Abstract: Calcium is very important for communication among
the neurons. It is vital in a number of cell processes such as secretion,
cell movement, cell differentiation. To reduce the system of reactiondiffusion
equations of [Ca2+] into a single equation, two theories
have been proposed one is excess buffer approximation (EBA) other
is rapid buffer approximation (RBA). The RBA is more realistic than
the EBA as it considers both the mobile and stationary endogenous
buffers. It is valid near the mouth of the channel. In this work we have
studied the effects of different types of buffers on calcium diffusion
under RBA. The novel thing studied is the effect of sodium ions on
calcium diffusion. The model has been made realistic by considering
factors such as variable [Ca2+], [Na+] sources, sodium-calcium
exchange protein(NCX), Sarcolemmal Calcium ATPase pump. The
proposed mathematical leads to a system of partial differential equations
which has been solved numerically to study the relationships
between different parameters such as buffer concentration, buffer
disassociation rate, calcium permeability. We have used Forward
Time Centred Space (FTCS) approach to solve the system of partial
differential equations.
Abstract: The impact of fixed speed squirrel cage type as well as
variable speed doubly fed induction generators (DFIG) on dynamic
performance of a multimachine power system has been investigated.
Detailed models of the various components have been presented and
the integration of asynchronous and synchronous generators has been
carried out through a rotor angle based transform. Simulation studies
carried out considering the conventional dynamic model of squirrel
cage asynchronous generators show that integration, as such, could
degrade to the AC system performance transiently. This article
proposes a frequency or power controller which can effectively
control the transients and restore normal operation of fixed speed
induction generator quickly. Comparison of simulation results
between classical cage and doubly-fed induction generators indicate
that the doubly fed induction machine is more adaptable to
multimachine AC system. Frequency controller installed in the DFIG
system can also improve its transient profile.
Abstract: Geographic Profiling has successfully assisted investigations for serial crimes. Considering the multi-cluster feature of serial criminal spots, we propose a Multi-point Centrography model as a natural extension of Single-point Centrography for geographic profiling. K-means clustering is first performed on the data samples and then Single-point Centrography is adopted to derive a probability distribution on each cluster. Finally, a weighted combinations of each distribution is formed to make next-crime spot prediction. Experimental study on real cases demonstrates the effectiveness of our proposed model.
Abstract: It is an important problem to compute the geodesics on
a surface in many fields. To find the geodesics in practice, however,
the traditional discrete algorithms or numerical approaches can only
find a list of discrete points. The first author proposed in 2010 a new,
elegant and accurate method, the geodesic-like method, for
approximating geodesics on a regular surface. This paper will present
by use of this method a computation of the Bezier geodesic-like curves
on spheres.
Abstract: This paper proposes the authentication method using
ESA algorithm instead of using CAVE algorithm in the CDMA
mobile communication systems including IS-95 and CDMA2000 1x.
And, we analyze to apply ESA mechanism on behalf of CAVE
mechanism without the change of message format and air interface in
the existing CDMA systems. If ESA algorithm can be used as the
substitution of CAVE algorithm, security strength of authentication
algorithm is intensified without protocol change. An algorithm
replacement proposed in this paper is not to change an authentication
mechanism, but to configure input of ESA algorithm and to produce
output. Therefore, our proposal can be the compatible to the existing
systems.
Abstract: Eye localization is necessary for face recognition and
related application areas. Most of eye localization algorithms reported
so far still need to be improved about precision and computational
time for successful applications. In this paper, we propose an eye
location method based on multi-scale Gabor feature vectors, which is
more robust with respect to initial points. The eye localization based
on Gabor feature vectors first needs to constructs an Eye Model Bunch
for each eye (left or right eye) which consists of n Gabor jets and
average eye coordinates of each eyes obtained from n model face
images, and then tries to localize eyes in an incoming face image by
utilizing the fact that the true eye coordinates is most likely to be very
close to the position where the Gabor jet will have the best Gabor jet
similarity matching with a Gabor jet in the Eye Model Bunch. Similar
ideas have been already proposed in such as EBGM (Elastic Bunch
Graph Matching). However, the method used in EBGM is known to be
not robust with respect to initial values and may need extensive search
range for achieving the required performance, but extensive search
ranges will cause much more computational burden. In this paper, we
propose a multi-scale approach with a little increased computational
burden where one first tries to localize eyes based on Gabor feature
vectors in a coarse face image obtained from down sampling of the
original face image, and then localize eyes based on Gabor feature
vectors in the original resolution face image by using the eye
coordinates localized in the coarse scaled image as initial points.
Several experiments and comparisons with other eye localization
methods reported in the other papers show the efficiency of our
proposed method.
Abstract: Radio frequency identification (RFID) applications have grown rapidly in many industries, especially in indoor location identification. The advantage of using received signal strength indicator (RSSI) values as an indoor location measurement method is a cost-effective approach without installing extra hardware. Because the accuracy of many positioning schemes using RSSI values is limited by interference factors and the environment, thus it is challenging to use RFID location techniques based on integrating positioning algorithm design. This study proposes the location estimation approach and analyzes a scheme relying on RSSI values to minimize location errors. In addition, this paper examines different factors that affect location accuracy by integrating the backpropagation neural network (BPN) with the LANDMARC algorithm in a training phase and an online phase. First, the training phase computes coordinates obtained from the LANDMARC algorithm, which uses RSSI values and the real coordinates of reference tags as training data for constructing an appropriate BPN architecture and training length. Second, in the online phase, the LANDMARC algorithm calculates the coordinates of tracking tags, which are then used as BPN inputs to obtain location estimates. The results show that the proposed scheme can estimate locations more accurately compared to LANDMARC without extra devices.
Abstract: The purpose of this research is to develop a security model for voice eavesdropping protection over digital networks. The proposed model provides an encryption scheme and a personal secret key exchange between communicating parties, a so-called voice data transformation system, resulting in a real-privacy conversation. The operation of this system comprises two main steps as follows: The first one is the personal secret key exchange for using the keys in the data encryption process during conversation. The key owner could freely make his/her choice in key selection, so it is recommended that one should exchange a different key for a different conversational party, and record the key for each case into the memory provided in the client device. The next step is to set and record another personal option of encryption, either taking all frames or just partial frames, so-called the figure of 1:M. Using different personal secret keys and different sets of 1:M to different parties without the intervention of the service operator, would result in posing quite a big problem for any eavesdroppers who attempt to discover the key used during the conversation, especially in a short period of time. Thus, it is quite safe and effective to protect the case of voice eavesdropping. The results of the implementation indicate that the system can perform its function accurately as designed. In this regard, the proposed system is suitable for effective use in voice eavesdropping protection over digital networks, without any requirements to change presently existing network systems, mobile phone network and VoIP, for instance.
Abstract: Educational games (EG) seem to have lots of potential due to digital games popularity and preferences of our younger generations of learners. However, most studies focus on game design and its effectiveness while little has been known about the factors that can affect users to accept or to reject EG for their learning. User acceptance research try to understand the determinants of information systems (IS) adoption among users by investigating both systems factors and users factors. Upon the lack of knowledge on acceptance factors for educational games, we seek to understand the issue. This study proposed a model of acceptance factors based on Unified Theory of Acceptance and Use of Technology (UTAUT). We use original model (performance expectancy, effort expectancy and social influence) together with two new determinants (learning opportunities and enjoyment). We will also investigate the effect of gender and gaming experience that moderate the proposed factors.
Abstract: In this paper the authors propose and verify an approach to control heat flow in machine tool components. Thermal deformations are a main aspect that affects the accuracy of machining. Due to goals of energy efficiency, thermal basic loads should be reduced. This leads to inhomogeneous and time variant temperature profiles. To counteract these negative consequences, material with high melting enthalpy is used as a method for thermal stabilization. The increased thermal capacity slows down the transient thermal behavior. To account for the delayed thermal equilibrium, a control mechanism for thermal flow is introduced. By varying a gap in a heat flow path the thermal resistance of an assembly can be controlled. This mechanism is evaluated in two experimental setups. First to validate the ability to control the thermal resistance and second to prove the possibility of a self-sufficient option based on the selfsensing abilities of thermal shape memory alloys.
Abstract: In this paper, a Neural Network based predictive
DTC algorithm is proposed .This approach is used as an
alternative to classical approaches .An appropriate riate Feed -
forward network is chosen and based on its value of
derivative electromagnetic torque ; optimal stator voltage
vector is determined to be applied to the induction motor (by
inverter). Moreover, an appropriate torque and flux observer
is proposed.
Abstract: It is estimated that the total cost of abnormal
conditions to US process industries is around $20 billion dollars in
annual losses. The hydrotreatment (HDT) of diesel fuel in petroleum
refineries is a conversion process that leads to high profitable
economical returns. However, this is a difficult process to control
because it is operated continuously, with high hydrogen pressures
and it is also subject to disturbances in feed properties and catalyst
performance. So, the automatic detection of fault and diagnosis plays
an important role in this context. In this work, a hybrid approach
based on neural networks together with a pos-processing
classification algorithm is used to detect faults in a simulated HDT
unit. Nine classes (8 faults and the normal operation) were correctly
classified using the proposed approach in a maximum time of 5
minutes, based on on-line data process measurements.
Abstract: In this paper, we propose a high capacity image hiding
technology based on pixel prediction and the difference of modified histogram. This approach is used the pixel prediction and the
difference of modified histogram to calculate the best embedding point.
This approach can improve the predictive accuracy and increase the pixel difference to advance the hiding capacity. We also use the
histogram modification to prevent the overflow and underflow. Experimental results demonstrate that our proposed method within the
same average hiding capacity can still keep high quality of image and low distortion
Abstract: Introduction applicability of high-speed cutting stock problem (CSP) is presented in this paper. Due to the orders continued coming in from various on-line ways for a professional cutting company, to stay competitive, such a business has to focus on sustained production at high levels. In others words, operators have to keep the machine running to stay ahead of the pack. Therefore, the continuous stock cutting problem with setup is proposed to minimize the cutting time and pattern changing time to meet the on-line given demand. In this paper, a novel method is proposed to solve the problem directly by using cutting patterns directly. A major advantage of the proposed method in series on-line production is that the system can adjust the cutting plan according to the floating orders. Examples with multiple items are demonstrated. The results show considerable efficiency and reliability in high-speed cutting of CSP.
Abstract: Optical burst switching(OBS) is considered as one of
preferable network technologies for the next generation Internet. The
Internet has two traffic classes, i.e. real-time bursts and reliable bursts.
It is an important subject for OBS to achieve cooperated operation of
real-time bursts and reliable bursts. In this paper, we proposes a new
effective traffic control method named Separate TB+LB (Token
Bucket + Leaky Bucket : TB+LB) method. The proposed method
presents a new Token Bucket scheme for real-time bursts called as
RBO-TB (Real-time Bursts Oriented Token Bucket). The method also
applies the LB method to reliable bursts for obtaining better
performance. This paper verifies the effectiveness of the Separate
TB+LB method through the performance evaluation.
Abstract: Here, a new idea to speed up the operation of
complex valued time delay neural networks is presented. The whole
data are collected together in a long vector and then tested as a one
input pattern. The proposed fast complex valued time delay neural
networks uses cross correlation in the frequency domain between the
tested data and the input weights of neural networks. It is proved
mathematically that the number of computation steps required for
the presented fast complex valued time delay neural networks is less
than that needed by classical time delay neural networks. Simulation
results using MATLAB confirm the theoretical computations.
Abstract: In this paper, a new reversible watermarking method is presented that reduces the size of a stereoscopic image sequence while keeping its content visible. The proposed technique embeds the residuals of the right frames to the corresponding frames of the left sequence, halving the total capacity. The residual frames may result in after a disparity compensated procedure between the two video streams or by a joint motion and disparity compensation. The residuals are usually lossy compressed before embedding because of the limited embedding capacity of the left frames. The watermarked frames are visible at a high quality and at any instant the stereoscopic video may be recovered by an inverse process. In fact, the left frames may be exactly recovered whereas the right ones are slightly distorted as the residuals are not embedded intact. The employed embedding method reorders the left frame into an array of consecutive pixel pairs and embeds a number of bits according to their intensity difference. In this way, it hides a number of bits in intensity smooth areas and most of the data in textured areas where resulting distortions are less visible. The experimental evaluation demonstrates that the proposed scheme is quite effective.
Abstract: The reliability of distributed systems and computer
networks have been modeled by a probabilistic network or a graph G.
Computing the residual connectedness reliability (RCR), denoted by
R(G), under the node fault model is very useful, but is an NP-hard
problem. Since it may need exponential time of the network size to
compute the exact value of R(G), it is important to calculate its tight
approximate value, especially its lower bound, at a moderate
calculation time. In this paper, we propose an efficient algorithm for
reliability lower bound of distributed systems with unreliable nodes.
We also applied our algorithm to several typical classes of networks
to evaluate the lower bounds and show the effectiveness of our
algorithm.
Abstract: One of the most important problems to solve is eye
location for a driver fatigue monitoring system. This paper presents an
efficient method to achieve fast and accurate eye location in grey level
images obtained in the real-word driving conditions. The structure of
eye region is used as a robust cue to find possible eye pairs. Candidates
of eye pair at different scales are selected by finding regions which
roughly match with the binary eye pair template. To obtain real one,
all the eye pair candidates are then verified by using support vector
machines. Finally, eyes are precisely located by using binary vertical
projection and eye classifier in eye pair images. The proposed method
is robust to deal with illumination changes, moderate rotations, glasses
wearing and different eye states. Experimental results demonstrate its
effectiveness.
Abstract: spherical porous carbon particles with
controllable porosity with a mean size of 2.5m have been
prepared using a spray drying method with organic particle
colloidal template. As a precursor, a mixing solution of carbon
nanopowder and polystyrene (PS) particles as a template was
used. The result showed that the particles with a good porous
structure could be obtained. The pore size and shape (spherical)
were identical to the initial template, giving a potential way for
further developments. The control of particle porosity was also
possible and reported in this paper, in which this control could
be achieved by means of PS concentration.