Abstract: Prior research evidenced that unimodal biometric
systems have several tradeoffs like noisy data, intra-class variations,
restricted degrees of freedom, non-universality, spoof attacks, and
unacceptable error rates. In order for the biometric system to be more
secure and to provide high performance accuracy, more than one
form of biometrics are required. Hence, the need arise for multimodal
biometrics using combinations of different biometric modalities. This
paper introduces a multimodal biometric system (MMBS) based on
fusion of whole dorsal hand geometry and fingerprints that acquires
right and left (Rt/Lt) near-infra-red (NIR) dorsal hand geometry (HG)
shape and (Rt/Lt) index and ring fingerprints (FP). Database of 100
volunteers were acquired using the designed prototype. The acquired
images were found to have good quality for all features and patterns
extraction to all modalities. HG features based on the hand shape
anatomical landmarks were extracted. Robust and fast algorithms for
FP minutia points feature extraction and matching were used. Feature
vectors that belong to similar biometric traits were fused using
feature fusion methodologies. Scores obtained from different
biometric trait matchers were fused using the Min-Max
transformation-based score fusion technique. Final normalized scores
were merged using the sum of scores method to obtain a single
decision about the personal identity based on multiple independent
sources. High individuality of the fused traits and user acceptability
of the designed system along with its experimental high performance
biometric measures showed that this MMBS can be considered for
med-high security levels biometric identification purposes.
Abstract: In this paper the application of rule mining in order to
review the effective factors on supplier selection is reviewed in the
following three sections 1) criteria selecting and information
gathering 2) performing association rule mining 3) validation and
constituting rule base. Afterwards a few of applications of rule base
is explained. Then, a numerical example is presented and analyzed
by Clementine software. Some of extracted rules as well as the
results are presented at the end.
Abstract: Genetic Algorithm has been used to solve wide range of optimization problems. Some researches conduct on applying Genetic Algorithm to analog circuit design automation. These researches show a better performance due to the nature of Genetic Algorithm. In this paper a modified Genetic Algorithm is applied for analog circuit design automation. The modifications are made to the topology of the circuit. These modifications will lead to a more computationally efficient algorithm.
Abstract: Providing authentication for the messages exchanged
between group members in addition to confidentiality is an important
issue in Secure Group communication. We develop a protocol for
Secure Authentic Communication where we address authentication
for the group communication scheme proposed by Blundo et al.
which only provides confidentiality. Authentication scheme used is a
multiparty authentication scheme which allows all the users in the
system to send and receive messages simultaneously. Our scheme is
secure against colluding malicious parties numbering fewer than k.
Abstract: The motion planning technique described in this paper has been developed to eliminate or reduce the residual vibrations of belt-driven rotary platforms, while maintaining unchanged the motion time and the total angular displacement of the platform. The proposed approach is based on a suitable choice of the motion command given to the servomotor that drives the mechanical device; this command is defined by some numerical coefficients which determine the shape of the displacement, velocity and acceleration profiles. Using a numerical optimization technique, these coefficients can be changed without altering the continuity conditions imposed on the displacement and its time derivatives at the initial and final time instants. The proposed technique can be easily and quickly implemented on an actual device, since it requires only a simple modification of the motion command profile mapped in the memory of the electronic motion controller.
Abstract: It is well known that metallic particles reduce the
reliability of Gas-Insulated Substation (GIS) equipments by initiating
partial discharge (PDs) that can lead to breakdown and complete
failure of GIS. This paper investigates the characteristics of PDs
caused by metallic particle adhering to the solid spacer. The PD
detection and measurement were carried out by using IEC 60270
method with particles of different sizes and at different positions on
the spacer surface. The results show that a particle of certain size at
certain position possesses a unique PD characteristic as compared to
those caused by particles of different sizes and/or at different
positions. Therefore PD characteristics may be useful for the particle
size and position identification.
Abstract: Phase error in communications systems degrades error
performance. In this paper, we present a simple approximation for the
average error probability of the binary phase shift keying (BPSK) in
the presence of phase error having a uniform distribution on arbitrary
intervals. For the simple approximation, we use symmetry and
periodicity of a sinusoidal function. Approximate result for the
average error probability is derived, and the performance is verified
through comparison with simulation result.
Abstract: Adapting wireless devices to communicate within grid
networks empowers us by providing range of possibilities.. These
devices create a mechanism for consumers and publishers to create
modern networks with or without peer device utilization. Emerging
mobile networks creates new challenges in the areas of reliability,
security, and adaptability. In this paper, we propose a system
encompassing mobility management using AAA context transfer for
mobile grid networks. This system ultimately results in seamless task
processing and reduced packet loss, communication delays,
bandwidth, and errors.
Abstract: The OTOP Entrepreneurship that used to create
substantial source of income for local Thai communities are now in a
stage of exigent matters that required assistances from public sectors
due to over Entrepreneurship of duplicative ideas, unable to adjust
costs and prices, lack of innovation, and inadequate of quality
control. Moreover, there is a repetitive problem of middlemen who
constantly corner the OTOP market. Local OTOP producers become
easy preys since they do not know how to add more values, how to
create and maintain their own brand name, and how to create proper
packaging and labeling. The suggested solutions to local OTOP
producers are to adopt modern management techniques, to find
knowhow to add more values to products and to unravel other
marketing problems. The objectives of this research are to study the
prevalent OTOP products management and to discover direction to
manage OTOP products to enhance the effectiveness of OTOP
Entrepreneurship in Nonthaburi Province, Thailand. There were 113
participants in this study. The research tools can be divided into two
parts: First part is done by questionnaire to find responses of the
prevalent OTOP Entrepreneurship management. Second part is the
use of focus group which is conducted to encapsulate ideas and local
wisdom. Data analysis is performed by using frequency, percentage,
mean, and standard deviation as well as the synthesis of several small
group discussions. The findings reveal that 1) Business Resources:
the quality of product is most important and the marketing of product
is least important. 2) Business Management: Leadership is most
important and raw material planning is least important. 3) Business
Readiness: Communication is most important and packaging is least
important. 4) Support from public sector: Certified from the
government is most important and source of raw material is the least
important.
Abstract: This paper is devoted to predict laminar and turbulent
heating rates around blunt re-entry spacecraft at hypersonic
conditions. Heating calculation of a hypersonic body is normally
performed during the critical part of its flight trajectory. The
procedure is of an inverse method, where a shock wave is assumed,
and the body shape that supports this shock, as well as the flowfield
between the shock and body, are calculated. For simplicity the
normal momentum equation is replaced with a second order pressure
relation; this simplification significantly reduces computation time.
The geometries specified in this research, are parabola and ellipsoids
which may have conical after bodies. An excellent agreement is
observed between the results obtained in this paper and those
calculated by others- research. Since this method is much faster than
Navier-Stokes solutions, it can be used in preliminary design,
parametric study of hypersonic vehicles.
Abstract: In this paper, a novel road extraction method using Stationary Wavelet Transform is proposed. To detect road features from color aerial satellite imagery, Mexican hat Wavelet filters are used by applying the Stationary Wavelet Transform in a multiresolution, multi-scale, sense and forming the products of Wavelet coefficients at a different scales to locate and identify road features at a few scales. In addition, the shifting of road features locations is considered through multiple scales for robust road extraction in the asymmetry road feature profiles. From the experimental results, the proposed method leads to a useful technique to form the basis of road feature extraction. Also, the method is general and can be applied to other features in imagery.
Abstract: Detection and classification of power quality (PQ)
disturbances is an important consideration to electrical utilities and
many industrial customers so that diagnosis and mitigation of such
disturbance can be implemented quickly. S-transform algorithm and
continuous wavelet transforms (CWT) are time-frequency
algorithms, and both of them are powerful in detection and
classification of PQ disturbances. This paper presents detection and
classification of PQ disturbances using S-transform and CWT
algorithms. The results of detection and classification, provides that
S-transform is more accurate in detection and classification for most
PQ disturbance than CWT algorithm, where as CWT algorithm more
powerful in detection in some disturbances like notching
Abstract: There are several ways of improving the performance of a vapor compression refrigeration cycle. Use of an ejector as expansion device is one of the alternative ways. The present paper aims at evaluate the performance improvement of a vapor compression refrigeration cycle under a wide range of operating conditions. A numerical model is developed and a parametric study of important parameters such as condensation (30-50°C) and evaporation temperatures (-20-5°C), nozzle and diffuser efficiencies (0.75-0.95), subcooling and superheating degrees (0-15K) are investigated. The model verification gives a good agreement with the literature data. The simulation results revealed that condensation temperature has the highest effect (129%) on the performance improvement ratio while superheating has the lowest one (6.2%). Among ejector efficiencies, the diffuser efficiency has a significant effect on the COP of ejector expansion refrigeration cycle. The COP improvement percentage decreases from 10.9% to 4.6% as subcooling degrees increases by 15K.
Abstract: Orthogonal Frequency Division Multiplexing (OFDM) is one of the techniques for high speed data rate communication with main consideration for 4G and 5G systems. In OFDM, there are several mapping schemes which provide a way of parallel transmission. In this paper, comparisons of mapping schemes used by some standards have been made and also has been discussed about the performance of the non-conventional modulation technique. The Comparisons of Bit Error Rate (BER) performances for conventional and non-conventional modulation schemes have been done using MATLAB software. Mentioned schemes used in OFDM system can be selected on the basis of the requirement of power or spectrum efficiency and BER analysis.
Abstract: Ant colony optimization is an ant algorithm framework that took inspiration from foraging behavior of ant colonies. Indeed, ACO algorithms use a chemical communication, represented by pheromone trails, to build good solutions. However, ants involve different communication channels to interact. Thus, this paper introduces the acoustic communication between ants while they are foraging. This process allows fine and local exploration of search space and permits optimal solution to be improved.
Abstract: The aim of the current work is to present a comparison among three popular optimization methods in the inverse elastostatics problem (IESP) of flaw detection within a solid. In more details, the performance of a simulated annealing, a Hooke & Jeeves and a sequential quadratic programming algorithm was studied in the test case of one circular flaw in a plate solved by both the boundary element (BEM) and the finite element method (FEM). The proposed optimization methods use a cost function that utilizes the displacements of the static response. The methods were ranked according to the required number of iterations to converge and to their ability to locate the global optimum. Hence, a clear impression regarding the performance of the aforementioned algorithms in flaw identification problems was obtained. Furthermore, the coupling of BEM or FEM with these optimization methods was investigated in order to track differences in their performance.
Abstract: This paper presents a wavelet transform and Support
Vector Machine (SVM) based algorithm for estimating fault location
on transmission lines. The Discrete wavelet transform (DWT) is used
for data pre-processing and this data are used for training and testing
SVM. Five types of mother wavelet are used for signal processing to
identify a suitable wavelet family that is more appropriate for use in
estimating fault location. The results demonstrated the ability of SVM
to generalize the situation from the provided patterns and to
accurately estimate the location of faults with varying fault resistance.
Abstract: The log periodogram regression is widely used in empirical
applications because of its simplicity, since only a least squares
regression is required to estimate the memory parameter, d, its good
asymptotic properties and its robustness to misspecification of the
short term behavior of the series. However, the asymptotic distribution
is a poor approximation of the (unknown) finite sample distribution
if the sample size is small. Here the finite sample performance of different
nonparametric residual bootstrap procedures is analyzed when
applied to construct confidence intervals. In particular, in addition to
the basic residual bootstrap, the local and block bootstrap that might
adequately replicate the structure that may arise in the errors of the
regression are considered when the series shows weak dependence in
addition to the long memory component. Bias correcting bootstrap
to adjust the bias caused by that structure is also considered. Finally,
the performance of the bootstrap in log periodogram regression based
confidence intervals is assessed in different type of models and how
its performance changes as sample size increases.
Abstract: The goal of speech parameterization is to extract the relevant information about what is being spoken from the audio signal. In speech recognition systems Mel-Frequency Cepstral Coefficients (MFCC) and Relative Spectral Mel-Frequency Cepstral Coefficients (RASTA-MFCC) are the two main techniques used. It will be shown in this paper that it presents some modifications to the original MFCC method. In our work the effectiveness of proposed changes to MFCC called Modified Function Cepstral Coefficients (MODFCC) were tested and compared against the original MFCC and RASTA-MFCC features. The prosodic features such as jitter and shimmer are added to baseline spectral features. The above-mentioned techniques were tested with impulsive signals under various noisy conditions within AURORA databases.
Abstract: Purpose of this work is the development of an
automatic classification system which could be useful for radiologists
in the investigation of breast cancer. The software has been designed
in the framework of the MAGIC-5 collaboration.
In the automatic classification system the suspicious regions with
high probability to include a lesion are extracted from the image as
regions of interest (ROIs). Each ROI is characterized by some
features based on morphological lesion differences.
Some classifiers as a Feed Forward Neural Network, a K-Nearest
Neighbours and a Support Vector Machine are used to distinguish the
pathological records from the healthy ones.
The results obtained in terms of sensitivity (percentage of
pathological ROIs correctly classified) and specificity (percentage of
non-pathological ROIs correctly classified) will be presented through
the Receive Operating Characteristic curve (ROC). In particular the
best performances are 88% ± 1 of area under ROC curve obtained
with the Feed Forward Neural Network.