Abstract: The main goal of the study is to analyze all relevant
properties of the electro hydraulic systems and based on that to make
a proper choice of the control strategy that may be used for the
control of the servomechanism system. A combination of electronic
and hydraulic systems is widely used since it combines the
advantages of both. Hydraulic systems are widely spread because of
their properties as accuracy, flexibility, high horsepower-to-weight
ratio, fast starting, stopping and reversal with smoothness and
precision, and simplicity of operations. On the other hand, the
modern control of hydraulic systems is based on control of the circuit
fed to the inductive solenoid that controls the position of the
hydraulic valve. Since this circuit may be easily handled by PWM
(Pulse Width Modulation) signal with a proper frequency, the
combination of electrical and hydraulic systems became very fruitful
and usable in specific areas as airplane and military industry.
The study shows and discusses the experimental results obtained
by the control strategy (classical feedback (PID) & neural network)
using MATLAB and SIMULINK [1]. Finally, the special attention
was paid to the possibility of neuro-controller design and its
application to control of electro-hydraulic systems and to make
comparative with classical control.
Abstract: For Romania, the fulfilment of the obligations
undertaken as a member state of the European Union in accordance
with the Treaty of Accession requires the effective implementation of
sustainable development principles and practices, this being the only
reasonable development option, which adequately draws in on the
economic, social and environment resources. Achieving this
objective is based on a profound analysis of the realities in the
Romanian economy, which will reflect the existent situation and the
action directions for the future. The paper presents an analysis of the
Romanian economic performances compared to the EU economy,
based on the sustainable value (SV) model. The analysis highlighted
the considerable gap between Romania and the EU regarding the
sustainable capitalization of resources, the provided information
being useful to justify strategic development decisions at a micro and
macro levels.
Abstract: During last decades is widely discussed the
international harmonization of financial reporting. This
harmonization is also affected by national tax systems in analyzed
countries. This paper provides some evidence on current national tax
systems in selected countries in Central and Eastern Europe. The
linkage of accounting profit as a tax base might decrease the
administrative burden for majority of SMEs, which are the most
important engine of each national economy.
Abstract: Over the past decades, automatic face recognition has become a highly active research area, mainly due to the countless application possibilities in both the private as well as the public sector. Numerous algorithms have been proposed in the literature to cope with the problem of face recognition, nevertheless, a group of methods commonly referred to as appearance based have emerged as the dominant solution to the face recognition problem. Many comparative studies concerned with the performance of appearance based methods have already been presented in the literature, not rarely with inconclusive and often with contradictory results. No consent has been reached within the scientific community regarding the relative ranking of the efficiency of appearance based methods for the face recognition task, let alone regarding their susceptibility to appearance changes induced by various environmental factors. To tackle these open issues, this paper assess the performance of the three dominant appearance based methods: principal component analysis, linear discriminant analysis and independent component analysis, and compares them on equal footing (i.e., with the same preprocessing procedure, with optimized parameters for the best possible performance, etc.) in face verification experiments on the publicly available XM2VTS database. In addition to the comparative analysis on the XM2VTS database, ten degraded versions of the database are also employed in the experiments to evaluate the susceptibility of the appearance based methods on various image degradations which can occur in "real-life" operating conditions. Our experimental results suggest that linear discriminant analysis ensures the most consistent verification rates across the tested databases.
Abstract: With the rapid usage of portable devices mobility in
IP networks becomes more important issue in the recent years. IETF
standardized Mobile IP that works in Network Layer, which involves
tunneling of IP packets from HA to Foreign Agent. Mobile IP suffers
many problems of Triangular Routing, conflict with private
addressing scheme, increase in load in HA, need of permanent home
IP address, tunneling itself, and so on. In this paper, we proposed
mobility management in Application Layer protocol SIP and show
some comparative analysis between Mobile IP and SIP in context of
mobility.
Abstract: The purpose of this work is to identify the positive and negative aspects of parties- participation in the country-s modernization, which in turn, will help a country to determine the necessary steps to improve the social-economic development. The article considers a question of the role of the dominating party of Kazakhstan and ruling party of China in the country-s modernization. Using a comparative analysis reveals differences between the People's Democratic Party “Nur Otan" and the Communist Party of China. It is discussed the policy of carrying out of modernization, the main actions of political parties of both countries with a view of modernization implementation.
Abstract: As the majority of faults are found in a few of its
modules so there is a need to investigate the modules that are
affected severely as compared to other modules and proper
maintenance need to be done in time especially for the critical
applications. As, Neural networks, which have been already applied
in software engineering applications to build reliability growth
models predict the gross change or reusability metrics. Neural
networks are non-linear sophisticated modeling techniques that are
able to model complex functions. Neural network techniques are
used when exact nature of input and outputs is not known. A key
feature is that they learn the relationship between input and output
through training. In this present work, various Neural Network Based
techniques are explored and comparative analysis is performed for
the prediction of level of need of maintenance by predicting level
severity of faults present in NASA-s public domain defect dataset.
The comparison of different algorithms is made on the basis of Mean
Absolute Error, Root Mean Square Error and Accuracy Values. It is
concluded that Generalized Regression Networks is the best
algorithm for classification of the software components into different
level of severity of impact of the faults. The algorithm can be used to
develop model that can be used for identifying modules that are
heavily affected by the faults.
Abstract: The aerodynamic performances of vertical axis wind
turbines are highly affected by tip vortexes. In the present
work, different tip devices are considered and simulated against
a baseline rotor configuration, with the aim of identifying the
best tip architecture. Three different configurations are tested:
winglets, an elliptic termination and an aerodynamic bulkhead.
A comparative analysis on the most promising architectures is
conducted, focusing also on blade torque evolution during a full
revolution of the rotor blade. The most promising technology is
concluded to be a well designed winglet.
Abstract: Optimal cultural site selection is one of the ways that
can lead to the promotion of citizenship culture in addition to
ensuring the health and leisure of city residents. This study examines
the social and cultural needs of the community and optimal cultural
site allocation and after identifying the problems and shortcomings,
provides a suitable model for finding the best location for these
centers where there is the greatest impact on the promotion of
citizenship culture. On the other hand, non-scientific methods cause
irreversible impacts to the urban environment and citizens. But
modern efficient methods can reduce these impacts. One of these
methods is using geographical information systems (GIS). In this
study, Analytical Hierarchy Process (AHP) method was used to
locate the optimal cultural site. In AHP, three principles
(decomposition), (comparative analysis), and (combining
preferences) are used. The objectives of this research include
providing optimal contexts for passing time and performing cultural
activities by Shiraz residents and also proposing construction of some
cultural sites in different areas of the city. The results of this study
show the correct positioning of cultural sites based on social needs of
citizens. Thus, considering the population parameters and radii
access, GIS and AHP model for locating cultural centers can meet
social needs of citizens.
Abstract: Indices summarizing community structure are used to
evaluate fundamental community ecology, species interaction,
biogeographical factors, and environmental stress. Some of these
indices are insensitive to gross community changes induced by
contaminants of pollution. Diversity indices and similarity indices are
reviewed considering their ecological application, both theoretical
and practical. For some useful indices, empirical equations are given
to calculate the expected maximum value of the indices to which the
observed values can be related at any combination of sample sizes at
the experimental sites. This paper examines the effects of sample size
and diversity on the expected values of diversity indices and
similarity indices, using various formulae. It has been shown that all
indices are strongly affected by sample size and diversity. In some
indices, this influence is greater than the others and an attempt has
been made to deal with these influences.
Abstract: Historic preservation areas are extremely vulnerable to disasters because they are home to many vulnerable people and contain many closely spaced wooden houses. However, the narrow streets in these regions have historic meaning, which means that they cannot be widened and can become blocked easily during large disasters. Here, we describe our efforts to establish a methodology for the planning of evacuation route sin such historic preservation areas. In particular, this study aims to clarify the effectiveness of measures intended to secure two-way evacuation routes for vulnerable people during large disasters in a historic area preserved under the Cultural Properties Protection Law, Japan.
Abstract: This work proposes a recursive weighted ELS
algorithm for system identification by applying numerically robust
orthogonal Householder transformations. The properties of the
proposed algorithm show it obtains acceptable results in a noisy
environment: fast convergence and asymptotically unbiased
estimates. Comparative analysis with others robust methods well
known from literature are also presented.
Abstract: The subject of the paper is comparative analysis of the hotel guest-s contractual liability for breaching the obligation for non-payment of hotel services in the hotel-keeper-s contract. The paper is methodologically conceived of six chapters (1. introduction, 2. comparative law sources of the hotel-keeper-s contract, 3. the guest-s obligation for payment of hotel services, 4. hotel guest's liability for non-payment, 5. the hotel-keeper-s rights due to nonpayment and 6. conclusion), which analyzes the guest-s liability for non-payment of hotel services through the international law, European law, euro-continental national laws (France, Germany, Italy, Croatia) and Anglo-American national laws (UK, USA). The paper-s results are the synthesis of answers to the set hypothesis and comparative review of hotel guest-s contractual liability for nonpayment of hotel services provided. In conclusion, it is necessary to adopt an international convention on the hotel-keeper-s contract, which would unify the institute of the hotel guest-s contractual liability for non-payment of hotel services at the international level.
Abstract: Decision fusion is one of hot research topics in
classification area, which aims to achieve the best possible
performance for the task at hand. In this paper, we
investigate the usefulness of this concept to improve change
detection accuracy in remote sensing. Thereby, outputs of
two fuzzy change detectors based respectively on
simultaneous and comparative analysis of multitemporal
data are fused by using fuzzy integral operators. This
method fuses the objective evidences produced by the
change detectors with respect to fuzzy measures that express
the difference of performance between them. The proposed
fusion framework is evaluated in comparison with some
ordinary fuzzy aggregation operators. Experiments carried
out on two SPOT images showed that the fuzzy integral was
the best performing. It improves the change detection
accuracy while attempting to equalize the accuracy rate in
both change and no change classes.
Abstract: The aim of this paper is to adopt a compromise ratio (CR) methodology for fuzzy multi-attribute single-expert decision making proble. In this paper, the rating of each alternative has been described by linguistic terms, which can be expressed as triangular fuzzy numbers. The compromise ratio method for fuzzy multi-attribute single expert decision making has been considered here by taking the ranking index based on the concept that the chosen alternative should be as close as possible to the ideal solution and as far away as possible from the negative-ideal solution simultaneously. From logical point of view, the distance between two triangular fuzzy numbers also is a fuzzy number, not a crisp value. Therefore a fuzzy distance measure, which is itself a fuzzy number, has been used here to calculate the difference between two triangular fuzzy numbers. Now in this paper, with the help of this fuzzy distance measure, it has been shown that the compromise ratio is a fuzzy number and this eases the problem of the decision maker to take the decision. The computation principle and the procedure of the compromise ratio method have been described in detail in this paper. A comparative analysis of the compromise ratio method previously proposed [1] and the newly adopted method have been illustrated with two numerical examples.
Abstract: Elliptic curve-based certificateless signature is slowly
gaining attention due to its ability to retain the efficiency of
identity-based signature to eliminate the need of certificate
management while it does not suffer from inherent private
key escrow problem. Generally, cryptosystem based on elliptic
curve offers equivalent security strength at smaller key sizes
compared to conventional cryptosystem such as RSA which
results in faster computations and efficient use of computing
power, bandwidth, and storage. This paper proposes to implement
certificateless signature based on bilinear pairing to
structure the framework of IKE authentication. In this paper,
we perform a comparative analysis of certificateless signature
scheme with a well-known RSA scheme and also present the
experimental results in the context of signing and verification
execution times. By generalizing our observations, we discuss the
different trade-offs involved in implementing IKE authentication
by using certificateless signature.
Abstract: SDMA (Space-Division Multiple Access) is a MIMO
(Multiple-Input and Multiple-Output) based wireless communication
network architecture which has the potential to significantly increase
the spectral efficiency and the system performance. The maximum
likelihood (ML) detection provides the optimal performance, but its
complexity increases exponentially with the constellation size of
modulation and number of users. The QR decomposition (QRD)
MUD can be a substitute to ML detection due its low complexity and
near optimal performance. The minimum mean-squared-error
(MMSE) multiuser detection (MUD) minimises the mean square
error (MSE), which may not give guarantee that the BER of the
system is also minimum. But the minimum bit error rate (MBER)
MUD performs better than the classic MMSE MUD in term of
minimum probability of error by directly minimising the BER cost
function. Also the MBER MUD is able to support more users than
the number of receiving antennas, whereas the rest of MUDs fail in
this scenario. In this paper the performance of various MUD
techniques is verified for the correlated MIMO channel models based
on IEEE 802.16n standard.
Abstract: In this article, the authors reviewed and analyzed the survey materials similarities ornament proto-Turkic and northern Indians. The study examined the materials scientists - geneticists, archaeologists, anthropologists. Numerous studies of scientists from different directions once again prove the relevance of the topic. The authors approached the subject from an artistic side. The study authors have made the appropriate conclusions. This publication is based on the proceedings of the investigation.
Abstract: The primary objective of this study is to test whether
there is any difference in performance between funded and nonfunded
registered charity organizations. In this study, performance as
the dependent variable is measured using total donations. Using a
sample of 101 charity organizations registered with the Registry of
Society, analysis of variance (ANOVA) results indicate that there is a
difference in financial performance between funded and non-funded
charity organizations. The study provides empirical evidence to
resource providers and the policy makers in scrutinizing the decision
to disburse their funds and resources to these charity organizations.
Abstract: This study performs a comparative analysis of the 21 Greek Universities in terms of their public funding, awarded for covering their operating expenditure. First it introduces a DEA/MCDM model that allocates the fund into four expenditure factors in the most favorable way for each university. Then, it presents a common, consensual assessment model to reallocate the amounts, remaining in the same level of total public budget. From the analysis it derives that a number of universities cannot justify the public funding in terms of their size and operational workload. For them, the sufficient reduction of their public funding amount is estimated as a future target. Due to the lack of precise data for a number of expenditure criteria, the analysis is based on a mixed crisp-ordinal data set.