Abstract: Functionalities and control behavior are both primary
requirements in design of a complex system. Automata theory plays
an important role in modeling behavior of a system. Z is an ideal
notation which is used for describing state space of a system and then
defining operations over it. Consequently, an integration of automata
and Z will be an effective tool for increasing modeling power for a
complex system. Further, nondeterministic finite automata (NFA)
may have different implementations and therefore it is needed to
verify the transformation from diagrams to a code. If we describe
formal specification of an NFA before implementing it, then
confidence over transformation can be increased. In this paper, we
have given a procedure for integrating NFA and Z. Complement of a
special type of NFA is defined. Then union of two NFAs is
formalized after defining their complements. Finally, formal
construction of intersection of NFAs is described. The specification
of this relationship is analyzed and validated using Z/EVES tool.
Abstract: There have been numerous implementations of
security system using biometric, especially for identification and
verification cases. An example of pattern used in biometric is the iris
pattern in human eye. The iris pattern is considered unique for each
person. The use of iris pattern poses problems in encoding the human
iris.
In this research, an efficient iris recognition method is proposed.
In the proposed method the iris segmentation is based on the
observation that the pupil has lower intensity than the iris, and the
iris has lower intensity than the sclera. By detecting the boundary
between the pupil and the iris and the boundary between the iris and
the sclera, the iris area can be separated from pupil and sclera. A step
is taken to reduce the effect of eyelashes and specular reflection of
pupil. Then the four levels Coiflet wavelet transform is applied to the
extracted iris image. The modified Hamming distance is employed to
measure the similarity between two irises.
This research yields the identification success rate of 84.25% for
the CASIA version 1.0 database. The method gives an accuracy of
77.78% for the left eyes of MMU 1 database and 86.67% for the
right eyes. The time required for the encoding process, from the
segmentation until the iris code is generated, is 0.7096 seconds.
These results show that the accuracy and speed of the method is
better than many other methods.
Abstract: Phase locked loops in 10 Gb/s and faster data links are
low phase noise devices. Characterization of their phase jitter
transfer functions is difficult because the intrinsic noise of the PLLs
is comparable to the phase noise of the reference clock signal. The
problem is solved by using a linear model to account for the intrinsic
noise. This study also introduces a novel technique for measuring the
transfer function. It involves the use of the reference clock as a
source of wideband excitation, in contrast to the commonly used
sinusoidal excitations at discrete frequencies. The data reported here
include the intrinsic noise of a PLL for 10 Gb/s links and the jitter
transfer function of a PLL for 12.8 Gb/s links. The measured transfer
function suggests that the PLL responded like a second order linear
system to a low noise reference clock.
Abstract: This paper has two main ideas. Firstly, it describes Evans and Wurster-s concepts “the trade-off between reach and richness", and relates them to the impact of technology on the virtual markets. Authors Evans and Wurster see the transfer of information as a 'trade'off between richness and reach-. Reach refers to the number of people who share particular information, with Richness ['Rich'] being a more complex concept combining: bandwidth, customization, interactivity, reliability, security and currency. Traditional shopping limits the number of shops the shopper is able to visit due to time and other cost constraints; the time spent traveling consequently leaves the shopper with less time to evaluate the product. The paper concludes that although the Web provides Reach, offering Richness and the sense of community required for creating and sustaining relationships with potential clients could be difficult.
Abstract: Drought is one of the most damaging climate-related
hazards, it is generally considered as a prolonged absence of
precipitation. This normal and recurring climate phenomenon had
plagued civilization throughout history because of the negative
impacts on economical, environmental and social sectors. Drought
characteristics are thus recognized as important factors in water
resources planning and management. The purpose of this study is to
detect the changes in drought frequency, persistence and severity
in the Ruhr river basin. The frequency of drought events was
calculated using the Standardized Precipitation Index (SPI). Used
data are daily precipitation records from seven meteorological
stations covering the period 1961-2007. The main benefit of the
application of this index is its versatility, only rainfall data is required
to deliver five major dimensions of a drought : duration, intensity,
severity, magnitude, and frequency. Furthermore, drought can be
calculated in different time steps. In this study SPI was calculated for
1, 3, 6, 9, 12, and 24 months. Several drought events were detected
in the covered period, these events contain mild, moderate and severe
droughts. Also positive and negative trends in the SPI values were
observed.
Abstract: The potential of entomopathogenic nematodes in suppressing T. squalida population on cauliflower from transplanting to harvest was evaluated. Significant reductions in plant infestation percentage and population density (/m2) were recorded throughout the plantation seasons, 2011 and 2012 before and after spraying the plants. The percent reduction in numbers/m2 was the highest in March for the treatments with Heterorhabditis indica Behera and Heterorhabditis bacteriophora Giza during the plantation season 2011, while at the plantation season 2012, the reduction in population density was the highest in January for Heterorhabditis Indica Behera and in February for H . bacteriophora Giza treatments. In a comparison test with conventional insecticides Hostathion and Lannate, there were no significant differences in control measures resulting from treatments with H. indica Behera, H. bacteriophora Giza and Lannate. At the plantation season is 2012. Also, the treatments reduced the economic threshold of T. squalida on cauliflower in this experiment as compared with before and after spraying with both the two entomopathogenic nematodes at both seasons 2011 and 2012. This means an increase in the marketability of heads harvested as a consequence of monthly treatments.
Abstract: The theatre-auditorium under investigation following
the highly reflective characteristics of materials used in it (marble,
painted wood, smooth plaster, etc), architectural and structural
features of the Protocol and its intended use (very multifunctional:
Auditorium, theatre, cinema, musicals, conference room) from the
analysis of the statement of fact made by the acoustic simulation
software Ramsete and supported by data obtained through a
campaign of acoustic measurements of the state of fact made on the
spot by a Fonomet Svantek model SVAN 957, appears to be
acoustically inadequate. After the completion of the 3D model
according to the specifications necessary software used forecast in
order to be recognized by him, have made three simulations, acoustic
simulation of the state of and acoustic simulation of two design
solutions.
Improved noise characteristics found in the first design solution,
compared to the state in fact consists therefore in lowering
Reverberation Time that you turn most desirable value, while the
Indicators of Clarity, the Baricentric Time, the Lateral Efficiency,
Ratio of Low Tmedia BR and defined the Speech Intelligibility
improved significantly. Improved noise characteristics found instead
in the second design solution, as compared to first design solution, is
finally mostly in a more uniform distribution of Leq and in lowering
Reverberation Time that you turn the optimum values. Indicators of
Clarity, and the Lateral Efficiency improve further but at the expense
of a value slightly worse than the BR. Slightly vary the remaining
indices.
Abstract: In this work, effects of catalysts (TiO2, and Nb2O5) were investigated on the hydrogen desorption of Mg(BH4)2. LiBH4 and MgCl2 with 2:1 molar ratio were mixed by using ball milling to prepare Mg(BH4)2. The desorption behaviors were measured by thermo-volumetric apparatus. The hydrogen desorption capacity of the mixed sample milled for 2 h was 4.78 wt% with a 2-step released. The first step occurred at 214 °C and the second step appeared at 374 °C. The addition of 16 wt% Nb2O5 decreased the desorption temperature in the second step about 66 °C and increased the hydrogen desorption capacity to 4.86 wt% hydrogen. The addition of TiO2 also improved the desorption temperature in the second step and the hydrogen desorption capacity. It decreased the desorption temperature about 71°C and showed a high amount of hydrogen, 5.27 wt%, released from the mixed sample. The hydrogen absorption after desorption of Mg(BH4)2 was also studied under 9.5 MPa and 350 °C for 12 h.
Abstract: As a result of the daily workflow in the design
development departments of companies, databases containing huge
numbers of 3D geometric models are generated. According to the
given problem engineers create CAD drawings based on their design
ideas and evaluate the performance of the resulting design, e.g. by
computational simulations. Usually, new geometries are built either
by utilizing and modifying sets of existing components or by adding
single newly designed parts to a more complex design.
The present paper addresses the two facets of acquiring
components from large design databases automatically and providing
a reasonable overview of the parts to the engineer. A unified
framework based on the topographic non-negative matrix
factorization (TNMF) is proposed which solves both aspects
simultaneously. First, on a given database meaningful components
are extracted into a parts-based representation in an unsupervised
manner. Second, the extracted components are organized and
visualized on square-lattice 2D maps. It is shown on the example of
turbine-like geometries that these maps efficiently provide a wellstructured
overview on the database content and, at the same time,
define a measure for spatial similarity allowing an easy access and
reuse of components in the process of design development.
Abstract: In the hardening energy context, the transport sector
which constitutes a large worldwide energy demand has to be
improving for decrease energy demand and global warming impacts.
In a controversial situation where subsists an increasing demand for
long-distance and high-speed travels, high-speed trains offer many
advantages, as consuming significantly less energy than road or air
transports.
At the project phase of new rail infrastructures, it is nowadays
important to characterize accurately the energy that will be induced
by its operation phase, in addition to other more classical criteria as
construction costs and travel time.
Current literature consumption models used to estimate railways
operation phase are obsolete or not enough accurate for taking into
account the newest train or railways technologies.
In this paper, an updated model of consumption for high-speed is
proposed, based on experimental data obtained from full-scale tests
performed on a new high-speed line. The assessment of the model
is achieved by identifying train parameters and measured power
consumptions for more than one hundred train routes. Perspectives
are then discussed to use this updated model for accurately assess
the energy impact of future railway infrastructures.
Abstract: Recently, much research has been conducted for
security for wireless sensor networks and ubiquitous computing.
Security issues such as authentication and data integrity are major
requirements to construct sensor network systems. Advanced
Encryption Standard (AES) is considered as one of candidate
algorithms for data encryption in wireless sensor networks. In this
paper, we will present the hardware architecture to implement low
power AES crypto module. Our low power AES crypto module has
optimized architecture of data encryption unit and key schedule unit
which could be applicable to wireless sensor networks. We also details
low power design methods used to design our low power AES crypto
module.
Abstract: A combined three-microphone voice activity detector (VAD) and noise-canceling system is studied to enhance speech recognition in an automobile environment. A previous experiment clearly shows the ability of the composite system to cancel a single noise source outside of a defined zone. This paper investigates the performance of the composite system when there are frequently moving noise sources (noise sources are coming from different locations but are not always presented at the same time) e.g. there is other passenger speech or speech from a radio when a desired speech is presented. To work in a frequently moving noise sources environment, whilst a three-microphone voice activity detector (VAD) detects voice from a “VAD valid zone", the 3-microphone noise canceller uses a “noise canceller valid zone" defined in freespace around the users head. Therefore, a desired voice should be in the intersection of the noise canceller valid zone and VAD valid zone. Thus all noise is suppressed outside this intersection of area. Experiments are shown for a real environment e.g. all results were recorded in a car by omni-directional electret condenser microphones.
Abstract: Numerous facts evidence the increasing religiosity of
the population and the intensification of religious movements in
various countries in the last decade of the 20th century. The number
of international religious institutions and foundations; religious
movements; parties and sects operating worldwide is increasing as
well. Some ethnic and inter-state conflicts are obviously of a
religious origin. All of this make a number of analysts to conclude
that the religious factor is becoming an important part of international
life, including the formation and activities of terrorist organizations.
Most of all is said and written about Islam, the second, after
Christianity, world religions professed according to various estimates
by 1.5 bln. individuals in 127 countries.
Abstract: Searching similar documents and document
management subjects have important place in text mining. One of the
most important parts of similar document research studies is the
process of classifying or clustering the documents. In this study, a
similar document search approach that includes discussion of out the
case of belonging to multiple categories (multiple categories
problem) has been carried. The proposed method that based on Fuzzy
Similarity Classification (FSC) has been compared with Rocchio
algorithm and naive Bayes method which are widely used in text
mining. Empirical results show that the proposed method is quite
successful and can be applied effectively. For the second stage,
multiple categories vector method based on information of categories
regarding to frequency of being seen together has been used.
Empirical results show that achievement is increased almost two
times, when proposed method is compared with classical approach.
Abstract: Traditional optical networks are gradually evolving towards intelligent optical networks due to the need for faster bandwidth provisioning, protection and restoration of the network that can be accomplished with devices like optical switch, add drop multiplexer and cross connects. Since dense wavelength multiplexing forms the physical layer for intelligent optical networking, the roll of high speed all optical switch is important. This paper analyzes such an ultra-high speed polymer electro-optic switch. The performances of the 2x2 optical waveguide switch with rectangular, triangular and trapezoidal grating profiles on various device parameters are analyzed. The simulation result shows that trapezoidal grating is the optimized structure which has the coupling length of 81μm and switching voltage of 11V for the operating wavelength of 1550nm. The switching time for this proposed switch is 0.47 picosecond. This makes the proposed switch to be an important element in the intelligent optical network.
Abstract: This paper deals with heterogeneous autoregressive
models of realized volatility (HAR-RV models) on high-frequency
data of stock indices in the USA. Its aim is to capture the behavior of
three groups of market participants trading on a daily, weekly and
monthly basis and assess their role in predicting the daily realized
volatility. The benefits of this work lies mainly in the application of
heterogeneous autoregressive models of realized volatility on stock
indices in the USA with a special aim to analyze an impact of the
global financial crisis on applied models forecasting performance.
We use three data sets, the first one from the period before the global
financial crisis occurred in the years 2006-2007, the second one from
the period when the global financial crisis fully hit the U.S. financial
market in 2008-2009 years, and the last period was defined over
2010-2011 years. The model output indicates that estimated realized
volatility in the market is very much determined by daily traders and
in some cases excludes the impact of those market participants who
trade on monthly basis.
Abstract: This paper proposes an easy-to-use instruction hiding
method to protect software from malicious reverse engineering
attacks. Given a source program (original) to be protected, the
proposed method (1) takes its modified version (fake) as an input,
(2) differences in assembly code instructions between original and
fake are analyzed, and, (3) self-modification routines are introduced
so that fake instructions become correct (i.e., original instructions)
before they are executed and that they go back to fake ones after
they are executed. The proposed method can add a certain amount
of security to a program since the fake instructions in the resultant
program confuse attackers and it requires significant effort to discover
and remove all the fake instructions and self-modification routines.
Also, this method is easy to use (with little effort) because all a user
(who uses the proposed method) has to do is to prepare a fake source
code by modifying the original source code.
Abstract: Axisymmetric vibration of an infinite Pyrocomposite
circular hollow cylinder made of inner and outer pyroelectric layer of
6mm-class bonded together by a Linear Elastic Material with Voids
(LEMV) layer is studied. The exact frequency equation is obtained
for the traction free surfaces with continuity condition at the
interfaces. Numerical results in the form of data and dispersion
curves for the first and second mode of the axisymmetric vibration of
the cylinder BaTio3 / Adhesive / BaTio3 by taking the Adhesive layer
as an existing Carbon Fibre Reinforced Polymer (CFRP) are
compared with a hypothetical LEMV layer with and without voids
and as well with a pyroelectric hollow cylinder. The damping is
analyzed through the imaginary parts of the complex frequencies.
Abstract: In this paper, a two-channel secure communication
using fractional chaotic systems is presented. Conditions for chaos
synchronization have been investigated theoretically by using Laplace
transform. To illustrate the effectiveness of the proposed scheme, a
numerical example is presented. The keys, key space, key selection
rules and sensitivity to keys are discussed in detail. Results show that
the original plaintexts have been well masked in the ciphertexts yet
recovered faithfully and efficiently by the present schemes.
Abstract: The purpose of this paper primarily intends to develop GIS interface for estimating sequences of stream-flows at ungauged stations based on known flows at gauged stations. The integrated GIS interface is composed of three major steps. The first, precipitation characteristics using statistical analysis is the procedure for making multiple linear regression equation to get the long term mean daily flow at ungauged stations. The independent variables in regression equation are mean daily flow and drainage area. Traditionally, mean flow data are generated by using Thissen polygon method. However, method for obtaining mean flow data can be selected by user such as Kriging, IDW (Inverse Distance Weighted), Spline methods as well as other traditional methods. At the second, flow duration curve (FDC) is computing at unguaged station by FDCs in gauged stations. Finally, the mean annual daily flow is computed by spatial interpolation algorithm. The third step is to obtain watershed/topographic characteristics. They are the most important factors which govern stream-flows. In summary, the simulated daily flow time series are compared with observed times series. The results using integrated GIS interface are closely similar and are well fitted each other. Also, the relationship between the topographic/watershed characteristics and stream flow time series is highly correlated.