Abstract: In a handwriting recognition problem, characters can
be represented using chain codes. The main problem in representing
characters using chain code is optimizing the length of the chain
code. This paper proposes to use randomized algorithm to minimize
the length of Freeman Chain Codes (FCC) generated from isolated
handwritten characters. Feedforward neural network is used in the
classification stage to recognize the image characters. Our test results
show that by applying the proposed model, we reached a relatively
high accuracy for the problem of isolated handwritten when tested on
NIST database.
Abstract: In this paper two models using a functional network
were employed to solving classification problem. Functional networks
are generalized neural networks, which permit the specification of
their initial topology using knowledge about the problem at hand. In
this case, and after analyzing the available data and their relations, we
systematically discuss a numerical analysis method used for
functional network, and apply two functional network models to
solving XOR problem. The XOR problem that cannot be solved with
two-layered neural network can be solved by two-layered functional
network, which reveals a potent computational power of functional
networks, and the performance of the proposed model was validated
using classification problems.
Abstract: In this paper three different approaches for person
verification and identification, i.e. by means of fingerprints, face and
voice recognition, are studied. Face recognition uses parts-based
representation methods and a manifold learning approach. The
assessment criterion is recognition accuracy. The techniques under
investigation are: a) Local Non-negative Matrix Factorization
(LNMF); b) Independent Components Analysis (ICA); c) NMF with
sparse constraints (NMFsc); d) Locality Preserving Projections
(Laplacianfaces). Fingerprint detection was approached by classical
minutiae (small graphical patterns) matching through image
segmentation by using a structural approach and a neural network as
decision block. As to voice / speaker recognition, melodic cepstral
and delta delta mel cepstral analysis were used as main methods, in
order to construct a supervised speaker-dependent voice recognition
system. The final decision (e.g. “accept-reject" for a verification
task) is taken by using a majority voting technique applied to the
three biometrics. The preliminary results, obtained for medium
databases of fingerprints, faces and voice recordings, indicate the
feasibility of our study and an overall recognition precision (about
92%) permitting the utilization of our system for a future complex
biometric card.
Abstract: Method of determining of moisture diffusivity on two types of autoclaved aerated concretes with different bulk density is represented in the paper. On the specimens were measured one dimensional water transport only on liquid phase. Ever evaluation was done from moisture profiles measured in specific times by capacitance moisture meter. All values from capacitance meter were recalculated to moisture content by mass. Moisture diffusivity was determined in dependence on both moisture and temperature. The experiment temperatures were set at values 55, 65, 75 and 85°C.
Abstract: The study of the interaction between humans and
computers has been emerging during the last few years. This
interaction will be more powerful if computers are able to perceive
and respond to human nonverbal communication such as emotions. In
this study, we present the image-based approach to emotion
classification through lower facial expression. We employ a set of
feature points in the lower face image according to the particular face
model used and consider their motion across each emotive expression
of images. The vector of displacements of all feature points input to
the Adaptive Support Vector Machines (A-SVMs) classifier that
classify it into seven basic emotions scheme, namely neutral, angry,
disgust, fear, happy, sad and surprise. The system was tested on the
Japanese Female Facial Expression (JAFFE) dataset of frontal view
facial expressions [7]. Our experiments on emotion classification
through lower facial expressions demonstrate the robustness of
Adaptive SVM classifier and verify the high efficiency of our
approach.
Abstract: This article presents the results of a study conducted to identify operational risks for information systems (IS) with service-oriented architecture (SOA). Analysis of current approaches to risk and system error classifications revealed that the system error classes were never used for SOA risk estimation. Additionally system error classes are not normallyexperimentally supported with realenterprise error data. Through the study several categories of various existing error classifications systems are applied and three new error categories with sub-categories are identified. As a part of operational risks a new error classification scheme is proposed for SOA applications. It is based on errors of real information systems which are service providers for application with service-oriented architecture. The proposed classification approach has been used to classify SOA system errors for two different enterprises (oil and gas industry, metal and mining industry). In addition we have conducted a research to identify possible losses from operational risks.
Abstract: In this paper, we proposed a method to classify each
type of natural rock texture. Our goal is to classify 26 classes of rock
textures. First, we extract five features of each class by using
principle component analysis combining with the use of applied
spatial frequency measurement. Next, the effective node number of
neural network was tested. We used the most effective neural
network in classification process. The results from this system yield
quite high in recognition rate. It is shown that high recognition rate
can be achieved in separation of 26 stone classes.
Abstract: The purpose of this work is to establish the theoretical
foundations for calculating and designing the sublimationcondensation
processes in chemical apparatuses which are intended
for production of ultrafine powders of crystalline and amorphous
materials with controlled fractional composition. Theoretic analysis
of the primary processes of nucleation and growth kinetics of the
clusters according to the degree of super-saturation and the
homogeneous or heterogeneous nature of nucleation has been carried
out. The engineering design procedures of desublimation processes
have been offered and tested for modification of the Claus process.
Abstract: Multivariate quality control charts show some advantages to monitor several variables in comparison with the simultaneous use of univariate charts, nevertheless, there are some disadvantages. The main problem is how to interpret the out-ofcontrol signal of a multivariate chart. For example, in the case of control charts designed to monitor the mean vector, the chart signals showing that it must be accepted that there is a shift in the vector, but no indication is given about the variables that have produced this shift. The MEWMA quality control chart is a very powerful scheme to detect small shifts in the mean vector. There are no previous specific works about the interpretation of the out-of-control signal of this chart. In this paper neural networks are designed to interpret the out-of-control signal of the MEWMA chart, and the percentage of correct classifications is studied for different cases.
Abstract: Fuzzy controllers are potential candidates for the
control of nonlinear, time variant and also complicated systems. Anti
lock brake system (ABS) which is a nonlinear system, may not be
easily controlled by classical control methods. An intelligent Fuzzy
control method is very useful for this kind of nonlinear system. A
typical antilock brake system (ABS) by sensing the wheel lockup,
releases the brakes for a short period of time, and then reapplies again
the brakes when the wheel spins up. In this paper, an intelligent fuzzy
ABS controller is designed to adjust slipping performance for variety
of roads. There are tow major sections in the proposing control
system. First section consists of tow Fuzzy-Logic Controllers (FLC)
providing optimal brake torque for both front and rear wheels.
Second section which is also a FLC provides required amount of slip
and torque references properties for different kind of roads.
Simulation results of our proposed intelligent ABS for three different
kinds of road show more reliable and better performance in compare
with two other break systems.
Abstract: The iron loss is a source of detuning in vector controlled
induction motor drives if the classical rotor vector controller is used for
decoupling. In fact, the field orientation will not be satisfied and the
output torque will not truck the reference torque mostly used by Loss
Model Controllers (LMCs). In addition, this component of loss, among
others, may be excessive if the vector controlled induction motor is
driving light loads. In this paper, the series iron loss model is used to
develop a vector controller immune to iron loss effect and then an LMC
to minimize the total power loss using the torque generated by the speed
controller.
Abstract: This case study investigates the effects of reactive
focus on form through negotiation on the linguistic development of
an adult EFL learner in an exclusive private EFL classroom. The
findings revealed that in this classroom negotiated feedback occurred
significantly more often than non-negotiated feedback. However, it
was also found that in the long run the learner was significantly more
successful in correcting his own errors when he had received nonnegotiated
feedback than negotiated feedback. This study, therefore,
argues that although negotiated feedback seems to be effective for
some learners in the short run, it is non-negotiated feedback which
seems to be more effective in the long run. This long lasting effect
might be attributed to the impact of schooling system which is itself
indicative of the dominant culture, or to the absence of other
interlocutors in the course of interaction.
Abstract: Structural performance and seismic vulnerability of
masonry buildings in Algeria are investigated in this paper. Structural
classification of such buildings is carried out regarding their
structural elements. Seismicity of Algeria is briefly discussed. Then
vulnerability of masonry buildings and their failure mechanisms in
the Boumerdes earthquake (May, 2003) are examined.
Abstract: With the advancement of wireless sensor network technology,
its practical utilization is becoming an important challange.
This paper overviews my past environmental monitoring project,
and discusses the process of starting the monitoring by classifying
it into four steps. The steps to start environmental monitoring can
be complicated, but not well discussed by researchers of wireless
sensor network technology. This paper demonstrates our activity and
challenges in each of the four steps to ease the process, and argues
future challenges to enable quick start of environmental monitoring.
Abstract: In this paper, we propose a robust disease detection
method, called adaptive orientation code matching (Adaptive OCM),
which is developed from a robust image registration algorithm:
orientation code matching (OCM), to achieve continuous and
site-specific detection of changes in plant disease. We use two-stage
framework for realizing our research purpose; in the first stage,
adaptive OCM was employed which could not only realize the
continuous and site-specific observation of disease development, but
also shows its excellent robustness for non-rigid plant object searching
in scene illumination, translation, small rotation and occlusion changes
and then in the second stage, a machine learning method of support
vector machine (SVM) based on a feature of two dimensional (2D)
xy-color histogram is further utilized for pixel-wise disease
classification and quantification. The indoor experiment results
demonstrate the feasibility and potential of our proposed algorithm,
which could be implemented in real field situation for better
observation of plant disease development.
Abstract: In this paper, center conditions and bifurcation of limit cycles at the nilpotent critical point in a class of quintic polynomial differential system are investigated.With the help of computer algebra system MATHEMATICA, the first 10 quasi Lyapunov constants are deduced. As a result, sufficient and necessary conditions in order to have a center are obtained. The fact that there exist 10 small amplitude limit cycles created from the three order nilpotent critical point is also proved. Henceforth we give a lower bound of cyclicity of three-order nilpotent critical point for quintic Lyapunov systems. At last, we give an system which could bifurcate 10 limit circles.
Abstract: In this paper, a novel scheme is proposed for ownership identification and authentication using color images by deploying Cryptography and Digital Watermarking as underlaying technologies. The former is used to compute the contents based hash and the latter to embed the watermark. The host image that will claim to be the rightful owner is first transformed from RGB to YST color space exclusively designed for watermarking based applications. Geometrically YS ÔèÑ T and T channel corresponds to the chrominance component of color image, therefore suitable for embedding the watermark. The T channel is divided into 4×4 nonoverlapping blocks. The size of block is important for enhanced localization, security and low computation. Each block along with ownership information is then deployed by SHA160, a one way hash function to compute the content based hash, which is always unique and resistant against birthday attack instead of using MD5 that may raise the condition i.e. H(m)=H(m'). The watermark payload varies from block to block and computed by the variance factorα . The quality of watermarked images is quite high both subjectively and objectively. Our scheme is blind, computationally fast and exactly locates the tampered region.
Abstract: With the advance of information technology in the
new era the applications of Internet to access data resources has
steadily increased and huge amount of data have become accessible
in various forms. Obviously, the network providers and agencies,
look after to prevent electronic attacks that may be harmful or may
be related to terrorist applications. Thus, these have facilitated the
authorities to under take a variety of methods to protect the special
regions from harmful data. One of the most important approaches is
to use firewall in the network facilities. The main objectives of
firewalls are to stop the transfer of suspicious packets in several
ways. However because of its blind packet stopping, high process
power requirements and expensive prices some of the providers are
reluctant to use the firewall. In this paper we proposed a method to
find a discriminate function to distinguish between usual packets and
harmful ones by the statistical processing on the network router logs.
By discriminating these data, an administrator may take an approach
action against the user. This method is very fast and can be used
simply in adjacent with the Internet routers.
Abstract: Leptospirosis occurs worldwide (except the
poles of the earth), urban and rural areas, developed and
developing countries, especially in Thailand. It can be
transmitted to the human by rats through direct and indirect
ways. Human can be infected by either touching the infected rats
or contacting with water, soil containing urine from the infected
rats through skin, eyes and nose. The data of the people who
are infected with this disease indicates that most of the
patients are adults. The transmission of this disease is studied
through mathematical model. The population is separated into human
and rat. The human is divided into two classes, namely juvenile
and adult. The model equation is constructed for each class. The
standard dynamical modeling method is then used for
analyzing the behaviours of solutions. In addition, the
conditions of the parameters for the disease free and endemic
states are obtained. Numerical solutions are shown to support the
theoretical predictions. The results of this study guide the way to
decrease the disease outbreak.
Abstract: In the present investigation, H13 tool steel has been
deposited on copper alloy substrate using both CO2 and diode laser.
A detailed parametric analysis has been carried out in order to find
out optimum processing zone for coating defect free H13 tool steel
on copper alloy substrate. Followed by parametric optimization, the
microstructure and microhardness of the deposited clads have been
evaluated. SEM micrographs revealed dendritic microstructure in
both clads. However, the microhardness of CO2 laser deposited clad
was much higher compared to diode laser deposited clad.