Abstract: This paper discusses a method for improving accuracy
of fuzzy-rule-based classifiers using particle swarm optimization
(PSO). Two different fuzzy classifiers are considered and optimized.
The first classifier is based on Mamdani fuzzy inference system
(M_PSO fuzzy classifier). The second classifier is based on Takagi-
Sugeno fuzzy inference system (TS_PSO fuzzy classifier). The
parameters of the proposed fuzzy classifiers including premise
(antecedent) parameters, consequent parameters and structure of
fuzzy rules are optimized using PSO. Experimental results show that
higher classification accuracy can be obtained with a lower number
of fuzzy rules by using the proposed PSO fuzzy classifiers. The
performances of M_PSO and TS_PSO fuzzy classifiers are compared
to other fuzzy based classifiers
Abstract: This paper presents the findings of two experiments that were performed on the Redundancy in Wireless Connection Model (RiWC) using the 802.11b standard. The experiments were simulated using OPNET 11.5 Modeler software. The first was aimed at finding the maximum number of simultaneous Voice over Internet Protocol (VoIP) users the model would support under the G.711 and G.729 codec standards when the packetization interval was 10 milliseconds (ms). The second experiment examined the model?s VoIP user capacity using the G.729 codec standard along with background traffic using the same packetization interval as in the first experiment. To determine the capacity of the model under various experiments, we checked three metrics: jitter, delay and data loss. When background traffic was added, we checked the response time in addition to the previous three metrics. The findings of the first experiment indicated that the maximum number of simultaneous VoIP users the model was able to support was 5, which is consistent with recent research findings. When using the G.729 codec, the model was able to support up to 16 VoIP users; similar experiments in current literature have indicated a maximum of 7 users. The finding of the second experiment demonstrated that the maximum number of VoIP users the model was able to support was 12, with the existence of background traffic.
Abstract: For the first time since 1940 and presentation of
theodorson-s theory, distribution of thrust, torque and efficiency
along the blade of a counter rotating propeller axial fan was studied
with a novel method in this research. A constant chord, constant
pitch symmetric fan was investigated with Reynolds Stress
Turbulence method in this project and H.E.S. method was utilized to
obtain distribution profiles from C.F.D. tests outcome. C.F.D. test
results were validated by estimation from Playlic-s analytical method.
Final results proved ability of H.E.S. method to obtain distribution
profiles from C.F.D test results and demonstrated interesting facts
about effects of solidity and differences between distributions in front
and rear section.
Abstract: Contemporary science and technologies largely widen
the gap between the spiritual and rational of the society. Industrial
and technological breakthroughs might radically affect most
processes in the society, thus losing the cultural heritage. The
thinkers recognized the dangers of the decadence in the first place. In
the present article the ways of preserving cultural heritage have been
investigated. Memory has always been a necessary condition for selfidentification,
- continuity is based on this. The authors have
supported the hypothesis that continuity and ethnic memory are the
very mechanisms that preserve cultural heritage. Such problemformulating
will facilitate another, new look at the material, spiritual
and arts spheres of the cultural heritage of numerous ethnic groups.
The fundamental works by major European and Kazakh scientists
have been taken as a basis for the research done.
Abstract: Thermal water hammer is a special type of water
hammer which rarely occurs in heat exchangers. In biphasic fluids, if
steam bubbles are surrounded by condensate, regarding lower
condensate temperature than steam, they will suddenly collapse. As a
result, the vacuum caused by an extreme change in volume lead to
movement of the condensates in all directions and their collision the
force produced by this collision leads to a severe stress in the pipe
wall. This phenomenon is a special type of water hammer. According
to fluid mechanics, this phenomenon is a particular type of transient
flows during which abrupt change of fluid leads to sudden pressure
change inside the tube. In this paper, the mechanism of abrupt failure
of 80 tubes of 481 tubes of a methanol heat exchanger is discussed.
Initially, due to excessive temperature differences between heat
transfer fluids and simultaneous failure of 80 tubes, thermal shock
was presupposed as the reason of failure. Deeper investigation on
cross-section of failed tubes showed that failure was, ductile type of
failure, so the first hypothesis was rejected. Further analysis and more
accurate experiments revealed that failure of tubes caused by thermal
water hammer. Finally, the causes of thermal water hammer and
various solutions to avoid such mechanism are discussed.
Abstract: Resistance of denial of service attacks is a key security requirement in voting protocols. Acquisti protocol plays an important role in development of internet voting protocols and claims its security without strong physical assumptions. In this study firstly Acquisti protocol is modeled in extended applied pi calculus, and then resistance of denial of service attacks is proved with ProVerif. The result is that it is not resistance of denial of service attacks because two denial of service attacks are found. Finally we give the method against the denial of service attacks.
Abstract: The paper presents an applied study of a multivariate AR(p) process fitted to daily data from U.S. commodity futures markets with the use of Bayesian statistics. In the first part a detailed description of the methods used is given. In the second part two BVAR models are chosen one with assumption of lognormal, the second with normal distribution of prices conditioned on the parameters. For a comparison two simple benchmark models are chosen that are commonly used in todays Financial Mathematics. The article compares the quality of predictions of all the models, tries to find an adequate rate of forgetting of information and questions the validity of Efficient Market Hypothesis in the semi-strong form.
Abstract: Iris localization is a very important approach in
biometric identification systems. Identification process usually is
implemented in three levels: iris localization, feature extraction, and
pattern matching finally. Accuracy of iris localization as the first step
affects all other levels and this shows the importance of iris
localization in an iris based biometric system. In this paper, we
consider Daugman iris localization method as a standard method,
propose a new method in this field and then analyze and compare the
results of them on a standard set of iris images. The proposed method
is based on the detection of circular edge of iris, and improved by
fuzzy circles and surface energy difference contexts. Implementation
of this method is so easy and compared to the other methods, have a
rather high accuracy and speed. Test results show that the accuracy of
our proposed method is about Daugman method and computation
speed of it is 10 times faster.
Abstract: In this paper, a fragile watermarking scheme is proposed for color image specified object-s authentication. The color image is first transformed from RGB to YST color space, suitable for watermarking the color media. The T channel corresponds to the chrominance component of a color image andYS ÔèÑ T , therefore selected for embedding the watermark. The T channel is first divided into 2×2 non-overlapping blocks and the two LSBs are set to zero. The object that is to be authenticated is also divided into 2×2 nonoverlapping blocks and each block-s intensity mean is computed followed by eight bit encoding. The generated watermark is then embedded into T channel randomly selected 2×2 block-s LSBs using 2D-Torus Automorphism. Selection of block size is paramount for exact localization and recovery of work. The proposed scheme is blind, efficient and secure with ability to detect and locate even minor tampering applied to the image with full recovery of original work. The quality of watermarked media is quite high both subjectively and objectively. The technique is suitable for class of images with format such as gif, tif or bitmap.
Abstract: Artificial Intelligence (AI) methods are increasingly being used for problem solving. This paper concerns using AI-type learning machines for power quality problem, which is a problem of general interest to power system to provide quality power to all appliances. Electrical power of good quality is essential for proper operation of electronic equipments such as computers and PLCs. Malfunction of such equipment may lead to loss of production or disruption of critical services resulting in huge financial and other losses. It is therefore necessary that critical loads be supplied with electricity of acceptable quality. Recognition of the presence of any disturbance and classifying any existing disturbance into a particular type is the first step in combating the problem. In this work two classes of AI methods for Power quality data mining are studied: Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs). We show that SVMs are superior to ANNs in two critical respects: SVMs train and run an order of magnitude faster; and SVMs give higher classification accuracy.
Abstract: This paper focuses on the calibration problem of a
multi-view shooting system designed for the production of 3D
content for auto-stereoscopic visualization. The considered multiview
camera is characterized by coplanar and decentered image
sensors regarding to the corresponding optical axis. Based on the
Faugéras and Toscani-s calibration approach, a calibration method is
herein proposed for the case of multi-view camera with parallel and
decentered image sensors. At first, the geometrical model of the
shooting system is recalled and some industrial prototypes with some
shooting simulations are presented. Next, the development of the
proposed calibration method is detailed. Finally, some simulation
results are presented before ending with some conclusions about this
work.
Abstract: This interdisciplinary study is an investigation to evaluate user-interfaces in business administration. The study is going to be implemented on two computerized business administration systems with two distinctive user-interfaces, so that differences between the two systems can be determined. Both systems, a commercial and a prototype developed for the purpose of this study, deal with ordering of supplies, tendering procedures, issuing purchase orders, controlling the movement of the stocks against their actual balances on the shelves and editing them on their tabulations. In the second suggested system, modern computer graphics and multimedia issues were taken into consideration to cover the drawbacks of the first system. To highlight differences between the two investigated systems regarding some chosen standard quality criteria, the study employs various statistical techniques and methods to evaluate the users- interaction with both systems. The study variables are divided into two divisions: independent representing the interfaces of the two systems, and dependent embracing efficiency, effectiveness, satisfaction, error rate etc.
Abstract: The heterotrophic seedling growth can be defined as a
product of two components: (1) the weight of mobilized seed reserve,
and (2) conversion efficiency of utilized seed reserve to seedling
tissue. The first component can be further divided into (1) initial seed
weight, and (2) the fraction of seed reserve, which is mobilized. The
objective of this study was the identification of the sensitive seedling
growth component(s) in response to drought and salinity stresses.
Two experiments were separately conducted using various salinity
levels (osmotic pressure) of 0, 0.25, 0.50, 0.75, 1, 1.25 and 1.5 MPa
created using NaCl as first experiment and by polyethylene glycol
(drought stress) of 0, 0.2, 0.4, 0.6, 0.8, 1, 1.2 and 1.4 MPa in second
experiment. Seeds of five crops species (Hordeum vulgare, Brassica
napus, Zea mays, Medicago sativa and Medicago scutellata) were
used in each experiment. In both experiments, seedling growth,
fraction of seed reserve utilization and weight of mobilized seed
reserve decreased with increasing drought and salt intensity.
However, drought and salinity stresses had no effect on the
conversion efficiency. It was concluded that the sensitive component
of seedling growth is the weight of mobilized seed reserve.
Abstract: The aim of this study was to synthesize the single
walled carbon nanotubes (SWCNTs) and determine their hydrogen
storage capacities. SWCNTs were firstly synthesized by chemical
vapor deposition (CVD) of acetylene (C2H2) on a magnesium oxide
(MgO) powder impregnated with an iron nitrate (Fe(NO3)3·9H2O)
solution. The synthesis parameters were selected as: the synthesis
temperature of 800°C, the iron content in the precursor of 5% and the
synthesis time of 30 min. Purification process of SWCNTs was
fulfilled by microwave digestion at three different temperatures (120,
150 and 200 °C), three different acid concentrations (0.5, 1 and 1.5
M) and for three different time intervals (15, 30 and 60 min). Nitric
acid (HNO3) was used in the removal of the metal catalysts. The
hydrogen storage capacities of the purified materials were measured
using volumetric method at the liquid nitrogen temperature and gas
pressure up to 100 bar. The effects of the purification conditions such
as temperature, time and acid concentration on hydrogen adsorption
were investigated.
Abstract: Helical milling operations are used to generate or
enlarge boreholes by means of a milling tool. The bore diameter can be
adjusted through the diameter of the helical path. The kinematics of
helical milling on a three axis machine tool is analysed firstly. The
relationships between processing parameters, cutting tool geometry
characters with machined hole feature are formulated. The feed motion
of the cutting tool has been decomposed to plane circular feed and
axial linear motion. In this paper, the time varying cutting forces acted
on the side cutting edges and end cutting edges of the flat end cylinder
miller is analysed using a discrete method separately. These two
components then are combined to produce the cutting force model
considering the complicated interaction between the cutters and
workpiece. The time varying cutting force model describes the
instantaneous cutting force during processing. This model could be
used to predict cutting force, calculate statics deflection of cutter and
workpiece, and also could be the foundation of dynamics model and
predicting chatter limitation of the helical milling operations.
Abstract: Composting is the process in which municipal solid
waste (MSW) and other organic waste materials such as biosolids
and manures are decomposed through the action of bacteria and other
microorganisms into a stable granular material which, applied to
land, as soil conditioner. Microorganisms, especially those that are
able to degrade polymeric organic material have a key role in speed
up this process. The aim of this study has been established to
isolation of microorganisms with high ability to production
extracellular enzymes for degradation of natural polymers that are
exists in MSW for decreasing time of degradation phase. Our
experimental study for isolation designed in two phases: in first
phase we isolated degrading microorganism with selected media that
consist a special natural polymer such as cellulose, starch, lipids and
etc as sole source of carbon. In second phase we selected
microorganism that had high degrading enzyme production with
enzymatic assay for seed production. However, our findings in pilot
scale have indicated that usage of this microbial consortium had high
efficiency for decreasing degradation phase.
Abstract: In recent years, a new numerical method has been
developed, the extended finite element method (X-FEM). The
objective of this work is to exploit the (X-FEM) for the treatment of
the fracture mechanics problems on 3D geometries, where we
showed the ability of this method to simulate the fatigue crack
growth into two cases: edge and central crack. In the results we
compared the six first natural frequencies of mode shapes uncracking
with the cracking initiation in the structure, and showed the stress
intensity factor (SIF) evolution function as crack size propagation
into structure, the analytical validation of (SIF) is presented. For to
evidence the aspects of this method, all result is compared between
FEA and X-FEM.
Abstract: In this paper, we propose a texture feature-based
language identification using wavelet-domain BDIP (block difference
of inverse probabilities) and BVLC (block variance of local
correlation coefficients) features and FFT (fast Fourier transform)
feature. In the proposed method, wavelet subbands are first obtained
by wavelet transform from a test image and denoised by Donoho-s
soft-thresholding. BDIP and BVLC operators are next applied to the
wavelet subbands. FFT blocks are also obtained by 2D (twodimensional)
FFT from the blocks into which the test image is
partitioned. Some significant FFT coefficients in each block are
selected and magnitude operator is applied to them. Moments for each
subband of BDIP and BVLC and for each magnitude of significant
FFT coefficients are then computed and fused into a feature vector. In
classification, a stabilized Bayesian classifier, which adopts variance
thresholding, searches the training feature vector most similar to the
test feature vector. Experimental results show that the proposed
method with the three operations yields excellent language
identification even with rather low feature dimension.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: This paper compares planning results of the electricity and water generation inventory up to year 2030 in the State of
Kuwait. Currently, the generation inventory consists of oil and gas fired technologies only. The planning study considers two main cases. The first case, Reference case, examines a generation inventory based on oil and gas fired generation technologies only.
The second case examines the inclusion of renewables as part of the generation inventory under two scenarios. In the first scenario, Ref-RE, renewable build-out is based on optimum economic performance
of overall generation system. Result shows that the optimum installed
renewable capacity with electric energy generation of 11% . In the second scenario, Ref-RE20, the renewable capacity build-out is
forced to provide 20% of electric energy by 2030. The respective energy systems costs of Reference, Ref-RE and Ref-RE20 case
scenarios reach US dollar 24, 10 and 14 billion annually in 2030.