Abstract: Depth estimation using stereo images is a challenging problem in computer vision. Many different studies have been carried out to solve this problem. With advancing machine learning, tackling this problem is often done with neural network-based solutions. The images used in these studies are mostly in the visible spectrum. However, the need to use the Infrared (IR) spectrum for depth estimation has emerged because it gives better results than visible spectra in some conditions. At this point, we recommend using thermal-thermal (IR) image pairs for depth estimation. In this study, we used two well-known networks (PSMNet, FADNet) with minor modifications to demonstrate the viability of this idea.
Abstract: At present, public efficiency is a concept that intends to maximize return on public investment focus on minimizing the use of resources and maximizing the outputs. The concept takes into account statistical criteria drawn up according to techniques such as DEA (Data Envelopment Analysis). The purpose of the current work is to consider, more precisely, the theoretical application of CBR (Case-Based Reasoning) from economics and computer science, as a preliminary step to improving the efficiency of law enforcement agencies (public sector). With the aim of increasing the efficiency of the public sector, we have entered into a phase whose main objective is the implementation of new technologies. Our main conclusion is that the application of computer techniques, such as CBR, has become key to the efficiency of the public sector, which continues to require economic valuation based on methodologies such as DEA. As a theoretical result and conclusion, the incorporation of CBR systems will reduce the number of inputs and increase, theoretically, the number of outputs generated based on previous computer knowledge.
Abstract: Bengal has a long history (8th century A.D. onwards) of decorating the wall of brick-built temples with curved terracotta plaques on a diverse range of subjects. These could be considered as one of the most significant visual archives to understand the various facets of the then contemporary societies. The temples under focus include Char-bangla temple complex (circa 1755 A.D.), Bhavanishvara temple (circa 1755 A.D.) and the Gangeshvara Shiva Jor-bangla temple (circa 1753 A.D.), located within a part of the river Bhagirathi basin in Baranagar, Murshidabad, West Bengal, India. Though, a diverse range of subjects have been intricately carved mainly on the front façades of the Baranagar temple cluster, the study specifically concentrates on depictions related to religious and non-religious acts performed by practitioners of various religious sects of late medieval Bengal with the intention to acquire knowledge about the various facets of their life. Apart from this, the paper also mapped the spatial location of these religious performers on the temples’ façades to examine if any systematic plan or arrangement had been employed for connoting a particular idea. Further, an attempt is made to provide a commentary on the attire worn by followers of various religious sects of late medieval Bengal. The primary materials for the study comprise the depictions which denote religious activities carved on the terracotta plaques. The secondary material has been collected from published and unpublished theses, journals and books. These data have been further supplemented with photographic documentation, some useful line-drawings and descriptions in table format to get a clear understanding of the concerned issues.
Abstract: Since the presence of Next Generation Air Transportation System (NextGen), Automatic Dependent Surveillance-Broadcast (ADS-B) has raised specific concerns related to the privacy and security, due to its vulnerable, low-level of security and limited payload. In this paper, the authors introduce and analyze the combination of Pulse Amplitude Modulation (PAM) and Phase Shift Keying (PSK) Modulation in conventional ADS-B, forming Secure ADS-B (SADS-B) avionics. In order to demonstrate the potential of this combination, Hardware-in-the-loop (HIL) simulation was used. The tests' results show that, on the one hand, SADS-B can offer five times the payload as its predecessor. This additional payload of SADS-B can be used in various applications, therefore enhancing the ability and efficiency of the current ADS-B. On the other hand, by using the extra phase modulated bits as a digital signature to authenticate ADS-B messages, SADS-B can increase the security of ADS-B, thus ensure a more secure aviation as well. More importantly, SADS-B is compatible with the current ADS-B In and Out. Hence, no significant modifications will be needed to implement this idea. As a result, SADS-B can be considered the most promising approach to enhance the capability and security of ADS-B.
Abstract: A practical project is used in an engineering surveying course to expose sophomore and junior civil engineering students to several important issues related to the use of basic principles of land surveying. The project, which is the design of a two-lane rural highway to connect between two arbitrary points, requires students to draw the profile of the proposed highway along with the existing ground level. Areas of all cross-sections are then computed to enable quantity computations between them. Lastly, Mass-Haul Diagram is drawn with all important parts and features shown on it for clarity. At the beginning, students faced challenges getting started on the project. They had to spend time and effort thinking of the best way to proceed and how the work would flow. It was even more challenging when they had to visualize images of cut, fill and mixed cross sections in three dimensions before they can draw them to complete the necessary computations. These difficulties were then somewhat overcome with the help of the instructor and thorough discussions among team members and/or between different teams. The method of assessment used in this study was a well-prepared-end-of-semester questionnaire distributed to students after the completion of the project and the final exam. The survey contained a wide spectrum of questions from students' learning experience when this course development was implemented to students' satisfaction of the class instructions provided to them and the instructor's competency in presenting the material and helping with the project. It also covered the adequacy of the project to show a sample of a real-life civil engineering application and if there is any excitement added by implementing this idea. At the end of the questionnaire, students had the chance to provide their constructive comments and suggestions for future improvements of the land surveying course. Outcomes will be presented graphically and in a tabular format. Graphs provide visual explanation of the results and tables, on the other hand, summarize numerical values for each student along with some descriptive statistics, such as the mean, standard deviation, and coefficient of variation for each student and each question as well. In addition to gaining experience in teamwork, communications, and customer relations, students felt the benefit of assigning such a project. They noticed the beauty of the practical side of civil engineering work and how theories are utilized in real-life engineering applications. It was even recommended by students that such a project be exercised every time this course is offered so future students can have the same learning opportunity they had.
Abstract: Nowadays, technological progress is one of the most
important components of economic growth and the efficiency of
R&D activities is particularly essential for countries. This study is an
attempt to analyze the R&D efficiencies of EU countries. The
indicators related to R&D efficiencies should be determined in
advance in order to use DEA. For this reason a list of input and
output indicators are derived from the literature review. Considering
the data availability, a final list is given for the numerical analysis for
future research.
Abstract: The main function of Medium Access Control (MAC) is to share the channel efficiently between all nodes. In the real-time scenario, there will be certain amount of wastage in bandwidth due to back-off periods. More bandwidth will be wasted in idle state if the back-off period is very high and collision may occur if the back-off period is small. So, an optimization is needed for this problem. The main objective of the work is to reduce delay due to back-off period thereby reducing collision and increasing throughput. Here a method, called the virtual back-off algorithm (VBA) is used to optimize the back-off period and thereby it increases throughput and reduces collisions. The main idea is to optimize the number of transmission for every node. A counter is introduced at each node to implement this idea. Here counter value represents the sequence number. VBA is classified into two types VBA with counter sharing (VBA-CS) and VBA with no counter sharing (VBA-NCS). These two classifications of VBA are compared for various parameters. Simulation is done in NS-2 environment. The results obtained are found to be promising.
Abstract: This paper adopts a two-stage data envelopment
analysis to explore the impacts of financial development and bank
operating scale on bank efficiencies. The sample comprises
unbalanced panel data of 32 Taiwanese listed domestic commercial
banks over the period 1998 to 2013. Empirical results show that pure
technical efficiency is positively related to financial development,
whereas the effect of financial development on scale efficiency is
insignificant. Enlargement of bank operating scale improves bank
efficiencies, but the efficiency gains are decreased gradually when the
scale increases. Increases in capital adequacy ratio and market power
of loans lead into a growth of bank efficiencies.
Abstract: These days customer satisfaction plays vital role in
any business. When customer searches for a product, significantly a
junk of irrelevant information is what is given, leading to customer
dissatisfaction. To provide exactly relevant information on the
searched product, we are proposing a model of KaaS (Knowledge as
a Service), which pre-processes the information using decision
making paradigm using Multi-agents.
Information obtained from various sources is taken to derive
knowledge and they are linked to Cloud to capture new idea. The
main focus of this work is to acquire relevant information
(knowledge) related to product, then convert this knowledge into a
service for customer satisfaction and deploy on cloud.
For achieving these objectives we are have opted to use multi
agents. They are communicating and interacting with each other,
manipulate information, provide knowledge, to take decisions. The
paper discusses about KaaS as an intelligent approach for Knowledge
acquisition.
Abstract: Universities have different offices such as educational, research, student, administrative, and financial offices. This paper considers universities as groups of decision making units (DMUs) in which DMUs are their offices. This approach gives us with a more just evaluation of universities instead of separate evaluation of the offices of universities. The proposed approach to evaluate group performance of universities is based on common set of weights method in DEA. The suggested method not only can compare groups and measure their efficiencies, but also can calculate the efficiency of units within group and efficiency spread of groups. At last, the suggested method is applied for the analysis of the performance of universities in 14th district of Islamic Azad University as groups under evaluation.
Abstract: It is well-known as Fitts’ law that the time for a user to point a target on a GUI screen can be modeled as a linear function of “index of difficulty (ID).” In this paper, the authors investigate whether the traditional ID formulation is appropriate independently of device screen sizes. Result of our experiment reveals that the ID formulation may not consistently capture actual difficulty: users’ pointing performances are not consistent among pointing target variations of which index of difficulty are consistent. The term A/W may not be appropriate because the term causes the observed inconsistency. Based on this finding, the authors then evaluate the applicability of possible models other than Fitts’ one. Multiple regression models are found to be able to appropriately represent the effects of target design variations. The authors next make an attempt to improve the definition of ID in Fitts’ model. Our idea is to raise the size or the distance values depending on the screen size. The modified model is found to fit well to the users’ pointing data, which supports the idea.
Abstract: This work presents a theoretical investigation of the
simultaneous absorption of CO2 and H2S into aqueous solutions of
MDEA and DEA. In this process the acid components react
with the basic alkanolamine solution via an exothermic,
reversible reaction in a gas/liquid absorber. The use of amine
solvents for gas sweetening has been investigated using
process simulation programs called HYSYS and ASPEN. We
use Electrolyte NRTL and Amine Package and Amines
(experimental) equation of state. The effects of temperature and
circulation rate and amine concentration and packed column and
murphree efficiency on the rate of absorption were studied.
When lean amine flow and concentration increase, CO2 and H2S
absorption increase too. With the improvement of inlet amine
temperature in absorber, CO2 and H2S penetrate to upper stages of
absorber and absorption of acid gases in absorber decreases. The CO2
concentration in the clean gas can be greatly influenced by the
packing height, whereas for the H2S concentration in the clean gas the
packing height plays a minor role. HYSYS software can not
estimate murphree efficiency correctly and it applies the same
contributions in all diagrams for HYSYS software. By
improvement in murphree efficiency, maximum temperature
of absorber decrease and the location of reaction transfer to the
stages of bottoms absorber and the absorption of acid gases
increase.
Abstract: Emerging Adulthood, the period during ages 18 to 25,
is a new conceptualitation proposed by Arnett which is especially
prevalent in the industrialized countries. Turkey is basically a
developing country having a young population structure.
Investigating the presence of such a life period in such a culture
might be helpful in understanding educational and psychological
needs of people who are in their twenties. With the aim of
investigating Emerging Adulthood in Turkey, a well-known
instrument (IDEA, 2003) was adapted to Turkish language and
Turkish culture. The scale was administered to 296 participants
between 15 and 34 ages and validity and reliability were conducted.
Exploratory factor analysis revealed three subscales. Reliability
coefficients of the scale (Cronbach a) was found as .69. Test-retest
reliability coefficients was found for the scale as .81. Finally, “The
IDEA" with 20 items was obtained to be used in the Turkish
population. The instrument is ready to be administered among
Turkish young people for the investigation of transition to adulthood,
and whether such a emerging adulthood period really existed.
Abstract: This article combines two techniques: data
envelopment analysis (DEA) and Factor analysis (FA) to data
reduction in decision making units (DMU). Data envelopment
analysis (DEA), a popular linear programming technique is useful to
rate comparatively operational efficiency of decision making units
(DMU) based on their deterministic (not necessarily stochastic)
input–output data and factor analysis techniques, have been proposed
as data reduction and classification technique, which can be applied
in data envelopment analysis (DEA) technique for reduction input –
output data. Numerical results reveal that the new approach shows a
good consistency in ranking with DEA.
Abstract: In the last decade, energy based control theory has undergone a significant breakthrough in dealing with underactated mechanical systems with two successful and similar tools, controlled Lagrangians and controlled Hamiltanians (IDA-PBC). However, because of the complexity of these tools, successful case studies are lacking, in particular, MIMO cases. The seminal theoretical paper of controlled Lagrangians proposed by Bloch and his colleagues presented a benchmark example–a 4 d.o.f underactuated pendulum on a cart but a detailed and completed design is neglected. To compensate this ignorance, the note revisit their design idea by addressing explicit control functions for a similar device motivated by a vector thrust body hovering in the air. To the best of our knowledge, this system is the first MIMO, underactuated example that is stabilized by using energy based tools at the courtesy of the original design idea. Some observations are given based on computer simulation.
Abstract: Taking the provincial capital, labor and energy as
inputs, regional GDP as output from 1995 to 2007, the paper
quantifies the vertical and lateral energy saving potential by
introducing the radial adjustment and slack adjustment of DEA. The
results show that by the vertical, the achievement of energy saving in
2007 is better than their respective historical performances. By
horizontal, in 2007 it can be found that Tianjin, Liaoning, Shanghai
and Yunnan do better in energy saving than other provinces. In
national wide, the higher of energy efficiency, the larger of per capita
GDP and the proportion of the tertiary industry in the national
economy, the more open to the outside, the lower the energy saving
potential demonstrates, while the energy endowment has negative
effect on energy saving potential.
Abstract: Although a picture can be automatically a graphic
work, but especially in the field of graphics and images based on the
idea of advertising and graphic design will be prepared and
photographers to realize the design using his own knowledge and
skills to help does. It is evident that knowledge of photography,
photographer and designer of the facilities, fields of reaching a
higher level of quality offers. At the same time do not have a graphic
designer is also skilled photographer, but can execute your idea may
delegate to an expert photographer. Using technology and methods in
all fields of photography, graphic art may be applicable. But most of
its application in Iran, in works such as packaging, posters, Bill
Board, advertising, brochures and catalogs are. In this study, we
review how the images and techniques in the chart should be used in
Iranian graphic photo what impact has left. Using photography
techniques and procedures can be designed and helped advance the
goals graphic. Technique could not determine the idea. But what is
important to think about design and photography and his creativity
can flourish as a tool to be effective graphic designer in mind.
Computer software to help it's very promotes creativity techniques
shall graphic designer but also it is as a tool. Using images in various
fields, especially graphic arts and only because it is not being
documented, but applications are beautiful. As to his photographic
style from today is graphics. Graphic works try to affect impacts on
their audience. Hence the photo as an important factor is attention.
The other hand saw the man with the extent of forgiving and
understanding people's image, instead of using the word to your files,
allows large messages and concepts should be sent in the shortest
time. Posters, advertisements, brochures, catalog and packaging
products very diverse agricultural, industrial and food could not be
self-image. Today, the use of graphic images for a big score and the
photos to richen the role graphic design plays a major.
Abstract: There have been various methods created based on the regression ideas to resolve the problem of data set containing censored observations, i.e. the Buckley-James method, Miller-s method, Cox method, and Koul-Susarla-Van Ryzin estimators. Even though comparison studies show the Buckley-James method performs better than some other methods, it is still rarely used by researchers mainly because of the limited diagnostics analysis developed for the Buckley-James method thus far. Therefore, a diagnostic tool for the Buckley-James method is proposed in this paper. It is called the renovated Cook-s Distance, (RD* i ) and has been developed based on the Cook-s idea. The renovated Cook-s Distance (RD* i ) has advantages (depending on the analyst demand) over (i) the change in the fitted value for a single case, DFIT* i as it measures the influence of case i on all n fitted values Yˆ∗ (not just the fitted value for case i as DFIT* i) (ii) the change in the estimate of the coefficient when the ith case is deleted, DBETA* i since DBETA* i corresponds to the number of variables p so it is usually easier to look at a diagnostic measure such as RD* i since information from p variables can be considered simultaneously. Finally, an example using Stanford Heart Transplant data is provided to illustrate the proposed diagnostic tool.
Abstract: These days MANET is attracting much attention as
they are expected to gratefully influence communication between
wireless nodes. Along with this great strength, there is much more
chance of leave and being attacked by a malicious node. Due to this
reason much attention is given to the security and the private issue in
MANET. A lot of research in MANET has been doing. In this paper
we present the overview of MANET, the security issues of MANET,
IP configuration in MANET, the solution to puzzle out the security
issues and the simulation of the proposal idea. We add the method to
figure out the malicious nodes so that we can prevent the attack from
them. Nodes exchange the information about nodes to prevent DAD
attack. We can get 30% better performance than the previous
MANETConf.
Abstract: This article concerns the presentation of an integrated
method for detection of steganographic content embedded by new
unknown programs. The method is based on data mining and
aggregated hypothesis testing. The article contains the theoretical
basics used to deploy the proposed detection system and the
description of improvement proposed for the basic system idea.
Further main results of experiments and implementation details are
collected and described. Finally example results of the tests are
presented.