Abstract: This study focuses on the development of triangular fuzzy numbers, the revising of triangular fuzzy numbers, and the constructing of a HCFN (half-circle fuzzy number) model which can be utilized to perform more plural operations. They are further transformed for trigonometric functions and polar coordinates. From half-circle fuzzy numbers we can conceive cylindrical fuzzy numbers, which work better in algebraic operations. An example of fuzzy control is given in a simulation to show the applicability of the proposed half-circle fuzzy numbers.
Abstract: This work deals with aspects of support vector machine learning for large-scale data mining tasks. Based on a decomposition algorithm for support vector machine training that can be run in serial as well as shared memory parallel mode we introduce a transformation of the training data that allows for the usage of an expensive generalized kernel without additional costs. We present experiments for the Gaussian kernel, but usage of other kernel functions is possible, too. In order to further speed up the decomposition algorithm we analyze the critical problem of working set selection for large training data sets. In addition, we analyze the influence of the working set sizes onto the scalability of the parallel decomposition scheme. Our tests and conclusions led to several modifications of the algorithm and the improvement of overall support vector machine learning performance. Our method allows for using extensive parameter search methods to optimize classification accuracy.
Abstract: This essay endeavors to read Ama Ata Aidoo-s Our Sister Killjoy with a postocolonially-inflected consciousness. It aims at demonstrating how her work could be read as a sophisticated postcolonial revision of the colonial travel narrative whereby the protagonist-s black-eyed squint operates as 'the all-seeing-eye' to subvert the historically unbroken legacy of the Orientalist ideology. It tries to demonstrate how Sissie assumes authority and voice in an act that destabilizes the traditionally established modes of western representation. It is also an investigation into how Aidoo-s text adopts processes which disengage the Eurocentric view produced by the discursive itineraries of western institutions through diverse acts of resistance and 'various strategies of subversion and appropriation'. Her counter discursive strategies of resistance are shaped up in various ways by a feminist consciousness that attempts to articulate a distinct African version of identity and preserve cultural distinctiveness.
Abstract: Wimax (Worldwide Interoperability for Microwave Access)
is a promising technology which can offer high speed data,
voice and video service to the customer end, which is presently, dominated
by the cable and digital subscriber line (DSL) technologies.
The performance assessment of Wimax systems is dealt with. The
biggest advantage of Broadband wireless application (BWA) over its
wired competitors is its increased capacity and ease of deployment.
The aims of this paper are to model and simulate the fixed OFDM
IEEE 802.16d physical layer under variant combinations of digital
modulation (BPSK, QPSK, and 16-QAM) over diverse combination
of fading channels (AWGN, SUIs). Stanford University Interim (SUI)
Channel serial was proposed to simulate the fixed broadband wireless
access channel environments where IEEE 802.16d is to be deployed.
It has six channel models that are grouped into three categories
according to three typical different outdoor Terrains, in order to give
a comprehensive effect of fading channels on the overall performance
of the system.
Abstract: The Bulgarian natural expanded mineral obtained from Bentonite AD perlite (A deposit of "The Broken Mountain" for perlite mining, near by the village of Vodenicharsko, in the municipality of Djebel), was loaded with silver (as ion form - Ag+ 2 and 5 wt% by the incipient wetness impregnation method), and as atomic silver - Ag0 using Tollen-s reagent (silver mirror reaction). Some physicochemical characterization of the samples are provided via: DC arc-AES, XRD, DR-IR and UV-VIS. The aim of this work was to obtain and test the silver-loaded catalyst for ozone decomposition. So the samples loaded with atomic silver show ca. 80% conversion of ozone 20 minutes after the reaction start. Then conversion decreases to ca. 20 % but stay stable during the prolongation of time.
Abstract: A product development for green logistics model using
the fuzzy analytic network process method is presented for evaluating
the relationships among the product design, the manufacturing
activities, and the green supply chain. In the product development
stage, there can be alternative ways to design the detailed components
to satisfy the design concept and product requirement. In different
design alternative cases, the manufacturing activities can be different.
In addition, the manufacturing activities can affect the green supply
chain of the components and product. In this research, a fuzzy analytic
network process evaluation model is presented for evaluating the
criteria in product design, manufacturing activities, and green supply
chain. The comparison matrices for evaluating the criteria among the
three groups are established. The total relational values between the
three groups represent the relationships and effects. In application, the
total relational values can be used to evaluate the design alternative
cases for decision-making to select a suitable design case and the green
supply chain. In this presentation, an example product is illustrated. It
shows that the model is useful for integrated evaluation of design and
manufacturing and green supply chain for the purpose of product
development for green logistics.
Abstract: As far as the latest technological improvements are concerned, digital systems more become popular than the past. Despite this growing demand to the digital systems, content copy and attack against the digital cinema contents becomes a serious problem. To solve the above security problem, we propose “traceable watermarking using Hash functions for digital cinema system. Digital Cinema is a great application for traceable watermarking since it uses watermarking technology during content play as well as content transmission. The watermark is embedded into the randomly selected movie frames using CRC-32 techniques. CRC-32 is a Hash function. Using it, the embedding position is distributed by Hash Function so that any party cannot break off the watermarking or will not be able to change. Finally, our experimental results show that proposed DWT watermarking method using CRC-32 is much better than the convenient watermarking techniques in terms of robustness, image quality and its simple but unbreakable algorithm.
Abstract: This paper proposes a novel methodology for enabling
debugging and tracing of production web applications without
affecting its normal flow and functionality. This method of debugging
enables developers and maintenance engineers to replace a set of
existing resources such as images, server side scripts, cascading
style sheets with another set of resources per web session. The new
resources will only be active in the debug session and other sessions
will not be affected. This methodology will help developers in tracing
defects, especially those that appear only in production environments
and in exploring the behaviour of the system. A realization of the
proposed methodology has been implemented in Java.
Abstract: In this paper an algorithm for fast wavelength calibration of Optical Spectrum Analyzers (OSAs) using low power reference gas spectra is proposed. In existing OSAs a reference spectrum with low noise for precise detection of the reference extreme values is needed. To generate this spectrum costly hardware with high optical power is necessary. With this new wavelength calibration algorithm it is possible to use a noisy reference spectrum and therefore hardware costs can be cut. With this algorithm the reference spectrum is filtered and the key information is extracted by segmenting and finding the local minima and maxima. Afterwards slope and offset of a linear correction function for best matching the measured and theoretical spectra are found by correlating the measured with the stored minima. With this algorithm a reliable wavelength referencing of an OSA can be implemented on a microcontroller with a calculation time of less than one second.
Abstract: Experiments were carried out at the Faculty of Food
Technology of Latvia University of Agriculture (LLU). Soft cheese
Kleo produced in Latvia was packed in a biodegradable PLA without
barrierproperties and VC999 BioPack lidding film PLA, coated with
a barrier of pure silicon oxide (SiOx) and in combination with
modified atmosphere (MAP) the influence on the shelf life was
investigated and compared with some conventional (OPP, PE/PA,
PE/OPA and Multibarrier 60) polymer film impact. Modified
atmosphere consisted of carbon dioxide CO2 (E 290) 30% and
nitrogen N2 (E 941) 70%. The analyzable samples were stored at the
temperature of +4.0±0.5 °C up to 32 days- and analyzed before
packaging and in the 0, 5th, 11th, 15th, 18th, 22nd, 25th, 29th and 32nd
day of storage. The shelf life was extended along to 32 days, good
outside appearance and lactic acid aroma was observed.
Abstract: The common practice of operating S-rotor is in an
open environment; however there are times when the rotor is
installed in a bounded environment and there might be changes in the
performance of the rotor. This paper presents the changes in the
performance of S-rotor when operated in bounded flows. The
investigation was conducted experimentally to compare the
performance of the rotors in bounded environment against open
environment. Three different rotors models were designed, fabricated
and subjected to experimental measurements. All of the three models
were having 600 mm height and 300 mm Diameter. They were tested
in three different flow environments; namely: partially bounded
environment, fully bounded environment and open environment.
Rotors were found to have better starting up capabilities when
operated in bounded environment. Apart from that, all rotors manage
to achieve higher Power and Torque Coefficients at a higher Tip
Speed Ratio as compared to the open environment.
Abstract: An ethical mandate of the social work profession in the
United States is that BSW and MSW graduates are sufficiently
prepared to both understand diverse cultural values and beliefs and
offer services that are culturally sensitive and relevant to clients. This
skill set is particularly important for social workers in the 21st Century,
given the increasing globalization of the U.S. and world. The purpose
of this paper is to outline a pedagogical model for teaching cultural
competency that resulted in a significant increase in cultural
competency for MSW graduates at Western Kentucky University
(WKU). More specifically, this model is predicated on five specific
culturally sensitive principles and activities that were found to be
highly effective in conveying culturally relevant knowledge and skills
to MSW students at WKU. Future studies can assess the effectiveness
of these principles in other MSW programs across the U.S. and abroad.
Abstract: This paper presents a novel approach to assessing textile porosity by the application of the image analysis techniques. The images of different types of sample fabrics, taken through a microscope when the fabric is placed over a constant light source,transfer the problem into the image analysis domain. Indeed, porosity can thus be expressed in terms of a brightness percentage index calculated on the digital microscope image. Furthermore, it is meaningful to compare the brightness percentage index with the air permeability and the tightness indices of each fabric type. We have experimentally shown that there exists an approximately linear relation between brightness percentage and air permeability indices.
Abstract: Routing in mobile ad hoc networks is a challenging task because nodes are free to move randomly. In DSR like all On- Demand routing algorithms, route discovery mechanism is associated with great delay. More Clearly in DSR routing protocol to send route reply packet, when current route breaks, destination seeks a new route. In this paper we try to change route selection mechanism proactively. We also define a link stability parameter in which a stability value is assigned to each link. Given this feature, destination node can estimate stability of routes and can select the best and more stable route. Therefore we can reduce the delay and jitter of sending data packets.
Abstract: In the package design industry, there are a lot of tacit knowledge resided within each designer. The objectives are to capture them and compile it to be used as a teaching resource and to create a video clip of package design process as well as to evaluate its quality and learning effectiveness. Interview were used as a technique for capturing knowledge in brand design concept, differentiation, recognition, rank of recognition factor, consumer survey, knowledge about marketing, research, graphic design, the effect of color, and law and regulation. Video clip about package design were created. The clip consisted of both the speech and clip of actual process. The quality of the video in term of media was ranked as good while the content was ranked as excellent. The students- score on post-test was significantly greater than that of pretest (p>0.001).
Abstract: This paper deals with the problem of non-uniform
torsion in thin-walled elastic beams with asymmetric cross-section,
removing the basic concept of a fixed center of twist, necessary in the
Vlasov-s and Benscoter-s theories to obtain a warping stress field
equivalent to zero. In this new torsion/flexure theory, despite of the
classical ones, the warping function will punctually satisfy the first
indefinite equilibrium equation along the beam axis and it wont- be
necessary to introduce the classical congruence condition, to take into
account the effect of the beam restraints. The solution, based on the
Fourier development of the displacement field, is obtained assuming
that the applied external torque is constant along the beam axis and
on both beam ends the unit twist angle and the warping axial
displacement functions are totally restrained.
Finally, in order to verify the feasibility of the proposed method
and to compare it with the classical theories, two applications are
carried out. The first one, relative to an open profile, is necessary to
test the numerical method adopted to find the solution; the second
one, instead, is relative to a simplified containership section,
considered as full restrained in correspondence of two adjacent
transverse bulkheads.
Abstract: Developing a nation geared by the principle of
sustainable development has been one of the piers in moulding a
greater nation for Malaysia since its independence. This is seen by
the act of joining the United Nations in 1957, just a month after
gaining their independence. The United Nations is an international
organization that aims to unite the nations worldwide based on
justice, human dignity and human well-being. Malaysia has
established a local body called the United Nations Malaysia which
collaborates with the government to accomplish the aim of
supporting sustainable development in Malaysia. Agenda 21 is an
international document produced from the Earth Summit providing
guidelines of implementing sustainable development globally,
nationally and locally. Initiatives of applying Agenda 21 in Malaysia
have been taken by the government and non-profit organizations to
expose issues regarding sustainable development and providing
environmental education to the community to increase awareness
towards environmental protection.
Abstract: The lack of security obstructs a large scale de- ployment of the multicast communication model. There- fore, a host of research works have been achieved in order to deal with several issues relating to securing the multicast, such as confidentiality, authentication, non-repudiation, in- tegrity and access control. Many applications require au- thenticating the source of the received traffic, such as broadcasting stock quotes and videoconferencing and hence source authentication is a required component in the whole multicast security architecture. In this paper, we propose a new and efficient source au- thentication protocol which guarantees non-repudiation for multicast flows, and tolerates packet loss. We have simu- lated our protocol using NS-2, and the simulation results show that the protocol allows to achieve improvements over protocols fitting into the same category.
Abstract: The increase on the demand of IT resources diverts
the enterprises to use the cloud as a cheap and scalable solution.
Cloud computing promises achieved by using the virtual machine as a
basic unite of computation. However, the virtual machine pre-defined
settings might be not enough to handle jobs QoS requirements. This
paper addresses the problem of mapping jobs have critical start
deadlines to virtual machines that have predefined specifications.
These virtual machines hosted by physical machines and shared a
fixed amount of bandwidth. This paper proposed an algorithm that
uses the idle virtual machines bandwidth to increase the quote of other
virtual machines nominated as executors to urgent jobs. An algorithm
with empirical study have been given to evaluate the impact of the
proposed model on impatient jobs. The results show the importance
of dynamic bandwidth allocation in virtualized environment and its
affect on throughput metric.
Abstract: This paper presents an ESN-based Arabic phoneme
recognition system trained with supervised, forced and combined
supervised/forced supervised learning algorithms. Mel-Frequency
Cepstrum Coefficients (MFCCs) and Linear Predictive Code (LPC)
techniques are used and compared as the input feature extraction
technique. The system is evaluated using 6 speakers from the King
Abdulaziz Arabic Phonetics Database (KAPD) for Saudi Arabia
dialectic and 34 speakers from the Center for Spoken Language
Understanding (CSLU2002) database of speakers with different
dialectics from 12 Arabic countries. Results for the KAPD and
CSLU2002 Arabic databases show phoneme recognition
performances of 72.31% and 38.20% respectively.