Abstract: Set covering problem is a classical problem in
computer science and complexity theory. It has many applications,
such as airline crew scheduling problem, facilities location problem,
vehicle routing, assignment problem, etc. In this paper, three
different techniques are applied to solve set covering problem.
Firstly, a mathematical model of set covering problem is introduced
and solved by using optimization solver, LINGO. Secondly, the
Genetic Algorithm Toolbox available in MATLAB is used to solve
set covering problem. And lastly, an ant colony optimization method
is programmed in MATLAB programming language. Results
obtained from these methods are presented in tables. In order to
assess the performance of the techniques used in this project, the
benchmark problems available in open literature are used.
Abstract: Existing image-based virtual reality applications
allow users to view image-based 3D virtual environment in a more
interactive manner. User could “walkthrough"; looks left, right, up
and down and even zoom into objects in these virtual worlds of
images. However what the user sees during a “zoom in" is just a
close-up view of the same image which was taken from a distant.
Thus, this does not give the user an accurate view of the object from
the actual distance. In this paper, a simple technique for zooming in
an object in a virtual scene is presented. The technique is based on
the 'hotspot' concept in existing application. Instead of navigation
between two different locations, the hotspots are used to focus into
an object in the scene. For each object, several hotspots are created.
A different picture is taken for each hotspot. Each consecutive
hotspot created will take the user closer to the object. This will
provide the user with a correct of view of the object based on his
proximity to the object. Implementation issues and the relevance of
this technique in potential application areas are highlighted.
Abstract: This paper proposes, for the first time, how the
challenges facing the guard-band designs including the margin
assist-circuits scheme for the screening-test in the coming process
generations should be addressed. The increased screening error
impacts are discussed based on the proposed statistical analysis
models. It has been shown that the yield-loss caused by the
misjudgment on the screening test would become 5-orders of
magnitude larger than that for the conventional one when the
amplitude of random telegraph noise (RTN) caused variations
approaches to that of random dopant fluctuation. Three fitting methods
to approximate the RTN caused complex Gamma mixtures
distributions by the simple Gaussian mixtures model (GMM) are
proposed and compared. It has been verified that the proposed
methods can reduce the error of the fail-bit predictions by 4-orders of
magnitude.
Abstract: This paper presents work characterizing finite element
performance boundaries within which live, interactive finite element
modeling is feasible on current and emerging systems. These results
are based on wide-ranging tests performed using a prototype finite
element program implemented specifically for this study, thereby enabling
the unified investigation of numerous direct and iterative solver
strategies and implementations in a variety of modeling contexts.
The results are intended to be useful for researchers interested in
interactive analysis by providing baseline performance estimates, to
give guidance in matching solution strategies to problem domains,
and to spur further work addressing the challenge of extending the
present boundaries.
Abstract: Protection system hidden failures have been identified as one of the main causes of system cascading collapse resulting to power system instability. In this paper, a systematic approach is presented in order to identify the probability of a system cascading collapse by taking into consideration the effect of protection system hidden failure. This includes the accurate calculation of the probability of hidden failure as it will provide significant impinge on the findings of the probability of system cascading collapse. The probability of a system cascading collapse is then used to identify the initial tripping of sensitive transmission lines which will contribute to a critical system cascading collapse. Based on the results obtained from this study, it is important to decide on the accurate value of the hidden failure probability as it will affect the probability of a system cascading collapse.
Abstract: Composite nanostructures of metal
core/semiconductor shell (Au/CdS) configuration were prepared
using organometalic method. UV-Vis spectra for the Au/CdS colloids
show initially two well separated bands, corresponding to surface
plasmon of the Au core, and the exciton of CdS shell. The absorption
of CdS shell is enhanced, while the Au plasmon band is suppressed
as the shell thickness increases. The shell sizes were estimated from
the optical spectra using the effective mass approximation model
(EMA), and compared to the sizes of the Au core and CdS shell
measured by high resolution transmission electron microscope
(HRTEM). The changes in the absorption features are discussed in
terms of gradual increase in the coupling strength of the Au core
surface plasmon and the exciton in the CdS. leading to charge
transfer and modification of electron oscillation in Au core.
Abstract: Aeration by a plunging water jet is an energetically attractive way to effect oxygen-transfer than conventional oxygenation systems. In the present study, a new type of conical shaped plunging aeration device is fabricated to generate hollow inclined ined plunging jets (jet plunge angle of π/3 ) to investigate its oxygen transfer capacity. The results suggest that the volumetric oxygen-transfer coefficient and oxygen-transfer efficiency of the conical plunging jet aerator are competitive with other types of aeration systems. Relationships of volumetric oxygen-transfer coefficient with jet power per unit volume and jet parameters are also proposed. The suggested relationships predict the volumetric oxygentransfer coefficient within a scatter of ± 15% . Further, the application of Support Vector Machines on the experimental data revealed its utility in the prediction of volumetric oxygen-transfer coefficient and development of conical plunging jet aerators.
Abstract: A automatic human tracking system using mobile
agent technology is realized because a mobile agent moves in
accordance with a migration of a target person. In this paper, we
propose a method for determining the neighbor node in consideration
of the imaging range of cameras.
Abstract: Wireless capsule endoscopy provides real-time images in the digestive tract. Capsule images are usually low resolution and are diverse images due to travel through various regions of human body. Color information has been a primary reference in predicting abnormalities such as bleeding. Often color is not sufficient for this purpose. In this study, we took morphological shapes into account as additional, but important criterion. First, we processed gastric images in order to indentify various objects in the image. Then, we analyzed color information in the object. In this way, we could remove unnecessary information and increase the accuracy. Compared to our previous investigations, we could handle images of various degrees of brightness and improve our diagnostic algorithm.
Abstract: From the perspective of system of systems (SoS) and
emergent behaviors, this paper describes large scale application
software systems, and proposes framework methods to further depict
systems- functional and non-functional characteristics. Besides, this
paper also specifically discusses some functional frameworks. In the
end, the framework-s applications in system disintegrations, system
architecture and stable intermediate forms are additionally dealt with
in this in building, deployment and maintenance of large scale
software applications.
Abstract: Synthetic aperture radar (SAR) imaging usually
requires echo data collected continuously pulse by pulse with certain
bandwidth. However in real situation, data collection or part of signal
spectrum can be interrupted due to various reasons, i.e. there will be
gaps in spatial spectrum. In this case we need to find ways to fill out
the resulted gaps and get image with defined resolution. In this paper
we introduce our work on how to apply iterative spatially variant
apodization (Super-SVA) technique to extrapolate the spatial
spectrum in both azimuthal and range directions so as to fill out the
gaps and get correct radar image.
Abstract: The wireless mesh networks (WMNs) are emerging technology in wireless networking as they can serve large scale high speed internet access. Due to its wireless multi-hop feature, wireless mesh network is prone to suffer from many attacks, such as denial of service attack (DoS). We consider a special case of DoS attack which is selective forwarding attack (a.k.a. gray hole attack). In such attack, a misbehaving mesh router selectively drops the packets it receives rom its predecessor mesh router. It is very hard to detect that packet loss is due to medium access collision, bad channel quality or because of selective forwarding attack. In this paper, we present a review of detection algorithms of selective forwarding attack and discuss their advantage & disadvantage. Finally we conclude this paper with open research issues and challenges.
Abstract: Multiple-Input-Multiple-Output (MIMO) is one of the most important communication techniques that allow wireless systems to achieve higher data rate. To overcome the practical difficulties in implementing Dirty Paper Coding (DPC), various suboptimal MIMO Broadcast (MIMO-BC) scheduling algorithms are employed which choose the best set of users among all the users. In this paper we discuss such a sub-optimal MIMO-BC scheduling algorithm which employs antenna selection at the receiver side. The channels for the users considered here are not Identical and Independent Distributed (IID) so that users at the receiver side do not get equal opportunity for communication. So we introduce a method of applying weights to channels of the users which are not IID in such a way that each of the users gets equal opportunity for communication. The effect of weights on overall sum-rate achieved by the system has been investigated and presented.
Abstract: This paper is on the general discussion of memory consistency model like Strict Consistency, Sequential Consistency, Processor Consistency, Weak Consistency etc. Then the techniques for implementing distributed shared memory Systems and Synchronization Primitives in Software Distributed Shared Memory Systems are discussed. The analysis involves the performance measurement of the protocol concerned that is Multiple Writer Protocol. Each protocol has pros and cons. So, the problems that are associated with each protocol is discussed and other related things are explored.
Abstract: Face authentication for access control is a face
membership authentication which passes the person of the incoming
face if he turns out to be one of an enrolled person based on face
recognition or rejects if not. Face membership authentication belongs
to the two class classification problem where SVM(Support Vector
Machine) has been successfully applied and shows better performance
compared to the conventional threshold-based classification. However,
most of previous SVMs have been trained using image feature vectors
extracted from face images of each class member(enrolled
class/unenrolled class) so that they are not robust to variations in
illuminations, poses, and facial expressions and much affected by
changes in member configuration of the enrolled class
In this paper, we propose an effective face membership
authentication method based on SVM using class discriminating
features which represent an incoming face image-s associability with
each class distinctively. These class discriminating features are weakly
related with image features so that they are less affected by variations
in illuminations, poses and facial expression.
Through experiments, it is shown that the proposed face
membership authentication method performs better than the threshold
rule-based or the conventional SVM-based authentication methods and
is relatively less affected by changes in member size and membership.
Abstract: As the Social network game(SNG) is rising
dramatically worldwide, an interesting aspect has appeared in the
demographic analysis. That is the ratio of the game users by gender.
Although the ratio of male and female users in online game was
60:40% previously, the ratio of male and female users in SNG stood at
47:53% which shows that the ratio of female users is higher than that
of male users. Here, it should be noted that 35% in those 53% female
users are the first-time users of game. This fact suggests that women
who were not interested in game previously has taken an interest in
SNG. Notwithstanding this issue, there have been little studies on the
female users of SNG although there are many studies that analyzed the
tendency of female users- online game play. This study conducted the
analyzed how the game-playing tendency of SNG gamers was
manifested in the game by gender. For that, this study will identify the
tendency of SNG users by gender based on the preceding studies that
analyzed the online game users by gender. The subject of this study
was confined to the farm and urban construction simulation games
which were offered based on the mobile application platform.
Regarding the methodology of study, the first focus group
interview(FGI) was conducted with the male and female users who
had played games on Social network service(SNS) until recently. Later,
the second one-on-one in-depth interview was conducted to gain an
insight into the psychological state of the subjects.
Abstract: The purpose of this paper is to propose an integrated
consumer health informatics utilization framework that can be used
to gauge the online health information needs and usage patterns
among Malaysian women. The proposed framework was developed
based on four different theories/models: Use and Gratification
Theory, Technology Acceptance 3 Model, Health Belief Model, and
Multi-level Model of Information Seeking. The relevant constructs
and research hypotheses are also presented in this paper. The
framework will be tested in order for it to be used successfully to
identify Malaysian women-s preferences of online health information
resources and health information seeking activities.
Abstract: Atrazine, a herbicide widely used in sugarcane and corn production, is a frequently detected groundwater contaminant. An atrazine-degrading bacterium, strain KB02, was obtained from long-term atrazine-treated sugarcane field soils in Kanchanaburi province of Thailand. Strain KB02 had a rod-to-coccus morphological cycle during growth. Sequence analysis of the PCR product indicated that the 16S rRNA gene in strain KB02 was ranging from 97-98% identical to the same region in Klebsiella sp. Based on biochemical, physiological analysis and 16S rDNA sequence analysis of one representative isolate, strain KB02, the isolates belong to the genus Klebsiella in the family Enterobacteriaceae. Interestingly that the various primers for atzA, B and C failed to amplify genomic DNA of strain KB02. Whereas the expected PCR product of atzA, B and C were obtained from the reference strain, Arthrobacter sp. strain KU001.
Abstract: Gluconic acid is one of interesting chemical products
in industries such as detergents, leather, photographic, textile, and
especially in food and pharmaceutical industries. Fermentation is an
advantageous process to produce gluconic acid. Mathematical
modeling is important in the design and operation of fermentation
process. In fact, kinetic data must be available for modeling. The
kinetic parameters of gluconic acid production by Aspergillus niger
in batch culture was studied in this research at initial substrate
concentration of 150, 200 and 250 g/l. The kinetic models used were
logistic equation for growth, Luedeking-Piret equation for gluconic
acid formation, and Luedeking-Piret-like equation for glucose
consumption. The Kinetic parameters in the model were obtained by
minimizing non linear least squares curve fitting.
Abstract: Grobner basis calculation forms a key part of computational
commutative algebra and many other areas. One important
ramification of the theory of Grobner basis provides a means to solve
a system of non-linear equations. This is why it has become very
important in the areas where the solution of non-linear equations is
needed, for instance in algebraic cryptanalysis and coding theory. This
paper explores on a parallel-distributed implementation for Grobner
basis calculation over GF(2). For doing so Buchberger algorithm is
used. OpenMP and MPI-C language constructs have been used to
implement the scheme. Some relevant results have been furnished
to compare the performances between the standalone and hybrid
(parallel-distributed) implementation.