Abstract: These In this work, a regular unit speed curve in six
dimensional Euclidean space, whose Frenet curvatures are constant,
is considered. Thereafter, a method to calculate Frenet apparatus of
this curve is presented.
Abstract: World has entered in 21st century. The technology of
computer graphics and digital cameras is prevalent. High resolution
display and printer are available. Therefore high resolution images
are needed in order to produce high quality display images and high
quality prints. However, since high resolution images are not usually
provided, there is a need to magnify the original images. One
common difficulty in the previous magnification techniques is that of
preserving details, i.e. edges and at the same time smoothing the data
for not introducing the spurious artefacts. A definitive solution to this
is still an open issue. In this paper an image magnification using
adaptive interpolation by pixel level data-dependent geometrical
shapes is proposed that tries to take into account information about
the edges (sharp luminance variations) and smoothness of the image.
It calculate threshold, classify interpolation region in the form of
geometrical shapes and then assign suitable values inside
interpolation region to the undefined pixels while preserving the
sharp luminance variations and smoothness at the same time.
The results of proposed technique has been compared qualitatively
and quantitatively with five other techniques. In which the qualitative
results show that the proposed method beats completely the Nearest
Neighbouring (NN), bilinear(BL) and bicubic(BC) interpolation. The
quantitative results are competitive and consistent with NN, BL, BC
and others.
Abstract: This paper focuses on a critical component of the situational awareness (SA), the control of autonomous vertical flight for an unmanned aerial vehicle (UAV). Autonomous vertical flight is a challenging but important task for tactical UAVs to achieve high level of autonomy under adverse conditions. With the SA strategy, we proposed a two stage flight control procedure using two autonomous control subsystems to address the dynamics variation and performance requirement difference in initial and final stages of flight trajectory for a nontrivial nonlinear trirotor mini-UAV model. This control strategy for chosen mini-UAV model has been verified by simulation of hovering maneuvers using software package Simulink and demonstrated good performance for fast SA in realtime search-and-rescue operations.
Abstract: The shortest path question is in a graph theory model
question, and it is applied in many fields. The most short-path
question may divide into two kinds: Single sources most short-path,
all apexes to most short-path. This article mainly introduces the
problem of all apexes to most short-path, and gives a new parallel
algorithm of all apexes to most short-path according to the Dijkstra
algorithm. At last this paper realizes the parallel algorithms in the
technology of C # multithreading.
Abstract: Many new experimental films which were free from conventional movie forms have appeared since Nubellbak Movement in the late 1950s. Forty years after the movement started, on March 13th, 1995, on the 100th anniversary of the birth of film, the declaration called Dogme 95, was issued in Copenhagen, Denmark. It aimed to create a new style of avant-garde film, and showed a tendency toward being anti-Hollywood and anti-genre, which were against the highly popular Hollywood trend of movies based on large-scale investment. The main idea of Dogme 95 is the opposition to 'the writer's doctrine' that a film should be the artist's individual work and to 'the overuse of technology' in film. The key figures declared ten principles called 'Vow of Chastity', by which new movie forms were to be produced. Interview (2000), directed by Byunhyuk, was made in 2000, five years after Dogme 95 was declared. This movie was dedicated as the first Asian Dogme. This study will survey the relationship between Korean film and the Vow of Chastity through the Korean films released in theaters from a viewpoint of technology and content. It also will call attention to its effects on and significance to Korean film in modern society.
Abstract: Space Vector Pulse Width Modulation SVPWM is
one of the most used techniques to generate sinusoidal voltage and
current due to its facility and efficiency with low harmonics
distortion. This algorithm is specially used in power electronic
applications. This paper describes simulation algorithm of SVPWM
& SPWM using MatLab/simulink environment. It also implements a
closed loop three phases DC-AC converter controlling its outputs
voltages amplitude and frequency using MatLab. Also comparison
between SVPWM & SPWM results is given.
Abstract: This paper introduces an automatic voice classification
system for the diagnosis of individual constitution based on Sasang
Constitutional Medicine (SCM) in Traditional Korean Medicine
(TKM). For the developing of this algorithm, we used the voices of
309 female speakers and extracted a total of 134 speech features from
the voice data consisting of 5 sustained vowels and one sentence. The
classification system, based on a rule-based algorithm that is derived
from a non parametric statistical method, presents 3 types of decisions:
reserved, positive and negative decisions. In conclusion, 71.5% of the
voice data were diagnosed by this system, of which 47.7% were
correct positive decisions and 69.7% were correct negative decisions.
Abstract: The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
Abstract: Dealing with hundreds of features in character
recognition systems is not unusual. This large number of features
leads to the increase of computational workload of recognition
process. There have been many methods which try to remove
unnecessary or redundant features and reduce feature dimensionality.
Besides because of the characteristics of Farsi scripts, it-s not
possible to apply other languages algorithms to Farsi directly. In this
paper some methods for feature subset selection using genetic
algorithms are applied on a Farsi optical character recognition (OCR)
system. Experimental results show that application of genetic
algorithms (GA) to feature subset selection in a Farsi OCR results in
lower computational complexity and enhanced recognition rate.
Abstract: Many firms implemented various initiatives such as outsourced manufacturing which could make a supply chain (SC) more vulnerable to various types of disruptions. So managing risk has become a critical component of SC management. Different types of SC vulnerability management methodologies have been proposed for managing SC risk, most offer only point-based solutions that deal with a limited set of risks. This research aims to reinforce SC risk management by proposing an integrated approach. SC risks are identified and a risk index classification structure is created. Then we develop a SC risk assessment approach based on the analytic network process (ANP) and the VIKOR methods under the fuzzy environment where the vagueness and subjectivity are handled with linguistic terms parameterized by triangular fuzzy numbers. By using FANP, risks weights are calculated and then inserted to the FVIKOR to rank the SC members and find the most risky partner.
Abstract: In this paper, the Tabu search algorithm is used to
solve a transportation problem which consists of determining the
shortest routes with the appropriate vehicle capacity to facilitate the
travel of the students attending the University of Mauritius. The aim
of this work is to minimize the total cost of the distance travelled by
the vehicles in serving all the customers. An initial solution is
obtained by the TOUR algorithm which basically constructs a giant
tour containing all the customers and partitions it in an optimal way
so as to produce a set of feasible routes. The Tabu search algorithm
then makes use of a search procedure, a swapping procedure and the
intensification and diversification mechanism to find the best set of
feasible routes.
Abstract: The essence of the 21st century is knowledge economy. Knowledge has become the key resource of economic growth and social development. Construction industry is no exception. Because of the characteristic of complexity, project manager can't depend only on information management. The only way to improve the level of construction project management is to set up a kind of effective knowledge accumulation mechanism. This paper first introduced the IFC standard and the concept of ontology. Then put forward the construction method of the architectural engineering domain ontology based on IFC. And finally build up the concepts, properties and the relationship between the concepts of the ontology. The deficiency of this paper is also pointed out.
Abstract: Recommender systems are usually regarded as an
important marketing tool in the e-commerce. They use important
information about users to facilitate accurate recommendation. The
information includes user context such as location, time and interest
for personalization of mobile users. We can easily collect information
about location and time because mobile devices communicate with the
base station of the service provider. However, information about user
interest can-t be easily collected because user interest can not be
captured automatically without user-s approval process. User interest
usually represented as a need. In this study, we classify needs into two
types according to prior research. This study investigates the
usefulness of data mining techniques for classifying user need type for
recommendation systems. We employ several data mining techniques
including artificial neural networks, decision trees, case-based
reasoning, and multivariate discriminant analysis. Experimental
results show that CHAID algorithm outperforms other models for
classifying user need type. This study performs McNemar test to
examine the statistical significance of the differences of classification
results. The results of McNemar test also show that CHAID performs
better than the other models with statistical significance.
Abstract: Inter-symbol interference if not taken care off may cause severe error at the receiver and the detection of signal becomes difficult. An adaptive equalizer employing Recursive Least Squares algorithm can be a good compensation for the ISI problem. In this paper performance of communication link in presence of Least Mean Square and Recursive Least Squares equalizer algorithm is analyzed. A Model of communication system having Quadrature amplitude modulation and Rician fading channel is implemented using MATLAB communication block set. Bit error rate and number of errors is evaluated for RLS and LMS equalizer algorithm, due to change in Signal to Noise Ratio (SNR) and fading component gain in Rician fading Channel.
Abstract: Two-dimensional (2D) bar codes were designed to
carry significantly more data with higher information density and
robustness than its 1D counterpart. Thanks to the popular
combination of cameras and mobile phones, it will naturally bring
great commercial value to use the camera phone for 2D bar code
reading. This paper addresses the problem of specific 2D bar code
design for mobile phones and introduces a low-level encoding
method of matrix codes. At the same time, we propose an efficient
scheme for 2D bar codes decoding, of which the effort is put on
solutions of the difficulties introduced by low image quality that is
very common in bar code images taken by a phone camera.
Abstract: In this study, we report the synthesis and
characterization of nanohydroxyapatite (nHAp) in gelatin-starch
matrix via biomimetic method. Characterization of the samples was
performed using X-ray diffraction (XRD) and Fourier Transform
infrared spectroscopy (FT-IR). The Size and morphology of the
nHAp samples were determined using scanning and transmission
electron microscopy (SEM and TEM). The results reveal that the
shape and morphology of nHAp is influenced by presence of
biopolymers as template. Carbonyl and amino groups from gelatin
and hydroxyl from starch play crucial roles in HAp formation on the
surface of gelatin-starch.
Abstract: As the new industrial revolution advances in the
nanotechnology have been followed with interest throughout the
world and also in Turkey. Media has an important role in conveying
these advances to public, rising public awareness and creating
attitudes related to nanotechnology. As well as representing how a
subject is treated, media frames determine how public think about
this subject. In literature definite frames related to nanoscience and
nanotechnology such as process, regulation, conflict and risks were
mentioned in studies focusing different countries. So how
nanotechnology news is treated by which frames and in which news
categories in Turkey as a one of developing countries? In this study
examining different variables about nanotechnology that affect
public attitudes such as category, frame, story tone, source in Turkish
media via framing analysis developed in agenda setting studies was
aimed. In the analysis data between 2005 and 2009 obtained from the
first five national newspapers with wide circulation in Turkey will be
used. In this study the direction of the media about nanotechnology,
in which frames nanotechnologic advances brought to agenda were
reported as news, and sectoral, legal, economic and social scenes
reflected by these frames to public related to nanotechnology in
Turkey were planned.
Abstract: There are few studies on eggshell of leatherback turtle
which is endangered species in Thailand. This study was focusing on
the ultrastructure and elemental composition of leatherback turtle
eggshells collected from Andaman Sea Shore, Thailand during the
nesting season using scanning electron microscope (SEM). Three
eggshell layers of leatherback turtle; the outer cuticle layer or
calcareous layer, the middle layer or middle multistrata layer and the
inner fibrous layer were recognized. The outer calcareous layer was
thick and porosity which consisted of loose nodular units of various
crystal shapes and sizes. The loose attachment between these units
resulted in numerous spaces and openings. The middle layer was
compact thick with several multistrata and contained numerous
openings connecting to both outer cuticle layer and inner fibrous
layer. The inner fibrous layer was compact and thin, and composed of
numerous reticular fibers. Energy dispersive X-ray microanalysis
detector revealed energy spectrum of X-rays character emitted from
all elements on each layer. The percentages of all elements were
found in the following order: carbon (C) > oxygen (O) > calcium
(Ca) > sulfur (S) > potassium (K) > aluminum (Al) > iodine (I) >
silicon (Si) > chlorine (Cl) > sodium (Na) > fluorine (F) >
phosphorus (P) > magnesium (Mg). Each layer consisted of high
percentage of CaCO3 (approximately 98%) implying that it was
essential for turtle embryonic development. A significant difference
was found in the percentages of Ca and Mo in the 3layers. Moreover,
transition metal, metal and toxic non-metal contaminations were
found in leatherback turtle eggshell samples. These were palladium
(Pd), molybdenum (Mo), copper (Cu), aluminum (Al), lead (Pb), and
bromine (Br). The contamination elements were seen in the outer
layers except for Mo. All elements were readily observed and
mapped using Smiling program. X-ray images which mapped the
location of all elements were showed. Calcium containing in the
eggshell appeared in high contents and was widely distributing in
clusters of the outer cuticle layer to form CaCO3 structure. Moreover,
the accumulation of Na and Cl was observed to form NaCl which was
widely distributing in 3 eggshell layers. The results from this study
would be valuable on assessing the emergent success in this
endangered species.
Abstract: We present an operator for a propositional linear temporal logic over infinite schedules of iterated transactions, which, when applied to a formula, asserts that any schedule satisfying the formula is serializable. The resulting logic is suitable for specifying and verifying consistency properties of concurrent transaction management systems, that can be defined in terms of serializability, as well as other general safety and liveness properties. A strict form of serializability is used requiring that, whenever the read and write steps of a transaction occurrence precede the read and write steps of another transaction occurrence in a schedule, the first transaction must precede the second transaction in an equivalent serial schedule. This work improves on previous work in providing a propositional temporal logic with a serializability operator that is of the same PSPACE complete computational complexity as standard propositional linear temporal logic without a serializability operator.
Abstract: The effect of different tempering temperatures and heat treatment times on the corrosion resistance of austenitic stainless steels in oxalic acid was studied in this work using conventional weight loss and electrochemical measurements. Typical 304 and 316 stainless steel samples were tempered at 150oC, 250oC and 350oC after being austenized at 1050oC for 10 minutes. These samples were then immersed in 1.0M oxalic acid and their weight losses were measured at every five days for 30 days. The results show that corrosion of both types of ASS samples increased with an increase in tempering temperature and time and this was due to the precipitation of chromium carbides at the grain boundaries of these metals. Electrochemical results also confirm that the 304 ASS is more susceptible to corrosion than 316 ASS in this medium. This is attributed to the molybdenum in the composition of the latter. The metallographic images of these samples showed non–uniform distribution of precipitated chromium carbides at the grain boundaries of these metals and unevenly distributed carbides and retained austenite phases which cause galvanic effects in the medium.