Abstract: In this paper, we present a comparative study of the
genetic algorithms and Hessian-s methods for optimal research of the
active powers in an electric network of power. The objective function
which is the performance index of production of electrical energy is
minimized by satisfying the constraints of the equality type and
inequality type initially by the Hessian-s methods and in the second
time by the genetic Algorithms. The results found by the application
of AG for the minimization of the electric production costs of power
are very encouraging. The algorithms seem to be an effective
technique to solve a great number of problems and which are in
constant evolution. Nevertheless it should be specified that the
traditional binary representation used for the genetic algorithms
creates problems of optimization of management of the large-sized
networks with high numerical precision.
Abstract: This study was conducted to evaluate the anti-diabetic
properties of ethanolic extract of two plants commonly used in folk
medicine, Mormodica charantia (bitter melon) and Trigonella
foenum-graecum (fenugreek). The study was performed on STZinduced
diabetic rats (DM type-I). Plant extracts of these two plants
were given to STZ diabetic rats at the concentration of 500 mg/kg
body weight ,50 mg/kg body weight respectively. Cidophage®
(metformin HCl) were administered to another group to support the
results at a dose of 500 mg/kg body weight, the ethanolic extracts and
Cidophage administered orally once a day for four weeks using a
stomach tube and; serum samples were obtained for biochemical
analysis. The extracts caused significant decreases in glucose levels
compared with diabetic control rats. Insulin secretions were increased
after 4 weeks of treatment with Cidophage® compared with the
control non-diabetic rats. Levels of AST and ALT liver enzymes were
normalized by all treatments. Decreases in liver cholesterol,
triglycerides, and LDL in diabetic rats were observed with all
treatments. HDL levels were increased by the treatments in the
following order: bitter melon, Cidophage®, and fenugreek. Creatinine
levels were reduced by all treatments. Serum nitric oxide and
malonaldehyde levels were reduced by all extracts. GSH levels were
increased by all extracts. Extravasation as measured by the Evans
Blue test increased significantly in STZ-induced diabetic animals.
This effect was reversed by ethanolic extracts of bitter melon or
fenugreek.
Abstract: Now a days video data embedding approach is a very challenging and interesting task towards keeping real time video data secure. We can implement and use this technique with high-level applications. As the rate-distortion of any image is not confirmed, because the gain provided by accurate image frame segmentation are balanced by the inefficiency of coding objects of arbitrary shape, with a lot factors like losses that depend on both the coding scheme and the object structure. By using rate controller in association with the encoder one can dynamically adjust the target bitrate. This paper discusses about to keep secure videos by mixing signature data with negligible distortion in the original video, and to keep steganographic video as closely as possible to the quality of the original video. In this discussion we propose the method for embedding the signature data into separate video frames by the use of block Discrete Cosine Transform. These frames are then encoded by real time encoding H.264 scheme concepts. After processing, at receiver end recovery of original video and the signature data is proposed.
Abstract: In this paper, the detection and tracking of face, mouth, hands and medication bottles in the context of medication intake monitoring with a camera is presented. This is aimed at recognizing medication intake for elderly in their home setting to avoid an inappropriate use. Background subtraction is used to isolate moving objects, and then, skin and bottle segmentations are done in the RGB normalized color space. We use a minimum displacement distance criterion to track skin color regions and the R/G ratio to detect the mouth. The color-labeled medication bottles are simply tracked based on the color space distance to their mean color vector. For the recognition of medication intake, we propose a three-level hierarchal approach, which uses activity-patterns to recognize the normal medication intake activity. The proposed method was tested with three persons, with different medication intake scenarios, and gave an overall precision of over 98%.
Abstract: We have investigated statistical properties of the defect turbulence in 1D CGLE wherein many body interaction is involved between local depressing wave (LDW) and local standing wave (LSW). It is shown that the counting number fluctuation of LDW is subject to the sub-Poisson statistics (SUBP). The physical origin of the SUBP can be ascribed to pair extinction of LDWs based on the master equation approach. It is also shown that the probability density function (pdf) of inter-LDW distance can be identified by the hyper gamma distribution. Assuming a superstatistics of the exponential distribution (Poisson configuration), a plausible explanation is given. It is shown further that the pdf of amplitude of LDW has a fattail. The underlying mechanism of its fluctuation is examined by introducing a generalized fractional Poisson configuration.
Abstract: A new Meta heuristic approach called "Randomized gravitational emulation search algorithm (RGES)" for solving large size set covering problems has been designed. This algorithm is found upon introducing randomization concept along with the two of the four primary parameters -velocity- and -gravity- in physics. A new heuristic operator is introduced in the domain of RGES to maintain feasibility specifically for the set covering problem to yield best solutions. The performance of this algorithm has been evaluated on a large set of benchmark problems from OR-library. Computational results showed that the randomized gravitational emulation search algorithm - based heuristic is capable of producing high quality solutions. The performance of this heuristic when compared with other existing heuristic algorithms is found to be excellent in terms of solution quality.
Abstract: In this paper, backstepping method (BM) is proposed for a single-link flexible mechanical manipulator. In each step of this method a positive value is obtained. Selections of the gain factor values are very important because controller will have different behavior for each different set of values. Improper selection of these gains can lead to instability of the system. In order to choose proper values for gains BELBIC method has been used in this work. Finally, to prove the efficiency of this method, the obtained results of proposed model are compared with robust controller one. Results show that the combination of backstepping and BELBIC that is presented here, can stabilized the system with higher speed, shorter settling time and lower overshoot in than robust controller.
Abstract: A reconfigurable manufacturing system (RMS) is an
advanced system designed at the outset for rapid changes in its hardware
and software components in order to quickly adjust its production
capacity and functionally. Among various operational decisions, this
study considers the scheduling problem that determines the input
sequence and schedule at the same time for a given set of parts. In
particular, we consider the practical constraints that the numbers of
pallets/fixtures are limited and hence a part can be released into the
system only when the fixture required for the part is available. To
solve the integrated input sequencing and scheduling problems, we
suggest a priority rule based approach in which the two sub-problems
are solved using a combination of priority rules. To show the effectiveness
of various rule combinations, a simulation experiment was
done on the data for a real RMS, and the test results are reported.
Abstract: In this paper, the existence, multiplicity and
noexistence of positive solutions for a class of semipositone
discrete boundary value problems with two parameters is
studied by applying nonsmooth critical point theory and
sub-super solutions method.
Abstract: In this study, the static behavior of super elliptical Winkler plate is analyzed by applying the double side approach method. The lack of information about super elliptical Winkler plates is the motivation of this study and we use the double side approach method to solve this problem because of its superior ability on efficiently treating problems with complex boundary shape. The double side approach method has the advantages of high accuracy, easy calculation procedure and less calculation load required. Most important of all, it can give the error bound of the approximate solution. The numerical results not only show that the double side approach method works well on this problem but also provide us the knowledge of static behavior of super elliptical Winkler plate in practical use.
Abstract: In order to integrate knowledge in heterogeneous
case-based reasoning (CBR) systems, ontology-based CBR system
has become a hot topic. To solve the facing problems of
ontology-based CBR system, for example, its architecture is
nonstandard, reusing knowledge in legacy CBR is deficient, ontology
construction is difficult, etc, we propose a novel approach for
semi-automatically construct ontology-based CBR system whose
architecture is based on two-layer ontology. Domain knowledge
implied in legacy case bases can be mapped from relational database
schema and knowledge items to relevant OWL local ontology
automatically by a mapping algorithm with low time-complexity. By
concept clustering based on formal concept analysis, computing
concept equation measure and concept inclusion measure, some
suggestions about enriching or amending concept hierarchy of OWL
local ontologies are made automatically that can aid designers to
achieve semi-automatic construction of OWL domain ontology.
Validation of the approach is done by an application example.
Abstract: This paper presents a customized deformable model
for the segmentation of abdominal and thoracic aortic aneurysms in
CTA datasets. An important challenge in reliably detecting aortic
aneurysm is the need to overcome problems associated with intensity
inhomogeneities and image noise. Level sets are part of an important
class of methods that utilize partial differential equations (PDEs) and
have been extensively applied in image segmentation. A Gaussian
kernel function in the level set formulation, which extracts the local
intensity information, aids the suppression of noise in the extracted
regions of interest and then guides the motion of the evolving contour
for the detection of weak boundaries. The speed of curve evolution
has been significantly improved with a resulting decrease in
segmentation time compared with previous implementations of level
sets. The results indicate the method is more effective than other
approaches in coping with intensity inhomogeneities.
Abstract: For the improvement of the ability in detecting
small calcifications using Ultrasonography (US) we propose a
novel indicator of calcifications in an ultrasound B-mode image
without decrease in frame rate. Since the waveform of an
ultrasound pulse changes at a calcification position, the
decorrelation of adjacent scan lines occurs behind a
calcification. Therefore, we employ the decorrelation of
adjacent scan lines as an indicator of a calcification. The
proposed indicator depicted wires 0.05 mm in diameter at 2 cm
depth with a sensitivity of 86.7% and a specificity of 100%,
which were hardly detected in ultrasound B-mode images. This
study shows the potential of the proposed indicator to
approximate the detectable calcification size using an US
device to that of an X-ray imager, implying the possibility that
an US device will become a convenient, safe, and principal
clinical tool for the screening of breast cancer.
Abstract: Different approaches for heating\cooling of stirred tanks, coils and jackets, are investigated using computational fluid dynamics (CFD).A time-dependant sliding mesh approach is applied to simulate the flow in both conditions. The investigations are carried out under the turbulent flow conditions for a Rushton impeller and heating elements are considered isothermal. The flow behavior and temperature distribution are studied for each case and heat transfer coefficient is calculated. Results show different velocity profiles for each case. Unsteady temperature distribution is not similar for different cases .In the case of the coiled stirred vessel more uniform temperature and higher heat transfer coefficient is resulted.
Abstract: This paper outlines the application of Knowledge Management (KM) principles in the context of Educational institutions. The paper caters to the needs of the engineering institutions for imparting quality education by delineating the instruction delivery process in a highly structured, controlled and quantified manner. This is done using a software tool EDULOGIC+. The central idea has been based on the engineering education pattern in Indian Universities/ Institutions. The data, contents and results produced over contiguous years build the necessary ground for managing the related accumulated knowledge. Application of KM has been explained using certain examples of data analysis and knowledge extraction.
Abstract: Steganography is the process of hiding one file inside another such that others can neither identify the meaning of the embedded object, nor even recognize its existence. Current trends favor using digital image files as the cover file to hide another digital file that contains the secret message or information. One of the most common methods of implementation is Least Significant Bit Insertion, in which the least significant bit of every byte is altered to form the bit-string representing the embedded file. Altering the LSB will only cause minor changes in color, and thus is usually not noticeable to the human eye. While this technique works well for 24-bit color image files, steganography has not been as successful when using an 8-bit color image file, due to limitations in color variations and the use of a colormap. This paper presents the results of research investigating the combination of image compression and steganography. The technique developed starts with a 24-bit color bitmap file, then compresses the file by organizing and optimizing an 8-bit colormap. After the process of compression, a text message is hidden in the final, compressed image. Results indicate that the final technique has potential of being useful in the steganographic world.
Abstract: Digital libraries become more and more necessary in
order to support users with powerful and easy-to-use tools for
searching, browsing and retrieving media information. The starting
point for these tasks is the segmentation of video content into shots.
To segment MPEG video streams into shots, a fully automatic
procedure to detect both abrupt and gradual transitions (dissolve and
fade-groups) with minimal decoding in real time is developed in this
study. Each was explored through two phases: macro-block type's
analysis in B-frames, and on-demand intensity information analysis.
The experimental results show remarkable performance in
detecting gradual transitions of some kinds of input data and
comparable results of the rest of the examined video streams. Almost
all abrupt transitions could be detected with very few false positive
alarms.
Abstract: Provision of optical devices without proper instruction
and training may cause frustration resulting in rejection or incorrect
use of the magnifiers. However training in the use of magnifiers
increases the cost of providing these devices. This study compared
the efficacy of providing instruction alone and instruction plus
training in the use of magnifiers. 24 participants randomly assigned
to two groups. 15 received instruction and training and 9 received
instruction only. Repeated measures of print size and reading speed
were performed at pre, post training and follow up. Print size
decreased in both groups between pre and post training maintained at
follow up. Reading speed increased in both groups over time with the
training group demonstrating more rapid improvement. Whilst
overall outcomes were similar, training decreased the time required
to increase reading speed supporting the use of training for increased
efficiency. A cost effective form of training is suggested.
Abstract: Part IV of the Civil Code of the Russian Federation dedicated to legal regulation of Intellectual property rights came into force in 2008. It is a first attempt of codification in Intellectual property sphere in Russia. That is why a lot of new norms appeared. The main problem of the Russian Civil Code (part IV) is that many rules (norms of Law) contradict the norms of International Intellectual property Law (i.e. protection of inventions, creations, ideas, know-how, trade secrets, innovations). Intellectual property rights protect innovations and creations and reward innovative and creative activity. Intellectual property rights are international in character and in that respect they fit in rather well with the economic reality of the global economy. Inventors prefer not to take out a patent for inventions because it is a very difficult procedure, it takes a lot of time and is very expensive. That-s why they try to protect their inventions as ideas, know-how, confidential information. An idea is the main element of any object of Intellectual property (creation, invention, innovation, know-how, etc.). But ideas are not protected by Civil Code of Russian Federation. The aim of the paper is to reveal the main problems of legal regulation of Intellectual property in Russia and to suggest possible solutions. The authors of this paper have raised these essential issues through different activities. Through the panel survey, questionnaires which were spread among the participants of intellectual activities the main problems of implementation of innovations, protecting of the ideas and know-how were identified. The implementation of research results will help to solve economic and legal problems of innovations, transfer of innovations and intellectual property.1