Abstract: Many agricultural and especially greenhouse
applications like plant inspection, data gathering, spraying and
selective harvesting could be performed by robots. In this paper
multiple nonholonomic robots are used in order to create a desired
formation scheme for screening solar energy in a greenhouse through
data gathering. The formation consists from a leader and a team
member equipped with appropriate sensors. Each robot is dedicated
to its mission in the greenhouse that is predefined by the
requirements of the application. The feasibility of the proposed
application includes experimental results with three unmanned
ground vehicles (UGV).
Abstract: The aim of this study was to screen for
microorganism that able to utilize 3-N-trimethylamino-1-propanol
(homocholine) as a sole source of carbon and nitrogen. The aerobic
degradation of homocholine has been found by a gram-positive
Rhodococcus sp. bacterium isolated from soil. The isolate was
identified as Rhodococcus sp. strain A4 based on the phenotypic
features, physiologic and biochemical characteristics, and
phylogenetic analysis. The cells of the isolated strain grown on both
basal-TMAP and nutrient agar medium displayed elementary
branching mycelia fragmented into irregular rod and coccoid
elements. Comparative 16S rDNA sequencing studies indicated that
the strain A4 falls into the Rhodococcus erythropolis subclade and
forms a monophyletic group with the type-strains of R. opacus, and
R. wratislaviensis. Metabolites analysis by capillary electrophoresis,
fast atom bombardment-mass spectrometry, and gas
chromatography- mass spectrometry, showed trimethylamine (TMA)
as the major metabolite beside β-alanine betaine and
trimethylaminopropionaldehyde. Therefore, the possible degradation
pathway of trimethylamino propanol in the isolated strain is through
consequence oxidation of alcohol group (-OH) to aldehyde (-CHO)
and acid (-COOH), and thereafter the cleavage of β-alanine betaine
C-N bonds yielded trimethylamine and alkyl chain.
Abstract: While OCD is one of the most commonly occurring
psychiatric conditions experienced by older adults, there is a paucity
of research conducted into the treatment of older adults with OCD.
This case study represents the first published investigation of a
cognitive treatment for geriatric OCD. It describes the successful
treatment of an 86-year old man with a 63-year history of OCD using
Danger Ideation Reduction Therapy (DIRT). The client received 14
individual, 50-minute treatment sessions of DIRT over 13 weeks.
Clinician-based Y-BOCS scores reduced 84% from 25 (severe) at
pre-treatment, to 4 (subclinical) at 6-month post-treatment follow-up
interview, demonstrating the efficacy of DIRT for this client. DIRT
may have particular advantages over ERP and pharmacological
approaches, however further research is required in older adults with
OCD.
Abstract: Multi-dimensional principal component analysis
(PCA) is the extension of the PCA, which is used widely as the
dimensionality reduction technique in multivariate data analysis, to
handle multi-dimensional data. To calculate the PCA the singular
value decomposition (SVD) is commonly employed by the reason of
its numerical stability. The multi-dimensional PCA can be calculated
by using the higher-order SVD (HOSVD), which is proposed by
Lathauwer et al., similarly with the case of ordinary PCA. In this
paper, we apply the multi-dimensional PCA to the multi-dimensional
medical data including the functional independence measure (FIM)
score, and describe the results of experimental analysis.
Abstract: Eukaryotic protein-coding genes are interrupted by spliceosomal introns, which are removed from the RNA transcripts before translation into a protein. The exon-intron structures of different eukaryotic species are quite different from each other, and the evolution of such structures raises many questions. We try to address some of these questions using statistical analysis of whole genomes. We go through all the protein-coding genes in a genome and study correlations between the net length of all the exons in a gene, the number of the exons, and the average length of an exon. We also take average values of these features for each chromosome and study correlations between those averages on the chromosomal level. Our data show universal features of exon-intron structures common to animals, plants, and protists (specifically, Arabidopsis thaliana, Caenorhabditis elegans, Drosophila melanogaster, Cryptococcus neoformans, Homo sapiens, Mus musculus, Oryza sativa, and Plasmodium falciparum). We have verified linear correlation between the number of exons in a gene and the length of a protein coded by the gene, while the protein length increases in proportion to the number of exons. On the other hand, the average length of an exon always decreases with the number of exons. Finally, chromosome clustering based on average chromosome properties and parameters of linear regression between the number of exons in a gene and the net length of those exons demonstrates that these average chromosome properties are genome-specific features.
Abstract: This work describes the aerodynamic characteristic for
aircraft wing model with and without bird feather like winglet. The
aerofoil used to construct the whole structure is NACA 653-218
Rectangular wing and this aerofoil has been used to compare the
result with previous research using winglet. The model of the
rectangular wing with bird feather like winglet has been fabricated
using polystyrene before design using CATIA P3 V5R13 software
and finally fabricated in wood. The experimental analysis for the
aerodynamic characteristic for rectangular wing without winglet,
wing with horizontal winglet and wing with 60 degree inclination
winglet for Reynolds number 1.66×105, 2.08×105 and 2.50×105 have
been carried out in open loop low speed wind tunnel at the
Aerodynamics laboratory in Universiti Putra Malaysia. The
experimental result shows 25-30 % reduction in drag coefficient and
10-20 % increase in lift coefficient by using bird feather like winglet
for angle of attack of 8 degree.
Abstract: The aim of this paper is description of the notion of
the death for prisoners and the ways of deal with. They express
indifference, coldness, inability to accept the blame, they have no
shame and no empathy. Is it enough to perform acts verging on the
death. In this paper we described mechanisms and regularities of selfdestructive
behaviour in the view of the relevant literature? The
explanation of the phenomenon is of a biological and sociopsychological
nature. It must be clearly stated that all forms of selfdestructive
behaviour result from various impulses, conflicts and
deficits. That is why they should be treated differently in terms of
motivation and functions which they perform in a given group of
people. Behind self-destruction there seems to be a motivational
mechanism which forces prisoners to rebel and fight against the hated
law and penitentiary systems. The imprisoned believe that pain and
suffering inflicted on them by themselves are better than passive
acceptance of repression. The variety of self-destruction acts is wide,
and some of them take strange forms. We assume that a life-death
barrier is a kind of game for them. If they cannot change the
degrading situation, their life loses sense.
Abstract: In the recent works related with mixture discriminant
analysis (MDA), expectation and maximization (EM) algorithm is
used to estimate parameters of Gaussian mixtures. But, initial values
of EM algorithm affect the final parameters- estimates. Also, when
EM algorithm is applied two times, for the same data set, it can be
give different results for the estimate of parameters and this affect the
classification accuracy of MDA. Forthcoming this problem, we use
Self Organizing Mixture Network (SOMN) algorithm to estimate
parameters of Gaussians mixtures in MDA that SOMN is more robust
when random the initial values of the parameters are used [5]. We
show effectiveness of this method on popular simulated waveform
datasets and real glass data set.
Abstract: In the context of computer numerical control (CNC) and computer aided manufacturing (CAM), the capabilities of programming languages such as symbolic and intuitive programming, program portability and geometrical portfolio have special importance. They allow to save time and to avoid errors during part programming and permit code re-usage. Our updated literature review indicates that the current state of art presents voids in parametric programming, program portability and programming flexibility. In response to this situation, this article presents a compiler implementation for EGCL (Extended G-code Language), a new, enriched CNC programming language which allows the use of descriptive variable names, geometrical functions and flow-control statements (if-then-else, while). Our compiler produces low-level generic, elementary ISO-compliant Gcode, thus allowing for flexibility in the choice of the executing CNC machine and in portability. Our results show that readable variable names and flow control statements allow a simplified and intuitive part programming and permit re-usage of the programs. Future work includes allowing the programmer to define own functions in terms of EGCL, in contrast to the current status of having them as library built-in functions.
Abstract: This paper proposes a new method for analyzing textual data. The method deals with items of textual data, where each item is described based on various viewpoints. The method acquires 2- class classification models of the viewpoints by applying an inductive learning method to items with multiple viewpoints. The method infers whether the viewpoints are assigned to the new items or not by using the models. The method extracts expressions from the new items classified into the viewpoints and extracts characteristic expressions corresponding to the viewpoints by comparing the frequency of expressions among the viewpoints. This paper also applies the method to questionnaire data given by guests at a hotel and verifies its effect through numerical experiments.
Abstract: Crosstalk is the major limiting issue in very high bit-rate digital subscriber line (VDSL) systems in terms of bit-rate or service coverage. At the central office side, joint signal processing accompanied by appropriate power allocation enables complex multiuser processors to provide near capacity rates. Unfortunately complexity grows with the square of the number of lines within a binder, so by taking into account that there are only a few dominant crosstalkers who contribute to main part of crosstalk power, the canceller structure can be simplified which resulted in a much lower run-time complexity. In this paper, a multiuser power control scheme, namely iterative waterfilling, is combined with previously proposed partial crosstalk cancellation approaches to demonstrate the best ever achieved performance which is verified by simulation results.
Abstract: In this article, while it is attempted to describe the
problem and its importance, transformational leadership is studied by considering leadership theories. Issues such as the definition of
transformational leadership and its aspects are compared on the basis of the ideas of various connoisseurs and then it (transformational leadership) is examined in successful and
unsuccessful companies. According to the methodology, the
method of research, hypotheses, population and statistical sample
are investigated and research findings are analyzed by using descriptive and inferential statistical methods in the framework of
analytical tables. Finally, our conclusion is provided by considering the results of statistical tests. The final result shows that
transformational leadership is significantly higher in successful companies than unsuccessful ones P
Abstract: Software reliability, defined as the probability of a
software system or application functioning without failure or errors
over a defined period of time, has been an important area of research
for over three decades. Several research efforts aimed at developing
models to improve reliability are currently underway. One of the
most popular approaches to software reliability adopted by some of
these research efforts involves the use of operational profiles to
predict how software applications will be used. Operational profiles
are a quantification of usage patterns for a software application. The
research presented in this paper investigates an innovative multiagent
framework for automatic creation and management of
operational profiles for generic distributed systems after their release
into the market. The architecture of the proposed Operational Profile
MAS (Multi-Agent System) is presented along with detailed
descriptions of the various models arrived at following the analysis
and design phases of the proposed system. The operational profile in
this paper is extended to comprise seven different profiles. Further,
the criticality of operations is defined using a new composed metrics
in order to organize the testing process as well as to decrease the time
and cost involved in this process. A prototype implementation of the
proposed MAS is included as proof-of-concept and the framework is
considered as a step towards making distributed systems intelligent
and self-managing.
Abstract: This paper studies ruin probabilities in two discrete-time
risk models with premiums, claims and rates of interest modelled by
three autoregressive moving average processes. Generalized Lundberg
inequalities for ruin probabilities are derived by using recursive
technique. A numerical example is given to illustrate the applications
of these probability inequalities.
Abstract: Intrusion Detection Systems are increasingly a key
part of systems defense. Various approaches to Intrusion Detection
are currently being used, but they are relatively ineffective. Artificial
Intelligence plays a driving role in security services. This paper
proposes a dynamic model Intelligent Intrusion Detection System,
based on specific AI approach for intrusion detection. The
techniques that are being investigated includes neural networks and
fuzzy logic with network profiling, that uses simple data mining
techniques to process the network data. The proposed system is a
hybrid system that combines anomaly, misuse and host based
detection. Simple Fuzzy rules allow us to construct if-then rules that
reflect common ways of describing security attacks. For host based
intrusion detection we use neural-networks along with self
organizing maps. Suspicious intrusions can be traced back to its
original source path and any traffic from that particular source will
be redirected back to them in future. Both network traffic and system
audit data are used as inputs for both.
Abstract: In this paper, the action research driven design of a
context relevant, developmental peer review of teaching model, its
implementation strategy and its impact at an Australian university is
presented. PRO-Teaching realizes an innovative process that
triangulates contemporaneous teaching quality data from a range of
stakeholders including students, discipline academics, learning and
teaching expert academics, and teacher reflection to create reliable
evidence of teaching quality. Data collected over multiple classroom
observations allows objective reporting on development differentials
in constructive alignment, peer, and student evaluations. Further
innovation is realized in the application of this highly structured
developmental process to provide summative evidence of sufficient
validity to support claims for professional advancement and learning
and teaching awards. Design decision points and contextual triggers
are described within the operating domain. Academics and
developers seeking to introduce structured peer review of teaching
into their organization will find this paper a useful reference.
Abstract: As a part of the development of a numerical method of
close capture exhausts systems for machining devices, a test rig
recreating a situation similar to a grinding operation, but in a
perfectly controlled environment, is used. The properties of the
obtained spray of solid particles are initially characterized using
particle tracking velocimetry (PTV), in order to obtain input and
validation parameters for numerical simulations. The dispersion of a
tracer gas (SF6) emitted simultaneously with the particle jet is then
studied experimentally, as the dispersion of such a gas is
representative of that of finer particles, whose aerodynamic response
time is negligible. Finally, complete modeling of the test rig is
achieved to allow comparison with experimental results and thus to
progress towards validation of the models used to describe a twophase
flow generated by machining operation.
Abstract: This paper is described one of the intelligent control method in Autonomous systems, which is called fuzzy control to correct the three wheel omnidirectional robot movement while it make mistake to catch the target. Fuzzy logic is especially advantageous for problems that can not be easily represented by mathematical modeling because data is either unavailable, incomplete or the process is too complex. Such systems can be easily up grated by adding new rules to improve performance or add new features. In many cases , fuzzy control can be used to improve existing traditional controller systems by adding an extra layer of intelligence to the current control method. The fuzzy controller designed here is more accurate and flexible than the traditional controllers. The project is done at MRL middle size soccer robot team.
Abstract: This paper examines the problem of designing robust H controllers for for HIV/AIDS infection system with dual drug dosages described by a Takagi-Sugeno (S) fuzzy model. Based on a linear matrix inequality (LMI) approach, we develop an H controller which guarantees the L2-gain of the mapping from the exogenous input noise to the regulated output to be less than some prescribed value for the system. A sufficient condition of the controller for this system is given in term of Linear Matrix Inequalities (LMIs). The effectiveness of the proposed controller design methodology is finally demonstrated through simulation results. It has been shown that the anti-HIV vaccines are critically important in reducing the infected cells.
Abstract: A closed-loop controlled wireless power transmission circuit block for implantable biomedical applications is described in this paper. The circuit consists of one front-end rectifier, power management sub-block including bandgap reference and low drop-out regulators (LDOs) as well as transmission power detection / feedback circuits. Simulation result shows that the front-end rectifier achieves 80% power efficiency with 750-mV single-end peak-to-peak input voltage and 1.28-V output voltage under load current of 4 mA. The power management block can supply 1.8mA average load current under 1V consuming only 12μW power, which is equivalent to 99.3% power efficiency. The wireless power transmission block described in this paper achieves a maximum power efficiency of 80%. The wireless power transmission circuit block is designed and implemented using UMC 65-nm CMOS/RF process. It occupies 1 mm × 1.2 mm silicon area.