Abstract: This paper presents the theoretical background and
the real implementation of an automated computer system to
introduce machine vision in flower, fruit and vegetable processing
for recollection, cutting, packaging, classification, or fumigation
tasks. The considerations and implementation issues presented in this
work can be applied to a wide range of varieties of flowers, fruits and
vegetables, although some of them are especially relevant due to the
great amount of units that are manipulated and processed each year
over the world. The computer vision algorithms developed in this
work are shown in detail, and can be easily extended to other
applications. A special attention is given to the electromagnetic
compatibility in order to avoid noisy images. Furthermore, real
experimentation has been carried out in order to validate the
developed application. In particular, the tests show that the method
has good robustness and high success percentage in the object
characterization.
Abstract: India recognizes the personal laws of the various
religious communities that reside in the country. At the same time all
the institutions of the state in India are committed to the value of
secularism. This paper has been developed on the basis of a case
study that indicates the dynamics of religion in the working of the
lower judiciary in India. Majority of the commentary on religion and
the judiciary has focused on debates surrounding the existence and
application of personal laws. This paper, through a case study in the
lower judiciary, makes an attempt to examine whether the interface
between religion and the judiciary goes beyond personal laws.
The first part of this paper explains the history and application of
personal laws in social, political and legal contexts in India. The
second part examines the case study located in two courts of first
instance, following into the third part which provides an analysis of
the empirical evidence. The fourth part focuses on preliminary
observations about why there is a hesitancy to speak about religion in
relation to the working of the judicial system.
Abstract: Innovation is more important in any companies.
However, it is not easy to measure the innovation performance
correctly. Patent is one of measuring index nowadays. This paper
wants to purpose an approach for valuing patents based on market
reaction to patent infringement litigations. The interesting
phenomenon is found from collection of patent infringement litigation
events. That is if any patent litigation event occurs the stock value will
follow changing. The plaintiffs- stock value raises some percentage.
According to this interesting phenomenon, the relationship between
patent litigation and stock value is tested and verified. And then, the
stock value variation is used to deduce the infringed patents- value.
The purpose of this study is providing another concept model to
evaluate the infringed patents. This study can provide a decision assist
system to help drafting patent litigation strategy and determine the
technology value
Abstract: A topologically oriented neural network is very
efficient for real-time path planning for a mobile robot in changing
environments. When using a recurrent neural network for this
purpose and with the combination of the partial differential equation
of heat transfer and the distributed potential concept of the network,
the problem of obstacle avoidance of trajectory planning for a
moving robot can be efficiently solved. The related dimensional
network represents the state variables and the topology of the robot's
working space. In this paper two approaches to problem solution are
proposed. The first approach relies on the potential distribution of
attraction distributed around the moving target, acting as a unique
local extreme in the net, with the gradient of the state variables
directing the current flow toward the source of the potential heat. The
second approach considers two attractive and repulsive potential
sources to decrease the time of potential distribution. Computer
simulations have been carried out to interrogate the performance of
the proposed approaches.
Abstract: In order to accommodate various multimedia
services, next generation wireless networks are characterized
by very high transmission bit rates. Thus, in such systems and
networks, the received signal is not only limited by noise but -
especially with increasing symbols rate often more
significantly by the intersymbol interference (ISI) caused by
the time dispersive radio channels such as those are used in
this work. This paper deals with the study of the performance
of detector for high bit rate transmission on some worst case
models of frequency selective fading channels for outdoor
mobile radio environments. This paper deals with a number of
different wireless channels with different power profiles and
different number of resolvable paths. All the radio channels
generated in this paper are for outdoor vehicular environments
with Doppler spread of 100 Hz. A carrier frequency of 1800
MHz is used and all the channels used in this work are such
that they are useful for next generation wireless systems.
Schemes for mitigation of ISI with adaptive equalizers of
different types have been investigated and their performances
have been investigated in terms of BER measured as a function
of SNR.
Abstract: QoS Routing aims to find paths between senders and
receivers satisfying the QoS requirements of the application which
efficiently using the network resources and underlying routing
algorithm to be able to find low-cost paths that satisfy given QoS
constraints. The problem of finding least-cost routing is known to be
NP-hard or complete and some algorithms have been proposed to
find a near optimal solution. But these heuristics or algorithms either
impose relationships among the link metrics to reduce the complexity
of the problem which may limit the general applicability of the
heuristic, or are too costly in terms of execution time to be applicable
to large networks. In this paper, we concentrate an algorithm that
finds a near-optimal solution fast and we named this algorithm as
optimized Delay Constrained Routing (ODCR), which uses an
adaptive path weight function together with an additional constraint
imposed on the path cost, to restrict search space and hence ODCR
finds near optimal solution in much quicker time.
Abstract: Over the past few years, a number of efforts have
been exerted to build parallel processing systems that utilize the idle
power of LAN-s and PC-s available in many homes and corporations.
The main advantage of these approaches is that they provide cheap
parallel processing environments for those who cannot afford the
expenses of supercomputers and parallel processing hardware.
However, most of the solutions provided are not very flexible in the
use of available resources and very difficult to install and setup.
In this paper, a multi-level web-based parallel processing system
(MWPS) is designed (appendix). MWPS is based on the idea of
volunteer computing, very flexible, easy to setup and easy to use.
MWPS allows three types of subscribers: simple volunteers (single
computers), super volunteers (full networks) and end users. All of
these entities are coordinated transparently through a secure web site.
Volunteer nodes provide the required processing power needed by
the system end users. There is no limit on the number of volunteer
nodes, and accordingly the system can grow indefinitely. Both
volunteer and system users must register and subscribe. Once, they
subscribe, each entity is provided with the appropriate MWPS
components. These components are very easy to install.
Super volunteer nodes are provided with special components that
make it possible to delegate some of the load to their inner nodes.
These inner nodes may also delegate some of the load to some other
lower level inner nodes .... and so on. It is the responsibility of the
parent super nodes to coordinate the delegation process and deliver
the results back to the user.
MWPS uses a simple behavior-based scheduler that takes into
consideration the current load and previous behavior of processing
nodes. Nodes that fulfill their contracts within the expected time get a
high degree of trust. Nodes that fail to satisfy their contract get a
lower degree of trust.
MWPS is based on the .NET framework and provides the minimal
level of security expected in distributed processing environments.
Users and processing nodes are fully authenticated. Communications
and messages between nodes are very secure. The system has been
implemented using C#.
MWPS may be used by any group of people or companies to
establish a parallel processing or grid environment.
Abstract: Although a picture can be automatically a graphic
work, but especially in the field of graphics and images based on the
idea of advertising and graphic design will be prepared and
photographers to realize the design using his own knowledge and
skills to help does. It is evident that knowledge of photography,
photographer and designer of the facilities, fields of reaching a
higher level of quality offers. At the same time do not have a graphic
designer is also skilled photographer, but can execute your idea may
delegate to an expert photographer. Using technology and methods in
all fields of photography, graphic art may be applicable. But most of
its application in Iran, in works such as packaging, posters, Bill
Board, advertising, brochures and catalogs are. In this study, we
review how the images and techniques in the chart should be used in
Iranian graphic photo what impact has left. Using photography
techniques and procedures can be designed and helped advance the
goals graphic. Technique could not determine the idea. But what is
important to think about design and photography and his creativity
can flourish as a tool to be effective graphic designer in mind.
Computer software to help it's very promotes creativity techniques
shall graphic designer but also it is as a tool. Using images in various
fields, especially graphic arts and only because it is not being
documented, but applications are beautiful. As to his photographic
style from today is graphics. Graphic works try to affect impacts on
their audience. Hence the photo as an important factor is attention.
The other hand saw the man with the extent of forgiving and
understanding people's image, instead of using the word to your files,
allows large messages and concepts should be sent in the shortest
time. Posters, advertisements, brochures, catalog and packaging
products very diverse agricultural, industrial and food could not be
self-image. Today, the use of graphic images for a big score and the
photos to richen the role graphic design plays a major.
Abstract: Multiparty voice over IP (MVoIP) systems allows a group of people to freely communicate each other via the internet, which have many applications such as online gaming, teleconferencing, online stock trading etc. Peertalk is a peer to peer multiparty voice over IP system (MVoIP) which is more feasible than existing approaches such as p2p overlay multicast and coupled distributed processing. Since the stream mixing and distribution are done by the peers, it is vulnerable to major security threats like nodes misbehavior, eavesdropping, Sybil attacks, Denial of Service (DoS), call tampering, Man in the Middle attacks etc. To thwart the security threats, a security framework called PEERTS (PEEred Reputed Trustworthy System for peertalk) is implemented so that efficient and secure communication can be carried out between peers.
Abstract: The focus of the study is to understand the factors of
curriculum innovation from the perspective of Language teacher
education. The overall aim of the study is to investigate Language
educators- perceptions of factors of curriculum innovation. In the
theoretical framework the main focus is on discussion about different
curriculum approaches for language teacher education and limiting
and facilitating factors of innovation. In order to achieve the aim of
the study, an observational research is employed. The empirical basis
of the study consists of questionnaire with sixty-three language
teachers from eight Romanian higher education institutions. The
findings reveal variation in Language teachers- conceptions of the
dominant factors of curricular innovation.
Abstract: Various intelligences and inspirations have been
adopted into the iterative searching process called as meta-heuristics.
They intelligently perform the exploration and exploitation in the
solution domain space aiming to efficiently seek near optimal
solutions. In this work, the bee algorithm, inspired by the natural
foraging behaviour of honey bees, was adapted to find the near
optimal solutions of the transportation management system, dynamic
multi-zone dispatching. This problem prepares for an uncertainty and
changing customers- demand. In striving to remain competitive,
transportation system should therefore be flexible in order to cope
with the changes of customers- demand in terms of in-bound and outbound
goods and technological innovations. To remain higher service
level but lower cost management via the minimal imbalance scenario,
the rearrangement penalty of the area, in each zone, including time
periods are also included. However, the performance of the algorithm
depends on the appropriate parameters- setting and need to be
determined and analysed before its implementation. BEE parameters
are determined through the linear constrained response surface
optimisation or LCRSOM and weighted centroid modified simplex
methods or WCMSM. Experimental results were analysed in terms
of best solutions found so far, mean and standard deviation on the
imbalance values including the convergence of the solutions
obtained. It was found that the results obtained from the LCRSOM
were better than those using the WCMSM. However, the average
execution time of experimental run using the LCRSOM was longer
than those using the WCMSM. Finally a recommendation of proper
level settings of BEE parameters for some selected problem sizes is
given as a guideline for future applications.
Abstract: Multiplication algorithms have considerable effect on
processors performance. A new high-speed, low-power
multiplication algorithm has been presented using modified Dadda
tree structure. Three important modifications have been implemented
in inner product generation step, inner product reduction step and
final addition step. Optimized algorithms have to be used into basic
computation components, such as multiplication algorithms. In this
paper, we proposed a new algorithm to reduce power, delay, and
transistor count of a multiplication algorithm implemented using low
power modified counter. This work presents a novel design for
Dadda multiplication algorithms. The proposed multiplication
algorithm includes structured parts, which have important effect on
inner product reduction tree. In this paper, a 1.3V, 64-bit carry hybrid
adder is presented for fast, low voltage applications. The new 64-bit
adder uses a new circuit to implement the proposed carry hybrid
adder. The new adder using 80 nm CMOS technology has been
implemented on 700 MHz clock frequency. The proposed
multiplication algorithm has achieved 14 percent improvement in
transistor count, 13 percent reduction in delay and 12 percent
modification in power consumption in compared with conventional
designs.
Abstract: Thanks to VR technology advanced, there are many
researches had used VR technology to develop a training system.
Using VR characteristics can simulate many kinds of situations to
reach our training-s goal. However, a good training system not only
considers real simulation but also considers learner-s learning
motivation. So, there are many researches started to conduct game-s
features into VR training system. We typically called this is a serious
game. It is using game-s features to engage learner-s learning
motivation. However, VR or Serious game has another important
advantage. That is simulating feature. Using this feature can create
any kinds of pressured environments. Because in the real
environment may happen any emergent situations. So, increasing the
trainees- pressure is more important when they are training. Most
pervious researches are investigated serious game-s applications and
learning performance. Seldom researches investigated how to
increase the learner-s mental workload when they are training. So, in
our study, we will introduce a real case study and create two types
training environments. Comparing the learner-s mental workload
between VR training and serious game.
Abstract: In general fuzzy sets are used to analyze the fuzzy
system reliability. Here intuitionistic fuzzy set theory for analyzing
the fuzzy system reliability has been used. To analyze the fuzzy
system reliability, the reliability of each component of the system as
a triangular intuitionistic fuzzy number is considered. Triangular
intuitionistic fuzzy number and their arithmetic operations are
introduced. Expressions for computing the fuzzy reliability of a
series system and a parallel system following triangular intuitionistic
fuzzy numbers have been described. Here an imprecise reliability
model of an electric network model of dark room is taken. To
compute the imprecise reliability of the above said system, reliability
of each component of the systems is represented by triangular
intuitionistic fuzzy numbers. Respective numerical example is
presented.
Abstract: Nosocomial (i.e., hospital-acquired) infections
(NI) is a major cause of morbidity and mortality in hospitals. NI
rate is higher in intensive care units (ICU) than in the general
ward due to patients with severe symptoms, poor immunity,
and accepted many invasive therapies. Contact behaviors
between health caregivers and patients is one of the infect
factors. It is difficult to obtain complete contact records by
traditional method of retrospective analysis of medical records.
This paper establishes a contact history inferential model
(CHIM) intended to extend the use of Proximity Sensing of
rapid frequency identification (RFID) technology to
transferring all proximity events between health caregivers and
patients into clinical events (close-in events, contact events and
invasive events).The results of the study indicated that the
CHIM can infer proximity care activities into close-in events
and contact events.
The infection control team could redesign and build optimal
workflow in the ICU according to the patient-specific contact
history which provided by our automatic tracing system.
Abstract: The issue of leadership has been investigated from
several perspectives; however, very less from ethical perspective.
With the growing number of corporate scandals and unethical roles
played by business leaders in several parts of the world, the need to
examine leadership from ethical perspective cannot be over
emphasized. The importance of leadership credibility has been
discussed in the authentic model of leadership. Authentic leaders
display high degree of integrity, have deep sense of purpose, and
committed to their core values. As a result they promote a more
trusting relationship in their work groups that translates into several
positive outcomes. The present study examined how authentic
leadership contribute to subordinates- trust in leadership and how this
trust, in turn, predicts subordinates- work engagement. A sample of
395 employees was randomly selected from several local banks
operating in Malaysia. Standardized tools such as ALQ, OTI, and
EEQ were employed. Results indicated that authentic leadership
promoted subordinates- trust in leader, and contributed to work
engagement. Also, interpersonal trust predicted employees- work
engagement as well as mediated the relationship between this style of
leadership and employees- work engagement.
Abstract: An experimental study is realized in order to verify the
Mini Heat Pipe (MHP) concept for cooling high power dissipation
electronic components and determines the potential advantages of
constructing mini channels as an integrated part of a flat heat pipe. A
Flat Mini Heat Pipe (FMHP) prototype including a capillary structure
composed of parallel rectangular microchannels is manufactured and
a filling apparatus is developed in order to charge the FMHP. The
heat transfer improvement obtained by comparing the heat pipe
thermal resistance to the heat conduction thermal resistance of a
copper plate having the same dimensions as the tested FMHP is
demonstrated for different heat input flux rates. Moreover, the heat
transfer in the evaporator and condenser sections are analyzed, and
heat transfer laws are proposed. In the theoretical part of this work, a
detailed mathematical model of a FMHP with axial microchannels is
developed in which the fluid flow is considered along with the heat
and mass transfer processes during evaporation and condensation.
The model is based on the equations for the mass, momentum and
energy conservation, which are written for the evaporator, adiabatic,
and condenser zones. The model, which permits to simulate several
shapes of microchannels, can predict the maximum heat transfer
capacity of FMHP, the optimal fluid mass, and the flow and thermal
parameters along the FMHP. The comparison between experimental
and model results shows the good ability of the numerical model to
predict the axial temperature distribution along the FMHP.
Abstract: There are many expand of Wi-Fi zones provided
mobile careers and usage of wireless access point at home as increase
of usage of wireless internet caused by the use of smart phone. This
paper shows wireless local area network status, security threats of
WLAN and functionality of major wireless access point in Korea. We
propose security countermeasures concerned with life cycle of access
point from manufacturing to installation, using and finally disposal.
There needed to releasing with configured secure at access point.
Because, it is most cost effective resolution than stage of installation or
other life cycle of access point.
Abstract: In the field of concepts, the measure of Wu and Palmer [1] has the advantage of being simple to implement and have good performances compared to the other similarity measures [2]. Nevertheless, the Wu and Palmer measure present the following disadvantage: in some situations, the similarity of two elements of an IS-A ontology contained in the neighborhood exceeds the similarity value of two elements contained in the same hierarchy. This situation is inadequate within the information retrieval framework. To overcome this problem, we propose a new similarity measure based on the Wu and Palmer measure. Our objective is to obtain realistic results for concepts not located in the same way. The obtained results show that compared to the Wu and Palmer approach, our measure presents a profit in terms of relevance and execution time.
Abstract: In this paper, based on the work in [1], we further give
a general model for acquiring knowledge, which first focuses on the
research of how and when things involved in problems are made
then describes the goals, the energy and the time to give an optimum
model to decide how many related things are supposed to be involved
in. Finally, we acquire knowledge from this model in which there are
the attributes, actions and connections of the things involved at the
time when they are born and the time in their life. This model not
only improves AI theories, but also surely brings the effectiveness
and accuracy for AI system because systems are given more
knowledge when reasoning or computing is used to bring about
results.