Abstract: This work presents a neural network model for the
clustering analysis of data based on Self Organizing Maps (SOM).
The model evolves during the training stage towards a hierarchical
structure according to the input requirements. The hierarchical structure
symbolizes a specialization tool that provides refinements of the
classification process. The structure behaves like a single map with
different resolutions depending on the region to analyze. The benefits
and performance of the algorithm are discussed in application to the
Iris dataset, a classical example for pattern recognition.
Abstract: Skin color is an important visual cue for computer
vision systems involving human users. In this paper we combine skin
color and optical flow for detection and tracking of skin regions. We
apply these techniques to gesture recognition with encouraging
results. We propose a novel skin similarity measure. For grouping
detected skin regions we propose a novel skin region grouping
mechanism. The proposed techniques work with any number of skin
regions making them suitable for a multiuser scenario.
Abstract: The amplitude response of infrared (IR) sensors
depends on the reflectance properties of the target. Therefore, in
order to use IR sensor for measuring distances accurately, prior
knowledge of the surface must be known. This paper describes the
Phong Illumination Model for determining the properties of a surface
and subsequently calculating the distance to the surface. The angular
position of the IR sensor is computed as normal to the surface for
simplifying the calculation. Ultrasonic (US) sensor can provide the
initial information on distance to obtain the parameters for this
method. In addition, the experimental results obtained by using
LabView are discussed. More care should be taken when placing the
objects from the sensors during acquiring data since the small change
in angle could show very different distance than the actual one.
Since stereo camera vision systems do not perform well under some
environmental conditions such as plain wall, glass surfaces, or poor
lighting conditions, the IR and US sensors can be used additionally to
improve the overall vision systems of mobile robots.
Abstract: In this paper, RSA encryption algorithm and its hardware
implementation in Xilinx-s Virtex Field Programmable Gate
Arrays (FPGA) is analyzed. The issues of scalability, flexible performance,
and silicon efficiency for the hardware acceleration of
public key crypto systems are being explored in the present work.
Using techniques based on the interleaved math for exponentiation,
the proposed RSA calculation architecture is compared to existing
FPGA-based solutions for speed, FPGA utilization, and scalability.
The paper covers the RSA encryption algorithm, interleaved multiplication,
Miller Rabin algorithm for primality test, extended Euclidean
math, basic FPGA technology, and the implementation details of
the proposed RSA calculation architecture. Performance of several
alternative hardware architectures is discussed and compared. Finally,
conclusion is drawn, highlighting the advantages of a fully flexible
& parameterized design.
Abstract: The coverage probability and range of IEEE 802.16
systems depend on different wireless scenarios. Evaluating the
performance of IEEE 802.16 systems over Stanford University
Interim (SUI) channels is suggested by IEEE 802.16 specifications.
In order to derive an effective method for forecasting the coverage
probability and range, this study uses the SUI channel model to
analyze the coverage probability with Rayleigh fading for an IEEE
802.16 system. The BER of the IEEE 802.16 system is shown in the
simulation results. Then, the maximum allowed path loss can be
calculated and substituted into the coverage analysis. Therefore,
simulation results show the coverage range with and without
Rayleigh fading.
Abstract: Routing security is a major concerned in Wireless
Sensor Network since a large scale of unattended nodes is deployed
in ad hoc fashion with no possibility of a global addressing due to a
limitation of node-s memory and the node have to be self organizing
when the systems require a connection with the other nodes. It
becomes more challenging when the nodes have to act as the router
and tightly constrained on energy and computational capabilities
where any existing security mechanisms are not allowed to be fitted
directly. These reasons thus increasing vulnerabilities to the network
layer particularly and to the whole network, generally. In this paper,
a Dynamic Window Secured Implicit Geographic Forwarding
(DWSIGF) routing is presented where a dynamic time is used for
collection window to collect Clear to Send (CTS) control packet in
order to find an appropriate hoping node. The DWIGF is expected to
minimize a chance to select an attacker as the hoping node that
caused by a blackhole attack that happen because of the CTS rushing
attack, which promise a good network performance with high packet
delivery ratios.
Abstract: Buckling-Restrained Braced Frame system(BRBFs)
are a new type of steel seismic-load-resisting system that has found
use in several countries because of its efficiency and its promise of
seismic performance far superior to that of conventional braced
frames. The system is addressed in the 2005 edition of the AISC
Seismic Provisions for Structural Steel Buildings, also a set of design
provisions has been developed by NEHRP. This report illustrates the
seismic design of buckling restrained braced frames and compares
the result of design in the application of earthquake load for ordinary
bracing systems and buckling restrained bracing systems to see the
advantage and disadvantages of this new type of seismic resisting
system in comparison with the old Ordinary Concentric Braced
Frame systems (OCBFs); they are defined by the provisions
governing their design.
Abstract: Using bottom-up image processing algorithms to predict human eye fixations and extract the relevant embedded information in images has been widely applied in the design of active machine vision systems. Scene text is an important feature to be extracted, especially in vision-based mobile robot navigation as many potential landmarks such as nameplates and information signs contain text. This paper proposes an edge-based text region extraction algorithm, which is robust with respect to font sizes, styles, color/intensity, orientations, and effects of illumination, reflections, shadows, perspective distortion, and the complexity of image backgrounds. Performance of the proposed algorithm is compared against a number of widely used text localization algorithms and the results show that this method can quickly and effectively localize and extract text regions from real scenes and can be used in mobile robot navigation under an indoor environment to detect text based landmarks.
Abstract: This paper reviews the optimization available
transmission capability (ATC) of power systems using a device of
FACTS named SSSC equipped with energy storage devices. So that,
emplacement and improvement of parameters of SSSC will be
illustrated. Thus, voltage magnitude constraints of network buses,
line transient stability constraints and voltage breakdown constraints
are considered. To help the calculations, a comprehensive program in
DELPHI is provided, which is able to simulate and trace the
parameters of SSSC has been installed on a specific line.
Furthermore, the provided program is able to compute ATC, TTC
and maximum value of their enhancement after using SSSC.
Abstract: This paper proposes a modeling method of the laws controlling manufacturing systems with temporal and non temporal constraints. A methodology of robust control construction generating the margins of passive and active robustness is being elaborated. Indeed, two paramount models are presented in this paper. The first utilizes the P-time Petri Nets which is used to manage the flow type disturbances. The second, the quality model, exploits the Intervals Constrained Petri Nets (ICPN) tool which allows the system to preserve its quality specificities. The redundancy of the robustness of the elementary parameters between passive and active is also used. The final model built allows the correlation of temporal and non temporal criteria by putting two paramount models in interaction. To do so, a set of definitions and theorems are employed and affirmed by applicator examples.
Abstract: The paper describes the workings for four models of
CONWIP systems used till date; the basic CONWIP system, the
hybrid CONWIP system, the multi-product CONWIP system, and the
parallel CONWIP system. The final novel model is introduced in this
paper in a general form. These models may be adopted for analysis
for both simulation studies and implementation on the shop floor. For
each model, input parameters of interest are highlighted and their
impacts on several system performance measures are addressed.
Abstract: Outsourcing, a management practice strongly
consolidated within the area of Information Systems, is currently
going through a stage of unstoppable growth. This paper makes a
proposal about the main reasons which may lead firms to adopt
Information Systems Outsourcing. It will equally analyse the
potential risks that IS clients are likely to face. An additional
objective is to assess these reasons and risks in the case of large
Spanish firms, while simultaneously examining their evolution over
time.
Abstract: It is expected that ubiquitous era will come soon. A ubiquitous environment has features like peer-to-peer and nomadic environments. Such features can be represented by peer-to-peer systems and mobile ad-hoc networks (MANETs). The features of P2P systems and MANETs are similar, appealing for implementing P2P systems in MANET environment. It has been shown that, however, the performance of the P2P systems designed for wired networks do not perform satisfactorily in mobile ad-hoc environment. Subsequently, this paper proposes a method to improve P2P performance using cross-layer design and the goodness of a node as a peer. The proposed method uses routing metric as well as P2P metric to choose favorable peers to connect. It also utilizes proactive approach for distributing peer information. According to the simulation results, the proposed method provides higher query success rate, shorter query response time and less energy consumption by constructing an efficient overlay network.
Abstract: Natural Language Understanding Systems (NLU) will not be widely deployed unless they are technically mature and cost effective to develop. Cost effective development hinges on the availability of tools and techniques enabling the rapid production of NLU applications through minimal human resources. Further, these tools and techniques should allow quick development of applications in a user friendly way and should be easy to upgrade in order to continuously follow the evolving technologies and standards. This paper presents a visual tool for the structuring and editing of dialog forms, the key element of driving conversation in NLU applications based on IBM technology. The main focus is given on the basic component used to describe Human – Machine interactions of that kind, the Dialogue Manager. In essence, the description of a tool that enables the visual representation of the Dialogue Manager mainly during the implementation phase is illustrated.
Abstract: This paper is concerned with the existence of a linear copositive Lyapunov function(LCLF) for a special class of switched positive linear systems(SPLSs) composed of continuousand discrete-time subsystems. Firstly, by using system matrices, we construct a special kind of matrices in appropriate manner. Secondly, our results reveal that the Hurwitz stability of these matrices is equivalent to the existence of a common LCLF for arbitrary finite sets composed of continuous- and discrete-time positive linear timeinvariant( LTI) systems. Finally, a simple example is provided to illustrate the implication of our results.
Abstract: The nickel and gold nanoclusters as supported
catalysts were analyzed by XAS, XRD and XPS in order to
determine their local, global and electronic structure. The present
study has pointed out a strong deformation of the local structure of
the metal, due to its interaction with oxide supports. The average
particle size, the mean squares of the microstrain, the particle size
distribution and microstrain functions of the supported Ni and Au
catalysts were determined by XRD method using Generalized Fermi
Function for the X-ray line profiles approximation. Based on EXAFS
analysis we consider that the local structure of the investigated
systems is strongly distorted concerning the atomic number pairs.
Metal-support interaction is confirmed by the shape changes of the
probability densities of electron transitions: Ni K edge (1s →
continuum and 2p), Au LIII-edge (2p3/2 → continuum, 6s, 6d5/2 and
6d3/2). XPS investigations confirm the metal-support interaction at
their interface.
Abstract: Optimal capacitor allocation in distribution systems
has been studied for a long times. It is an optimization problem
which has an objective to define the optimal sizes and locations of
capacitors to be installed. In this works, an overview of capacitor
placement problem in distribution systems is briefly introduced. The
objective functions and constraints of the problem are listed and the
methodologies for solving the problem are summarized.
Abstract: With the rapid popularization of internet services, it is apparent that the next generation terrestrial communication systems must be capable of supporting various applications like voice, video, and data. This paper presents the performance evaluation of turbo- coded mobile terrestrial communication systems, which are capable of providing high quality services for delay sensitive (voice or video) and delay tolerant (text transmission) multimedia applications in urban and suburban areas. Different types of multimedia information require different service qualities, which are generally expressed in terms of a maximum acceptable bit-error-rate (BER) and maximum tolerable latency. The breakthrough discovery of turbo codes allows us to significantly reduce the probability of bit errors with feasible latency. In a turbo-coded system, a trade-off between latency and BER results from the choice of convolutional component codes, interleaver type and size, decoding algorithm, and the number of decoding iterations. This trade-off can be exploited for multimedia applications by using optimal and suboptimal performance parameter amalgamations to achieve different service qualities. The results are therefore proposing an adaptive framework for turbo-coded wireless multimedia communications which incorporate a set of performance parameters that achieve an appropriate set of service qualities, depending on the application's requirements.
Abstract: The Influence Diagrams (IDs) is a kind of Probabilistic Belief Networks for graphic modeling. The usage of IDs can improve the communication among field experts, modelers, and decision makers, by showing the issue frame discussed from a high-level point of view. This paper enhances the Time-Sliced Influence Diagrams (TSIDs, or called Dynamic IDs) based formalism from a Discrete Event Systems Modeling and Simulation (DES M&S) perspective, for Exploring Analysis (EA) modeling. The enhancements enable a modeler to specify times occurred of endogenous events dynamically with stochastic sampling as model running and to describe the inter- influences among them with variable nodes in a dynamic situation that the existing TSIDs fails to capture. The new class of model is named Dynamic-Stochastic Influence Diagrams (DSIDs). The paper includes a description of the modeling formalism and the hiberarchy simulators implementing its simulation algorithm, and shows a case study to illustrate its enhancements.
Abstract: This paper demonstrates how the soft systems
methodology can be used to improve the delivery of a module in data warehousing for fourth year information technology students.
Graduates in information technology needs to have academic skills
but also needs to have good practical skills to meet the skills requirements of the information technology industry. In developing
and improving current data warehousing education modules one has to find a balance in meeting the expectations of various role players such as the students themselves, industry and academia. The soft
systems methodology, developed by Peter Checkland, provides a
methodology for facilitating problem understanding from different world views. In this paper it is demonstrated how the soft systems methodology can be used to plan the improvement of data
warehousing education for fourth year information technology students.