Abstract: Natural disasters, including earthquake, kill many people around the world every year. Society rescue actions, which start after the earthquake and are called LAST in abbreviation, include locating, access, stabilization and transportation. In the present article, we have studied the process of local accessibility to the injured and transporting them to health care centers. With regard the heavy traffic load due to earthquake, the destruction of connecting roads and bridges and the heavy debris in alleys and street, which put the lives of the injured and the people buried under the debris in danger, accelerating the rescue actions and facilitating the accessibilities are of great importance, obviously. Tehran, the capital of Iran, is among the crowded cities in the world and is the center of extensive economic, political, cultural and social activities. Tehran has a population of about 9.5 millions and because of the immigration of people from the surrounding cities. Furthermore, considering the fact that Tehran is located on two important and large faults, a 6 Richter magnitude earthquake in this city could lead to the greatest catastrophe during the entire human history. The present study is a kind of review and a major part of the required information for it, has been obtained from libraries all of the rescue vehicles around the world, including rescue helicopters, ambulances, fire fighting vehicles and rescue boats, and their applied technology, and also the robots specifically designed for the rescue system and the advantages and disadvantages of them, have been investigated. The studies show that there is a significant relationship between the rescue team-s arrival time at the incident zone and the number of saved people; so that, if the duration of burial under debris 30 minutes, the probability of survival is %99.3, after a day is %81, after 2days is %19 and after 5days is %7.4. The exiting transport systems all have some defects. If these defects are removed, more people could be saved each hour and the preparedness against natural disasters is increased. In this study, transport system has been designed for the rescue team and the injured; which could carry the rescue team to the incident zone and the injured to the health care centers. In addition, this system is able to fly in the air and move on the earth as well; so that the destruction of roads and the heavy traffic load could not prevent the rescue team from arriving early at the incident zone. The system also has the equipment required firebird for debris removing, optimum transport of the injured and first aid.
Abstract: In this paper, the effect of atmospheric turbulence on
bit error probability in free-space optical CDMA scheme with
Sequence Inverse Keyed (SIK) optical correlator receiver is analyzed.
Here Intensity Modulation scheme is considered for transmission.
The turbulence induced fading is described by the newly introduced
gamma-gamma pdf[1] as a tractable mathematical model for
atmospheric turbulence. Results are evaluated with Gold and Kasami
code & it is shown that Gold sequence can be used for more
efficient transmission than Kasami sequence in an atmospheric
turbulence channel.
Abstract: Fungal infections are becoming more common and the
range of susceptible individuals has expanded. While Candida
albicans remains the most common infective species, other Candida
spp. are becoming increasingly significant. In a range of large-scale
studies of candidaemia between 1999 and 2006, about 52% of 9717
cases involved C. albicans, about 30% involved either C. glabrata or
C. parapsilosis and less than 15% involved C. tropicalis, C. krusei or
C. guilliermondii. However, the probability of mortality within 30
days of infection with a particular species was at least 40% for C.
tropicalis, C. albicans, C. glabrata and C. krusei and only 22% for
C. parapsilopsis. Clinical isolates of Candida spp. grew at rates
ranging from 1.65 h-1 to 4.9 h-1. Three species (C. krusei, C. albicans
and C. glabrata) had relatively high growth rates (μm > 4 h-1), C.
tropicalis and C. dubliniensis grew moderately quickly (Ôëê 3 h-1) and
C. parapsilosis and C. guilliermondii grew slowly (< 2 h-1). Based
on these data, the log of the odds of mortality within 30 days of
diagnosis was linearly related to μm. From this the underlying
probability of mortality is 0.13 (95% CI: 0.10-0.17) and it increases
by about 0.09 ± 0.02 for each unit increase in μm. Given that the
overall crude mortality is about 0.36, the growth of Candida spp.
approximately doubles the rate, consistent with the results of larger
case-matched studies of candidaemia.
Abstract: The proposed system identifies the species of the wood
using the textural features present in its barks. Each species of a wood
has its own unique patterns in its bark, which enabled the proposed
system to identify it accurately. Automatic wood recognition system
has not yet been well established mainly due to lack of research in this
area and the difficulty in obtaining the wood database. In our work, a
wood recognition system has been designed based on pre-processing
techniques, feature extraction and by correlating the features of those
wood species for their classification. Texture classification is a problem
that has been studied and tested using different methods due to its
valuable usage in various pattern recognition problems, such as wood
recognition, rock classification. The most popular technique used
for the textural classification is Gray-level Co-occurrence Matrices
(GLCM). The features from the enhanced images are thus extracted
using the GLCM is correlated, which determines the classification
between the various wood species. The result thus obtained shows a
high rate of recognition accuracy proving that the techniques used in
suitable to be implemented for commercial purposes.
Abstract: e-mail has become an important means of electronic
communication but the viability of its usage is marred by Unsolicited
Bulk e-mail (UBE) messages. UBE consists of many types
like pornographic, virus infected and 'cry-for-help' messages as well
as fake and fraudulent offers for jobs, winnings and medicines. UBE
poses technical and socio-economic challenges to usage of e-mails.
To meet this challenge and combat this menace, we need to
understand UBE. Towards this end, the current paper presents a
content-based textual analysis of nearly 3000 winnings-announcing
UBE. Technically, this is an application of Text Parsing and
Tokenization for an un-structured textual document and we approach
it using Bag Of Words (BOW) and Vector Space Document Model
techniques. We have attempted to identify the most frequently
occurring lexis in the winnings-announcing UBE documents. The
analysis of such top 100 lexis is also presented. We exhibit the
relationship between occurrence of a word from the identified lexisset
in the given UBE and the probability that the given UBE will be
the one announcing fake winnings. To the best of our knowledge and
survey of related literature, this is the first formal attempt for
identification of most frequently occurring lexis in winningsannouncing
UBE by its textual analysis. Finally, this is a sincere
attempt to bring about alertness against and mitigate the threat of
such luring but fake UBE.
Abstract: Work Breakdown Structure (WBS) is one of the
most vital planning processes of the project management since it
is considered to be the fundamental of other processes like
scheduling, controlling, assigning responsibilities, etc. In fact
WBS or activity list is the heart of a project and omission of a
simple task can lead to an irrecoverable result. There are some
tools in order to generate a project WBS. One of the most
powerful tools is mind mapping which is the basis of this article.
Mind map is a method for thinking together and helps a project
manager to stimulate the mind of project team members to
generate project WBS. Here we try to generate a WBS of a
sample project involving with the building construction using the
aid of mind map and the artificial intelligence (AI) programming
language. Since mind map structure can not represent data in a
computerized way, we convert it to a semantic network which can
be used by the computer and then extract the final WBS from the
semantic network by the prolog programming language. This
method will result a comprehensive WBS and decrease the
probability of omitting project tasks.
Abstract: In this paper we explore the application of a formal proof system to verification problems in cryptography. Cryptographic properties concerning correctness or security of some cryptographic algorithms are of great interest. Beside some basic lemmata, we explore an implementation of a complex function that is used in cryptography. More precisely, we describe formal properties of this implementation that we computer prove. We describe formalized probability distributions (o--algebras, probability spaces and condi¬tional probabilities). These are given in the formal language of the formal proof system Isabelle/HOL. Moreover, we computer prove Bayes' Formula. Besides we describe an application of the presented formalized probability distributions to cryptography. Furthermore, this paper shows that computer proofs of complex cryptographic functions are possible by presenting an implementation of the Miller- Rabin primality test that admits formal verification. Our achievements are a step towards computer verification of cryptographic primitives. They describe a basis for computer verification in cryptography. Computer verification can be applied to further problems in crypto-graphic research, if the corresponding basic mathematical knowledge is available in a database.
Abstract: The goal of this research is discovering the
determinants of the success or failure of external cooperation in small
and medium enterprises (SMEs). For this, a survey was given to 190
SMEs that experienced external cooperation within the last 3 years. A
logistic regression model was used to derive organizational or strategic
characteristics that significantly influence whether external
collaboration of domestic SMEs is successful or not. Results suggest
that research and development (R&D) features in general
characteristics (both idea creation and discovering market
opportunities) that focused on and emphasized indirected-market
stakeholders (such as complementary companies and affiliates) and
strategies in innovative strategic characteristics raise the probability of
successful external cooperation. This can be used meaningfully to
build a policy or strategy for inducing successful external cooperation
or to understand the innovation of SMEs.
Abstract: One major source of performance decline in speaker
recognition system is channel mismatch between training and testing.
This paper focuses on improving channel robustness of speaker
recognition system in two aspects of channel compensation technique
and channel robust features. The system is text-independent speaker
identification system based on two-stage recognition. In the aspect of
channel compensation technique, this paper applies MAP (Maximum
A Posterior Probability) channel compensation technique, which was
used in speech recognition, to speaker recognition system. In the
aspect of channel robust features, this paper introduces
pitch-dependent features and pitch-dependent speaker model for the
second stage recognition. Based on the first stage recognition to
testing speech using GMM (Gaussian Mixture Model), the system
uses GMM scores to decide if it needs to be recognized again. If it
needs to, the system selects a few speakers from all of the speakers
who participate in the first stage recognition for the second stage
recognition. For each selected speaker, the system obtains 3
pitch-dependent results from his pitch-dependent speaker model, and
then uses ANN (Artificial Neural Network) to unite the 3
pitch-dependent results and 1 GMM score for getting a fused result.
The system makes the second stage recognition based on these fused
results. The experiments show that the correct rate of two-stage
recognition system based on MAP channel compensation technique
and pitch-dependent features is 41.7% better than the baseline system
for closed-set test.
Abstract: The cardiovascular system has become the most
important subject of clinical research, particularly measurement of
arterial blood flow. Therefore correct determination of arterial
diameter is crucial. We propose a novel, semi-automatic method for
artery lumen detection. The method is based on Gaussian probability
function. Usability of our proposed method was assessed by
analyzing ultrasound B-mode CFA video sequences acquired from
eleven healthy volunteers. The correlation coefficient between the
manual and semi-automatic measurement of arterial diameter was
0.996. Our proposed method for detecting artery boundary is novel
and accurate enough for the measurement of artery diameter.
Abstract: Hot tear cracking and residual stress are two different consequences of thermal stress both of which can be considered as casting problem. The purpose of the present study is simulation of the effect of casting shape characteristic on hot tearing and residual stress. This study shows that the temperature range for simulation of hot tearing and residual stress are different. In this study, in order to study the development of thermal stress and to predict the hot tearing and residual stress of shaped casting, MAGMASOFT simulation program was used. The strategy of this research was the prediction of hot tear location using pinpointing hot spot and thermal stress concentration zones. The results shows that existing of stress concentration zone increases the hot tearing probability and consequently reduces the amount of remaining residual stress in casting parts.
Abstract: A generalized Digital Modulation Identification algorithm for adaptive demodulator has been developed and presented in this paper. The algorithm developed is verified using wavelet Transform and histogram computation to identify QPSK and QAM with GMSK and M–ary FSK modulations. It has been found that the histogram peaks simplifies the procedure for identification. The simulated results show that the correct modulation identification is possible to a lower bound of 5 dB and 12 dB for GMSK and QPSK respectively. When SNR is above 5 dB the throughput of the proposed algorithm is more than 97.8%. The receiver operating characteristics (ROC) has been computed to measure the performance of the proposed algorithm and the analysis shows that the probability of detection (Pd) drops rapidly when SNR is 5 dB and probability of false alarm (Pf) is smaller than 0.3. The performance of the proposed algorithm has been compared with existing methods and found it will identify all digital modulation schemes with low SNR.
Abstract: Purpose of this work is to develop an automatic classification system that could be useful for radiologists in the breast cancer investigation. The software has been designed in the framework of the MAGIC-5 collaboration. In an automatic classification system the suspicious regions with high probability to include a lesion are extracted from the image as regions of interest (ROIs). Each ROI is characterized by some features based generally on morphological lesion differences. A study in the space features representation is made and some classifiers are tested to distinguish the pathological regions from the healthy ones. The results provided in terms of sensitivity and specificity will be presented through the ROC (Receiver Operating Characteristic) curves. In particular the best performances are obtained with the Neural Networks in comparison with the K-Nearest Neighbours and the Support Vector Machine: The Radial Basis Function supply the best results with 0.89 ± 0.01 of area under ROC curve but similar results are obtained with the Probabilistic Neural Network and a Multi Layer Perceptron.
Abstract: A new class of percolation model in complex networks,
in which nodes are characterized by hidden variables reflecting the
properties of nodes and the occupied probability of each link is
determined by the hidden variables of the end nodes, is studied
in this paper. By the mean field theory, the analytical expressions
for the phase of percolation transition is deduced. It is determined
by the distribution of the hidden variables for the nodes and the
occupied probability between pairs of them. Moreover, the analytical
expressions obtained are checked by means of numerical simulations
on a particular model. Besides, the general model can be applied
to describe and control practical diffusion models, such as disease
diffusion model, scientists cooperation networks, and so on.
Abstract: In this paper, 3X3 routing nodes are proposed to
provide speedup and parallel processing capability in Data Vortex
network architectures. The new design not only significantly
improves network throughput and latency, but also eliminates the
need for distributive traffic control mechanism originally embedded
among nodes and the need for nodal buffering. The cost effectiveness
is studied by a comparison study with the previously proposed 2-
input buffered networks, and considerable performance enhancement
can be achieved with similar or lower cost of hardware. Unlike
previous implementation, the network leaves small probability of
contention, therefore, the packet drop rate must be kept low for such
implementation to be feasible and attractive, and it can be achieved
with proper choice of operation conditions.
Abstract: In this paper we introduce new data oriented modeling
of uniform random variable well-matched with computing systems. Due to this conformity with current computers structure, this modeling will be efficiently used in statistical inference.
Abstract: Generation system reliability assessment is an
important task which can be performed using deterministic or
probabilistic techniques. The probabilistic approaches have
significant advantages over the deterministic methods. However,
more complicated modeling is required by the probabilistic
approaches. Power generation model is a basic requirement for this
assessment. One form of the generation models is the well known
capacity outage probability table (COPT). Different analytical
techniques have been used to construct the COPT. These approaches
require considerable mathematical modeling of the generating units.
The unit-s models are combined to build the COPT which will add
more burdens on the process of creating the COPT. Decimal to
Binary Conversion (DBC) technique is widely and commonly applied
in electronic systems and computing This paper proposes a novel
utilization of the DBC to create the COPT without engaging in
analytical modeling or time consuming simulations. The simple
binary representation , “0 " and “1 " is used to model the states o f
generating units. The proposed technique is proven to be an effective
approach to build the generation model.
Abstract: The objective of the present research manuscript is to
perform parametric, nonparametric, and decision tree analysis to
evaluate two treatments that are being used for breast cancer patients.
Our study is based on utilizing real data which was initially used in
“Tamoxifen with or without breast irradiation in women of 50 years
of age or older with early breast cancer" [1], and the data is supplied
to us by N.A. Ibrahim “Decision tree for competing risks survival
probability in breast cancer study" [2]. We agree upon certain aspects
of our findings with the published results. However, in this
manuscript, we focus on relapse time of breast cancer patients instead
of survival time and parametric analysis instead of semi-parametric
decision tree analysis is applied to provide more precise
recommendations of effectiveness of the two treatments with respect
to reoccurrence of breast cancer.
Abstract: In order to derive important parameters concerning
mobile subscriber MS with ongoing calls in Low Earth Orbit Mobile
Satellite Systems LEO MSSs, a positioning system had to be
integrated into MSS in order to localize mobile subscribers MSs and
track them during the connection. Such integration is regarded as a
complex implementation. We propose in this paper a novel method
based on advantages of mobility model of Low Earth Orbit Mobile
Satellite System LEO MSS which allows the evaluation of instant of
subsequent handover of a MS even if its location is unknown. This
method is utilized to propose a Dynamic Channel Reservation DCRlike
scheme based on the DCR scheme previously proposed in
literature. Results presented show that DCR-like technique gives
different QoS performance than DCR. Indeed, an improve in
handover blocking probability and an increase in new call blocking
probability are observed for the DCR-like technique.
Abstract: In this paper we present an extension to Vision Based
LRTA* (VLRTA*) known as Vision Based Moving Target Search
(VMTS) for capturing unknown moving target in unknown territory
with randomly generated obstacles. Target position is unknown to the
agents and they cannot predict its position using any probability
method. Agents have omni directional vision but can see in one
direction at some point in time. Agent-s vision will be blocked by the
obstacles in the search space so agent can not see through the
obstacles. Proposed algorithm is evaluated on large number of
scenarios. Scenarios include grids of sizes from 10x10 to 100x100.
Grids had obstacles randomly placed, occupying 0% to 50%, in
increments of 10%, of the search space. Experiments used 2 to 9
agents for each randomly generated maze with same obstacle ratio.
Observed results suggests that VMTS is effective in locate target
time, solution quality and virtual target. In addition, VMTS becomes
more efficient if the number of agents is increased with proportion to
obstacle ratio.