MIMO systems. A case study of image transmission is applied to prove the efficient of scheme. The linear dispersion structure is employed to accommodate the cooperative wireless communication network in the dynamic topology of structure, as well as to achieve higher throughput than conventional space–time codes based on orthogonal designs. The LDPC encoder without girth-4 and the STBC encoder with guard intervals are respectively introduced. The experiment results show that the combined coder of LDPC-STBC with guard intervals can be the good error correcting coders and BER performance in the asynchronous cooperative communication. In the case study of image transmission, the results show that in the transmission process, the image quality which is obtained by applied combined scheme is much better than it which is not applied the scheme in the asynchronous cooperative MIMO systems.
Abstract: The aim of this study is to develop mathematical
relationships for the performance parameter brake thermal efficiency
(BTE) and emission parameter nitrogen oxides (NOx) for the various
esters of vegetable oils used as CI engine fuel. The BTE is an
important performance parameter defining the ability of engine to
utilize the energy supplied and power developed similarly it is
indication of efficiency of fuels used. The esters of cottonseed oil,
soybean oil, jatropha oil and hingan oil are prepared using
transesterification process and characterized for their physical and
main fuel properties including viscosity, density, flash point and
higher heating value using standard test methods. These esters are
tried as CI engine fuel to analyze the performance and emission
parameters in comparison to diesel. The results of the study indicate
that esters as a fuel does not differ greatly with that of diesel in
properties. The CI engine performance with esters as fuel is in line
with the diesel where as the emission parameters are reduced with the
use of esters.
The correlation developed between BTE and brake power(BP),
gross calorific value(CV), air-fuel ratio(A/F), heat carried away by
cooling water(HCW). Another equation is developed between the
NOx emission and CO, HC, smoke density (SD), exhaust gas
temperature (EGT). The equations are verified by comparing the
observed and calculated values which gives the coefficient of
correlation of 0.99 and 0.96 for the BTE and NOx equations
respectively.
Abstract: In this paper a novel, simple and reliable digital firing
scheme has been implemented for speed control of three-phase
induction motor using ac voltage controller. The system consists of
three-phase supply connected to the three-phase induction motor via
three triacs and its control circuit. The ac voltage controller has three
modes of operation depending on the shape of supply current. The
performance of the induction motor differs in each mode where the
speed is directly proportional with firing angle in two modes and
inversely in the third one. So, the control system has to detect the
current mode of operation to choose the correct firing angle of triacs.
Three sensors are used to feed the line currents to control system to
detect the mode of operation. The control strategy is implemented
using a low cost Xilinx Spartan-3E field programmable gate array
(FPGA) device. Three PI-controllers are designed on FPGA to
control the system in the three-modes. Simulation of the system is
carried out using PSIM computer program. The simulation results
show stable operation for different loading conditions especially in
mode 2/3. The simulation results have been compared with the
experimental results from laboratory prototype.
Abstract: As the mobile Internet has become widespread in
recent years, communication based on mobile networks is increasing.
As a result, security threats have been posed with regard to the
abnormal traffic of mobile networks, but mobile security has been
handled with focus on threats posed by mobile malicious codes, and
researches on security threats to the mobile network itself have not
attracted much attention. In mobile networks, the IP address of the data
packet is a very important factor for billing purposes. If one mobile
terminal use an incorrect IP address that either does not exist or could
be assigned to another mobile terminal, billing policy will cause
problems. We monitor and analyze 3G mobile data networks traffics
for a period of time and finds some abnormal IP packets. In this paper,
we analyze the reason for abnormal IP packets on 3G Mobile Data
Networks. And we also propose an algorithm based on IP address table
that contains addresses currently in use within the mobile data network
to detect abnormal IP packets.