Abstract: One major source of performance decline in speaker
recognition system is channel mismatch between training and testing.
This paper focuses on improving channel robustness of speaker
recognition system in two aspects of channel compensation technique
and channel robust features. The system is text-independent speaker
identification system based on two-stage recognition. In the aspect of
channel compensation technique, this paper applies MAP (Maximum
A Posterior Probability) channel compensation technique, which was
used in speech recognition, to speaker recognition system. In the
aspect of channel robust features, this paper introduces
pitch-dependent features and pitch-dependent speaker model for the
second stage recognition. Based on the first stage recognition to
testing speech using GMM (Gaussian Mixture Model), the system
uses GMM scores to decide if it needs to be recognized again. If it
needs to, the system selects a few speakers from all of the speakers
who participate in the first stage recognition for the second stage
recognition. For each selected speaker, the system obtains 3
pitch-dependent results from his pitch-dependent speaker model, and
then uses ANN (Artificial Neural Network) to unite the 3
pitch-dependent results and 1 GMM score for getting a fused result.
The system makes the second stage recognition based on these fused
results. The experiments show that the correct rate of two-stage
recognition system based on MAP channel compensation technique
and pitch-dependent features is 41.7% better than the baseline system
for closed-set test.
Abstract: The purpose of this research is to disentangle and
validate the underlying factorial-structure of Ecotourism Experiential
Value (EEV) measurement scale and subsequently investigate its
psychometric properties. The analysis was based on a sample of 225
eco-tourists, collected at the vicinity of Taman Negara National Park
(TNNP) via interviewer-administered questionnaire. Exploratory
factor analysis (EFA) was performed to determine the factorial
structure of EEV. Subsequently, to confirm and validate the factorial
structure and assess the psychometric properties of EEV,
confirmatory factor analysis (CFA) was executed. In addition, to
establish the nomological validity of EEV a structural model was
developed to examine the effect of EEV on Total Eco-tourist
Experience Quality (TEEQ). It is unveiled that EEV is a secondorder
six-factorial structure construct and it scale has adequately met
the psychometric criteria, thus could permit interpretation of results
confidently. The findings have important implications for future
research directions and management of ecotourism destination.
Abstract: This paper tries to shed light on the existence of a bank lending channel (BLC) in South Eastern European countries (SEE). Based on a VAR framework we test the responsiveness of credit supply to monetary policy shocks. By compiling a new data set and using the reserve requirement ratio, among others, as the policy instrument we measure the effectiveness of the BLC and the buffering effect of the banks in the SEE countries. The results indicate that loan supply is significantly affected by shifts in monetary policy, when demand factors are controlled. Furthermore, by analyzing the effect of the Greek banks in the region we conclude that Greek banks do buffer the negative effects of monetary policy transmission. By having a significant market share of the SEE-s banking markets we argue that Greek banks influence positively the economic growth of SEE countries.
Abstract: This paper examines the implementation of RC5 block cipher for digital images along with its detailed security analysis. A complete specification for the method of application of the RC5 block cipher to digital images is given. The security analysis of RC5 block cipher for digital images against entropy attack, bruteforce, statistical, and differential attacks is explored from strict cryptographic viewpoint. Experiments and results verify and prove that RC5 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC5 block cipher algorithm.
Abstract: The objective of current issue was to develop a model
of testicular herpes simplex virus (HSV) type I infection for
assessment of viral effect on fertility. 56 male mice were inoculated
intraperitoneally with different concentrations of HSV on 8 day post
partum. It was revealed that the optimal dose was 100 plaque
forming units per mice as it provided testicular infection in 100% of
survivors. HSV proteins were detected both in somatic and germ
cells (spermatogonia, spermatocytes, spermatides). Although DNA
load in testis was descending from 3 to 28 days post infection only
12.5% of infected males had offspring after mating with uninfected
females comparing to 87.5% in control (p=0.012). These results are
the first direct evidence for HSV impact in male sterility. Prepuberal
mice appeared to be a suitable model for investigation of
pathogenesis of virus-associated fertility disorders.
Abstract: This paper mathematically analyses the varying
magnitude of production loss, which may occur due to idle time (inprocess
waiting time and traveling time) on a linear walking worker
assembly line. Within this flexible and reconfigurable assembly
system, each worker travels down the line carrying out each
assembly task at each station; and each worker accomplishes the
assembly of a unit from start to finish and then travels back to the
first station to start the assembly of a new product. This strategy of
system design attempts to combine the flexibility of the U-shaped
moving worker assembly cell with the efficiency of the conventional
fixed worker assembly line. The paper aims to evaluate the effect of
idle time that may offset the labor efficiency of each walking worker
providing an insight into the mechanism of such a flexible and
reconfigurable assembly system.
Abstract: This study examines the structural and systematic processes of the Human Resources Division at The University of the West Indies, St. Augustine, Trinidad and Tobago for evidence of incorporation of the University's 2012- 2017 Strategic Plan. In conducting the study the structure of the Human Resources Management Division and its functions were carefully reviewed and measured against the strategic direction of the organisation. Findings indicate disconnect between these areas as there is apparent failure of the Human Resources Division to totally align its mandate with that of the organisation-s strategic direction. This action serves to threaten the viability of the organisation and its efficiency and effectiveness as an institution. The recommendations being put forward are for the realignment of the Human Resources Management Division and for its focus to mirror that of the organisation and the organisation-s goals and objectives. This may entail a restructuring of the Division.
Abstract: With the development of the Polyvinyl chloride
(PVC) products in many applications, the challenge of investigating
the raw material composition and reducing the cost have both
become more and more important. Considerable research has been
done investigating the effect of additives on the PVC products. Most
of the PVC composites research investigates only the effect of
single/few factors, at a time. This isolated consideration of the input
factors does not take in consideration the interaction effect of the
different factors. This paper implements a mixture experimental
design approach to find out a cost-effective PVC composition for the
production of electrical-insulation cables considering the ASTM
Designation (D) 6096. The results analysis showed that a minimum
cost can be achieved through using 20% virgin PVC, 18.75%
recycled PVC, 43.75% CaCO3 with participle size 10 microns, 14%
DOP plasticizer, and 3.5% CPW plasticizer. For maximum UTS the
compound should consist of: 17.5% DOP, 62.5% virgin PVC, and
20.0% CaCO3 of particle size 5 microns. Finally, for the highest
ductility the compound should be made of 35% virgin PVC, 20%
CaCO3 of particle size 5 microns, and 45.0% DOP plasticizer.
Abstract: This work deals with the initial applications and formulation of an anisotropic plastic-damage constitutive model proposed for non-linear analysis of reinforced concrete structures submitted to a loading with change of the sign. The original constitutive model is based on the fundamental hypothesis of energy equivalence between real and continuous medium following the concepts of the Continuum Damage Mechanics. The concrete is assumed as an initial elastic isotropic medium presenting anisotropy, permanent strains and bimodularity (distinct elastic responses whether traction or compression stress states prevail) induced by damage evolution. In order to take into account the bimodularity, two damage tensors governing the rigidity in tension or compression regimes are introduced. Then, some conditions are introduced in the original version of the model in order to simulate the damage unilateral effect. The three-dimensional version of the proposed model is analyzed in order to validate its formulation when compared to micromechanical theory. The one-dimensional version of the model is applied in the analyses of a reinforced concrete beam submitted to a loading with change of the sign. Despite the parametric identification problems, the initial applications show the good performance of the model.
Abstract: This paper presents a systematic procedure for modelling and simulation of a power system installed with a power system stabilizer (PSS) and a flexible ac transmission system (FACTS)-based controller. For the design purpose, the model of example power system which is a single-machine infinite-bus power system installed with the proposed controllers is developed in MATLAB/SIMULINK. In the developed model synchronous generator is represented by model 1.1. which includes both the generator main field winding and the damper winding in q-axis so as to evaluate the impact of PSS and FACTS-based controller on power system stability. The model can be can be used for teaching the power system stability phenomena, and also for research works especially to develop generator controllers using advanced technologies. Further, to avoid adverse interactions, PSS and FACTS-based controller are simultaneously designed employing genetic algorithm (GA). The non-linear simulation results are presented for the example power system under various disturbance conditions to validate the effectiveness of the proposed modelling and simultaneous design approach.
Abstract: This study investigated the ecological effects of
particulate pollution from a cement factory on the vegetation in the
western Mediterranean coastal desert of Egypt. Variations in
vegetation, soil chemical characters, and some responses of Atriplex
halimus, as a dominant species in the study area, were investigated in
some sites located in different directions from the cement factory
between Burg El-Arab in the east and El-Hammam in the west. The
results showed an obvious decrease in vegetation diversity, in
response to cement-kiln dust pollution, that accompanied by a high
dominance attributed to the high contribution of Atriplex halimus.
Annual species were found to be more sensitive to cement dust
pollution as they all failed to persist in highly disturbed sites. It is
remarkable that cover and phytomass of Atriplex halimus were
increased greatly in response to cement dust pollution, and this was
accompanied by a reduction in the mature seeds and leaf-area of the
plant. The few seeds of the affected individuals seemed to be more
fertile and attained higher germination percentages and exhibited
hardening against drought stress.
Abstract: In this paper, we explore a new scheme for filtering spoofed packets (DDOS attack) which is a combination of path fingerprint and client puzzle concepts. In this each IP packet has a unique fingerprint is embedded that represents, the route a packet has traversed. The server maintains a mapping table which contains the client IP address and its corresponding fingerprint. In ingress router, client puzzle is placed. For each request, the puzzle issuer provides a puzzle which the source has to solve. Our design has the following advantages over prior approaches, 1) Reduce the network traffic, as we place a client puzzle at the ingress router. 2) Mapping table at the server is lightweight and moderate.
Abstract: The scope of this paper is to describe a real electrical
installation of renewable energy using photovoltaic cells. The
displayed power grid connected network was established in 2007 at
area of Northern Greece. The photovoltaic park is composed of 6120
photovoltaic cells able to deliver a total power of 1.101.600 Wp. For
the transformation of DC voltage to AC voltage have been used 25
stand alone three phases inverters and for the connection at the
medium voltage network of Greek Power Authority have been
installed two oil immersed transformer of 630 kVA each one. Due to
the wide space area of installation a specific external lightning
protection system has been designed. Additionally, due to the
sensitive electronics of the control and protection systems of park,
surge protection, equipotent bonding and shielding were also of
major importance.
Abstract: We propose an all optical flip-flop circuit composedof two Silicon-on-insulator microring resonators coupled to straightwaveguides by exploiting the optical bistability behavior due to thenonlinear Kerr effect. We used the transfer matrix analysis toinvestigate continuous wave propagation through microrings, as wellwe considered the nonlinear switching characteristics of an opticaldevice using a double-coupler silicon ring resonator in presence ofthe Kerr nonlinearity, thus obtaining the bistability behavior of theoutput port, the drop port and also inside the silicon microringresonator. It is shown that the bistability behavior depends on thecontrol of the input wavelength.KeywordsAll optical flip-flops, Kerr effect, microringresonator, optical bistability.
Abstract: The objective is to split a simply connected polygon
into a set of convex quadrilaterals without inserting new
boundary nodes. The presented approach consists in repeatedly
removing quadrilaterals from the polygon. Theoretical results
pertaining to quadrangulation of simply connected polygons are
derived from the usual 2-ear theorem. It produces a quadrangulation
technique with O(n) number of quadrilaterals. The
theoretical methodology is supplemented by practical results
and CAD surface segmentation.
Abstract: The security of computer networks plays a strategic
role in modern computer systems. Intrusion Detection Systems (IDS)
act as the 'second line of defense' placed inside a protected
network, looking for known or potential threats in network traffic
and/or audit data recorded by hosts. We developed an Intrusion
Detection System using LAMSTAR neural network to learn patterns
of normal and intrusive activities, to classify observed system
activities and compared the performance of LAMSTAR IDS with
other classification techniques using 5 classes of KDDCup99 data.
LAMSAR IDS gives better performance at the cost of high
Computational complexity, Training time and Testing time, when
compared to other classification techniques (Binary Tree classifier,
RBF classifier, Gaussian Mixture classifier). we further reduced the
Computational Complexity of LAMSTAR IDS by reducing the
dimension of the data using principal component analysis which in
turn reduces the training and testing time with almost the same
performance.
Abstract: The theoretical investigation is carried out to describe
the effect of increase of pressure waves amplitude in clean and bubbly liquid. The goal of the work is to capture the regime of multiple magnification of acoustic and shock waves in the liquid,
which enables to get appropriate conditions to enlarge collapses of
micro-bubbles. The influence of boundary conditions and frequency
of the governing acoustic field is studied for the case of the
cylindrical acoustic resonator. It has been observed the formation of
standing waves with large amplitude at resonant frequencies. The
interaction of the compression wave with gas and vapor bubbles is
investigated for the convergent channel. It is shown theoretically that
the chemical reactions, which occur inside gas bubbles, provide additional impulse to the wave, that affect strongly on the collapses
of the vapor bubbles
Abstract: Tolerance is a tool for achieving a social cohesion, particularly, among individuals and groups with different values. The aim is to study the characteristics of the ethnic tolerance, the inhabitants of Latvia. The ethnic tolerance is taught as a set of conscious and unconscious orientations of the individual in social interaction and inter-ethnic communication. It uses the tools of empirical studies of the ethnic tolerance which allows to identify the explicitly and implicitly levels of the emotional component of Latvia's residents. Explicit measurements were made using the techniques of self-report which revealed the index of the ethnic tolerance and the ethnic identity of the participants. The implicit component was studied using methods based on the effect of the emotional priming. During the processing of the results, there were calculated indicators of the positive and negative implicit attitudes towards members of their own and other ethnicity as well as the explicit parameters of the ethnic tolerance and the ethnic identity of Latvia-s residents. The implicit measurements of the ratio of neighboring ethnic groups against each other showed a mutual negative attitude whereas the explicit measurements indicate a neutral attitude. The data obtained contribute to a further study of the ethnic tolerance of Latvia's residents.
Abstract: The functional response of an infective is the relationship
between an infected individual-s infection rate and the abundance
of the number of susceptibles that one can potentially be infected.
In this paper, we consider defensive attitudes for HIV prevention
(primary prevention) while at the same time emphasizing on offensive
attitudes that reduce infection for those infected (secondary prevention).
We look at how defenses can protect an uninfected individual
in the case where high risk groups such as commercial sex workers
and those who deliberately go out to look for partners. We propose
an infection cycle that begins with a search, then an encounter,
a proposal and contact. The infection cycle illustrates the various
steps an infected individual goes through to successfully infect a
susceptible. For heterogeneous transmission of HIV, there will be no
infection unless there is contact. The ability to avoid an encounter,
detection, proposal and contact constitute defense.
Abstract: The recognition of handwritten numeral is an
important area of research for its applications in post office, banks
and other organizations. This paper presents automatic recognition of
handwritten Kannada numerals based on structural features. Five
different types of features, namely, profile based 10-segment string,
water reservoir; vertical and horizontal strokes, end points and
average boundary length from the minimal bounding box are used in
the recognition of numeral. The effect of each feature and their
combination in the numeral classification is analyzed using nearest
neighbor classifiers. It is common to combine multiple categories of
features into a single feature vector for the classification. Instead,
separate classifiers can be used to classify based on each visual
feature individually and the final classification can be obtained based
on the combination of separate base classification results. One
popular approach is to combine the classifier results into a feature
vector and leaving the decision to next level classifier. This method
is extended to extract a better information, possibility distribution,
from the base classifiers in resolving the conflicts among the
classification results. Here, we use fuzzy k Nearest Neighbor (fuzzy
k-NN) as base classifier for individual feature sets, the results of
which together forms the feature vector for the final k Nearest
Neighbor (k-NN) classifier. Testing is done, using different features,
individually and in combination, on a database containing 1600
samples of different numerals and the results are compared with the
results of different existing methods.