Abstract: In this paper, the issue of pth moment stability of a class of stochastic neural networks with mixed delays is investigated. By establishing two integro-differential inequalities, some new sufficient conditions ensuring pth moment exponential stability are obtained. Compared with some previous publications, our results generalize some earlier works reported in the literature, and remove some strict constraints of time delays and kernel functions. Two numerical examples are presented to illustrate the validity of the main results.
Abstract: This paper addresses parameter and state estimation problem in the presence of the perturbation of observer gain bounded input disturbances for the Lipschitz systems that are linear in unknown parameters and nonlinear in states. A new nonlinear adaptive resilient observer is designed, and its stability conditions based on Lyapunov technique are derived. The gain for this observer is derived systematically using linear matrix inequality approach. A numerical example is provided in which the nonlinear terms depend on unmeasured states. The simulation results are presented to show the effectiveness of the proposed method.
Abstract: Emerging adulthood, between the ages of 18 and 25, as a distinct developmental stage extending from adolescence to young adulthood. The proportions composing the five-factor model are neuroticism, extraversion, openness to experience, agreeableness, and conscientiousness. In the literature, there is any study which includes the relationship between emerging adults loneliness and personality traits. Therefore, the relationship between emerging adults loneliness and personality traits have to be investigated. This study examines the association between the Big Five personality traits, and loneliness among Turkish emerging adults. A total of 220 emerging adults completed the NEO Five Factor Inventory (NEO-FFI), and the The UCLA Loneliness Scale (UCLALS). Correlation analysis showed that three Big Five personality dimensions which are Neuroticism (positively), and Extraversion and Aggreableness (negatively) are moderately correlated with emerging adults loneliness. Regression analysis shows that Extraversion, Aggreableness and Neuroticism are the most important predictors of emerging adults loneliness. Results can be discussed in the context of emerging adulthood theory.
Abstract: Hybrid algorithm is the hot issue in Computational
Intelligence (CI) study. From in-depth discussion on Simulation
Mechanism Based (SMB) classification method and composite patterns,
this paper presents the Mamdani model based Adaptive Neural
Fuzzy Inference System (M-ANFIS) and weight updating formula in
consideration with qualitative representation of inference consequent
parts in fuzzy neural networks. M-ANFIS model adopts Mamdani
fuzzy inference system which has advantages in consequent part.
Experiment results of applying M-ANFIS to evaluate traffic Level
of service show that M-ANFIS, as a new hybrid algorithm in computational
intelligence, has great advantages in non-linear modeling,
membership functions in consequent parts, scale of training data and
amount of adjusted parameters.
Abstract: Genetic Folding (GF) a new class of EA named as is
introduced for the first time. It is based on chromosomes composed
of floating genes structurally organized in a parent form and
separated by dots. Although, the genotype/phenotype system of GF
generates a kernel expression, which is the objective function of
superior classifier. In this work the question of the satisfying
mapping-s rules in evolving populations is addressed by analyzing
populations undergoing either Mercer-s or none Mercer-s rule. The
results presented here show that populations undergoing Mercer-s
rules improve practically models selection of Support Vector
Machine (SVM). The experiment is trained multi-classification
problem and tested on nonlinear Ionosphere dataset. The target of this
paper is to answer the question of evolving Mercer-s rule in SVM
addressed using either genetic folding satisfied kernel-s rules or not
applied to complicated domains and problems.
Abstract: In this work we evaluate the possibility of predicting
the emotional state of a person based on the EEG. We investigate
the problem of classifying valence from EEG signals during
the presentation of affective pictures, utilizing the "frontal EEG
asymmetry" phenomenon. To distinguish positive and negative
emotions, we applied the Common Spatial Patterns algorithm.
In contrast to our expectations, the affective pictures did not
reliably elicit changes in frontal asymmetry. The classifying task
thereby becomes very hard as reflected by the poor classifier
performance. We suspect that the masking of the source of the
brain activity related to emotions, coming mostly from deeper
structures in the brain, and the insufficient emotional engagement
are among main reasons why it is difficult to predict the emotional
state of a person.
Abstract: Characterization of radio communication signals aims
at automatic recognition of different characteristics of radio signals in
order to detect their modulation type, the central frequency, and the
level. Our purpose is to apply techniques used in image processing in
order to extract pertinent characteristics. To the single analysis, we
add several rules for checking the consistency of hypotheses using
fuzzy logic. This allows taking into account ambiguity and
uncertainty that may remain after the extraction of individual
characteristics. The aim is to improve the process of radio
communications characterization.
Abstract: The amount of urban artificial heat which affects the
urban temperature rise in urban meteorology was investigated in order
to clarify the relationships between urbanization and urban
meteorology in this study.
The results of calculation to identify how urban temperate was
increased through the establishment of a model for measuring the
amount of urban artificial heat and theoretical testing revealed that the
amount of urban artificial heat increased urban temperature by plus or
minus 0.23 ˚ C in 2007 compared with 1996, statistical methods
(correlation and regression analysis) to clarify the relationships
between urbanization and urban weather were as follows.
New design techniques and urban growth management are
necessary from urban growth management point of view suggested
from this research at city design phase to decrease urban temperature
rise and urban torrential rain which can produce urban disaster in terms
of urban meteorology by urbanization.
Abstract: In this paper, we shall present sufficient conditions
for the ψ-exponential stability of a class of nonlinear impulsive
differential equations. We use the Lyapunov method with functions
that are not necessarily differentiable. In the last section, we give
some examples to support our theoretical results.
Abstract: The tagging data of (users, tags and resources) constitutes a folksonomy that is the user-driven and bottom-up approach to organizing and classifying information on the Web. Tagging data stored in the folksonomy include a lot of very useful information and knowledge. However, appropriate approach for analyzing tagging data and discovering hidden knowledge from them still remains one of the main problems on the folksonomy mining researches. In this paper, we have proposed a folksonomy data mining approach based on FCA for discovering hidden knowledge easily from folksonomy. Also we have demonstrated how our proposed approach can be applied in the collaborative tagging system through our experiment. Our proposed approach can be applied to some interesting areas such as social network analysis, semantic web mining and so on.
Abstract: According to the governmental data, the cases of oral
cancers doubled in the past 10 years. This had brought heavy burden to
the patients- family, the society, and the country. The literature
generally evidenced the betel nut contained particular chemicals that
can cause oral cancers. Research in Taiwan had also proofed that 90
percent of oral cancer patients had experience of betel nut chewing. It
is thus important to educate the betel-nut hobbyists to cease such a
hazardous behavior. A program was then organized to establish
several training classes across different areas specific to help ceasing
this particular habit. Purpose of this research was to explore the
attitude and intention toward ceasing betel-nut chewing before and
after attending the training classes. 50 samples were taken from a
ceasing class with average age at 45 years old with high school
education (54%). 74% of the respondents were male in service or
agricultural industries. Experiences in betel-nut chewing were 5-20
years with a dose of 1-20 pieces per day. The data had shown that 60%
of the respondents had cigarette smoking habit, and 30% of the
respondents were concurrently alcoholic dependent. Research results
indicated that the attitude, intentions, and the knowledge on oral
cancers were found significant different between before and after
attendance. This provided evidence for the effectiveness of the training
class. However, we do not perform follow-up after the class.
Noteworthy is the test result also shown that participants who were
drivers as occupation, or habitual smokers or alcoholic dependents
would be less willing to quit the betel-nut chewing. The test results
indicated as well that the educational levels and the type of occupation
may have significant impacts on an individual-s decisions in taking
betel-nut or substance abuse.
Abstract: The cDNA encoding the 326 amino acids of a Class I
basic chitinase gene from Leucaena leucocephala de Wit (KB3,
Genbank accession: AAM49597) was cloned under the control of
CaMV35S promoter in pCAMBIA 1300 and transferred to
Koshihikari. Calli of Koshihikari rice was transformed with
agrobacterium with this construct expressing the chitinase and β-
glucouronidase (GUS). The frequencies of calli 90 % has been
obtained from rice seedlings cultured on NB medium. The high
regeneration frequencies, 74% was obtained from calli cultured on
regeneration medium containing 4 mg/l BAP, and 7 g/l phytagel at
25°C. Various factors were studied in order to establish a procedure
for the transformation of Koshihikari Agrobacterium tumefaciens.
Supplementation of 50 mM acetosyringone to the medium during
coculivation was important to enhance the frequency to transient
transformation. The 4 week-old scutellum-derived calli were
excellent starting materials. Selection medium based on NB medium
supplement with 40 mg/l hygromycin and 400 mg/l cefotaxime were
an optimized medium for selection of transformed rice calli. The
percentage of transformation 70 was obtained. Recombinant calli and
regenerated rice plants were checked the expression of chitinase and
gus by PCR, northern blot gel, southern blot gel, and gus assay.
Chitinase and gus were expressed in all parts of recombinant rice.
The rice line expressing the KB3 chiitnase was more resistant to the
blast fungus Fusarium monoliforme than control line.
Abstract: Text categorization is the problem of classifying text
documents into a set of predefined classes. In this paper, we
investigated three approaches to build a meta-classifier in order to
increase the classification accuracy. The basic idea is to learn a metaclassifier
to optimally select the best component classifier for each
data point. The experimental results show that combining classifiers
can significantly improve the accuracy of classification and that our
meta-classification strategy gives better results than each individual
classifier. For 7083 Reuters text documents we obtained a
classification accuracies up to 92.04%.
Abstract: The issue of unintentional islanding in PV grid
interconnection still remains as a challenge in grid-connected
photovoltaic (PV) systems. This paper discusses the overview of
popularly used anti-islanding detection methods, practically applied
in PV grid-connected systems. Anti-islanding methods generally can
be classified into four major groups, which include passive methods,
active methods, hybrid methods and communication base methods.
Active methods have been the preferred detection technique over the
years due to very small non-detected zone (NDZ) in small scale
distribution generation. Passive method is comparatively simpler
than active method in terms of circuitry and operations. However, it
suffers from large NDZ that significantly reduces its performance.
Communication base methods inherit the advantages of active and
passive methods with reduced drawbacks. Hybrid method which
evolved from the combination of both active and passive methods
has been proven to achieve accurate anti-islanding detection by many
researchers. For each of the studied anti-islanding methods, the
operation analysis is described while the advantages and
disadvantages are compared and discussed. It is difficult to pinpoint a
generic method for a specific application, because most of the
methods discussed are governed by the nature of application and
system dependent elements. This study concludes that the setup and
operation cost is the vital factor for anti-islanding method selection in
order to achieve minimal compromising between cost and system
quality.
Abstract: This study reveals that anti-immigrant policies in
Europe result from a process of securitization, and that, within this
process, radical right parties have been formulating discourses and
approaches through a construction process by using some common
security themes. These security themes can be classified as national
security, economic security, cultural security and internal security.
The frequency with which radical right parties use these themes may
vary according to the specific historical, social and cultural
characteristics of a particular country.
Abstract: This paper presents a new steganography approach suitable for Arabic texts. It can be classified under steganography feature coding methods. The approach hides secret information bits within the letters benefiting from their inherited points. To note the specific letters holding secret bits, the scheme considers the two features, the existence of the points in the letters and the redundant Arabic extension character. We use the pointed letters with extension to hold the secret bit 'one' and the un-pointed letters with extension to hold 'zero'. This steganography technique is found attractive to other languages having similar texts to Arabic such as Persian and Urdu.
Abstract: Sharing the manufacturing facility through remote
operation and monitoring of a machining process is challenge for
effective use the production facility. Several automation tools in term
of hardware and software are necessary for successfully remote
operation of a machine. This paper presents a prototype of workpiece
holding attachment for remote operation of milling process by self
configuration the workpiece setup. The prototype is designed with
mechanism to reorient the work surface into machining spindle
direction with high positioning accuracy. Variety of parts geometry
is hold by attachment to perform single setup machining. Pin type
with array pattern additionally clamps the workpiece surface from
two opposite directions for increasing the machining rigidity.
Optimum pins configuration for conforming the workpiece geometry
with minimum deformation is determined through hybrid algorithms,
Genetic Algorithms (GA) and Particle Swarm Optimization (PSO).
Prototype with intelligent optimization technique enables to hold
several variety of workpiece geometry which is suitable for
machining low of repetitive production in remote operation.
Abstract: This paper introduces a temporal epistemic logic
CBCTL that updates agent-s belief states through communications
in them, based on computational tree logic (CTL). In practical
environments, communication channels between agents may not be
secure, and in bad cases agents might suffer blackouts. In this study,
we provide inform* protocol based on ACL of FIPA, and declare the
presence of secure channels between two agents, dependent on time.
Thus, the belief state of each agent is updated along with the progress
of time. We show a prover, that is a reasoning system for a given
formula in a given a situation of an agent ; if it is directly provable
or if it could be validated through the chains of communications, the
system returns the proof.
Abstract: The paper proposes an approach using genetic algorithm for computing the region based image similarity. The image is denoted using a set of segmented regions reflecting color and texture properties of an image. An image is associated with a family of image features corresponding to the regions. The resemblance of two images is then defined as the overall similarity between two families of image features, and quantified by a similarity measure, which integrates properties of all the regions in the images. A genetic algorithm is applied to decide the most plausible matching. The performance of the proposed method is illustrated using examples from an image database of general-purpose images, and is shown to produce good results.
Abstract: Reconfigurable optical add/drop multiplexers
(ROADMs) can be classified into three categories based on their
underlying switching technologies. Category I consists of a single
large optical switch; category II is composed of a number of small
optical switches aligned in parallel; and category III has a single
optical switch and only one wavelength being added/dropped. In this
paper, to evaluate the wavelength-routing capability of ROADMs of
category-II in dynamic optical networks,the dynamic traffic models
are designed based on Bernoulli, Poisson distributions for smooth
and regular types of traffic. Through Analytical and Simulation
results, the routing power of cat-II of ROADM networks for two
traffic models are determined.