Abstract: In this study, we have defined slant helix according to
Bishop frame in Euclidean 3-Space. Furthermore, we have given
some necassary and sufficient conditons for the slant helix.
Abstract: In this paper we study the rheonomic mechanical systems from the point of view of Lagrange geometry, by means of its canonical semispray. We present an example of the constraint motion of a material point, in the rheonomic case.
Abstract: This paper proposes a copyright protection scheme for color images using secret sharing and wavelet transform. The scheme contains two phases: the share image generation phase and the watermark retrieval phase. In the generation phase, the proposed scheme first converts the image into the YCbCr color space and creates a special sampling plane from the color space. Next, the scheme extracts the features from the sampling plane using the discrete wavelet transform. Then, the scheme employs the features and the watermark to generate a principal share image. In the retrieval phase, an expanded watermark is first reconstructed using the features of the suspect image and the principal share image. Next, the scheme reduces the additional noise to obtain the recovered watermark, which is then verified against the original watermark to examine the copyright. The experimental results show that the proposed scheme can resist several attacks such as JPEG compression, blurring, sharpening, noise addition, and cropping. The accuracy rates are all higher than 97%.
Abstract: Intelligent systems based on machine learning
techniques, such as classification, clustering, are gaining wide spread
popularity in real world applications. This paper presents work on
developing a software system for predicting crop yield, for example
oil-palm yield, from climate and plantation data. At the core of our
system is a method for unsupervised partitioning of data for finding
spatio-temporal patterns in climate data using kernel methods which
offer strength to deal with complex data. This work gets inspiration
from the notion that a non-linear data transformation into some high
dimensional feature space increases the possibility of linear
separability of the patterns in the transformed space. Therefore, it
simplifies exploration of the associated structure in the data. Kernel
methods implicitly perform a non-linear mapping of the input data
into a high dimensional feature space by replacing the inner products
with an appropriate positive definite function. In this paper we
present a robust weighted kernel k-means algorithm incorporating
spatial constraints for clustering the data. The proposed algorithm
can effectively handle noise, outliers and auto-correlation in the
spatial data, for effective and efficient data analysis by exploring
patterns and structures in the data, and thus can be used for
predicting oil-palm yield by analyzing various factors affecting the
yield.
Abstract: In today's day and age, one of the important topics in
information security is authentication. There are several alternatives
to text-based authentication of which includes Graphical Password
(GP) or Graphical User Authentication (GUA). These methods stems
from the fact that humans recognized and remembers images better
than alphanumerical text characters. This paper will focus on the
security aspect of GP algorithms and what most researchers have
been working on trying to define these security features and
attributes. The goal of this study is to develop a fuzzy decision model
that allows automatic selection of available GP algorithms by taking
into considerations the subjective judgments of the decision makers
who are more than 50 postgraduate students of computer science. The
approach that is being proposed is based on the Fuzzy Analytic
Hierarchy Process (FAHP) which determines the criteria weight as a
linear formula.
Abstract: In the present article, effect of non-uniform excitation
of reservoir bottom on nonlinear response of concrete gravity dams is
considered. Anisotropic damage mechanics approach is used to model nonlinear behavior of mass concrete in 2D space. The tallest
monolith of Pine Flat dam is selected as a case study. The horizontal
and vertical components of 1967 Koyna earthquake is used to excite
the system. It is found that crest response and stresses within the dam body decrease significantly when the reservoir is excited nonuniformly. In addition, the crack profiles within the dam body and in vicinity of the neck decreases.
Abstract: In this research work, a novel parallel manipulator
with high positioning and orienting rate is introduced. This
mechanism has two rotational and one translational degree of
freedom. Kinematics and Jacobian analysis are investigated.
Moreover, workspace analysis and optimization has been performed
by using genetic algorithm toolbox in Matlab software. Because of
decreasing moving elements, it is expected much more better
dynamic performance with respect to other counterpart mechanisms
with the same degrees of freedom. In addition, using couple of
cylindrical and revolute joints increased mechanism ability to have
more extended workspace.
Abstract: Extracting and elaborating software requirements and
transforming them into viable software architecture are still an
intricate task. This paper defines a solution architecture which is
based on the blurred amalgamation of problem space and solution
space. The dependencies between domain constraints, requirements
and architecture and their importance are described that are to be
considered collectively while evolving from problem space to
solution space. This paper proposes a revised version of Twin Peaks
Model named Win Peaks Model that reconciles software
requirements and architecture in more consistent and adaptable
manner. Further the conflict between stakeholders- win-requirements
is resolved by proposed Voting methodology that is simple
adaptation of win-win requirements negotiation model and QARCC.
Abstract: The purpose of planned islanding is to construct a
power island during system disturbances which are commonly
formed for maintenance purpose. However, in most of the cases
island mode operation is not allowed. Therefore distributed
generators (DGs) must sense the unplanned disconnection from the
main grid. Passive technique is the most commonly used method for
this purpose. However, it needs improvement in order to identify the
islanding condition. In this paper an effective method for
identification of islanding condition based on phase space and neural
network techniques has been developed. The captured voltage
waveforms at the coupling points of DGs are processed to extract the
required features. For this purposed a method known as the phase
space techniques is used. Based on extracted features, two neural
network configuration namely radial basis function and probabilistic
neural networks are trained to recognize the waveform class.
According to the test result, the investigated technique can provide
satisfactory identification of the islanding condition in the
distribution system.
Abstract: the article analyzes the development prospects of
education system in Kazakhstan. Education is among key sources of
culture and social mobility. Modern education must become civic
which means availability of high quality education to all people
irrespective of their racial, ethnic, religious, social, gender and any
other differences. Socially focused nature of modernization of
Kazakhstan-s society is predicated upon formation of a civic
education model in the future. Kazakhstan-s education system
undergoes intensive reforms first of all intended to achieve
international education standards and integration into the global
educational and information space.
Abstract: Knowledge is indispensable but voluminous knowledge becomes a bottleneck for efficient processing. A great challenge for data mining activity is the generation of large number of potential rules as a result of mining process. In fact sometimes result size is comparable to the original data. Traditional data mining pruning activities such as support do not sufficiently reduce the huge rule space. Moreover, many practical applications are characterized by continual change of data and knowledge, thereby making knowledge voluminous with each change. The most predominant representation of the discovered knowledge is the standard Production Rules (PRs) in the form If P Then D. Michalski & Winston proposed Censored Production Rules (CPRs), as an extension of production rules, that exhibit variable precision and supports an efficient mechanism for handling exceptions. A CPR is an augmented production rule of the form: If P Then D Unless C, where C (Censor) is an exception to the rule. Such rules are employed in situations in which the conditional statement 'If P Then D' holds frequently and the assertion C holds rarely. By using a rule of this type we are free to ignore the exception conditions, when the resources needed to establish its presence, are tight or there is simply no information available as to whether it holds or not. Thus the 'If P Then D' part of the CPR expresses important information while the Unless C part acts only as a switch changes the polarity of D to ~D. In this paper a scheme based on Dempster-Shafer Theory (DST) interpretation of a CPR is suggested for discovering CPRs from the discovered flat PRs. The discovery of CPRs from flat rules would result in considerable reduction of the already discovered rules. The proposed scheme incrementally incorporates new knowledge and also reduces the size of knowledge base considerably with each episode. Examples are given to demonstrate the behaviour of the proposed scheme. The suggested cumulative learning scheme would be useful in mining data streams.
Abstract: An automatic method for the extraction of feature points for face based applications is proposed. The system is based upon volumetric feature descriptors, which in this paper has been extended to incorporate scale space. The method is robust to noise and has the ability to extract local and holistic features simultaneously from faces stored in a database. Extracted features are stable over a range of faces, with results indicating that in terms of intra-ID variability, the technique has the ability to outperform manual landmarking.
Abstract: We developed a vision interface immersive projection system, CAVE in virtual rea using hand gesture recognition with computer vis background image was subtracted from current webcam and we convert the color space of the imag Then we mask skin regions using skin color range t a noise reduction operation. We made blobs fro gestures were recognized using these blobs. Using recognition, we could implement an effective bothering devices for CAVE. e framework for an reality research field vision techniques. ent image frame age into HSV space. e threshold and apply from the image and ing our hand gesture e interface without
Abstract: The approaches to make an agent generate intelligent actions in the AI field might be roughly categorized into two ways–the classical planning and situated action system. It is well known that each system have its own strength and weakness. However, each system also has its own application field. In particular, most of situated action systems do not directly deal with the logical problem. This paper first briefly mentions the novel action generator to situatedly extract a set of actions, which is likely to help to achieve the goal at the current situation in the relaxed logical space. After performing the action set, the agent should recognize the situation for deciding the next likely action set. However, since the extracted action is an approximation of the action which helps to achieve the goal, the agent could be caught into the deadlock of the problem. This paper proposes the newly developed hybrid architecture to solve the problem, which combines the novel situated action generator with the conventional planner. The empirical result in some planning domains shows that the quality of the resultant path to the goal is mostly acceptable as well as deriving the fast response time, and suggests the correlation between the structure of problems and the organization of each system which generates the action.
Abstract: This paper presents a method for determining the
uniaxial tensile properties such as Young-s modulus, yield strength
and the flow behaviour of a material in a virtually non-destructive
manner. To achieve this, a new dumb-bell shaped miniature
specimen has been designed. This helps in avoiding the removal of
large size material samples from the in-service component for the
evaluation of current material properties. The proposed miniature
specimen has an advantage in finite element modelling with respect
to computational time and memory space. Test fixtures have been
developed to enable the tension tests on the miniature specimen in a
testing machine. The studies have been conducted in a chromium
(H11) steel and an aluminum alloy (AR66). The output from the
miniature test viz. load-elongation diagram is obtained and the finite
element simulation of the test is carried out using a 2D plane stress
analysis. The results are compared with the experimental results. It is
observed that the results from the finite element simulation
corroborate well with the miniature test results. The approach seems
to have potential to predict the mechanical properties of the
materials, which could be used in remaining life estimation of the
various in-service structures.
Abstract: In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS ÔèÑ T , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overlapping blocks and the two LSBs are set to zero. The object that is to be authenticated is also divided into 2×2 nonoverlapping blocks and each block-s intensity mean is computed followed by eight bit encoding. The generated watermark is then embedded into T channel randomly selected 2×2 block-s LSBs using 2D-Torus Automorphism. Selection of block size is paramount for exact localization and recovery of work. The proposed scheme is blind, efficient and secure with ability to detect and locate even minor tampering applied to the image with full recovery of original work. The quality of watermarked media is quite high both subjectively and objectively. The technique is suitable for class of images with format such as gif, tif or bitmap.
Abstract: Calcium is a vital second messenger used in signal transduction. Calcium controls secretion, cell movement, muscular contraction, cell differentiation, ciliary beating and so on. Two theories have been used to simplify the system of reaction-diffusion equations of calcium into a single equation. One is excess buffer approximation (EBA) which assumes that mobile buffer is present in excess and cannot be saturated. The other is rapid buffer approximation (RBA), which assumes that calcium binding to buffer is rapid compared to calcium diffusion rate. In the present work, attempt has been made to develop a model for calcium diffusion under excess buffer approximation in neuron cells. This model incorporates the effect of [Na+] influx on [Ca2+] diffusion,variable calcium and sodium sources, sodium-calcium exchange protein, Sarcolemmal Calcium ATPase pump, sodium and calcium channels. The proposed mathematical model leads to a system of partial differential equations which have been solved numerically using Forward Time Centered Space (FTCS) approach. The numerical results have been used to study the relationships among different types of parameters such as buffer concentration, association rate, calcium permeability.
Abstract: The machining of Carbon Fiber Reinforced Plastics
has come to constitute a significant challenge for many fields of
industry. The resulting surface finish of machined parts is of primary
concern for several reasons, including contact quality and impact on
the assembly. Therefore, the characterization and prediction of
roughness based on machining parameters are crucial for costeffective
operations. In this study, a PCD tool comprised of two
straight flutes was used to trim 32-ply carbon fiber laminates in a bid
to analyze the effects of the feed rate and the cutting speed on the
surface roughness. The results show that while the speed has but a
slight impact on the surface finish, the feed rate for its part affects it
strongly. A detailed study was also conducted on the effect of fiber
orientation on surface roughness, for quasi-isotropic laminates used
in aerospace. The resulting roughness profiles for the four-ply
orientation lay-up were compared, and it was found that fiber angle is
a critical parameter relating to surface roughness. One of the four
orientations studied led to very poor surface finishes, and
characteristic roughness profiles were identified and found to only
relate to the ply orientations of multilayer carbon fiber laminates.
Abstract: In this paper we present an extension to Vision Based
LRTA* (VLRTA*) known as Vision Based Moving Target Search
(VMTS) for capturing unknown moving target in unknown territory
with randomly generated obstacles. Target position is unknown to the
agents and they cannot predict its position using any probability
method. Agents have omni directional vision but can see in one
direction at some point in time. Agent-s vision will be blocked by the
obstacles in the search space so agent can not see through the
obstacles. Proposed algorithm is evaluated on large number of
scenarios. Scenarios include grids of sizes from 10x10 to 100x100.
Grids had obstacles randomly placed, occupying 0% to 50%, in
increments of 10%, of the search space. Experiments used 2 to 9
agents for each randomly generated maze with same obstacle ratio.
Observed results suggests that VMTS is effective in locate target
time, solution quality and virtual target. In addition, VMTS becomes
more efficient if the number of agents is increased with proportion to
obstacle ratio.
Abstract: In this paper, a Smart Home Service Robot, McBot II,
which performs mess-cleanup function etc. in house, is designed much
more optimally than other service robots. It is newly developed in
much more practical system than McBot I which we had developed
two years ago. One characteristic attribute of mobile platforms
equipped with a set of dependent wheels is their omni- directionality
and the ability to realize complex translational and rotational
trajectories for agile navigation in door. An accurate coordination of
steering angle and spinning rate of each wheel is necessary for a
consistent motion. This paper develops trajectory controller of
3-wheels omni-directional mobile robot using fuzzy azimuth estimator.
A specialized anthropomorphic robot manipulator which can be
attached to the housemaid robot McBot II, is developed in this paper.
This built-in type manipulator consists of both arms with 3 DOF
(Degree of Freedom) each and both hands with 3 DOF each. The
robotic arm is optimally designed to satisfy both the minimum
mechanical size and the maximum workspace. Minimum mass and
length are required for the built-in cooperated-arms system. But that
makes the workspace so small. This paper proposes optimal design
method to overcome the problem by using neck joint to move the arms
horizontally forward/backward and waist joint to move them
vertically up/down. The robotic hand, which has two fingers and a
thumb, is also optimally designed in task-based concept. Finally, the
good performance of the developed McBot II is confirmed through
live tests of the mess-cleanup task.