Abstract: In order to achieve better road utilization and traffic
efficiency, there is an urgent need for a travel information delivery
mechanism to assist the drivers in making better decisions in the
emerging intelligent transportation system applications. In this paper,
we propose a relayed multicast scheme under heterogeneous networks
for this purpose. In the proposed system, travel information consisting
of summarized traffic conditions, important events, real-time traffic
videos, and local information service contents is formed into layers
and multicasted through an integration of WiMAX infrastructure and
Vehicular Ad hoc Networks (VANET). By the support of adaptive
modulation and coding in WiMAX, the radio resources can be
optimally allocated when performing multicast so as to dynamically
adjust the number of data layers received by the users. In addition to
multicast supported by WiMAX, a knowledge propagation and
information relay scheme by VANET is designed. The experimental
results validate the feasibility and effectiveness of the proposed
scheme.
Abstract: In many applications, magnetic suspension systems
are required to operate over large variations in air gap. As a result,
the nonlinearities inherent in most types of suspensions have a
significant impact on performance. Specifically, it may be difficult to
design a linear controller which gives satisfactory performance,
stability, and disturbance rejection over a wide range of operating
points. in this paper an optimal controller based on discontinuous
mathematical model of the system for an electromagnetic suspension
system which is applied in magnetic trains has been designed .
Simulations show that the new controller can adapt well to the
variance of suspension mass and gap, and keep its dynamic
performance, thus it is superior to the classic controller.
Abstract: The human knee joint has a three dimensional
geometry with multiple body articulations that produce complex
mechanical responses under loads that occur in everyday life and
sports activities. To produce the necessary joint compliance and
stability for optimal daily function various menisci and ligaments are
present while muscle forces are used to this effect. Therefore,
knowledge of the complex mechanical interactions of these load
bearing structures is necessary when treatment of relevant diseases is
evaluated and assisting devices are designed.
Numerical tools such as finite element analysis are suitable for
modeling such joints in order to understand their physics. They have
been used in the current study to develop an accurate human knee
joint and model its mechanical behavior. To evaluate the efficacy of
this articulated model, static load cases were used for comparison
purposes with previous experimentally verified modeling works
drawn from literature.
Abstract: The present study is concerned with the free
convective two dimensional flow and heat transfer, within the
framework of Boussinesq approximation, in anisotropic fluid filled
porous rectangular enclosure subjected to end-to-end temperature
difference have been investigated using Lattice Boltzmann method
fornon-Darcy flow model. Effects of the moving lid direction (top,
bottom, left, and right wall moving in the negative and positive x&ydirections),
number of moving walls (one or two opposite walls), the
sliding wall velocity, and four different constant temperatures
opposite walls cases (two surfaces are being insulated and the
twoother surfaces areimposed to be at constant hot and cold
temperature)have been conducted. The results obtained are discussed
in terms of the Nusselt number, vectors, contours, and isotherms.
Abstract: Medical image registration is the key technology in image guided radiation therapy (IGRT) systems. On the basis of the previous work on our IGRT prototype with a biorthogonal x-ray imaging system, we described a method focused on the 2D/2D rigid-body registration using multiresolution pyramid based mutual information in this paper. Three key steps were involved in the method : firstly, four 2D images were obtained including two x-ray projection images and two digital reconstructed radiographies(DRRs ) as the input for the registration ; Secondly, each pair of the corresponding x-ray image and DRR image were matched using multiresolution pyramid based mutual information under the ITK registration framework ; Thirdly, we got the final couch offset through a coordinate transformation by calculating the translations acquired from the two pairs of the images. A simulation example of a parotid gland tumor case and a clinical example of an anthropomorphic head phantom were employed in the verification tests. In addition, the influence of different CT slice thickness were tested. The simulation results showed that the positioning errors were 0.068±0.070, 0.072±0.098, 0.154±0.176mm along three axes which were lateral, longitudinal and vertical. The clinical test indicated that the positioning errors of the planned isocenter were 0.066, 0.07, 2.06mm on average with a CT slice thickness of 2.5mm. It can be concluded that our method with its verified accuracy and robustness can be effectively used in IGRT systems for patient setup.
Abstract: The current research paper is an implementation of
Eigen Faces and Karhunen-Loeve Algorithm for face recognition.
The designed program works in a manner where a unique
identification number is given to each face under trial. These faces
are kept in a database from where any particular face can be matched
and found out of the available test faces. The Karhunen –Loeve
Algorithm has been implemented to find out the appropriate right
face (with same features) with respect to given input image as test
data image having unique identification number. The procedure
involves usage of Eigen faces for the recognition of faces.
Abstract: Cardiac pulse-related artifacts in the EEG recorded
simultaneously with fMRI are complex and highly variable. Their
effective removal is an unsolved problem. Our aim is to develop an
adaptive removal algorithm based on the matching pursuit (MP)
technique and to compare it to established methods using a visual
evoked potential (VEP). We recorded the VEP inside the static
magnetic field of an MR scanner (with artifacts) as well as in an
electrically shielded room (artifact free). The MP-based artifact
removal outperformed average artifact subtraction (AAS) and
optimal basis set removal (OBS) in terms of restoring the EEG field
map topography of the VEP. Subsequently, a dipole model was fitted
to the VEP under each condition using a realistic boundary element
head model. The source location of the VEP recorded inside the MR
scanner was closest to that of the artifact free VEP after cleaning
with the MP-based algorithm as well as with AAS. While none of the
tested algorithms offered complete removal, MP showed promising
results due to its ability to adapt to variations of latency, frequency
and amplitude of individual artifact occurrences while still utilizing a
common template.
Abstract: This paper presents an optimized algorithm for robot localization which increases the correctness and accuracy of the estimating position of mobile robot to more than 150% of the past methods [1] in the uncertain and noisy environment. In this method the odometry and vision sensors are combined by an adapted well-known discrete kalman filter [2]. This technique also decreased the computation process of the algorithm by DKF simple implementation. The experimental trial of the algorithm is performed on the robocup middle size soccer robot; the system can be used in more general environments.
Abstract: The textile industry produces highly coloured
effluents containing polar and non-polar compounds. The textile mill
run by the Assam Polyester Co-operative Society Limited (APOL) is
situated at Rangia, about 55 km from Guwahati (26011' N, 91047' E)
in the northern bank of the river Brahmaputra, Assam (India). This
unit was commissioned in June 1988 and started commercial
production in November 1988. The installed capacity of the weaving
unit was 8000 m/day and that of the processing unit was 20,000
m/day. The mill has its own dyeing unit with a capacity of 1500-2000
kg/day. The western side of the mill consists of vast agricultural land
and the far northern and southern side of the mill has scattered human
population. The eastern side of the mill has a major road for
thoroughfare. The mill releases its effluents into the agricultural land
in the western side of the mill. The present study was undertaken to
assess the impact of the textile mill on surface soil quality in and
around the mill with particular reference to Cr, Mn, Ni and Zn.
Surface soil samples, collected along different directions at 200, 500
and 1000 m were digested and the metals were estimated with
Atomic Absorption Spectrophotometer. The metals were found in the
range of: Cr 50.9 – 105.0 mg kg-1, Mn 19.2- 78.6 mg kg-1, Ni 41.9 –
50.6 mg kg-1 and Zn 187.8 – 1095.8 mg kg-1. The study reveals
enrichment of Cr, Mn, Ni and Zn in the soil near the textile mill.
Abstract: Security risk models have been successful in estimating the likelihood of attack for simple security threats. However, modeling complex system and their security risk is even a challenge. Many methods have been proposed to face this problem. Often difficult to manipulate, and not enough all-embracing they are not as famous as they should with administrators and deciders. We propose in this paper a new tool to model big systems on purpose. The software, takes into account attack threats and security strength.
Abstract: The counting process of cell colonies is always a long
and laborious process that is dependent on the judgment and ability
of the operator. The judgment of the operator in counting can vary in
relation to fatigue. Moreover, since this activity is time consuming it
can limit the usable number of dishes for each experiment. For these
purposes, it is necessary that an automatic system of cell colony
counting is used. This article introduces a new automatic system of
counting based on the elaboration of the digital images of cellular
colonies grown on petri dishes. This system is mainly based on the
algorithms of region-growing for the recognition of the regions of
interest (ROI) in the image and a Sanger neural net for the
characterization of such regions. The better final classification is
supplied from a Feed-Forward Neural Net (FF-NN) and confronted
with the K-Nearest Neighbour (K-NN) and a Linear Discriminative
Function (LDF). The preliminary results are shown.
Abstract: A study was conducted in greenhouse environment to
determine the response of five tissue-cultured date palm cultivars, Al-
Ahamad, Nabusaif, Barhee, Khalas, and Kasab to irrigation water
salinity of 1.6, 5, 10, or 20 dS/ m. The salinity level of 1.6dS/m, was
used as a control. The effects of high salinity on plant survival were
manifested at 360 days after planting (DAP) onwards. Three
cultivars, Khalas, Kasab and Barhee were able to tolerate 10 dS/m
salinity level at 24 months after the start of study. Khalas tolerated
the highest salinity level of 20 dS/ m and 'Nabusaif' was found to be the
least tolerant cv. The average heights of palms and the number of
fronds were decreased with increasing salinity levels as time
progressed.
Abstract: Copper based composites reinforced with WC and Ti
particles were prepared using planetary ball-mill. The experiment
was designed by using Taguchi technique and milling was carried out
in an air for several hours. The powder was characterized before and
after milling using the SEM, TEM and X-ray for microstructure and
for possible new phases. Microstructures show that milled particles
size and reduction in particle size depend on many parameters. The
distance d between planes of atoms estimated from X-ray powder
diffraction data and TEM image. X-ray diffraction patterns of the
milled powder did not show clearly any new peak or energy shift, but
the TEM images show a significant change in crystalline structure of
corporate on titanium in the composites.
Abstract: In this paper we present an off line system for the
recognition of the handwritten numeric chains. Our work is divided
in two big parts. The first part is the realization of a recognition
system of the isolated handwritten digits. In this case the study is
based mainly on the evaluation of neural network performances,
trained with the gradient back propagation algorithm. The used
parameters to form the input vector of the neural network are
extracted on the binary images of the digits by several methods: the
distribution sequence, the Barr features and the centred moments of
the different projections and profiles. The second part is the
extension of our system for the reading of the handwritten numeric
chains constituted of a variable number of digits. The vertical
projection is used to segment the numeric chain at isolated digits and
every digit (or segment) will be presented separately to the entry of
the system achieved in the first part (recognition system of the
isolated handwritten digits). The result of the recognition of the
numeric chain will be displayed at the exit of the global system.
Abstract: Software project effort estimation is frequently seen
as complex and expensive for individual software engineers.
Software production is in a crisis. It suffers from excessive costs.
Software production is often out of control. It has been suggested that
software production is out of control because we do not measure.
You cannot control what you cannot measure. During last decade, a
number of researches on cost estimation have been conducted. The
metric-set selection has a vital role in software cost estimation
studies; its importance has been ignored especially in neural network
based studies. In this study we have explored the reasons of those
disappointing results and implemented different neural network
models using augmented new metrics. The results obtained are
compared with previous studies using traditional metrics. To be able
to make comparisons, two types of data have been used. The first
part of the data is taken from the Constructive Cost Model
(COCOMO'81) which is commonly used in previous studies and the
second part is collected according to new metrics in a leading
international company in Turkey. The accuracy of the selected
metrics and the data samples are verified using statistical techniques.
The model presented here is based on Multi-Layer Perceptron
(MLP). Another difficulty associated with the cost estimation studies
is the fact that the data collection requires time and care. To make a
more thorough use of the samples collected, k-fold, cross validation
method is also implemented. It is concluded that, as long as an
accurate and quantifiable set of metrics are defined and measured
correctly, neural networks can be applied in software cost estimation
studies with success
Abstract: Clustering is the process of subdividing an input data set into a desired number of subgroups so that members of the same subgroup are similar and members of different subgroups have diverse properties. Many heuristic algorithms have been applied to the clustering problem, which is known to be NP Hard. Genetic algorithms have been used in a wide variety of fields to perform clustering, however, the technique normally has a long running time in terms of input set size. This paper proposes an efficient genetic algorithm for clustering on very large data sets, especially on image data sets. The genetic algorithm uses the most time efficient techniques along with preprocessing of the input data set. We test our algorithm on both artificial and real image data sets, both of which are of large size. The experimental results show that our algorithm outperforms the k-means algorithm in terms of running time as well as the quality of the clustering.
Abstract: University websites are considered as one of the brand primary touch points for multiple stakeholders, but most of them did not have great designs to create favorable impressions. Some of the elements that web designers should carefully consider are the appearance, the content, the functionality, usability and search engine optimization. However, priority should be placed on website simplicity and negative space. In terms of content, previous research suggests that universities should include reputation, learning environment, graduate career prospects, image destination, cultural integration, and virtual tour on their websites. The study examines how top 200 world ranking science and technology-based universities present their brands online and whether the websites capture the content dimensions. Content analysis of the websites revealed that the top ranking universities captured these dimensions at varying degree. Besides, the UK-based university had better priority on website simplicity and negative space compared to the Malaysian-based university.
Abstract: Intrusion Detection System is significant in network
security. It detects and identifies intrusion behavior or intrusion
attempts in a computer system by monitoring and analyzing the
network packets in real time. In the recent year, intelligent algorithms
applied in the intrusion detection system (IDS) have been an
increasing concern with the rapid growth of the network security.
IDS data deals with a huge amount of data which contains irrelevant
and redundant features causing slow training and testing process,
higher resource consumption as well as poor detection rate. Since the
amount of audit data that an IDS needs to examine is very large even
for a small network, classification by hand is impossible. Hence, the
primary objective of this review is to review the techniques prior to
classification process suit to IDS data.
Abstract: In this paper we present a novel approach for face image coding. The proposed method makes a use of the features of video encoders like motion prediction. At first encoder selects appropriate prototype from the database and warps it according to features of encoding face. Warped prototype is placed as first I frame. Encoding face is placed as second frame as P frame type. Information about features positions, color change, selected prototype and data flow of P frame will be sent to decoder. The condition is both encoder and decoder own the same database of prototypes. We have run experiment with H.264 video encoder and obtained results were compared to results achieved by JPEG and JPEG2000. Obtained results show that our approach is able to achieve 3 times lower bitrate and two times higher PSNR in comparison with JPEG. According to comparison with JPEG2000 the bitrate was very similar, but subjective quality achieved by proposed method is better.
Abstract: Robot manipulators are highly coupled nonlinear
systems, therefore real system and mathematical model of dynamics
used for control system design are not same. Hence, fine-tuning of
controller is always needed. For better tuning fast simulation speed
is desired. Since, Matlab incorporates LAPACK to increase the speed
and complexity of matrix computation, dynamics, forward and
inverse kinematics of PUMA 560 is modeled on Matlab/Simulink in
such a way that all operations are matrix based which give very less
simulation time. This paper compares PID parameter tuning using
Genetic Algorithm, Simulated Annealing, Generalized Pattern Search
(GPS) and Hybrid Search techniques. Controller performances for all
these methods are compared in terms of joint space ITSE and
cartesian space ISE for tracking circular and butterfly trajectories.
Disturbance signal is added to check robustness of controller. GAGPS
hybrid search technique is showing best results for tuning PID
controller parameters in terms of ITSE and robustness.