Abstract: RFID system, in which we give identification number to each item and detect it with radio frequency, supports more variable service than barcode system can do. For example, a refrigerator with RFID reader and internet connection will automatically notify expiration of food validity to us. But, in spite of its convenience, RFID system has some security threats, because anybody can get ID information of item easily. One of most critical threats is privacy invasion. Existing privacy protection schemes or systems have been proposed, and these schemes or systems defend normal users from attempts that any attacker tries to get information using RFID tag value. But, these systems still have weakness that attacker can get information using analogous value instead of original tag value. In this paper, we mention this type of attack more precisely and suggest 'Tag Broker Model', which can defend it. Tag broker in this model translates original tag value to random value, and user can only get random value. Attacker can not use analogous tag value, because he/she is not able to know original one from it.
Abstract: Public procurement is one of the most
important areas in the public sector that introduces a possibility for a
corruption. Due to the volume of the funds that are
allocated through this institution (in the EU countries it is between 10
– 15% of GDP), it has very serious implications for the efficiency of
public expenditures and the overall economic efficiency as
well. Indicators that are usually used for the measurement of the
corruption (such as Corruption Perceptions Index - CPI) show that
the worst situation is in the post-communist countries
and Mediterranean countries.
The presented paper uses the Czech Republic as an example of a
post-communist country and analyses the factors which influence
the scope of corruption in public procurement. Moreover, the
paper discusses indicators that could point at the public procurement
market inefficiency. The presented results show that post-communist
states use the institute of public contracts significantly more than the
old member countries of the continental Europe. It has a very
important implication because it gives more space for corruption.
Furthermore, it appears that the inefficient functioning of public
procurement market is clearly manifested in the low number of bids,
low level of market transparency and an ineffective control
system. Some of the observed indicators are statistically significantly
correlated with the CPI.
Abstract: Mammalian genomes contain large number of
retroelements (SINEs, LINEs and LTRs) which could affect
expression of protein coding genes through associated transcription
factor binding sites (TFBS). Activity of the retroelement-associated
TFBS in many genes is confirmed experimentally but their global
functional impact remains unclear. Human SINEs (Alu repeats) and
mouse SINEs (B1 and B2 repeats) are known to be clustered in GCrich
gene rich genome segments consistent with the view that they
can contribute to regulation of gene expression. We have shown
earlier that Alu are involved in formation of cis-regulatory modules
(clusters of TFBS) in human promoters, and other authors reported
that Alu located near promoter CpG islands have an increased
frequency of CpG dinucleotides suggesting that these Alu are
undermethylated. Human Alu and mouse B1/B2 elements have an
internal bipartite promoter for RNA polymerase III containing
conserved sequence motif called B-box which can bind basal
transcription complex TFIIIC. It has been recently shown that TFIIIC
binding to B-box leads to formation of a boundary which limits
spread of repressive chromatin modifications in S. pombe. SINEassociated
B-boxes may have similar function but conservation of
TFIIIC binding sites in SINEs located near mammalian promoters
has not been studied earlier. Here we analysed abundance and
distribution of retroelements (SINEs, LINEs and LTRs) in annotated
sequences of the Database of mammalian transcription start sites
(DBTSS). Fractions of SINEs in human and mouse promoters are
slightly lower than in all genome but >40% of human and mouse
promoters contain Alu or B1/B2 elements within -1000 to +200 bp
interval relative to transcription start site (TSS). Most of these SINEs
is associated with distal segments of promoters (-1000 to -200 bp
relative to TSS) indicating that their insertion at distances >200 bp
upstream of TSS is tolerated during evolution. Distribution of SINEs
in promoters correlates negatively with the distribution of CpG
sequences. Using analysis of abundance of 12-mer motifs from the
B1 and Alu consensus sequences in genome and DBTSS it has been
confirmed that some subsegments of Alu and B1 elements are poorly
conserved which depends in part on the presence of CpG
dinucleotides. One of these CpG-containing subsegments in B1
elements overlaps with SINE-associated B-box and it shows better
conservation in DBTSS compared to genomic sequences. It has been
also studied conservation in DBTSS and genome of the B-box
containing segments of old (AluJ, AluS) and young (AluY) Alu
repeats and found that CpG sequence of the B-box of old Alu is
better conserved in DBTSS than in genome. This indicates that Bbox-
associated CpGs in promoters are better protected from
methylation and mutation than B-box-associated CpGs in genomic
SINEs. These results are consistent with the view that potential
TFIIIC binding motifs in SINEs associated with human and mouse
promoters may be functionally important. These motifs may protect
promoters from repressive histone modifications which spread from
adjacent sequences. This can potentially explain well known
clustering of SINEs in GC-rich gene rich genome compartments and
existence of unmethylated CpG islands.
Abstract: In this paper, we validate crater detection in moon surface image using FLDA. This proposal assumes that it is applied to SLIM (Smart Lander for Investigating Moon) project aiming at the pin-point landing to the moon surface. The point where the lander should land is judged by the position relations of the craters obtained via camera, so the real-time image processing becomes important element. Besides, in the SLIM project, 400kg-class lander is assumed, therefore, high-performance computers for image processing cannot be equipped. We are studying various crater detection methods such as Haar-Like features, LBP, and PCA. And we think these methods are appropriate to the project, however, to identify the unlearned images obtained by actual is insufficient. In this paper, we examine the crater detection using FLDA, and compare with the conventional methods.
Abstract: This paper proposes an adaptive sliding mode
controller which combines adaptive control and sliding
mode control to control a nonlinear robotic manipulator
with uncertain parameters. We use an adaptive algorithm
based on the concept of sliding mode control to alleviate the
chattering phenomenon of control input. Adaptive laws are
developed to obtain the gain of switching input and the
boundary layer parameters. The stability and convergence
of the robotic manipulator control system are guaranteed
by applying the Lyapunov theorem. Simulation results
demonstrate that the chattering of control input can be
alleviated effectively. The proposed controller scheme can
assure robustness against a large class of uncertainties and
achieve good trajectory tracking performance.
Abstract: Objective of this study was to study and compare the effectiveness of inspectors who had different workloads for feed forward and feedback training. The visual search task was simulated to search for specified alphabets called defects. These defects were included of four alphabets in Thai and English such as s ภ, ถ, X, and V with different background. These defects were combined in the specified alphabets and were given the different three backgrounds i.e., Thai, English, and mixed English and Thai alphabets. Sixty students were chosen as a sample in this study and test for final selection subject. Finally, five subjects were taken into testing process. They were asked to search for defects after they were provided basic information. Experiment design was used factorial design and subjects were trained for feed forward and the feedback training. The results show that both trainings were affected on mean search time. It was also found that the feedback training can increase the effectiveness of visual inspectors rather than the feed forward training significantly different at the level of .05
Abstract: A novel application of neural network approach to
fault classification and fault location of Medium voltage cables is
demonstrated in this paper. Different faults on a protected cable
should be classified and located correctly. This paper presents the use
of neural networks as a pattern classifier algorithm to perform these
tasks. The proposed scheme is insensitive to variation of different
parameters such as fault type, fault resistance, and fault inception
angle. Studies show that the proposed technique is able to offer high
accuracy in both of the fault classification and fault location tasks.
Abstract: In this paper, an magnetorheological (MR) mount with
fuzzy sliding mode controller (FSMC) is studied for vibration
suppression when the system is subject to base excitations. In recent
years, magnetorheological fluids are becoming a popular material in
the field of the semi-active control. However, the dynamic equation of
an MR mount is highly nonlinear and it is difficult to identify. FSMC
provides a simple method to achieve vibration attenuation of the
nonlinear system with uncertain disturbances. This method is capable
of handling the chattering problem of sliding mode control effectively
and the fuzzy control rules are obtained by using the Lyapunov
stability theory. The numerical simulations using one-dimension and
two-dimension FSMC show effectiveness of the proposed controller
for vibration suppression. Further, the well-known skyhook control
scheme and an adaptive sliding mode controller are also included in
the simulation for comparison with the proposed FSMC.
Abstract: Prediction of sinusoidal signals with time-varying
frequencies has been an important research topic in power electronics
systems. To solve this problem, we propose a new fuzzy
predictive filtering scheme, which is based on a Finite Impulse
Response (FIR) filter bank. Fuzzy logic is introduced here to provide
appropriate interpolation of individual filter outputs. Therefore,
instead of regular 'hard' switching, our method has the advantageous
'soft' switching among different filters. Simulation
comparisons between the fuzzy predictive filtering and conventional
filter bank-based approach are made to demonstrate that the
new scheme can achieve an enhanced prediction performance for
slowly changing sinusoidal input signals.
Abstract: Studies in economics domain tried to reveal the correlation between stock markets. Since the globalization era, interdependence between stock markets becomes more obvious. The Dynamic Interaction Network (DIN) algorithm, which was inspired by a Gene Regulatory Network (GRN) extraction method in the bioinformatics field, is applied to reveal important and complex dynamic relationship between stock markets. We use the data of the stock market indices from eight countries around the world in this study. Our results conclude that DIN is able to reveal and model patterns of dynamic interaction from the observed variables (i.e. stock market indices). Furthermore, it is also found that the extracted network models can be utilized to predict movement of the stock market indices with a considerably good accuracy.
Abstract: This paper presents comparison among methods of
determination of the characteristic polynomial coefficients. First, the
resultant systems from the methods are compared based on frequency
criteria such as the closed loop bandwidth, gain and phase margins.
Then the step responses of the resultant systems are compared on the
basis of the transient behavior criteria including overshoot, rise time,
settling time and error (via IAE, ITAE, ISE and ITSE integral
indices). Also relative stability of the systems is compared together.
Finally the best choices in regards to the above diverse criteria are
presented.
Abstract: This paper proposes the use of metrics in design space exploration that highlight where in the structure of the model and at what point in the behaviour, prevention is needed against transient faults. Previous approaches to tackle transient faults focused on recovery after detection. Almost no research has been directed towards preventive measures. But in real-time systems, hard deadlines are performance requirements that absolutely must be met and a missed deadline constitutes an erroneous action and a possible system failure. This paper proposes the use of metrics to assess the system design to flag where transient faults may have significant impact. These tools then allow the design to be changed to minimize that impact, and they also flag where particular design techniques – such as coding of communications or memories – need to be applied in later stages of design.
Abstract: This paper presents an optimal and unsupervised satellite image segmentation approach based on Pearson system and k-Means Clustering Algorithm Initialization. Such method could be considered as original by the fact that it utilised K-Means clustering algorithm for an optimal initialisation of image class number on one hand and it exploited Pearson system for an optimal statistical distributions- affectation of each considered class on the other hand. Satellite image exploitation requires the use of different approaches, especially those founded on the unsupervised statistical segmentation principle. Such approaches necessitate definition of several parameters like image class number, class variables- estimation and generalised mixture distributions. Use of statistical images- attributes assured convincing and promoting results under the condition of having an optimal initialisation step with appropriated statistical distributions- affectation. Pearson system associated with a k-means clustering algorithm and Stochastic Expectation-Maximization 'SEM' algorithm could be adapted to such problem. For each image-s class, Pearson system attributes one distribution type according to different parameters and especially the Skewness 'β1' and the kurtosis 'β2'. The different adapted algorithms, K-Means clustering algorithm, SEM algorithm and Pearson system algorithm, are then applied to satellite image segmentation problem. Efficiency of those combined algorithms was firstly validated with the Mean Quadratic Error 'MQE' evaluation, and secondly with visual inspection along several comparisons of these unsupervised images- segmentation.
Abstract: This paper summarizes and compares approaches to
solving the knapsack problem and its known application in capital
budgeting. The first approach uses deterministic methods and can be
applied to small-size tasks with a single constraint. We can also
apply commercial software systems such as the GAMS modelling
system. However, because of NP-completeness of the problem, more
complex problem instances must be solved by means of heuristic
techniques to achieve an approximation of the exact solution in a
reasonable amount of time. We show the problem representation and
parameter settings for a genetic algorithm framework.
Abstract: In this paper, we have presented a new multivariate fuzzy time series forecasting method. This method assumes mfactors with one main factor of interest. History of past three years is used for making new forecasts. This new method is applied in forecasting total number of car accidents in Belgium using four secondary factors. We also make comparison of our proposed method with existing methods of fuzzy time series forecasting. Experimentally, it is shown that our proposed method perform better than existing fuzzy time series forecasting methods. Practically, actuaries are interested in analysis of the patterns of causalities in road accidents. Thus using fuzzy time series, actuaries can define fuzzy premium and fuzzy underwriting of car insurance and life insurance for car insurance. National Institute of Statistics, Belgium provides region of risk classification for each road. Thus using this risk classification, we can predict premium rate and underwriting of insurance policy holders.
Abstract: Unmanned Aerial Vehicles (UAVs) have gained tremendous importance, in both Military and Civil, during first decade of this century. In a UAV, onboard computer (autopilot) autonomously controls the flight and navigation of the aircraft. Based on the aircraft role and flight envelope, basic to complex and sophisticated controllers are used to stabilize the aircraft flight parameters. These controllers constitute the autopilot system for UAVs. The autopilot systems, most commonly, provide lateral and longitudinal control through Proportional-Integral-Derivative (PID) controllers or Phase-lead or Lag Compensators. Various techniques are commonly used to ‘tune’ gains of these controllers. Some techniques used are, in-flight step-by-step tuning, software-in-loop or hardware-in-loop tuning methods. Subsequently, numerous in-flight tests are required to actually ‘fine-tune’ these gains. However, an optimization-based tuning of these PID controllers or compensators, as presented in this paper, can greatly minimize the requirement of in-flight ‘tuning’ and substantially reduce the risks and cost involved in flight-testing.
Abstract: In this paper we introduced new wavelet based algorithm for speckle reduction of synthetic aperture radar images, which uses combination of undecimated wavelet transformation, wiener filter (which is an adaptive filter) and mean filter. Further more instead of using existing thresholding techniques such as sure shrinkage, Bayesian shrinkage, universal thresholding, normal thresholding, visu thresholding, soft and hard thresholding, we use brute force thresholding, which iteratively run the whole algorithm for each possible candidate value of threshold and saves each result in array and finally selects the value for threshold that gives best possible results. That is why it is slow as compared to existing thresholding techniques but gives best results under the given algorithm for speckle reduction.
Abstract: An optimal control strategy based on simple model, a
single phase unity power factor boost converter is presented with an
evaluation of first order differential equations. This paper presents an
evaluation of single phase boost converter having power factor
correction. The simple discrete model of boost converter is formed
and optimal control is obtained, digital PI is adopted to adjust control
error. The method of instantaneous current control is proposed in this
paper for its good tracking performance of dynamic response. The
simulation and experimental results verified our design.
Abstract: Adsorption of proteins onto a solid surface is believed to be the initial and controlling step in biofouling. A better knowledge of the fouling process can be obtained by controlling the formation of the first protein layer at a solid surface. A number of methods have been investigated to inhibit adsorption of proteins. In this study, the adsorption kinetics of
Abstract: Attack graph is an integral part of modeling the
overview of network security. System administrators use attack graphs to determine how vulnerable their systems are and to determine
what security measures to deploy to defend their systems. Previous methods on AGG(attack graphs generation) are aiming at
the whole network, which makes the process of AGG complex and
non-scalable. In this paper, we propose a new approach which is
simple and scalable to AGG by decomposing the whole network into atomic domains. Each atomic domain represents a host with a specific privilege. Then the process for AGG is achieved by communications
among all the atomic domains. Our approach simplifies the process
of design for the whole network, and can gives the attack graphs including each attack path for each host, and when the network changes we just carry on the operations of corresponding atomic
domains which makes the process of AGG scalable.