Abstract: Augmented Reality (AR) shows great promises for
its usage as a tool for simulation and verification of design proposal
of new technological systems. Main advantage of augmented reality
application usage is possibility of creation and simulation of new
technological unit before its realization. This may contribute to
increasing of safety and ergonomics and decreasing of economical
aspects of new proposed unit. Virtual model of proposed workcell
could reveal hidden errors which elimination in later stage of new
workcell creation should cause great difficulties. Paper describes
process of such virtual model creation and possibilities of its
simulation and verification by augmented reality tools.
Abstract: Soy polyol obtained from hydroxylation of soy
epoxide with ethylene glycol were prepared as pre-polyurethane. The
two step process method were applied in the polyurethane synthesis.
The blending of soy polyol with synthetic polyol then simultaneously
carried out to TDI (2,4): MDI (4,4-) (80:20), blowing agent, and
surfactant. Ethylene glycol were not taking part in the polyurethane
synthesis. The inclusion of ethylene glycol were used as a control.
Characterization of polyurethane foam through impact resillience,
indentation deflection, and density can visualize the polyurethane
classifications.
Abstract: In social network analysis the mean nodal degree and
density of the graph can be considered as a measure of the activity of
all actors in the network and this is an important property of a graph
and for making comparisons among networks. Since subjects in a
family or organization are subject to common environment factors, it
is prime interest to study the association between responses.
Therefore, we study the distribution of the mean nodal degree and
density of the graph under correlated binary units. The cross product
ratio is used to capture the intra-units association among subjects.
Computer program and an application are given to show the benefits
of the method.
Abstract: Increasing number of vehicles and lack of awareness among road users may lead to road accidents. However no specific literature was found to rank vehicles involved in accidents based on fuzzy variables of road users. This paper proposes a ranking of four selected motor vehicles involved in road accidents. Human and non-human factors that normally linked with road accidents are considered for ranking. The imprecision or vagueness inherent in the subjective assessment of the experts has led the application of fuzzy sets theory to deal with ranking problems. Data in form of linguistic variables were collected from three authorised personnel of three Malaysian Government agencies. The Multi Criteria Decision Making, fuzzy TOPSIS was applied in computational procedures. From the analysis, it shows that motorcycles vehicles yielded the highest closeness coefficient at 0.6225. A ranking can be drawn using the magnitude of closeness coefficient. It was indicated that the motorcycles recorded the first rank.
Abstract: Due to the limited lifetime of the nodes in ad hoc and sensor networks, energy efficiency needs to be an important design consideration in any routing algorithm. It is known that by employing a virtual backbone in a wireless network, the efficiency of any routing scheme for the network can be improved. One common design for routing protocols in mobile ad hoc networks is to use positioning information; we use the node-s geometric locations to introduce an algorithm that can construct the virtual backbone structure locally in 3D environment. The algorithm construction has a constant time.
Abstract: Here we report on the utilization of Laser-Induced
Breakdown Spectroscopy (LIBS) for determination of Quantum Dots
(QDs) in liquid solution. The process of optimization of experimental
conditions from choosing the carrier medium to application of colloid
QDs is described. The main goal was to get the best possible signal to
noise ratio.
The results obtained from the measurements confirmed the capability
of LIBS technique for qualitative and afterwards quantitative
determination of QDs in liquid solution.
Abstract: This paper studied the synthesis of monoacylglycerol (monolaurin) by glycerolysis of coconut oil and crude glycerol, catalyzed by Carica papaya lipase. Coconut oil obtained from cold pressed extraction method and crude glycerol obtained from the biodiesel plant in Department of Chemistry, Uttaradit Rajabhat University, Thailand which used oils were used as raw materials for biodiesel production through transesterification process catalyzed by sodium hydroxide. The influences of the following variables were studied: (i) type of organic solvent, (ii) molar ratio of substrate, (iii) reaction temperature, (iv) reaction time, (v) lipase dosage, and (vi) initial water activity of enzyme. High yields in monoacylglycerol (58.35%) were obtained with molar ratio of glycerol to oil at 8:1 in ethanol, temperature was controlled at 45oC for 36 hours, the amount of enzyme used was 20 wt% of oil and initial water activity of enzyme at 0.53.
Abstract: Formulation of biological profile is one of the modern roles of forensic anthropologist. The present study was conducted to estimate height using foot and shoeprint length of Malaysian population. The present work can be very useful information in the process of identification of individual in forensic cases based on shoeprint evidence. It can help to narrow down suspects and ease the police investigation. Besides, stature is important parameters in determining the partial identify of unidentified and mutilated bodies. Thus, this study can help the problem encountered in cases of mass disaster, massacre, explosions and assault cases. This is because it is very hard to identify parts of bodies in these cases where people are dismembered and become unrecognizable. Samples in this research were collected from 200 Malaysian adults (100 males and 100 females) with age ranging from 20 to 45 years old. In this research, shoeprint length were measured based on the print of the shoes made from the flat shoes. Other information like gender, foot length and height of subject were also recorded. The data was analyzed using IBM® SPSS Statistics 19 software. Results indicated that, foot length has a strong correlation with stature than shoeprint length for both sides of the feet. However, in the unknown, where the gender was undetermined have shown a better correlation in foot length and shoeprint length parameter compared to males and females analyzed separately. In addition, prediction equations are developed to estimate the stature using linear regression analysis of foot length and shoeprint length. However, foot lengths give better prediction than shoeprint length.
Abstract: This paper suggests a calibration method to reduce
errors occurring due to mobile robot sliding during location estimation
using the Dead-reckoning. Due to sliding of the mobile robot caused
between its wheels and the road surface while on free run, location
estimation can be erroneous. Sliding especially occurs during
cornering of mobile robot. Therefore, in order to reduce these frequent
sliding errors in cornering, we calibrated the mobile robot-s heading
values using a vision camera and templates of the ceiling.
Abstract: Numerical design optimization is a powerful tool that
can be used by engineers during any stage of the design process.
There are many different applications for structural optimization. A
specific application that will be discussed in the following paper is
experimental data matching. Data obtained through tests on a physical
structure will be matched with data from a numerical model of that
same structure. The data of interest will be the dynamic characteristics
of an antenna structure focusing on the mode shapes and modal
frequencies. The structure used was a scaled and simplified model of
the Karoo Array Telescope-7 (KAT-7) antenna structure.
This kind of data matching is a complex and difficult task. This
paper discusses how optimization can assist an engineer during the
process of correlating a finite element model with vibration test data.
Abstract: Crypto System Identification is one of the challenging tasks in Crypt analysis. The paper discusses the possibility of employing Neural Networks for identification of Cipher Systems from cipher texts. Cascade Correlation Neural Network and Back Propagation Network have been employed for identification of Cipher Systems. Very large collection of cipher texts were generated using a Block Cipher (Enhanced RC6) and a Stream Cipher (SEAL). Promising results were obtained in terms of accuracy using both the Neural Network models but it was observed that the Cascade Correlation Neural Network Model performed better compared to Back Propagation Network.
Abstract: The prediction of transmembrane helical segments
(TMHs) in membrane proteins is an important field in the
bioinformatics research. In this paper, a new method based on discrete
wavelet transform (DWT) has been developed to predict the number
and location of TMHs in membrane proteins. PDB coded as 1KQG
was chosen as an example to describe the prediction of the number and
location of TMHs in membrane proteins by using this method. To
access the effect of the method, 80 proteins with known 3D-structure
from Mptopo database are chosen at random as the test objects
(including 325 TMHs), 308 of which can be predicted accurately, the
average predicted accuracy is 96.3%. In addition, the above 80
membrane proteins are divided into 13 groups according to their
function and type. In particular, the results of the prediction of TMHs
of the 13 groups are satisfying.
Abstract: Dichotomization of the outcome by a single cut-off point is an important part of various medical studies. Usually the relationship between the resulted dichotomized dependent variable and explanatory variables is analyzed with linear regression, probit regression or logistic regression. However, in many real-life situations, a certain cut-off point dividing the outcome into two groups is unknown and can be specified only approximately, i.e. surrounded by some (small) uncertainty. It means that in order to have any practical meaning the regression model must be robust to this uncertainty. In this paper, we show that neither the beta in the linear regression model, nor its significance level is robust to the small variations in the dichotomization cut-off point. As an alternative robust approach to the problem of uncertain medical categories, we propose to use the linear regression model with the fuzzy membership function as a dependent variable. This fuzzy membership function denotes to what degree the value of the underlying (continuous) outcome falls below or above the dichotomization cut-off point. In the paper, we demonstrate that the linear regression model of the fuzzy dependent variable can be insensitive against the uncertainty in the cut-off point location. In the paper we present the modeling results from the real study of low hemoglobin levels in infants. We systematically test the robustness of the binomial regression model and the linear regression model with the fuzzy dependent variable by changing the boundary for the category Anemia and show that the behavior of the latter model persists over a quite wide interval.
Abstract: The purpose of this study is to determine in what
ways elementary education prospective teachers are being informed
about innovations and to explain the role of social influence in the
usage process of a technological innovation in terms of genders. The
study group consisted of 300 prospective teachers, including 234
females and 66 males. Data have been collected by a questionnaire
developed by the researchers. The result of the study showed that,
while prospective teachers are being informed about innovations
most frequently by mass media, they rarely seek to take expert
advice. In addition, analysis of results showed that the social
influence on females were significantly higher than males in usage
process of a technological innovation.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: In this paper, the authors examine whether or not there Institute for Information and Communications Policy shows are differences of Japanese Internet users awareness to information security based on individual attributes by using analysis of variance based on non-parametric method. As a result, generally speaking, it is found that Japanese Internet users' awareness to information security is different by individual attributes. Especially, the authors verify that the users who received the information security education would have rather higher recognition concerning countermeasures than other users including self-educated users. It is suggested that the information security education should be enhanced so that the users may appropriately take the information security countermeasures. In addition, the information security policy such as carrying out "e- net caravan" and "information security seminars" are effective in improving the users' awareness on the information security in Japan.
Abstract: This paper proposes a direct power control for
doubly-fed induction machine for variable speed wind power
generation. It provides decoupled regulation of the primary side
active and reactive power and it is suitable for both electric energy
generation and drive applications. In order to control the power
flowing between the stator of the DFIG and the network, a decoupled
control of active and reactive power is synthesized using PI
controllers.The obtained simulation results show the feasibility
and the effectiveness of the suggested method
Abstract: Normally business changes are made in order to
change a level of activity in some way, whether it is sales, cash flow,
productivity, or product portfolio. When attempts are made to make
such changes, too often the business reverts to the old levels of
activity as soon as management attention is diverted. Risk
management is a field of growing interest to project managers as well
as in general business and organizational management. There are
several approaches used to manage risk in projects and this paper is a
brief outline of some that you might encounter, with an indication of
their strengths and weaknesses.
Abstract: There is wide range of scientific workflow systems
today, each one designed to resolve problems at a specific level. In
large collaborative projects, it is often necessary to recognize the
heterogeneous workflow systems already in use by various partners
and any potential collaboration between these systems requires
workflow interoperability. Publish/Subscribe Scientific Workflow
Interoperability Framework (PS-SWIF) approach was proposed to
achieve workflow interoperability among workflow systems. This
paper evaluates the PS-SWIF approach and its system to achieve
workflow interoperability using Web Services with asynchronous
notification messages represented by WS-Eventing standard. This
experiment covers different types of communication models provided
by Workflow Management Coalition (WfMC). These models are:
Chained processes, Nested synchronous sub-processes, Event
synchronous sub-processes, and Nested sub-processes
(Polling/Deferred Synchronous). Also, this experiment shows the
flexibility and simplicity of the PS-SWIF approach when applied to a
variety of workflow systems (Triana, Taverna, Kepler) in local and
remote environments.
Abstract: Multi criteria decision making (MCDM) methods like analytic hierarchy process, ELECTRE and multi-attribute utility theory are critically studied. They have irregularities in terms of the reliability of ranking of the best alternatives. The Routing Decision Support (RDS) algorithm is trying to improve some of their deficiencies. This paper gives a mathematical verification that the RDS algorithm conforms to the test criteria for an effective MCDM method when a linear preference function is considered.