Abstract: In this work the opportunity of construction of the
qualifiers for face-recognition systems based on conjugation criteria
is investigated. The linkage between the bipartite conjugation, the
conjugation with a subspace and the conjugation with the null-space
is shown. The unified solving rule is investigated. It makes the
decision on the rating of face to a class considering the linkage
between conjugation values. The described recognition method can
be successfully applied to the distributed systems of video control
and video observation.
Abstract: Accounts of language acquisition differ significantly in their treatment of the role of prediction in language learning. In particular, nativist accounts posit that probabilistic learning about words and word sequences has little to do with how children come to use language. The accuracy of this claim was examined by testing whether distributional probabilities and frequency contributed to how well 3-4 year olds repeat simple word chunks. Corresponding chunks were the same length, expressed similar content, and were all grammatically acceptable, yet the results of the study showed marked differences in performance when overall distributional frequency varied. It was found that a distributional model of language predicted the empirical findings better than a number of other models, replicating earlier findings and showing that children attend to distributional probabilities in an adult corpus. This suggested that language is more prediction-and-error based, rather than on abstract rules which nativist camps suggest.
Abstract: Low temperature (LT) is one of the most abiotic
stresses causing loss of yield in wheat (T. aestivum). Four major
genes in wheat (Triticum aestivum L.) with the dominant alleles
designated Vrn–A1,Vrn–B1,Vrn–D1 and Vrn4, are known to have
large effects on the vernalization response, but the effects on cold
hardiness are ambiguous. Poor cold tolerance has restricted winter
wheat production in regions of high winter stress [9]. It was known
that nearly all wheat chromosomes [5] or at least 10 chromosomes of
21 chromosome pairs are important in winter hardiness [15]. The
objective of present study was to clarify the role of each chromosome
in cold tolerance. With this purpose we used 20 isogenic lines of
wheat. In each one of these isogenic lines only a chromosome from
‘Bezostaya’ variety (a winter habit cultivar) was substituted to
‘Capple desprez’ variety. The plant materials were planted in
controlled conditions with 20º C and 16 h day length in moderately
cold areas of Iran at Karaj Agricultural Research Station in 2006-07
and the acclimation period was completed for about 4 weeks in a
cold room with 4º C. The cold hardiness of these isogenic lines was
measured by LT50 (the temperature in which 50% of the plants are
killed by freezing stress).The experimental design was completely
randomized block design (RCBD)with three replicates. The results
showed that chromosome 5A had a major effect on freezing
tolerance, and then chromosomes 1A and 4A had less effect on this
trait. Further studies are essential to understanding the importance of
each chromosome in controlling cold hardiness in wheat.
Abstract: Rapid progress in process automation and tightening
quality standards result in a growing demand being placed on fault
detection and diagnostics methods to provide both speed and
reliability of motor quality testing. Doubly fed induction generators
are used mainly for wind energy conversion in MW power plants.
This paper presents a detection of an inter turn stator and an open
phase faults, in a doubly fed induction machine whose stator and
rotor are supplied by two pulse width modulation (PWM) inverters.
The method used in this article to detect these faults, is based on
Park-s Vector Approach, using a neural network.
Abstract: This research aimed to study correlation between
work satisfaction and organization core value of officers in
Waterworks Authority, Bangkean Branch. Sample group of the study
was 112 officers who worked in the Waterworks Authority,
Bangkean Branch. Questionnaires were employed as a research tools,
while, Percentage, Mean, Standard Deviation, T-test, One-way
ANOVA, and Pearson Product Moment Correlation were claimed as
statistics used in this study. Researcher found that overall and
individual aspects of work satisfaction namely, work characteristic,
work progress, and colleagues significantly correlated with
organization core value in aspect of perception in choice of work at
0.5, 0.01, and 0.01 respectively. Also, such aspects were compatible
with income at .05 which indicated the low level of correlation, mid
low correlation respectively at the same direction, same direction,
opposite direction, and same direction, correspondingly.
Abstract: Today’s technology is heavily dependent on web applications. Web applications are being accepted by users at a very rapid pace. These have made our work efficient. These include webmail, online retail sale, online gaming, wikis, departure and arrival of trains and flights and list is very long. These are developed in different languages like PHP, Python, C#, ASP.NET and many more by using scripts such as HTML and JavaScript. Attackers develop tools and techniques to exploit web applications and legitimate websites. This has led to rise of web application security; which can be broadly classified into Declarative Security and Program Security. The most common attacks on the applications are by SQL Injection and XSS which give access to unauthorized users who totally damage or destroy the system. This paper presents a detailed literature description and analysis on Web Application Security, examples of attacks and steps to mitigate the vulnerabilities.
Abstract: Kernel function, which allows the formulation of nonlinear variants of any algorithm that can be cast in terms of dot products, makes the Support Vector Machines (SVM) have been successfully applied in many fields, e.g. classification and regression. The importance of kernel has motivated many studies on its composition. It-s well-known that reproducing kernel (R.K) is a useful kernel function which possesses many properties, e.g. positive definiteness, reproducing property and composing complex R.K by simple operation. There are two popular ways to compute the R.K with explicit form. One is to construct and solve a specific differential equation with boundary value whose handicap is incapable of obtaining a unified form of R.K. The other is using a piecewise integral of the Green function associated with a differential operator L. The latter benefits the computation of a R.K with a unified explicit form and theoretical analysis, whereas there are relatively later studies and fewer practical computations. In this paper, a new algorithm for computing a R.K is presented. It can obtain the unified explicit form of R.K in general reproducing kernel Hilbert space. It avoids constructing and solving the complex differential equations manually and benefits an automatic, flexible and rigorous computation for more general RKHS. In order to validate that the R.K computed by the algorithm can be used in SVM well, some illustrative examples and a comparison between R.K and Gaussian kernel (RBF) in support vector regression are presented. The result shows that the performance of R.K is close or slightly superior to that of RBF.
Abstract: Text Mining is around applying knowledge discovery techniques to unstructured text is termed knowledge discovery in text (KDT), or Text data mining or Text Mining. In Neural Network that address classification problems, training set, testing set, learning rate are considered as key tasks. That is collection of input/output patterns that are used to train the network and used to assess the network performance, set the rate of adjustments. This paper describes a proposed back propagation neural net classifier that performs cross validation for original Neural Network. In order to reduce the optimization of classification accuracy, training time. The feasibility the benefits of the proposed approach are demonstrated by means of five data sets like contact-lenses, cpu, weather symbolic, Weather, labor-nega-data. It is shown that , compared to exiting neural network, the training time is reduced by more than 10 times faster when the dataset is larger than CPU or the network has many hidden units while accuracy ('percent correct') was the same for all datasets but contact-lences, which is the only one with missing attributes. For contact-lences the accuracy with Proposed Neural Network was in average around 0.3 % less than with the original Neural Network. This algorithm is independent of specify data sets so that many ideas and solutions can be transferred to other classifier paradigms.
Abstract: We provide a supervised speech-independent voice recognition technique in this paper. In the feature extraction stage we propose a mel-cepstral based approach. Our feature vector classification method uses a special nonlinear metric, derived from the Hausdorff distance for sets, and a minimum mean distance classifier.
Abstract: This paper discusses a new, systematic approach to
the synthesis of a NP-hard class of non-regenerative Boolean
networks, described by FON[FOFF]={mi}[{Mi}], where for every
mj[Mj]∈{mi}[{Mi}], there exists another mk[Mk]∈{mi}[{Mi}], such
that their Hamming distance HD(mj, mk)=HD(Mj, Mk)=O(n), (where
'n' represents the number of distinct primary inputs). The method
automatically ensures exact minimization for certain important selfdual
functions with 2n-1 points in its one-set. The elements meant for
grouping are determined from a newly proposed weighted incidence
matrix. Then the binary value corresponding to the candidate pair is
correlated with the proposed binary value matrix to enable direct
synthesis. We recommend algebraic factorization operations as a post
processing step to enable reduction in literal count. The algorithm
can be implemented in any high level language and achieves best
cost optimization for the problem dealt with, irrespective of the
number of inputs. For other cases, the method is iterated to
subsequently reduce it to a problem of O(n-1), O(n-2),.... and then
solved. In addition, it leads to optimal results for problems exhibiting
higher degree of adjacency, with a different interpretation of the
heuristic, and the results are comparable with other methods.
In terms of literal cost, at the technology independent stage, the
circuits synthesized using our algorithm enabled net savings over
AOI (AND-OR-Invert) logic, AND-EXOR logic (EXOR Sum-of-
Products or ESOP forms) and AND-OR-EXOR logic by 45.57%,
41.78% and 41.78% respectively for the various problems.
Circuit level simulations were performed for a wide variety of
case studies at 3.3V and 2.5V supply to validate the performance of
the proposed method and the quality of the resulting synthesized
circuits at two different voltage corners. Power estimation was
carried out for a 0.35micron TSMC CMOS process technology. In
comparison with AOI logic, the proposed method enabled mean
savings in power by 42.46%. With respect to AND-EXOR logic, the
proposed method yielded power savings to the tune of 31.88%, while
in comparison with AND-OR-EXOR level networks; average power
savings of 33.23% was obtained.
Abstract: In spite of the advent of new materials, clay bricks
remain, arguably, the most popular construction materials today.
Nevertheless the low cost and versatility of clay bricks cannot always
be associated with high environmental and sustainable values,
especially in terms of raw material sources and manufacturing
processes. At the same time, the worldwide agricultural footprint is
fast growing, with vast agricultural land cultivation and active
expansion of the agro-based industry. The resulting large quantities of
agricultural wastes, unfortunately, are not always well managed or
utilised. These wastes can be recycled, such as by retrieving fibres
from disposed leaves and fruit bunches, and then incorporated in
brick-making. This way the clay bricks are made a 'greener' building
material and the discarded natural wastes can be reutilised, avoiding
otherwise wasteful landfill and harmful open incineration. This study
examined the physical and mechanical properties of clay bricks made
by adding two natural fibres to a clay-water mixture, with baked and
non-baked conditions. The fibres were sourced from pineapple leaves
(PF) and oil palm fruit bunch (OF), and added within the range of
0.25-0.75 %. Cement was added as a binder to the mixture at 5-15 %.
Although the two fibres had different effects on the bricks produced,
cement appeared to dominate the compressive strength. The
non-baked bricks disintegrated when submerged in water, while the
baked ones displayed cement-dependent characteristics in
water-absorption and density changes. Interestingly, further increase
in fibre content did not cause significant density decrease in both the
baked and non-baked bricks.
Abstract: The combustion of liquid fuel in the porous burner
(PB) was experimented to investigate evaporation mechanism and
combustion behavior. The diesel oil was used as fuel and the pebbles
carefully chosen in the same size like the solid sphere homogeneously
was adopted as the porous media. Two structures of the liquid porous
burner, i.e. the PB without and with installation of porous emitter
(PE), were performed. PE was installed by lower than PB with
distance of 20 cm. The pebbles having porosity (φ) of 0.45 and 0.52
were, respectively, used in PB and PE. The fuel was supplied dropwise
from the top through the PB and the combustion was occurred between
PB and PE. Axial profiles of temperature along the burner length were
measured to clarify the evaporation and combustion phenomena. The
pollutant emission characteristics were monitored at the burner exit.
From the experiment, it was found that the temperature profiles of both
structures decreased with the three ways swirling air flows (QA)
increasing. On the other hand, the temperature profiles increased with
fuel heat input (QF). Obviously, the profile of the porous burner
installed with PE was higher than that of the porous burner without
PE
Abstract: We are concerned with a class of quadratic matrix
equations arising from the overdamped mass-spring system. By
exploring the structure of coefficient matrices, we propose a fast
cyclic reduction algorithm to calculate the extreme solutions of the
equation. Numerical experiments show that the proposed algorithm
outperforms the original cyclic reduction and the structure-preserving
doubling algorithm.
Abstract: Support Vector Machine (SVM) is a statistical
learning tool developed to a more complex concept of
structural risk minimization (SRM). In this paper, SVM is
applied to signal detection in communication systems in the
presence of channel noise in various environments in the form
of Rayleigh fading, additive white Gaussian background noise
(AWGN), and interference noise generalized as additive color
Gaussian noise (ACGN). The structure and performance of
SVM in terms of the bit error rate (BER) metric is derived and
simulated for these advanced stochastic noise models and the
computational complexity of the implementation, in terms of
average computational time per bit, is also presented. The
performance of SVM is then compared to conventional binary
signaling optimal model-based detector driven by binary
phase shift keying (BPSK) modulation. We show that the
SVM performance is superior to that of conventional matched
filter-, innovation filter-, and Wiener filter-driven detectors,
even in the presence of random Doppler carrier deviation,
especially for low SNR (signal-to-noise ratio) ranges. For
large SNR, the performance of the SVM was similar to that of
the classical detectors. However, the convergence between
SVM and maximum likelihood detection occurred at a higher
SNR as the noise environment became more hostile.
Abstract: Buildings are considered as significant part in the
cities, which plays main role in organization and arrangement of city
appearance, which is affects image of that building facades, as an
connective between inner and outer space, have a main role in city
image and they are classified as rich image and poor image by people
evaluation which related to visual architectural and urban elements in
building facades. the buildings in Karimi street , in Lahijan city
where, lies in north of Iran, contain the variety of building's facade
types which, have made a city image in Historical part of Lahijan
city, while reflected the Iranian cities identity. The study attempt to
identify the architectural and urban elements that impression the
image of building facades in historical area, based on public
evaluation. Quantitative method were used and the data was collected
through questionnaire survey, the result presented architectural style,
color, shape, and design evaluated by people as most important factor
which should be understate in future development. in fact, the rich
architectural style with strong design make strong city image as weak
design make poor city image.
Abstract: Cyber attacks pose a serious threat to all states. Therefore, states constantly seek for various methods to encounter those threats. In addition, recent changes in the nature of cyber attacks and their more complicated methods have created a new concept: active cyber defense (ACD). This article tries to answer firstly why ACD is important to NATO and find out the viewpoint of NATO towards ACD. Secondly, infrastructure protection is essential to cyber defense. Critical infrastructure protection with ACD means is even more important. It is assumed that by implementing active cyber defense, NATO may not only be able to repel the attacks but also be deterrent. Hence, the use of ACD has a direct positive effect in all international organizations’ future including NATO.
Abstract: The article presents findings from the study and
analysis of the results of an experimental programme focused on the
production of concrete and fibre reinforced concrete in which natural
aggregate has been substituted with brick or concrete recyclate. The
research results are analyzed to monitor the effect of mechanicalphysical
characteristics on the durability properties of tested
cementitious composites. The key parts of the fibre reinforced
concrete mix are the basic components: aggregates – recyclate,
cement, fly ash, water and fibres. Their specific ratios and the
properties of individual components principally affect the resulting
behaviour of fresh fibre reinforced concrete and the characteristics of
the final product. The article builds on the sources dealing with the
use of recycled aggregates from construction and demolition waste in
the production of fibre reinforced concrete. The implemented
procedure of testing the composite contributes to the building
sustainability in environmental engineering.
Abstract: Reactiondiffusion systems are mathematical models that describe how the concentration of one or more substances distributed in space changes under the influence of local chemical reactions in which the substances are converted into each other, and diffusion which causes the substances to spread out in space. The classical representation of a reaction-diffusion system is given by semi-linear parabolic partial differential equations, whose general form is ÔêétX(x, t) = DΔX(x, t), where X(x, t) is the state vector, D is the matrix of the diffusion coefficients and Δ is the Laplace operator. If the solute move in an homogeneous system in thermal equilibrium, the diffusion coefficients are constants that do not depend on the local concentration of solvent and of solutes and on local temperature of the medium. In this paper a new stochastic reaction-diffusion model in which the diffusion coefficients are function of the local concentration, viscosity and frictional forces of solvent and solute is presented. Such a model provides a more realistic description of the molecular kinetics in non-homogenoeus and highly structured media as the intra- and inter-cellular spaces. The movement of a molecule A from a region i to a region j of the space is described as a first order reaction Ai k- → Aj , where the rate constant k depends on the diffusion coefficient. Representing the diffusional motion as a chemical reaction allows to assimilate a reaction-diffusion system to a pure reaction system and to simulate it with Gillespie-inspired stochastic simulation algorithms. The stochastic time evolution of the system is given by the occurrence of diffusion events and chemical reaction events. At each time step an event (reaction or diffusion) is selected from a probability distribution of waiting times determined by the specific speed of reaction and diffusion events. Redi is the software tool, developed to implement the model of reaction-diffusion kinetics and dynamics. It is a free software, that can be downloaded from http://www.cosbi.eu. To demonstrate the validity of the new reaction-diffusion model, the simulation results of the chaperone-assisted protein folding in cytoplasm obtained with Redi are reported. This case study is redrawing the attention of the scientific community due to current interests on protein aggregation as a potential cause for neurodegenerative diseases.
Abstract: The primary objective of the paper is to propose a new method for solving assignment problem under uncertain situation. In the classical assignment problem (AP), zpqdenotes the cost for assigning the qth job to the pth person which is deterministic in nature. Here in some uncertain situation, we have assigned a cost in the form of composite relative degree Fpq instead of and this replaced cost is in the maximization form. In this paper, it has been solved and validated by the two proposed algorithms, a new mathematical formulation of IVIF assignment problem has been presented where the cost has been considered to be an IVIFN and the membership of elements in the set can be explained by positive and negative evidences. To determine the composite relative degree of similarity of IVIFS the concept of similarity measure and the score function is used for validating the solution which is obtained by Composite relative similarity degree method. Further, hypothetical numeric illusion is conducted to clarify the method’s effectiveness and feasibility developed in the study. Finally, conclusion and suggestion for future work are also proposed.
Abstract: This study investigated the relationships between the
active learning strategies (discussion, video clips, game show, role–
play, five minute paper, clarification pauses, and small group) and
academic achievement among a sample of 158 undergraduate
psychology students in The University of the West Indies (UWI),
Barbados. Results revealed statistically significant positive
correlations between active learning strategies and students’
academic achievement; so also the active learning strategies
contributed 22% (Rsq=0.222) to the variance being accounted for in
academic achievement and this was found to be statistically
significant (F(7,150) = 6.12, p < .05). Additionally, group work
emerged as the best active learning strategy and had the highest
correlation with the students’ academic achievement. These results
were discussed in the light of the importance of the active learning
strategies promoting academic achievement among the university
students.