Abstract: Headphones and earphones have many extremely small
holes or narrow slits; they use sound-absorbing or porous material (i.e.,
dampers) to suppress vibratory system resonance. The air viscosity in
these acoustic paths greatly affects the acoustic properties. Simulation
analyses such as the finite element method (FEM) therefore require
knowledge of the material properties of sound-absorbing or porous
materials, such as the characteristic impedance and propagation
constant. The transfer function method using acoustic tubes is a widely
known measuring method, but there is no literature on taking
measurements up to the audible range. To measure the acoustic
properties at high-range frequencies, the acoustic tubes that form the
measuring device need to be narrowed, and the distance between the
two microphones needs to be reduced. However, when the tubes are
narrowed, the characteristic impedance drops below the air impedance.
In this study, we considered the effect of air viscosity in an acoustical
tube, introduced a theoretical formula for this effect in the form of
complex density and complex sonic velocity, and verified the
theoretical formula. We also conducted an experiment and observed
the effect from air viscosity in the actual measurements.
Abstract: Multiple-input multiple-output (MIMO) systems are
widely in use to improve quality, reliability of wireless transmission
and increase the spectral efficiency. However in MIMO systems,
multiple copies of data are received after experiencing various
channel effects. The limitations on account of complexity due to
number of antennas in case of conventional decoding techniques have
been looked into. Accordingly we propose a modified sphere decoder
(MSD-1) algorithm with lower complexity and give rise to system
with high spectral efficiency. With the aim to increase signal
diversity we apply rotated quadrature amplitude modulation (QAM)
constellation in multi dimensional space. Finally, we propose a new
architecture involving space time trellis code (STTC) concatenated
with space time block code (STBC) using MSD-1 at the receiver for
improving system performance. The system gains have been verified
with channel state information (CSI) errors.
Abstract: Machine tools are improved capacity remarkably during the 20th century. Improving the precision of machine tools are related with precision of products and accurate processing is always associated with the subject of interest. There are a lot of the elements that determine the precision of the machine, as guides, motors, structure, control, etc. In this paper we focused on the phenomenon that vertical movement system has worse precision than horizontal movement system even they were made up with same components. The vertical movement system needs to be studied differently from the horizontal movement system to develop its precision. The vertical movement system has load on its transfer direction and it makes the movement system weak in precision than the horizontal one. Some machines have mechanical counter balance, hydraulic or pneumatic counter balance to compensate the weight of the machine head. And there is several type of compensating the weight. It can push the machine head and also can use chain or wire lope to transfer the compensating force from counter balance to machine head. According to the type of compensating, there could be error from friction, pressure error of hydraulic or pressure control error. Also according to what to use for transferring the compensating force, transfer error of compensating force could be occur.
Abstract: Iris-based biometric system is gaining its importance in several applications. However, processing of iris biometric is a challenging and time consuming task. Detection of iris part in an eye image poses a number of challenges such as, inferior image quality, occlusion of eyelids and eyelashes etc. Due to these problems it is not possible to achieve 100% accuracy rate in any iris-based biometric authentication systems. Further, iris detection is a computationally intensive task in the overall iris biometric processing. In this paper, we address these two problems and propose a technique to localize iris part efficiently and accurately. We propose scaling and color level transform followed by thresholding, finding pupil boundary points for pupil boundary detection and dilation, thresholding, vertical edge detection and removal of unnecessary edges present in the eye images for iris boundary detection. Scaling reduces the search space significantly and intensity level transform is helpful for image thresholding. Experimental results show that our approach is comparable with the existing approaches. Following our approach it is possible to detect iris part with 95-99% accuracy as substantiated by our experiments on CASIA Ver-3.0, ICE 2005, UBIRIS, Bath and MMU iris image databases.
Abstract: In this paper, we propose a method of resolving dependency ambiguities of Korean subordinate clauses based on Support Vector Machines (SVMs). Dependency analysis of clauses is well known to be one of the most difficult tasks in parsing sentences, especially in Korean. In order to solve this problem, we assume that the dependency relation of Korean subordinate clauses is the dependency relation among verb phrase, verb and endings in the clauses. As a result, this problem is represented as a binary classification task. In order to apply SVMs to this problem, we selected two kinds of features: static and dynamic features. The experimental results on STEP2000 corpus show that our system achieves the accuracy of 73.5%.
Abstract: Load balancing in distributed computer systems is the
process of redistributing the work load among processors in the
system to improve system performance. Most of previous research in
using fuzzy logic for the purpose of load balancing has only
concentrated in utilizing fuzzy logic concepts in describing
processors load and tasks execution length. The responsibility of the
fuzzy-based load balancing process itself, however, has not been
discussed and in most reported work is assumed to be performed in a
distributed fashion by all nodes in the network. This paper proposes a
new fuzzy dynamic load balancing algorithm for homogenous
distributed systems. The proposed algorithm utilizes fuzzy logic in
dealing with inaccurate load information, making load distribution
decisions, and maintaining overall system stability. In terms of
control, we propose a new approach that specifies how, when, and by
which node the load balancing is implemented. Our approach is
called Centralized-But-Distributed (CBD).
Abstract: Camptothecin (CPT) is a cytotoxic quinoline alkaloid,
which inhibits the DNA enzyme topoisomerase I (topo I). It was
discovered in 1966 by M. E. Wall and M. C. Wani in systematic
screening of natural products for anticancer drugs. It was isolated
from the bark and stem of Camptotheca acuminata (Camptotheca,
Happy tree), a tree native in China. CPT showed remarkable
anticancer activity in preliminary clinical trials but also low
solubility and (high) adverse drug reaction. Because of these
disadvantages synthetic and medicinal chemists have developed
numerous syntheses of Camptothecine [1][2][3] and various
derivatives to increase the benefits of the chemical, with good results.
In our method CPT analogues has be six steps starting from available
material DL Malic acid.
Abstract: In this paper we present a Adaptive Neuro-Fuzzy
System (ANFIS) with inputs the lagged dependent variable for the
prediction of Gross domestic Product growth rate in six countries.
We compare the results with those of Autoregressive (AR) model.
We conclude that the forecasting performance of neuro-fuzzy-system
in the out-of-sample period is much more superior and can be a very
useful alternative tool used by the national statistical services and the
banking and finance industry.
Abstract: Hollywood has produced various blockbusters on the
subject of disasters. Entering the 2000s, disaster films began to be
produced in the East Asian region as well, and as most of them were
successful, disaster films have settled as a popular genre in the region.
East Asian disaster films utilize a plot structure similar to Hollywood
films but, at the same time, represent East Asian people-s unique value
system. East Asian people-s social behavior pattern defined as
collectivism is a characteristic that distinguishes this region from other
cultural regions. In order to examine Confucian culture in disaster
films on the premise of the difference, the author conducts this
research as follows.This study first reviews the concepts disaster and
disaster film, and understands the genre through analyzing the
narrative structure and style. In addition, it discusses collectivism, a
characteristic of the East Asian region distinguished from the West,
and investigates Confucian culture in films and examines differences
among Korean, Chinese and Japanese Confucianism. Films selected
for this study are Tidal Wave (Korea, 2009), After Shock (China,
2006), and The Sinking of Japan (Japan, 2006). Using the characters in
these films, we analyze how Confucian thought is described and
reproduced.
Abstract: The growth of open networks created the interest to
commercialise it. The establishment of an electronic business
mechanism must be accompanied by a digital – electronic payment
system to transfer the value of transactions. Financial organizations
are requested to offer a secure e-payment synthesis with equivalent
level of security served in conventional paper-based payment
transactions. PKI, which is functioning as a chain of trust in security
architecture, can enable security services of cryptography to epayments,
in order to take advantage of the wider base either of
customer or of trading partners and the reduction of cost transaction
achieved by the use of Internet channels. The paper addresses the
possibilities and the implementation suggestions of PKI in relevance
to electronic payments by suggesting a framework that should be
followed.
Abstract: For a spatiotemporal database management system,
I/O cost of queries and other operations is an important performance
criterion. In order to optimize this cost, an intense research on
designing robust index structures has been done in the past decade.
With these major considerations, there are still other design issues
that deserve addressing due to their direct impact on the I/O cost.
Having said this, an efficient buffer management strategy plays a key
role on reducing redundant disk access. In this paper, we proposed an
efficient buffer strategy for a spatiotemporal database index
structure, specifically indexing objects moving over a network of
roads. The proposed strategy, namely MONPAR, is based on the data
type (i.e. spatiotemporal data) and the structure of the index
structure. For the purpose of an experimental evaluation, we set up a
simulation environment that counts the number of disk accesses
while executing a number of spatiotemporal range-queries over the
index. We reiterated simulations with query sets with different
distributions, such as uniform query distribution and skewed query
distribution. Based on the comparison of our strategy with wellknown
page-replacement techniques, like LRU-based and Prioritybased
buffers, we conclude that MONPAR behaves better than its
competitors for small and medium size buffers under all used query-distributions.
Abstract: This paper presents a SCR-based ESD protection devices for I/O clamp and power rail clamp, respectably. These devices have a low trigger voltage and high holding voltage characteristics than conventional SCR device. These devices are fabricated by using 0.35um BCD (Bipolar-CMOS-DMOS) processes. These devices were validated using a TLP system. From the experimental results, the device for I/O ESD clamp has a trigger voltage of 5.8V. Also, the device for power rail ESD clamp has a holding voltage of 7.7V.
Abstract: Stegnography is a new way of secret
communication the most widely used mechanism on account
of its simplicity is the use of the least significant bit. We have
used the least significant bit (2 LSB and 4 LSB) substitution
method. Depending upon the characteristics of the individual
portions of cover image we decide whether to use 2 LSB or 4
LSB thus it is an adaptive stegnography technique. We used
one of the three channels to behave as indicator to indicate the
presence of hidden data in other two channels. The module
showed impressive results in terms of capacity to hide the
data. In proposed method, instead of using RGB color space
directly, YCbCr color space is used to make use of human
visual system characteristic.
Abstract: In this paper, we use Generalized Hamiltonian systems approach to synchronize a modified sixth-order Chua's circuit, which generates hyperchaotic dynamics. Synchronization is obtained between the master and slave dynamics with the slave being given by an observer. We apply this approach to transmit private information (analog and binary), while the encoding remains potentially secure.
Abstract: The contribution deals with problem of take-off phase of back somersault with twisting with various numbers of twists along longitudinal body axis. The aim was to evaluate the changes in angles during transition phase from back handspring to back somersault using 3D kinematic analysis of the somersaults. We used Simi Motion System for the 3D kinematic analysis of the observed gymnastic element performed by Czech Republic female representative and 2008 Summer Olympic Games participant. The results showed that the higher the number of twists, the smaller the touchdown angle in which the gymnasts lands on the pad in the beginning of take-off phase. In back somersault with one twist (180°) the average angle is 54°, in 1080° back somersault the average angle is 45.9°. These results may help to improve technical training of sports gymnasts.
Abstract: In geometrical camera calibration, the objective is to
determine a set of camera parameters that describe the mapping
between 3D references coordinates and 2D image coordinates. In this
paper, a technique of calibration and tracking based on both a least
squares method is presented and a correlation technique developed as
part of an augmented reality system. This approach is fast and it can
be used for a real time system
Abstract: One of the factors to maintain system survivability is
the adequate reactive power support to the system. Lack of reactive
power support may cause undesirable voltage decay leading to total
system instability. Thus, appropriate reactive power support scheme
should be arranged in order to maintain system stability. The strength
of a system capacity is normally denoted as system loadability. This
paper presents the enhancement of system loadability through
optimal reactive power planning technique using a newly developed
optimization technique, termed as Multiagent Immune Evolutionary
Programming (MAIEP). The concept of MAIEP is developed based
on the combination of Multiagent System (MAS), Artificial Immune
System (AIS) and Evolutionary Programming (EP). In realizing the
effectiveness of the proposed technique, validation is conducted on
the IEEE-26-Bus Reliability Test System. The results obtained from
pre-optimization and post-optimization process were compared
which eventually revealed the merit of MAIEP.
Abstract: This paper deals with motion planning of multiple
mobile robots. Mobile robots working together to achieve several
objectives have many advantages over single robot system. However,
the planning and coordination between the mobile robots is
extremely difficult. In the present investigation rule-based and rulebased-
neuro-fuzzy techniques are analyzed for multiple mobile
robots navigation in an unknown or partially known environment.
The final aims of the robots are to reach some pre-defined goals.
Based upon a reference motion, direction; distances between the
robots and obstacles; and distances between the robots and targets;
different types of rules are taken heuristically and refined later to find
the steering angle. The control system combines a repelling influence
related to the distance between robots and nearby obstacles and with
an attracting influence between the robots and targets. Then a hybrid
rule-based-neuro-fuzzy technique is analysed to find the steering
angle of the robots. Simulation results show that the proposed rulebased-
neuro-fuzzy technique can improve navigation performance in
complex and unknown environments compared to this simple rulebased
technique.
Abstract: This paper presents an innovative computer system
that contributes to sustainable development of the enterprise. The
research refers to a rethinking of traditional systems of collaboration
and risk assessment, present in any organization, leading to a
sustainable enterprise. This concept integrates emerging tools that
allow the implementation and exploitation of the collective
intelligence of the enterprise, allowing the exchange of contextual,
agile and simplified information, and collaboration with networks of
customers and partners in an environment where risks are controlled.
Risk assessment is done in a systemic way: the enterprise as the
system compared to the contained departments and the enterprise as a
subsystem compared to: families of international standards and
sustainability-s responsibilities. The enterprise, in this systemic
vision, responds to the requirements that any existing system to
operate continuously in an indefinite future without reaching key
resource depletion. The research is done by integrating collaborative
science, engineering, management, psychology, obtaining thus a
cornerstone of sustainable development of the enterprise.
Abstract: The paper presents the multi-element synthetic
transmit aperture (MSTA) method with a small number of elements
transmitting and all elements apertures in medical ultrasound
imaging. As compared to the other methods MSTA allows to
increase the system frame rate and provides the best compromise
between penetration depth and lateral resolution.
In the experiments a 128-element linear transducer array with
0.3 mm pitch excited by a burst pulse of 125 ns duration were used.
The comparison of 2D ultrasound images of tissue mimicking
phantom obtained using the STA and the MSTA methods is
presented to demonstrate the benefits of the second approach. The
results were obtained using SA algorithm with transmit and receive
signals correction based on a single element directivity function.