Abstract: Shadows add great amount of realism to a scene and
many algorithms exists to generate shadows. Recently, Shadow
volumes (SVs) have made great achievements to place a valuable
position in the gaming industries. Looking at this, we concentrate on
simple but valuable initial partial steps for further optimization in SV
generation, i.e.; model simplification and silhouette edge detection
and tracking. Shadow volumes (SVs) usually takes time in generating
boundary silhouettes of the object and if the object is complex then
the generation of edges become much harder and slower in process.
The challenge gets stiffer when real time shadow generation and
rendering is demanded. We investigated a way to use the real time
silhouette edge detection method, which takes the advantage of
spatial and temporal coherence, and exploit the level-of-details
(LOD) technique for reducing silhouette edges of the model to use
the simplified version of the model for shadow generation speeding
up the running time. These steps highly reduce the execution time of
shadow volume generations in real-time and are easily flexible to any
of the recently proposed SV techniques. Our main focus is to exploit
the LOD and silhouette edge detection technique, adopting them to
further enhance the shadow volume generations for real time
rendering.
Abstract: A typical definition of the Computer Aided Diagnosis
(CAD), found in literature, can be: A diagnosis made by a radiologist
using the output of a computerized scheme for automated image
analysis as a diagnostic aid. Often it is possible to find the expression
Computer Aided Detection (CAD or CADe): this definition
emphasizes the intent of CAD to support rather than substitute the
human observer in the analysis of radiographic images. In this article
we will illustrate the application of CAD systems and the aim of
these definitions.
Commercially available CAD systems use computerized
algorithms for identifying suspicious regions of interest. In this paper
are described the general CAD systems as an expert system
constituted of the following components: segmentation / detection,
feature extraction, and classification / decision making.
As example, in this work is shown the realization of a Computer-
Aided Detection system that is able to assist the radiologist in
identifying types of mammary tumor lesions. Furthermore this
prototype of station uses a GRID configuration to work on a large
distributed database of digitized mammographic images.
Abstract: MRAM technology provides a combination of fast
access time, non-volatility, data retention and endurance. While a
growing interest is given to two-terminal Magnetic Tunnel Junctions
(MTJ) based on Spin-Transfer Torque (STT) switching as the
potential candidate for a universal memory, its reliability is
dramatically decreased because of the common writing/reading path.
Three-terminal MTJ based on Spin-Orbit Torque (SOT) approach
revitalizes the hope of an ideal MRAM. It can overcome the
reliability barrier encountered in current two-terminal MTJs by
separating the reading and the writing path. In this paper, we study
two possible writing schemes for the SOT-MTJ device based on
recently fabricated samples. While the first is based on precessional
switching, the second requires the presence of permanent magnetic
field. Based on an accurate Verilog-A model, we simulate the two
writing techniques and we highlight advantages and drawbacks of
each one. Using the second technique, pioneering logic circuits based
on the three-terminal architecture of the SOT-MTJ described in this
work are under development with preliminary attractive results.
Abstract: Nowadays the asynchronous learning has granted the permission to the anywhere and anything learning via the technology and E-media which give the learner more convenient. This research is about the design of the blended and online learning for the asynchronous learning of the process management subject in order to create the prototype of this subject asynchronous learning which will create the easiness and increase capability in the learning. The pattern of learning is the integration between the in-class learning and online learning via the internet. This research is mainly focused on the online learning and the online learning can be divided into 5 parts which are virtual classroom, online content, collaboration, assessment and reference material. After the system design was finished, it was evaluated and tested by 5 experts in blended learning design and 10 students which the user’s satisfaction level is good. The result is as good as the assumption so the system can be used in the process management subject for a real usage.
Abstract: This study addresses the effect of impurities on the
crystallization of Na2CO3 produced within a strategy for capturing
CO2 from flue gases by alkaline absorption. A novel technology -
membrane assisted crystallization - is proposed for Na2CO3
crystallization from mother liquors containing impurities. High purity
of Na2CO3•10H2O crystals was obtained without impacting the
performance of the mass transfer of water vapor through membranes
during crystallization.
Abstract: Web usage mining is an interesting application of data
mining which provides insight into customer behaviour on the Internet. An important technique to discover user access and navigation trails is based on sequential patterns mining. One of the
key challenges for web access patterns mining is tackling the problem
of mining richly structured patterns. This paper proposes a novel
model called Web Access Patterns Graph (WAP-Graph) to represent all of the access patterns from web mining graphically. WAP-Graph
also motivates the search for new structural relation patterns, i.e. Concurrent Access Patterns (CAP), to identify and predict more
complex web page requests. Corresponding CAP mining and modelling methods are proposed and shown to be effective in the
search for and representation of concurrency between access patterns
on the web. From experiments conducted on large-scale synthetic
sequence data as well as real web access data, it is demonstrated that
CAP mining provides a powerful method for structural knowledge discovery, which can be visualised through the CAP-Graph model.
Abstract: Opinion extraction about products from customer
reviews is becoming an interesting area of research. Customer
reviews about products are nowadays available from blogs and
review sites. Also tools are being developed for extraction of opinion
from these reviews to help the user as well merchants to track the
most suitable choice of product. Therefore efficient method and
techniques are needed to extract opinions from review and blogs. As
reviews of products mostly contains discussion about the features,
functions and services, therefore, efficient techniques are required to
extract user comments about the desired features, functions and
services. In this paper we have proposed a novel idea to find features
of product from user review in an efficient way. Our focus in this
paper is to get the features and opinion-oriented words about
products from text through auxiliary verbs (AV) {is, was, are, were,
has, have, had}. From the results of our experiments we found that
82% of features and 85% of opinion-oriented sentences include AVs.
Thus these AVs are good indicators of features and opinion
orientation in customer reviews.
Abstract: Pummelo is known to be the largest of all citrus fruits, with expected ratio of 2:1 (w/v) of producing juice, is an attractive opportunity for Malaysia to expand pummelo-s influence and marketability over the international market of juices. The purpose of this study is to identify and quantify the phenolic compounds in two Malaysian varieties of pummelo fruit juice: Ledang (PO55) and Tambun (PO52). Identifications of polyphenols composition were done using High Performance Liquid Chromatography Diode Array Detection (HPLC-DAD). The phenolic compounds that were found in both varieties were hydroxycinnamic acids and flavonones. This study proved that Tambun variety has the highest antioxidant and phenolic compounds in comparison to Ledang variety. However, considerations have to be made to suit consumer-s taste bud and the amount of enzyme needed to clarify the juice for its marketability.
Abstract: A new target detection technique is presented in this
paper for the identification of small boats in coastal surveillance. The
proposed technique employs an adaptive progressive thresholding (APT) scheme to first process the given input scene to separate any
objects present in the scene from the background. The preprocessing
step results in an image having only the foreground objects, such as
boats, trees and other cluttered regions, and hence reduces the search
region for the correlation step significantly. The processed image is then fed to the shifted phase-encoded fringe-adjusted joint transform
correlator (SPFJTC) technique which produces single and delta-like
correlation peak for a potential target present in the input scene. A
post-processing step involves using a peak-to-clutter ratio (PCR) to determine whether the boat in the input scene is authorized or unauthorized. Simulation results are presented to show that the
proposed technique can successfully determine the presence of an authorized boat and identify any intruding boat present in the given input scene.
Abstract: This paper presents a part of research on the
rheological properties of bitumen modified by thermoplastic namely
linear low density polyethylene (LLDPE), high density polyethylene
(HDPE) and polypropylene (PP) and its interaction with 80 pen base
bitumen. As it is known that the modification of bitumen by the use
of polymers enhances its performance characteristics but at the same
time significantly alters its rheological properties. The rheological
study of polymer modified bitumen (PMB) was made through
penetration, ring & ball softening point and viscosity test. The results
were then related to the changes in the rheological properties of
polymer modified bitumen. It was observed that thermoplastic
copolymer shows profound effect on penetration rather than
softening point. The viscoelastic behavior of polymer modified
bitumen depend on the concentration of polymer, mixing
temperature, mixing technique, solvating power of base bitumen and
molecular structure of polymer used. PP offer better blend in
comparison to HDPE and LLDPE. The viscosity of base bitumen was
also enhanced with the addition of polymer. The pseudoplastic
behavior was more prominent for HDPE and LLDPE than PP. Best
results were obtained when polymer concentration was kept below
3%
Abstract: In this article we explore how computer assisted exercises may allow for bridging the traditional gap between theory and practice in professional education. To educate officers able to master the complexity of the battlefield the Norwegian Military Academy needs to develop a learning environment that allows for creating viable connections between the educational environment and the field of practice. In response to this challenge we explore the conditions necessary to make computer assisted training systems (CATS) a useful tool to create structural similarities between an educational context and the field of military practice. Although, CATS may facilitate work procedures close to real life situations, this case do demonstrate how professional competence also must build on viable learning theories and environments. This paper explores the conditions that allow for using simulators to facilitate professional competence from within an educational setting. We develop a generic didactic model that ascribes learning to participation in iterative cycles of action and reflection. The development of this model is motivated by the need to develop an interdisciplinary professional education rooted in the pattern of military practice.
Abstract: During recent years, the traditional learning
approaches have undergone fundamental changes due to the
emergence of new technologies such as multimedia, hypermedia and
telecommunication. E-learning is a modern world phenomenon that
has come into existence in the information age and in a knowledgebased
society. E-learning has developed significantly within a short
period of time. Thus it is of a great significant to secure information,
allow a confident access and prevent unauthorized accesses. Making
use of individuals- physiologic or behavioral (biometric) properties is
a confident method to make the information secure. Among the
biometrics, fingerprint is more acceptable and most countries use it as
an efficient methods of identification. This article provides a new
method to compare the fingerprint comparison by pattern recognition
and image processing techniques. To verify fingerprint, the shortest
distance method is used together with perceptronic multilayer neural
network functioning based on minutiae. This method is highly
accurate in the extraction of minutiae and it accelerates comparisons
due to elimination of false minutiae and is more reliable compared
with methods that merely use directional images.
Abstract: Mycotoxin (aflatoxins) contamination of peanuts is a
great concern for human health. A total of 72 samples of unripe,
roasted, and salty peanuts were collected randomly from Pothohar
plateau of Pakistan for the assessment of aflatoxin. Samples were
dried, ground and extracted by acetonitrile (84%). The filtered
extracts were cleaned up by MycoSep-226 and analyzed by high
performance liquid chromatography with flourescence detector.
Quantification limit of Aflatoxin was 1 μg/kg and 70% Recovery was
observed in spiked samples in the range 1–10 μg/kg. The screening
of mycotoxins indicated that aflatoxins were present in most of the
samples being detected in 82%, in concentrations from 14.25 μg/kg
to 98.80 μg/kg. Optimal conditions for mycotoxin production and
fungal growth are frequently found in the crop fields as well as in
store houses. Human exposure of such toxin can be controlled by
pointed out such awareness and implemented the regulations.
Abstract: The Internet telephony employs a new type of Internet communication on which a mutual communication is realized by establishing sessions. Session Initiation Protocol (SIP) is used to establish sessions between end-users. For unreliable transmission (UDP), SIP message should be retransmitted when it is lost. The retransmissions increase a load of the SIP signaling network, and sometimes lead to performance degradation when a network is overloaded. The paper proposes an overload control for a SIP signaling network to protect from a performance degradation. Introducing two thresholds in a queue of a SIP proxy server, the SIP proxy server detects a congestion. Once congestion is detected, a SIP signaling network restricts to make new calls. The proposed overload control is evaluated using the network simulator (ns-2). With simulation results, the paper shows the proposed overload control works well.
Abstract: We prove detailed analysis of a waveguide-based Schottky barrier photodetector (SBPD) where a thin silicide film is put on the top of a silicon-on-insulator (SOI) channel waveguide to absorb light propagating along the waveguide. Taking both the confinement factor of light absorption and the wall scanning induced gain of the photoexcited carriers into account, an optimized silicide thickness is extracted to maximize the effective gain, thereby the responsivity. For typical lengths of the thin silicide film (10-20 Ðçm), the optimized thickness is estimated to be in the range of 1-2 nm, and only about 50-80% light power is absorbed to reach the maximum responsivity. Resonant waveguide-based SBPDs are proposed, which consist of a microloop, microdisc, or microring waveguide structure to allow light multiply propagating along the circular Si waveguide beneath the thin silicide film. Simulation results suggest that such resonant waveguide-based SBPDs have much higher repsonsivity at the resonant wavelengths as compared to the straight waveguidebased detectors. Some experimental results about Si waveguide-based SBPD are also reported.
Abstract: The procurement and cost management approach adopted for mechanical and electrical (M&E) services in Malaysian construction industry have been criticized for its inefficiency. The study examined early cost estimating practices adopted for mechanical and electrical services (M&E) in Malaysia so as to understand the level of compliance of the current techniques with best practices. The methodology adopted for the study is a review of bidding documents used on both completed and on – going building projects awarded between 2008 – 2010 under 9th Malaysian Plan. The analysis revealed that, M&E services cost cannot be reliably estimated at pre-contract stage; the bidding techniques adopted for M&E services failed to provide uniform basis for contractors to submit tender; detailed measurement of items were not made which could complicate post contract cost control and financial management. The paper concluded that, there is need to follow a structured approach in determining the pre-contract cost estimate for M&E services which will serve as a virile tool for post contract cost control.
Abstract: Fundamental sensor-motor couplings form the backbone
of most mobile robot control tasks, and often need to be implemented
fast, efficiently and nevertheless reliably. Machine learning
techniques are therefore often used to obtain the desired sensor-motor
competences.
In this paper we present an alternative to established machine
learning methods such as artificial neural networks, that is very fast,
easy to implement, and has the distinct advantage that it generates
transparent, analysable sensor-motor couplings: system identification
through nonlinear polynomial mapping.
This work, which is part of the RobotMODIC project at the
universities of Essex and Sheffield, aims to develop a theoretical understanding
of the interaction between the robot and its environment.
One of the purposes of this research is to enable the principled design
of robot control programs.
As a first step towards this aim we model the behaviour of the
robot, as this emerges from its interaction with the environment, with
the NARMAX modelling method (Nonlinear, Auto-Regressive, Moving
Average models with eXogenous inputs). This method produces
explicit polynomial functions that can be subsequently analysed using
established mathematical methods.
In this paper we demonstrate the fidelity of the obtained NARMAX
models in the challenging task of robot route learning; we present a
set of experiments in which a Magellan Pro mobile robot was taught
to follow four different routes, always using the same mechanism to
obtain the required control law.
Abstract: This paper proposes and analyses the wireless
telecommunication system with multiple antennas to the emission
and reception MIMO (multiple input multiple output) with space
diversity in a OFDM context. In particular it analyses the
performance of a DTT (Digital Terrestrial Television) broadcasting
system that includes MIMO-OFDM techniques. Different
propagation channel models and configurations are considered for
each diversity scheme. This study has been carried out in the context
of development of the next generation DVB-T/H and WRAN.
Abstract: The use of new technologies such internet (e-mail, chat
rooms) and cell phones has steeply increased in recent years.
Especially among children and young people, use of technological
tools and equipments is widespread. Although many teachers and
administrators now recognize the problem of school bullying, few are
aware that students are being harassed through electronic
communication. Referred to as electronic bullying, cyber bullying, or
online social cruelty, this phenomenon includes bullying through email,
instant messaging, in a chat room, on a website, or through
digital messages or images sent to a cell phone. Cyber bullying is
defined as causing deliberate/intentional harm to others using internet
or other digital technologies. It has a quantitative research design nd
uses relational survey as its method. The participants consisted of
300 secondary school students in the city of Konya, Turkey. 195
(64.8%) participants were female and 105 (35.2%) were male. 39
(13%) students were at grade 1, 187 (62.1%) were at grade 2 and 74
(24.6%) were at grade 3. The “Cyber Bullying Question List"
developed by Ar─▒cak (2009) was given to students. Following
questions about demographics, a functional definition of cyber
bullying was provided. In order to specify students- human values,
“Human Values Scale (HVS)" developed by Dilmaç (2007) for
secondary school students was administered. The scale consists of 42
items in six dimensions. Data analysis was conducted by the primary
investigator of the study using SPSS 14.00 statistical analysis
software. Descriptive statistics were calculated for the analysis of
students- cyber bullying behaviour and simple regression analysis was
conducted in order to test whether each value in the scale could
explain cyber bullying behaviour.
Abstract: The clinical usefulness of heart rate variability is
limited to the range of Holter monitoring software available. These
software algorithms require a normal sinus rhythm to accurately
acquire heart rate variability (HRV) measures in the frequency
domain. Premature ventricular contractions (PVC) or more
commonly referred to as ectopic beats, frequent in heart failure,
hinder this analysis and introduce ambiguity. This investigation
demonstrates an algorithm to automatically detect ectopic beats by
analyzing discrete wavelet transform coefficients. Two techniques
for filtering and replacing the ectopic beats from the RR signal are
compared. One technique applies wavelet hard thresholding
techniques and another applies linear interpolation to replace ectopic
cycles. The results demonstrate through simulation, and signals
acquired from a 24hr ambulatory recorder, that these techniques can
accurately detect PVC-s and remove the noise and leakage effects
produced by ectopic cycles retaining smooth spectra with the
minimum of error.