Abstract: In this paper we introduce an effective ECG compression algorithm based on two dimensional multiwavelet transform. Multiwavelets offer simultaneous orthogonality, symmetry and short support, which is not possible with scalar two-channel wavelet systems. These features are known to be important in signal processing. Thus multiwavelet offers the possibility of superior performance for image processing applications. The SPIHT algorithm has achieved notable success in still image coding. We suggested applying SPIHT algorithm to 2-D multiwavelet transform of2-D arranged ECG signals. Experiments on selected records of ECG from MIT-BIH arrhythmia database revealed that the proposed algorithm is significantly more efficient in comparison with previously proposed ECG compression schemes.
Abstract: Superelastic Shape Memory Alloy (SMA) is accepted
when it used as connection in steel structures. The seismic behaviour
of steel frames with SMA is being assessed in this study. Three eightstorey
steel frames with different SMA systems are suggested, the
first one of which is braced with diagonal bracing system, the second
one is braced with nee bracing system while the last one is which the
SMA is used as connection at the plastic hinge regions of beams.
Nonlinear time history analyses of steel frames with SMA subjected
to two different ground motion records have been performed using
Seismostruct software. To evaluate the efficiency of suggested
systems, the dynamic responses of the frames were compared. From
the comparison results, it can be concluded that using SMA element
is an effective way to improve the dynamic response of structures
subjected to earthquake excitations. Implementing the SMA braces
can lead to a reduction in residual roof displacement. The shape
memory alloy is effective in reducing the maximum displacement at
the frame top and it provides a large elastic deformation range. SMA
connections are very effective in dissipating energy and reducing the
total input energy of the whole frame under severe seismic ground
motion. Using of the SMA connection system is more effective in
controlling the reaction forces at the base frame than other bracing
systems. Using SMA as bracing is more effective in reducing the
displacements. The efficiency of SMA is dependant on the input
wave motions and the construction system as well.
Abstract: In the present study the efficiency of Big Bang-Big
Crunch (BB-BC) algorithm is investigated in discrete structural
design optimization. It is shown that a standard version of the BB-BC
algorithm is sometimes unable to produce reasonable solutions to
problems from discrete structural design optimization. Two
reformulations of the algorithm, which are referred to as modified
BB-BC (MBB-BC) and exponential BB-BC (EBB-BC), are
introduced to enhance the capability of the standard algorithm in
locating good solutions for steel truss and frame type structures,
respectively. The performances of the proposed algorithms are
experimented and compared to its standard version as well as some
other algorithms over several practical design examples. In these
examples, steel structures are sized for minimum weight subject to
stress, stability and displacement limitations according to the
provisions of AISC-ASD.
Abstract: Particle damping is a technique to reduce the
structural vibrations by means of placing small metallic particles
inside a cavity that is attached to the structure at location of high
vibration amplitudes. In this paper, we have presented an analytical
model to simulate the particle damping of two dimensional transient
vibrations in structure operating under high centrifugal loads. The
simulation results show that this technique remains effective as long
as the ratio of the dynamic acceleration of the structure to the applied
centrifugal load is more than 0.1. Particle damping increases with the
increase of particle to structure mass ratio. However, unlike to the
case of particle damping in the absence of centrifugal loads where
the damping efficiency strongly depends upon the size of the cavity,
here this dependence becomes very weak. Despite the simplicity of
the model, the simulation results are considerably in good agreement
with the very scarce experimental data available in the literature for
particle damping under centrifugal loads.
Abstract: This paper presents an effective technique for harmonic current mitigation using an adaptive notch filter (ANF) to estimate current harmonics. The proposed filter consists of multiple units of ANF connected in parallel structure; each unit is governed by two ordinary differential equations. The frequency estimation is carried out based on the output of these units. The simulation and experimental results show the ability of the proposed tracking scheme to accurately estimate harmonics. The proposed filter was implemented digitally in TMS320F2808 and used in the control of hybrid active power filter (HAPF). The theoretical expectations are verified and demonstrated experimentally.
Abstract: Ontologies play an important role in semantic web
applications and are often developed by different groups and
continues to evolve over time. The knowledge in ontologies changes
very rapidly that make the applications outdated if they continue to
use old versions or unstable if they jump to new versions. Temporal
frames using frame versioning and slot versioning are used to take
care of dynamic nature of the ontologies. The paper proposes new
tags and restructured OWL format enabling the applications to work
with the old or new version of ontologies. Gene Ontology, a very
dynamic ontology, has been used as a case study to explain the OWL
Ontology with Temporal Tags.
Abstract: IVE toolkit has been created for facilitating research,education and development in the ?eld of virtual storytelling andcomputer games. Primarily, the toolkit is intended for modellingaction selection mechanisms of virtual humans, investigating level-of-detail AI techniques for large virtual environments, and for exploringjoint behaviour and role-passing technique (Sec. V). Additionally, thetoolkit can be used as an AI middleware without any changes. Themain facility of IVE is that it serves for prototyping both the AI andvirtual worlds themselves. The purpose of this paper is to describeIVE?s features in general and to present our current work - includingan educational game - on this platform.Keywords? AI middleware, simulation, virtual world.
Abstract: The central recirculation zone (CRZ) in a swirl
stabilized gas turbine combustor has a dominant effect on the fuel air
mixing process and flame stability. Most of state of the art swirlers
share one disadvantage; the fixed swirl number for the same swirler
configuration. Thus, in a mathematical sense, Reynolds number
becomes the sole parameter for controlling the flow characteristics
inside the combustor. As a result, at low load operation, the
generated swirl is more likely to become feeble affecting the flame
stabilization and mixing process. This paper introduces a new swirler
concept which overcomes the mentioned weakness of the modern
configurations. The new swirler introduces air tangentially and
axially to the combustor through tangential vanes and an axial vanes
respectively. Therefore, it provides different swirl numbers for the
same configuration by regulating the ratio between the axial and
tangential flow momenta. The swirler aerodynamic performance was
investigated using four CFD simulations in order to demonstrate the
impact of tangential to axial flow rate ratio on the CRZ. It was found
that the length of the CRZ is directly proportional to the tangential to
axial air flow rate ratio.
Abstract: IP networks are evolving from data communication
infrastructure into many real-time applications such as video
conferencing, IP telephony and require stringent Quality of Service
(QoS) requirements. A rudimentary issue in QoS routing is to find a
path between a source-destination pair that satisfies two or more endto-
end constraints and termed to be NP hard or complete. In this
context, we present an algorithm Multi Constraint Path Problem
Version 3 (MCPv3), where all constraints are approximated and
return a feasible path in much quicker time. We present another
algorithm namely Delay Coerced Multi Constrained Routing
(DCMCR) where coerce one constraint and approximate the
remaining constraints. Our algorithm returns a feasible path, if exists,
in polynomial time between a source-destination pair whose first
weight satisfied by the first constraint and every other weight is
bounded by remaining constraints by a predefined approximation
factor (a). We present our experimental results with different
topologies and network conditions.
Abstract: This study uses a simulation to establish a realistic
environment for laboratory research on Accountable Care
Organizations. We study network attributes in order to gain insights
regarding healthcare providers- conduct and performance. Our
findings indicate how network structure creates significant
differences in organizational performance. We demonstrate how
healthcare providers positioning themselves at the central, pivotal
point of the network while maintaining their alliances with their
partners produce better outcomes.
Abstract: MM-Path, an acronym for Method/Message Path, describes the dynamic interactions between methods in object-oriented systems. This paper discusses the classifications of MM-Path, based on the characteristics of object-oriented software. We categorize it according to the generation reasons, the effect scope and the composition of MM-Path. A formalized representation of MM-Path is also proposed, which has considered the influence of state on response method sequences of messages. .Moreover, an automatic MM-Path generation approach based on UML Statechart diagram has been presented, and the difficulties in identifying and generating MM-Path can be solved. . As a result, it provides a solid foundation for further research on test cases generation based on MM-Path.
Abstract: The robustness of color-based signatures in the presence of a selection of representative distortions is investigated. Considered are five signatures that have been developed and evaluated within a new modular framework. Two signatures presented in this work are directly derived from histograms gathered from video frames. The other three signatures are based on temporal information by computing difference histograms between adjacent frames. In order to obtain objective and reproducible results, the evaluations are conducted based on several randomly assembled test sets. These test sets are extracted from a video repository that contains a wide range of broadcast content including documentaries, sports, news, movies, etc. Overall, the experimental results show the adequacy of color-histogram-based signatures for video fingerprinting applications and indicate which type of signature should be preferred in the presence of certain distortions.
Abstract: The use of neural networks for recognition application is generally constrained by their inherent parameters inflexibility after the training phase. This means no adaptation is accommodated for input variations that have any influence on the network parameters. Attempts were made in this work to design a neural network that includes an additional mechanism that adjusts the threshold values according to the input pattern variations. The new approach is based on splitting the whole network into two subnets; main traditional net and a supportive net. The first deals with the required output of trained patterns with predefined settings, while the second tolerates output generation dynamically with tuning capability for any newly applied input. This tuning comes in the form of an adjustment to the threshold values. Two levels of supportive net were studied; one implements an extended additional layer with adjustable neuronal threshold setting mechanism, while the second implements an auxiliary net with traditional architecture performs dynamic adjustment to the threshold value of the main net that is constructed in dual-layer architecture. Experiment results and analysis of the proposed designs have given quite satisfactory conducts. The supportive layer approach achieved over 90% recognition rate, while the multiple network technique shows more effective and acceptable level of recognition. However, this is achieved at the price of network complexity and computation time. Recognition generalization may be also improved by accommodating capabilities involving all the innate structures in conjugation with Intelligence abilities with the needs of further advanced learning phases.
Abstract: Vehicular Ad-hoc Network (VANET) is taking more
attention in automotive industry due to the safety concern of human
lives on roads. Security is one of the safety aspects in VANET. To be
secure, network availability must be obtained at all times since
availability of the network is critically needed when a node sends any
life critical information to other nodes. However, it can be expected
that security attacks are likely to increase in the coming future due to
more and more wireless applications being developed and deployed
onto the well-known expose nature of the wireless medium. In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has
been developed and some possible solutions to overcome the attacks
have been discussed.
Abstract: This paper discusses the implementation of a fuzzy logic based coordinated voltage control for a distribution system connected with distributed generations (DGs). The connection of DGs has created a challenge for the distribution network operators to keep the voltage in the system within its acceptable limits. Intelligent centralized or coordinated voltage control schemes have proven to be more reliable due to its ability to provide more control and coordination with the communication with other network devices. In this work, voltage control using fuzzy logic by coordinating three methods of control, power factor control, on load tap changer and generation curtailment is implemented on a distribution network test system. The results show that the fuzzy logic based coordination is able to keep the voltage within its allowable limits.
Abstract: Multi-Radio Multi-Channel (MRMC) systems are key to power control problems in wireless mesh networks (WMNs). In this paper, we present asynchronous multiple-state based power control for MRMC WMNs. First, WMN is represented as a set of disjoint Unified Channel Graphs (UCGs). Second, each network interface card (NIC) or radio assigned to a unique UCG adjusts transmission power using predicted multiple interaction state variables (IV) across UCGs. Depending on the size of queue loads and intra- and inter-channel states, each NIC optimizes transmission power locally and asynchronously. A new power selection MRMC unification protocol (PMMUP) is proposed that coordinates interactions among radios. The efficacy of the proposed method is investigated through simulations.
Abstract: The Mobile IP Standard has been developed to support mobility over the Internet. This standard contains several drawbacks as in the cases where packets are routed via sub-optimal paths and significant amount of signaling messages is generated due to the home registration procedure which keeps the network aware of the current location of the mobile nodes. Recently, a dynamic hierarchical mobility management strategy for mobile IP networks (DHMIP) has been proposed to reduce home registrations costs. However, this strategy induces a packet delivery delay and increases the risk of packet loss. In this paper, we propose an enhanced version of the dynamic hierarchical strategy that reduces the packet delivery delay and minimizes the risk of packet loss. Preliminary results obtained from simulations are promising. They show that the enhanced version outperforms the original dynamic hierarchical mobility management strategy version.
Abstract: The protection of groundwater resources is the great
important many semiarid and arid environments. Baghan watershed
is located in the north of Kangan in the Boshehr province in Iran. The
groundwater resources have a vital role in supplying agricultural,
drinking, domestic and industrial water demand in Baghan
watershed. For our investigation into the water quality we collected
30 samples to chemical and physical analysis. The result showed the
marl and evaporation deposits that contain anhydrite and gypsum is
the main source of groundwater pollution, and one part of the
groundwater was polluted by oil and gas industrial. Another part of
the groundwater was contaminated by urban waste water. The
electrical conductivity and captions and anions increased around of
towns and gas refinery. Although the negative impact of untreated
domestic wastewater is relatively low but the results showed strongly
the negative impact of wastewater refinery is very considerable. This
negative impact increased in downstream due to shallow aquifer.
Additionally, the agents that adversely affect the quality of
groundwater come from a variety of sources, including geology,
domestic wastewater and the Jam refinery in Baghan watershed.
Abstract: The purpose of this paper is to examine the inter
relationships among various leadership branding constructs of
entrepreneurs in small and medium sized enterprises (SMEs). We
employ a quantitative structural equation modeling through a new
leadership branding engagement model comprises constructs of
leader-s or entrepreneur-s personality, branding practice and
customer engagement. The results confirm that there are significant
relationships between the three constructs and the major fit indices
indicate that the data fits the proposed model. The findings provide
insights and fill in the literature gaps on statistically validated
representation of leadership branding for SMEs across new economic
regions of Malaysia that may implicate other economic zones with
similar situations. This study extends the establishment of a
leadership branding engagement model with a new mechanism of
using leaders- personality as a predictor to branding practice and
customer engagement performance.
Abstract: The DNA microarray technology concurrently monitors the expression levels of thousands of genes during significant biological processes and across the related samples. The better understanding of functional genomics is obtained by extracting the patterns hidden in gene expression data. It is handled by clustering which reveals natural structures and identify interesting patterns in the underlying data. In the proposed work clustering gene expression data is done through an Advanced Nelder Mead (ANM) algorithm. Nelder Mead (NM) method is a method designed for optimization process. In Nelder Mead method, the vertices of a triangle are considered as the solutions. Many operations are performed on this triangle to obtain a better result. In the proposed work, the operations like reflection and expansion is eliminated and a new operation called spread-out is introduced. The spread-out operation will increase the global search area and thus provides a better result on optimization. The spread-out operation will give three points and the best among these three points will be used to replace the worst point. The experiment results are analyzed with optimization benchmark test functions and gene expression benchmark datasets. The results show that ANM outperforms NM in both benchmarks.