Abstract: An effective visual error concealment method has been presented by employing a robust rotation, scale, and translation (RST) invariant partial patch matching model (RSTI-PPMM) and
exemplar-based inpainting. While the proposed robust and inherently
feature-enhanced texture synthesis approach ensures the generation
of excellent and perceptually plausible visual error concealment results, the outlier pruning property guarantees the significant quality improvements, both quantitatively and qualitatively. No intermediate
user-interaction is required for the pre-segmented media and the
presented method follows a bootstrapping approach for an automatic
visual loss recovery and the image and video error concealment.
Abstract: Culture and family structure provide a sense security.
Further, the chrono, macro and micro contexts of development
influence developmental transitions and timetable particularly owing
to variations in the macrosystem associated with non normative life
events like migration. Migration threatens family links, security and
attachment bonds. Rising migratory trends have prompted an
increased interest in migration consequences on familial bonds,
developmental autonomy, socialization process, and sense of
security. This paper takes a narrative approach and applies the
attachment paradigm from a lifespan perspective, to examine the
settlement experiences of an India-born migrant student in Sydney,
Australia. It focuses on her quest to preserve family ties; her remote
secure base; her continual struggle to balance dependency and
autonomy, a major developmental milestone. As positional parental
power is culturally more potent in the Indian society, the paper
therefore raises some important concerns related to cultural
expectations, adaptation, acculturative stress and sense of security.
Abstract: The increasing importance of FlexRay systems in
automotive domain inspires unceasingly relative researches. One
primary issue among researches is to verify the reliability of FlexRay
systems either from protocol aspect or from system design aspect.
However, research rarely discusses the effect of network topology on
the system reliability. In this paper, we will illustrate how to model
the reliability of FlexRay systems with various network topologies by
a well-known probabilistic reasoning technology, Bayesian Network.
In this illustration, we especially investigate the effectiveness of error
containment built in star topology and fault-tolerant midpoint
synchronization algorithm adopted in FlexRay communication
protocol. Through a FlexRay steer-by-wire case study, the influence
of different topologies on the failure probability of the FlexRay steerby-
wire system is demonstrated. The notable value of this research is
to show that the Bayesian Network inference is a powerful and
feasible method for the reliability assessment of FlexRay systems.
Abstract: The InAlGaN alloy has only recently began receiving
serious attention into its growth and application. High quality InGaN
films have led to the development of light emitting diodes (LEDs) and
blue laser diodes (LDs). The quaternary InAlGaN however, represents
a more versatile material since the bandgap and lattice constant can be
independently varied. We report an ultraviolet (UV) quaternary
InAlGaN multi-quantum wells (MQWs) LD study by using the
simulation program of Integrated System Engineering (ISE TCAD).
Advanced physical models of semiconductor properties were used in
order to obtain an optimized structure. The device performance which
is affected by piezoelectric and thermal effects was studied via
drift-diffusion model for carrier transport, optical gain and loss. The
optical performance of the UV LD with different numbers of quantum
wells was numerically investigated. The main peak of the emission
wavelength for double quantum wells (DQWs) was shifted from 358
to 355.8 nm when the forward current was increased. Preliminary
simulated results indicated that better output performance and lower
threshold current could be obtained when the quantum number is four,
with output power of 130 mW and threshold current of 140 mA.
Abstract: In the context of spectrum surveillance, a new method
to recover the code of spread spectrum signal is presented, while the
receiver has no knowledge of the transmitter-s spreading sequence. In
our previous paper, we used Genetic algorithm (GA), to recover
spreading code. Although genetic algorithms (GAs) are well known
for their robustness in solving complex optimization problems, but
nonetheless, by increasing the length of the code, we will often lead
to an unacceptable slow convergence speed. To solve this problem we
introduce Particle Swarm Optimization (PSO) into code estimation in
spread spectrum communication system. In searching process for
code estimation, the PSO algorithm has the merits of rapid
convergence to the global optimum, without being trapped in local
suboptimum, and good robustness to noise. In this paper we describe
how to implement PSO as a component of a searching algorithm in
code estimation. Swarm intelligence boasts a number of advantages
due to the use of mobile agents. Some of them are: Scalability, Fault
tolerance, Adaptation, Speed, Modularity, Autonomy, and
Parallelism. These properties make swarm intelligence very attractive
for spread spectrum code estimation. They also make swarm
intelligence suitable for a variety of other kinds of channels. Our
results compare between swarm-based algorithms and Genetic
algorithms, and also show PSO algorithm performance in code
estimation process.
Abstract: This paper contributes to the debate on the proximate
causes of climate change. Also, it discusses the impact of the global
temperature increases since the beginning of the twentieth century
and the effectiveness of climate change models in isolating the
primary cause (anthropogenic influences or natural variability in
temperature) of the observed temperature increases that occurred
within this period. The paper argues that if climate scientist and
policymakers ignore the anthropogenic influence (greenhouse gases)
on global warming on the pretense of lack of agreement among
various climate models and their inability to account for all the
necessary factors of global warming at all levels the current efforts of
greenhouse emissions control and global warming as a whole could
be exacerbated.
Abstract: For a variety of safety and economic reasons, engineering undergraduates in Australia have experienced diminishing access to the real hardware that is typically the embodiment of their theoretical studies. This trend will delay the development of practical competence, decrease the ability to model and design, and suppress motivation. The author has attempted to address this concern by creating a software tool that contains both photographic images of real machinery, and sets of graphical modeling 'tools'. Academics from a range of disciplines can use the software to set tutorial tasks, and incorporate feedback comments for a range of student responses. An evaluation of the software demonstrated that students who had solved modeling problems with the aid of the electronic tutor performed significantly better in formal examinations with similar problems. The 2-D graphical diagnostic routines in the Tutor have the potential to be used in a wider range of problem-solving tasks.
Abstract: The consumption capability of people in China has
been a big issue to tourism business. Due to the increasing of China
tourists, Taiwan-s government rescinded the category of people in
China and opened up the non-stopped airline from China to Taiwan.
The “one-day traveling style between China and Taiwan" has formed,
hoping to bring business to Taiwan. Night market, which shows
foreigners the very local character of Taiwan, contains various
merchandise for consumers to purchase. With the increasing numbers
of non-stopped airline, visiting Taiwan-s night markets has also been
one of major activities to China-s tourists. The purpose of the present
study is to understand the consumer behavior of China tourists in
tourist night markets in Taipei and analyze that if their shopping
motives cause the different shopping behaviors and post-purchase
satisfaction and revisiting intention. The results reveled that for the
China tourists, the motives of significant influence to the shopping
behaviors. Also, the shopping behaviors significant influence to the
whole satisfaction and the whole satisfaction significant influence to
post-purchase behavior.
Abstract: Threedimensional numerical simulations are conducted on a full scale CANDU Moderator and Transient variations of the temperature and velocity distributions inside the tank are determined. The results show that the flow and temperature distributions inside the moderator tank are three dimensional and no symmetry plane can be identified.Competition between the upward moving buoyancy driven flows and the downward moving momentum driven flows, results in the formation of circulation zones. The moderator tank operates in the buoyancy driven mode and any small disturbances in the flow or temperature makes the system unstable and asymmetric. Different types of temperature fluctuations are noted inside the tank: (i) large amplitude are at the boundaries between the hot and cold (ii) low amplitude are in the core of the tank (iii) high frequency fluctuations are in the regions with high velocities and (iv) low frequency fluctuations are in the regions with lower velocities.
Abstract: This paper investigates the problem of absolute stability and robust stability of a class of Lur-e systems with neutral type and time-varying delays. By using Lyapunov direct method and linear matrix inequality technique, new delay-dependent stability criteria are obtained and formulated in terms of linear matrix inequalities (LMIs) which are easy to check the stability of the considered systems. To obtain less conservative stability conditions, an operator is defined to construct the Lyapunov functional. Also, the free weighting matrices approach combining a matrix inequality technique is used to reduce the entailed conservativeness. Numerical examples are given to indicate significant improvements over some existing results.
Abstract: The actual grow of the infrastructure in develop country require sophisticate ways manage the operation and control the quality served. This research wants to concentrate in the operation of this infrastructure beyond the construction. The infrastructure-s operation involves an uncertain environment, where unexpected variables are present every day and everywhere. Decision makers need to make right decisions with right information/data analyzed most in real time. To adequately support their decisions and decrease any negative impact and collateral effect, they need to use computational tools called decision support systems (DSS), but now the main source of information came from common users thought an extensive crowdsourcing
Abstract: Software development is moving towards agility with use cases and scenarios being used for requirements stories. Estimates of software costs are becoming even more important than before as effects of delays is much larger in successive short releases context of agile development. Thus, this paper reports on the development of new linear use case based software cost estimation model applicable in the very early stages of software development being based on simple metric. Evaluation showed that accuracy of estimates varies between 43% and 55% of actual effort of historical test projects. These results outperformed those of wellknown models when applied in the same context. Further work is being carried out to improve the performance of the proposed model when considering the effect of non-functional requirements.
Abstract: In this paper a special kind of buffer management policy is studied where the packet are preempted even when sufficient space is available in the buffer for incoming packets. This is done to congestion for future incoming packets to improve QoS for certain type of packets. This type of study has been done in past for ATM type of scenario. We extend the same for heterogeneous traffic where data rate and size of the packets are very versatile in nature. Typical example of this scenario is the buffer management in Differentiated Service Router. There are two aspects that are of interest. First is the packet size: whether all packets have same or different sizes. Second aspect is the value or space priority of the packets, do all packets have the same space priority or different packets have different space priorities. We present two types of policies to achieve QoS goals for packets with different priorities: the push out scheme and the expelling scheme. For this work the scenario of packets of variable length is considered with two space priorities and main goal is to minimize the total weighted packet loss. Simulation and analytical studies show that, expelling policies can outperform the push out policies when it comes to offering variable QoS for packets of two different priorities and expelling policies also help improve the amount of admissible load. Some other comparisons of push out and expelling policies are also presented using simulations.
Abstract: Variable digital filters are useful for various signal processing and communication applications where the frequency characteristics, such as fractional delays and cutoff frequencies, can be varied. In this paper, we propose a design method of variable FIR digital filters with an approximate linear phase characteristic in the passband. The proposed variable FIR filters have some large attenuation in stopband and their large attenuation can be varied by spectrum parameters. In the proposed design method, a quasi-equiripple characteristic can be obtained by using an iterative weighted least square method. The usefulness of the proposed design method is verified through some examples.
Abstract: Active network was developed to solve the problem of
the current sharing-based network–difficulty in applying new
technology, service or standard, and duplicated operation at several
protocol layers. Active network can transport the packet loaded with
the executable codes, which enables to change the state of the network
node. However, if the network node is placed in the sharing-based
network, security and safety issues should be resolved. To satisfy this
requirement, various security aspects are required such as
authentication, authorization, confidentiality and integrity. Among
these security components, the core factor is the encryption key. As a
result, this study is designed to propose the scheme that manages the
encryption key, which is used to provide security of the
comprehensive active directory, based on the domain.
Abstract: It-s known that incorporating prior knowledge into support
vector regression (SVR) can help to improve the approximation
performance. Most of researches are concerned with the incorporation
of knowledge in form of numerical relationships. Little work,
however, has been done to incorporate the prior knowledge on the
structural relationships among the variables (referred as to Structural
Prior Knowledge, SPK). This paper explores the incorporation of SPK
in SVR by constructing appropriate admissible support vector kernel
(SV kernel) based on the properties of reproducing kernel (R.K).
Three-levels specifications of SPK are studies with the corresponding
sub-levels of prior knowledge that can be considered for the method.
These include Hierarchical SPK (HSPK), Interactional SPK (ISPK)
consisting of independence, global and local interaction, Functional
SPK (FSPK) composed of exterior-FSPK and interior-FSPK. A
convenient tool for describing the SPK, namely Description Matrix
of SPK is introduced. Subsequently, a new SVR, namely Motivated
Support Vector Regression (MSVR) whose structure is motivated
in part by SPK, is proposed. Synthetic examples show that it is
possible to incorporate a wide variety of SPK and helpful to improve
the approximation performance in complex cases. The benefits of
MSVR are finally shown on a real-life military application, Air-toground
battle simulation, which shows great potential for MSVR to
the complex military applications.
Abstract: A lightpipe is an about 99 percent specular reflective
mirror pipe or duct that is used for the transmission of the daylight
from the outside into a building. The lightpipes are usually used in
the daylighting buildings, in the residential, industrial and
commercial sectors. This paper is about the performances of a
lightpipe installed in a laboratory (3 m x 2.6 m x 3 m) without
windows. The aim is to analyse the luminous intensity distribution
for several sky/sun conditions. The lightpipe was monitored during
the year 2006. The lightpipe is 1 m long and the diameter of the top
collector and of the internal diffuser device is 0.25 m. In the
laboratory there are seven illuminance sensors: one external is
located on the roof of the laboratory and six internal sensors are
connected to a data acquisition system. The internal sensors are
positioned under the internal diffusive device at an height of 0.85 m
from the floor to simulate a working plane. The numerical data are
obtained through a simulation software. This paper shows the
comparison between the experimental and numerical results
concerning the behavior of the lightpipe.
Abstract: This research assesses the value of the brand personality and its influence on consumer-s decision making, through relational variables, after receiving a text message ad. An empirical study, in which 380 participants have received an SMS ad, confirms that brand personality does actually influence the brand trust as well as the attachment and commitment. The levels of sensitivity and involvement have an impact on the brand personality and the related variables to it.
Abstract: The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
Abstract: This paper presents unified theory for local (Savitzky-
Golay) and global polynomial smoothing. The algebraic framework
can represent any polynomial approximation and is seamless from
low degree local, to high degree global approximations. The representation
of the smoothing operator as a projection onto orthonormal
basis functions enables the computation of: the covariance matrix
for noise propagation through the filter; the noise gain and; the
frequency response of the polynomial filters. A virtually perfect Gram
polynomial basis is synthesized, whereby polynomials of degree
d = 1000 can be synthesized without significant errors. The perfect
basis ensures that the filters are strictly polynomial preserving. Given
n points and a support length ls = 2m + 1 then the smoothing
operator is strictly linear phase for the points xi, i = m+1. . . n-m.
The method is demonstrated on geometric surfaces data lying on an
invariant 2D lattice.