Abstract: This paper presents a wavelet transform and Support
Vector Machine (SVM) based algorithm for estimating fault location
on transmission lines. The Discrete wavelet transform (DWT) is used
for data pre-processing and this data are used for training and testing
SVM. Five types of mother wavelet are used for signal processing to
identify a suitable wavelet family that is more appropriate for use in
estimating fault location. The results demonstrated the ability of SVM
to generalize the situation from the provided patterns and to
accurately estimate the location of faults with varying fault resistance.
Abstract: The log periodogram regression is widely used in empirical
applications because of its simplicity, since only a least squares
regression is required to estimate the memory parameter, d, its good
asymptotic properties and its robustness to misspecification of the
short term behavior of the series. However, the asymptotic distribution
is a poor approximation of the (unknown) finite sample distribution
if the sample size is small. Here the finite sample performance of different
nonparametric residual bootstrap procedures is analyzed when
applied to construct confidence intervals. In particular, in addition to
the basic residual bootstrap, the local and block bootstrap that might
adequately replicate the structure that may arise in the errors of the
regression are considered when the series shows weak dependence in
addition to the long memory component. Bias correcting bootstrap
to adjust the bias caused by that structure is also considered. Finally,
the performance of the bootstrap in log periodogram regression based
confidence intervals is assessed in different type of models and how
its performance changes as sample size increases.
Abstract: The goal of speech parameterization is to extract the relevant information about what is being spoken from the audio signal. In speech recognition systems Mel-Frequency Cepstral Coefficients (MFCC) and Relative Spectral Mel-Frequency Cepstral Coefficients (RASTA-MFCC) are the two main techniques used. It will be shown in this paper that it presents some modifications to the original MFCC method. In our work the effectiveness of proposed changes to MFCC called Modified Function Cepstral Coefficients (MODFCC) were tested and compared against the original MFCC and RASTA-MFCC features. The prosodic features such as jitter and shimmer are added to baseline spectral features. The above-mentioned techniques were tested with impulsive signals under various noisy conditions within AURORA databases.
Abstract: Efficient modulo 2n+1 adders are important for
several applications including residue number system, digital signal
processors and cryptography algorithms. In this paper we present a
novel modulo 2n+1 addition algorithm for a recently represented
number system. The proposed approach is introduced for the
reduction of the power dissipated. In a conventional modulo 2n+1
adder, all operands have (n+1)-bit length. To avoid using (n+1)-bit
circuits, the diminished-1 and carry save diminished-1 number
systems can be effectively used in applications. In the paper, we also
derive two new architectures for designing modulo 2n+1 adder, based
on n-bit ripple-carry adder. The first architecture is a faster design
whereas the second one uses less hardware. In the proposed method,
the special treatment required for zero operands in Diminished-1
number system is removed. In the fastest modulo 2n+1 adders in
normal binary system, there are 3-operand adders. This problem is
also resolved in this paper. The proposed architectures are compared
with some efficient adders based on ripple-carry adder and highspeed
adder. It is shown that the hardware overhead and power
consumption will be reduced. As well as power reduction, in some
cases, power-delay product will be also reduced.
Abstract: Value engineering is an efficacious contraption for
administrators to make up their minds. Value perusals proffer the
gaffers a suitable instrument to decrease the expenditures of the life
span, quality amelioration, structural improvement, curtailment of the
construction schedule, longevity prolongation or a merging of the
aforementioned cases. Subjecting organizers to pressures on one
hand and their accountability towards their pertinent fields together
with inherent risks and ambiguities of other options on the other hand
set some comptrollers in a dilemma utilization of risk management
and the value engineering in projects manipulation with regard to
complexities of implementing projects can be wielded as a
contraption to identify and efface each item which wreaks
unnecessary expenses and time squandering sans inflicting any
damages upon the essential project applications. Of course It should
be noted that implementation of risk management and value
engineering with regard to the betterment of efficiency and functions
may lead to the project implementation timing elongation. Here time
revamping does not refer to time diminishing in the whole cases. his
article deals with risk and value engineering conceptualizations at
first. The germane reverberations effectuated due to its execution in
Iran Khodro Corporation are regarded together with the joint features
and amalgamation of the aforesaid entia; hence the proposed
blueprint is submitted to be taken advantage of in engineering and
industrial projects including Iran Khodro Corporation.
Abstract: The hard clam (meretrix lusoria) cultivated industry
has been developed vigorously for recent years in Taiwan, and
seawater quality determines the cultivated environment. The pH
concentration variation affects survival rate of meretrix lusoria
immediately. In order to monitor seawater quality, solid-state sensing
electrode of ruthenium-doped titanium dioxide (TiO2:Ru) is developed
to measure hydrogen ion concentration in different cultivated
solutions. Because the TiO2:Ru sensing electrode has high chemical
stability and superior sensing characteristics, thus it is applied as a pH
sensor. Response voltages of TiO2:Ru sensing electrode are readout by
instrument amplifier in different sample solutions. Mean sensitivity
and linearity of TiO2:Ru sensing electrode are 55.20 mV/pH and 0.999
from pH1 to pH13, respectively. We expect that the TiO2:Ru sensing
electrode can be applied to real environment measurement, therefore
we collect two sample solutions by different meretrix lusoria
cultivated ponds in the Yunlin, Taiwan. The two sample solutions are
both measured for 200 seconds after calibration of standard pH buffer
solutions (pH7, pH8 and pH 9). Mean response voltages of sample 1
and sample 2 are -178.758 mV (Standard deviation=0.427 mV) and
-180.206 mV (Standard deviation =0.399 mV), respectively. Response
voltages of the two sample solutions are between pH 8 and pH 9 which
conform to weak alkali range and suitable meretrix lusoria growth. For
long-term monitoring, drift of cultivated solutions (sample 1 and
sample 2) are 1.16 mV/hour and 1.03 mV/hour, respectively.
Abstract: Today-s children, who are born into a more colorful,
more creative, more abstract and more accessible communication
environment than their ancestors as a result of dizzying advances in
technology, have an interesting capacity to perceive and make sense
of the world. Millennium children, who live in an environment where
all kinds of efforts by marketing communication are more intensive
than ever are, from their early childhood on, subject to all kinds of
persuasive messages. As regards advertising communication, it
outperforms all the other marketing communication efforts in
creating little consumer individuals and, as a result of processing of
codes and signs, plays a significant part in building a world of seeing,
thinking and understanding for children. Children who are raised with
metaphorical expressions such as tales and riddles also meet that fast
and effective meaning communication in advertisements.
Children-s perception of metaphors, which help grasp the “product
and its promise" both verbally and visually and facilitate association
between them is the subject of this study. Stimulating and activating
imagination, metaphors have unique advantages in promoting the
product and its promise especially in regard to print advertisements,
which have certain limitations. This study deals comparatively with
both literal and metaphoric versions of print advertisements
belonging to various product groups and attempts to discover to what
extent advertisements are liked, recalled, perceived and are
persuasive. The sample group of the study, which was conducted in
two elementary schools situated in areas that had different socioeconomic
features, consisted of children aged 12.
Abstract: Recently ORC(Organic Rankine Cycle) has attracted
much attention due to its potential in reducing consumption of fossil
fuels and its favorable characteristics to exploit low-grade heat sources.
In this work thermodynamic performance of ORC with superheating of
vapor is comparatively assessed for various working fluids. Special
attention is paid to the effects of system parameters such as the evaporating
temperature and the turbine inlet temperature on the characteristics
of the system such as maximum possible work extraction from
the given source, volumetric flow rate per 1 kW of net work and
quality of the working fluid at turbine exit as well as thermal and
exergy efficiencies. Results show that for a given source the thermal
efficiency increases with decrease of the superheating but exergy
efficiency may have a maximum value with respect to the superheating
of the working fluid. Results also show that in selection of working
fluid it is required to consider various criteria of performance characteristics
as well as thermal efficiency.
Abstract: Aerospace vehicles are subjected to non-uniform
thermal loading that may cause thermal buckling. A study was
conducted on the thermal post-buckling of shape memory alloy
composite plates subjected to the non-uniform tent-like temperature
field. The shape memory alloy wires were embedded within the
laminated composite plates to add recovery stress to the plates. The
non-linear finite element model that considered the recovery stress of
the shape memory alloy and temperature dependent properties of the
shape memory alloy and composite matrix along with its source
codes were developed. It was found that the post-buckling paths of
the shape memory alloy composite plates subjected to various tentlike
temperature fields were stable within the studied temperature
range. The addition of shape memory alloy wires to the composite
plates was found to significantly improve the post-buckling behavior
of laminated composite plates under non-uniform temperature
distribution.
Abstract: In this paper, we describe a rule-based message passing method to support developing collaborative applications, in which multiple users share resources in distributed environments. Message communications of applications in collaborative environments tend to be very complex because of the necessity to manage context situations such as sharing events, access controlling of users, and network places. In this paper, we propose a message communications method based on unification of artificial intelligence and logic programming for defining rules of such context information in a procedural object-oriented programming language. We also present an implementation of the method as java classes.
Abstract: Text similarity measurement is a fundamental issue in
many textual applications such as document clustering, classification,
summarization and question answering. However, prevailing approaches
based on Vector Space Model (VSM) more or less suffer
from the limitation of Bag of Words (BOW), which ignores the semantic
relationship among words. Enriching document representation
with background knowledge from Wikipedia is proven to be an effective
way to solve this problem, but most existing methods still
cannot avoid similar flaws of BOW in a new vector space. In this
paper, we propose a novel text similarity measurement which goes
beyond VSM and can find semantic affinity between documents.
Specifically, it is a unified graph model that exploits Wikipedia as
background knowledge and synthesizes both document representation
and similarity computation. The experimental results on two different
datasets show that our approach significantly improves VSM-based
methods in both text clustering and classification.
Abstract: Nowadays, the importance of energy saving is clearance to everyone. By attention to increasing price of fuels and also the problems of environment pollutions, there are the most efforts for using fuels littler and more optimum in everywhere. This essay studies optimizing of gas consumption in gas-burner space heaters. In oven of each gas-burner space heaters there is two snags to prevent the hot air (the result of combustion of natural gas) to go out of oven of the gas-burner space heaters directly without delivering its heat to the space of favorite environment like a room. These snags cause a excess circulating that helps hot air deliver its heat to the space of favorite environment. It means the exhaust air temperature will be decreased then when there are no snags. This is the aim of this essay to use maximum potential energy of the natural gas to make heat. In this study, by the help of a finite volume software (FLUENT) consumption of the gas-burner space heaters is simulated and optimized. At the end of this writing, by comparing the results of software and experimental results, it will be proved the authenticity of this method.
Abstract: Breast cancer is one of the most frequent occurring cancers in women throughout the world including U.K. The grading of this cancer plays a vital role in the prognosis of the disease. In this paper we present an overview of the use of advanced computational method of fuzzy inference system as a tool for the automation of breast cancer grading. A new spectral data set obtained from Fourier Transform Infrared Spectroscopy (FTIR) of cancer patients has been used for this study. The future work outlines the potential areas of fuzzy systems that can be used for the automation of breast cancer grading.
Abstract: The study investigated the educational implications
that can be derived from the work of a variety of celebrated figures
such as Piaget, Vygotsky, and Bruner that will be helpful in the field
of language learning. However, the writer believed these views were
previously expressed not full–fledged by Comenius who has been
described by Howatt (1984) as a genius–the one that the history of
language teaching can claim. And we owe to him more than anyone.
Abstract: This paper examines economic and Information and Communication Technology (ICT) development influence on recently increasing Internet purchases by individuals for European Union member states. After a growing trend for Internet purchases in EU27 was noticed, all possible regression analysis was applied using nine independent variables in 2011. Finally, two linear regression models were studied in detail. Conducted simple linear regression analysis confirmed the research hypothesis that the Internet purchases in analyzed EU countries is positively correlated with statistically significant variable Gross Domestic Product per capita (GDPpc). Also, analyzed multiple linear regression model with four regressors, showing ICT development level, indicates that ICT development is crucial for explaining the Internet purchases by individuals, confirming the research hypothesis.
Abstract: The morphological short-term evolution of Ponta do Tubarão Island (PTI) was investigated through high accurate surveys based on post-processed kinematic (PPK) relative positioning on Global Navigation Satellite Systems (GNSS). PTI is part of a barrier island system on a high energy northeast Brazilian coastal environment and also an area of high environmental sensitivity. Surveys were carried out quarterly over a two years period from May 2010 to May 2012. This paper assesses statically the performance of digital elevation models (DEM) derived from different interpolation methods to represent morphologic features and to quantify volumetric changes and TIN models shown the best results to that purposes. The MDE allowed quantifying surfaces and volumes in detail as well as identifying the most vulnerable segments of the PTI to erosion and/or accumulation of sediments and relate the alterations to climate conditions. The coastal setting and geometry of PTI protects a significant mangrove ecosystem and some oil and gas facilities installed in the vicinities from damaging effects of strong oceanwaves and currents. Thus, the maintenance of PTI is extremely required but the prediction of its longevity is uncertain because results indicate an irregularity of sedimentary balance and a substantial decline in sediment supply to this coastal area.
Abstract: The complex shape of the human pelvic bone was
successfully imaged and modeled using finite element FE processing.
The bone was subjected to quasi-static and dynamic loading
conditions simulating the effect of both weight gain and impact.
Loads varying between 500 – 2500 N (~50 – 250 Kg of weight) was
used to simulate 3D quasi-static weight gain. Two different 3D
dynamic analyses, body free fall at two different heights (1 and 2 m)
and forced side impact at two different velocities (20 and 40 Km/hr)
were also studied. The computed resulted stresses were compared for
the four loading cases, where Von Misses stresses increases linearly
with the weight gain increase under quasi-static loading. For the
dynamic models, the Von Misses stress history behaviors were
studied for the affected area and effected load with respect to time.
The normalization Von Misses stresses with respect to the applied
load were used for comparing the free fall and the forced impact load
results. It was found that under the forced impact loading condition
an over lapping behavior was noticed, where as for the free fall the
normalized Von Misses stresses behavior was found to nonlinearly
different. This phenomenon was explained through the energy
dissipation concept. This study will help designers in different
specialization in defining the weakest spots for designing different
supporting systems.
Abstract: Sixteen selected deep-sea fish obtained from Southern
Java Ocean and Western Sumatra Ocean was analyzed to determine
its proximate, fatty acid and mineral composition. The moisture
content was ranged from 64.38 to 86.04 %, ash from 0.17 to 0.69 %,
the fat content was 1.54 – 13.30 % while the protein content varied
from 15.84 to 23.60%. Among the fatty acids, oleic acid and palmitic
acid was the dominant MUFA and SFA. Linoleic acid was the
highest PUFA found at the selected deep-sea fish. Phospor was the
highest macroelement concentration on selected deep-sea fish,
followed by K, Ca, Mg and Iod, Fe and Zn among microelement. The
trace concentration was found at Se microelement.
Abstract: A variety of new technology-based services have
emerged with the development of Information and Communication
Technologies (ICTs). Since technology-based services have technology-driven characteristics, the identification of relationships
between technology-based services and ICTs would give meaningful implications. Thus, this paper proposes an approach for identifying the
relationships between technology-based services and ICTs by
analyzing patent documents. First, business model (BM) patents are
classified into relevant service categories. Second, patent citation
analysis is conducted to investigate the technological linkage and impacts between technology-based services and ICTs at macro level.
Third, as a micro level analysis, patent co-classification analysis is
employed to identify the technological linkage and coverage. The
proposed approach could guide and help managers and designers of
technology-based services to discover the opportunity of the development of new technology-based services in emerging service sectors.
Abstract: Spam mails are unwanted mails sent to large number
of users. Spam mails not only consume the network resources, but
cause security threats as well. This paper proposes an efficient
technique to detect, and to prevent spam mail in the sender side rather
than the receiver side. This technique is based on a counter set on the
sender server. When a mail is transmitted to the server, the mail server
checks the number of the recipients based on its counter policy. The
counter policy performed by the mail server is based on some
pre-defined criteria. When the number of recipients exceeds the
counter policy, the mail server discontinues the rest of the process, and
sends a failure mail to sender of the mail; otherwise the mail is
transmitted through the network. By using this technique, the usage of
network resources such as bandwidth, and memory is preserved. The
simulation results in real network show that when the counter is set on
the sender side, the time required for spam mail detection is 100 times
faster than the time the counter is set on the receiver side, and the
network resources are preserved largely compared with other
anti-spam mail techniques in the receiver side.