Abstract: The weight constrained shortest path problem
(WCSPP) is one of most several known basic problems in
combinatorial optimization. Because of its importance in many areas
of applications such as computer science, engineering and operations
research, many researchers have extensively studied the WCSPP.
This paper mainly concentrates on the reduction of total search space
for finding WCSP using some existing Genetic Algorithm (GA). For
this purpose, some controlled schemes of genetic operators are
adopted on list chromosome representation. This approach gives a
near optimum solution with smaller elapsed generation than classical
GA technique. From further analysis on the matter, a new
generalized schema theorem is also developed from the philosophy
of Holland-s theorem.
Abstract: Aerial and satellite images are information rich. They are also complex to analyze. For GIS systems, many features require fast and reliable extraction of roads and intersections. In this paper, we study efficient and reliable automatic extraction algorithms to address some difficult issues that are commonly seen in high resolution aerial and satellite images, nonetheless not well addressed in existing solutions, such as blurring, broken or missing road boundaries, lack of road profiles, heavy shadows, and interfering surrounding objects. The new scheme is based on a new method, namely reference circle, to properly identify the pixels that belong to the same road and use this information to recover the whole road network. This feature is invariable to the shape and direction of roads and tolerates heavy noise and disturbances. Road extraction based on reference circles is much more noise tolerant and flexible than the previous edge-detection based algorithms. The scheme is able to extract roads reliably from images with complex contents and heavy obstructions, such as the high resolution aerial/satellite images available from Google maps.
Abstract: A new secure knapsack cryptosystem based on the
Merkle-Hellman public key cryptosystem will be proposed in this
paper. Although it is common sense that when the density is low, the
knapsack cryptosystem turns vulnerable to the low-density attack. The
density d of a secure knapsack cryptosystem must be larger than
0.9408 to avoid low-density attack. In this paper, we investigate a
new Permutation Combination Algorithm. By exploiting this
algorithm, we shall propose a novel knapsack public-key cryptosystem.
Our proposed scheme can enjoy a high density to avoid the
low-density attack. The density d can also exceed 0.9408 to avoid
the low-density attack.
Abstract: In this paper, The T-G-action topology on a set acted
on by a fuzzy T-neighborhood (T-neighborhood, for short) group is
defined as a final T-neighborhood topology with respect to a set of
maps. We mainly prove that this topology is a T-regular Tneighborhood
topology.
Abstract: The theoretical investigation is carried out to describe
the effect of increase of pressure waves amplitude in clean and bubbly liquid. The goal of the work is to capture the regime of multiple magnification of acoustic and shock waves in the liquid,
which enables to get appropriate conditions to enlarge collapses of
micro-bubbles. The influence of boundary conditions and frequency
of the governing acoustic field is studied for the case of the
cylindrical acoustic resonator. It has been observed the formation of
standing waves with large amplitude at resonant frequencies. The
interaction of the compression wave with gas and vapor bubbles is
investigated for the convergent channel. It is shown theoretically that
the chemical reactions, which occur inside gas bubbles, provide additional impulse to the wave, that affect strongly on the collapses
of the vapor bubbles
Abstract: Self-sensing estimates the air gap within an electro
magnetic path by analyzing the bearing coil current and/or voltage
waveform. The self-sensing concept presented in this paper has been
developed within the research project “Active Magnetic Bearings
with Supreme Reliability" and is used for position sensor fault
detection.
Within this new concept gap calculation is carried out by an alldigital
analysis of the digitized coil current and voltage waveform.
For analysis those time periods within the PWM period are used,
which give the best results. Additionally, the concept allows the
digital compensation of nonlinearities, for example magnetic
saturation, without degrading signal quality. This increases the
accuracy and robustness of the air gap estimation and additionally
reduces phase delays.
Beneath an overview about the developed concept first
measurement results are presented which show the potential of this
all-digital self-sensing concept.
Abstract: Pepper spray use has gained momentum since 1992
and although the active ingredient is readily available, it is considered
a weapon with restricted use in many regions, including The
Bahamas. In light of controversy in the literature regarding the
severity of presenting respiration complaints among individuals postacute
exposure of pepper spray inhalation, this descriptive case series
study was conducted to assess the respiratory status of persons
evaluated during a mass casualty in The Bahamas. Parameters noted
were patients- demographics and respiration severity determined via
clinical examination findings, disposition and follow-up review of the
20 persons. Their most common complaint was difficulty breathing
post exposure. Two required admission and stayed for
Abstract: The motivation for adaptive modulation and coding is
to adjust the method of transmission to ensure that the maximum
efficiency is achieved over the link at all times. The receiver
estimates the channel quality and reports it back to the transmitter.
The transmitter then maps the reported quality into a link mode. This
mapping however, is not a one-to-one mapping. In this paper we
investigate a method for selecting the proper modulation scheme.
This method can dynamically adapt the mapping of the Signal-to-
Noise Ratio (SNR) into a link mode. It enables the use of the right
modulation scheme irrespective of changes in the channel conditions
by incorporating errors in the received data. We propose a Markov
model for this method, and use it to derive the average switching
thresholds and the average throughput. We show that the average
throughput of this method outperforms the conventional threshold
method.
Abstract: The aim of this study is to discover secondary school students’ perceptions related to information technologies and the connections between concepts in their cognitive structures. A word association test consisting of six concepts related to information technologies is used to collect data from 244 secondary school students. Concept maps that present students’ cognitive structures are drawn with the help of frequency data. Data are analyzed and interpreted according to the connections obtained as a result of the concept maps. It is determined students associate most with these concepts—computer, Internet, and communication of the given concepts, and associate least with these concepts—computer-assisted education and information technologies. These results show the concepts, Internet, communication, and computer, are an important part of students’ cognitive structures. In addition, students mostly answer computer, phone, game, Internet and Facebook as the key concepts. These answers show students regard information technologies as a means for entertainment and free time activity, not as a means for education.
Abstract: Streaming Applications usually run in parallel or in
series that incrementally transform a stream of input data. It poses a
design challenge to break such an application into distinguishable
blocks and then to map them into independent hardware processing
elements. For this, there is required a generic controller that
automatically maps such a stream of data into independent processing
elements without any dependencies and manual considerations. In
this paper, Kahn Process Networks (KPN) for such streaming
applications is designed and developed that will be mapped on
MPSoC. This is designed in such a way that there is a generic Cbased
compiler that will take the mapping specifications as an input
from the user and then it will automate these design constraints and
automatically generate the synthesized RTL optimized code for
specified application.
Abstract: Bioinformatics and computational biology involve
the use of techniques including applied mathematics,
informatics, statistics, computer science, artificial intelligence,
chemistry, and biochemistry to solve biological problems
usually on the molecular level. Research in computational
biology often overlaps with systems biology. Major research
efforts in the field include sequence alignment, gene finding,
genome assembly, protein structure alignment, protein structure
prediction, prediction of gene expression and proteinprotein
interactions, and the modeling of evolution. Various
global rearrangements of permutations, such as reversals and
transpositions,have recently become of interest because of their
applications in computational molecular biology. A reversal is
an operation that reverses the order of a substring of a permutation.
A transposition is an operation that swaps two adjacent
substrings of a permutation. The problem of determining the
smallest number of reversals required to transform a given
permutation into the identity permutation is called sorting by
reversals. Similar problems can be defined for transpositions
and other global rearrangements. In this work we perform a
study about some genome rearrangement primitives. We show
how a genome is modelled by a permutation, introduce some
of the existing primitives and the lower and upper bounds
on them. We then provide a comparison of the introduced
primitives.
Abstract: Ethanol has been known for a long time, being
perhaps the oldest product obtained through traditional biotechnology
fermentation. Agriculture waste as substrate in fermentation is vastly
discussed as alternative to replace edible food and utilization of
organic material. Pineapple peel, highly potential source as substrate
is a by-product of the pineapple processing industry. Bio-ethanol
from pineapple (Ananas comosus) peel extract was carried out by
controlling fermentation without any treatment. Saccharomyces
ellipsoides was used as inoculum in this fermentation process as it is
naturally found at the pineapple skin. In this study, the capability of
Response Surface Methodology (RSM) for optimization of ethanol
production from pineapple peel extract using Saccharomyces
ellipsoideus in batch fermentation process was investigated. Effect of
five test variables in a defined range of inoculum concentration 6-
14% (v/v), pH (4.0-6.0), sugar concentration (14-22°Brix),
temperature (24-32°C) and time of incubation (30-54 hrs) on the
ethanol production were evaluated. Data obtained from experiment
were analyzed with RSM of MINITAB Software (Version 15)
whereby optimum ethanol concentration of 8.637% (v/v) was
determined. The optimum condition of 14% (v/v) inoculum
concentration, pH 6, 22°Brix, 26°C and 30hours of incubation. The
significant regression equation or model at the 5% level with
correlation value of 99.96% was also obtained.
Abstract: Automatic detection of bleeding is of practical
importance since capsule endoscopy produces an extremely large
number of images. Algorithm development of bleeding detection in
the digestive tract is difficult due to different contrasts among the
images, food dregs, secretion and others. In this study, were assigned
weighting factors derived from the independent features of the
contrast and brightness between bleeding and normality. Spectral
analysis based on weighting factors was fast and accurate. Results
were a sensitivity of 87% and a specificity of 90% when the accuracy
was determined for each pixel out of 42 endoscope images.
Abstract: This paper presents the fundamentals of Origami engineering and its application in nowadays as well as future industry. Several main cores of mathematical approaches such as Huzita- Hatori axioms, Maekawa and Kawasaki-s theorems are introduced briefly. Meanwhile flaps and circle packing by Robert Lang is explained to make understood the underlying principles in designing crease pattern. Rigid origami and its corrugation patterns which are potentially applicable for creating transformable or temporary spaces is discussed to show the transition of origami from paper to thick material. Moreover, some innovative applications of origami such as eyeglass, origami stent and high tech origami based on mentioned theories and principles are showcased in section III; while some updated origami technology such as Vacuumatics, self-folding of polymer sheets and programmable matter folding which could greatlyenhance origami structureare demonstrated in Section IV to offer more insight in future origami.
Abstract: It has been always observed that the effectiveness of
MIS as a support tool for management decisions degenerate after
time of implementation, despite the substantial investments being
made. This is true for organizations at the initial stages of MIS
implementations, manual or computerized. A survey of a sample of
middle to top managers in business and government institutions was
made. A large ratio indicates that the MIS has lost its impact on the
day-to-day operations, and even the response lag time expands
sometimes indefinitely. The data indicates an infant mortality
phenomenon of the bathtub model. Reasons may be monotonous
nature of MIS delivery, irrelevance, irreverence, timeliness, and lack
of adequate detail. All those reasons collaborate to create a degree of
degeneracy. We investigate and model as a bathtub model the
phenomenon of MIS degeneracy that inflicts the MIS systems and
renders it ineffective. A degeneracy index is developed to identify
the status of the MIS system and possible remedies to prevent the
onset of total collapse of the system to the point of being useless.
Abstract: Firms have invested heavily in knowledge
management (KM) with the aim to build a knowledge capability and
use it to achieve a competitive advantage. Research has shown,
however, that not all knowledge management projects succeed. Some
studies report that about 84% of knowledge management projects
fail. This paper has integrated studies on the impediments to
knowledge management into a theoretical framework. Based on this
framework, five cases documenting failed KM initiatives were
analysed. The analysis gave us a clear picture about why certain KM
projects fail. The high failure rate of KM can be explained by the
gaps that exist between users and management in terms of KM
perceptions and objectives
Abstract: Thermal water hammer is a special type of water
hammer which rarely occurs in heat exchangers. In biphasic fluids, if
steam bubbles are surrounded by condensate, regarding lower
condensate temperature than steam, they will suddenly collapse. As a
result, the vacuum caused by an extreme change in volume lead to
movement of the condensates in all directions and their collision the
force produced by this collision leads to a severe stress in the pipe
wall. This phenomenon is a special type of water hammer. According
to fluid mechanics, this phenomenon is a particular type of transient
flows during which abrupt change of fluid leads to sudden pressure
change inside the tube. In this paper, the mechanism of abrupt failure
of 80 tubes of 481 tubes of a methanol heat exchanger is discussed.
Initially, due to excessive temperature differences between heat
transfer fluids and simultaneous failure of 80 tubes, thermal shock
was presupposed as the reason of failure. Deeper investigation on
cross-section of failed tubes showed that failure was, ductile type of
failure, so the first hypothesis was rejected. Further analysis and more
accurate experiments revealed that failure of tubes caused by thermal
water hammer. Finally, the causes of thermal water hammer and
various solutions to avoid such mechanism are discussed.
Abstract: Observations and long-term trends indicate that climate
change impacts would be significant and affects Taiwan directly and
severely. Taiwan engages not only in mitigation, but also in adaptation.
However, there are cognitive gaps on adaptation between government
and populace. Besides, a vision of zero-carbon and renewable energy
100% will be adopted in future. Therefore, the objectives of this
article are to 1) hold a National Forum for knowing differences
between the strategies of zero-carbon and renewable energy 100% and
cognitions of general populace, and 2) plan a clear roadmap for the
vision, strategy, and measures. In this forum, we set 5 group topics, 5
presumed themes, and issues mentioned review for concluding the
critical issues. Finally, there are 4 strategies and 14 critical issues
which correlate with the vision and strategy of government and the
cognition of the general populace.
Abstract: Wireless LAN (WLAN) access in public hotspot areas
becomes popular in the recent years. Since more and more multimedia
information is available in the Internet, there is an increasing demand
for accessing multimedia information through WLAN hotspots.
Currently, the bandwidth offered by an IEEE 802.11 WLAN cannot
afford many simultaneous real-time video accesses. A possible way to
increase the offered bandwidth in a hotspot is the use of multiple access
points (APs). However, a mobile station is usually connected to the
WLAN AP with the strongest received signal strength indicator (RSSI).
The total consumed bandwidth cannot be fairly allocated among those
APs. In this paper, we will propose an effective load-balancing scheme
via the support of the IAPP and SNMP in APs. The proposed scheme is
an open solution and doesn-t need any changes in both wireless stations
and APs. This makes load balancing possible in WLAN hotspots,
where a variety of heterogeneous mobile devices are employed.
Abstract: This paper studies, maps and explains the interactions between downloaders and uploaders pertaining to the Internet film piracy. This study also covers several motivational factors that influence users to upload or download movies, and thus to engage in film piracy over the Internet. The essay also proposes a model that describes user behavior including their relationships and influences. Moreover, proposed theoretical interactions and motivational factors are applied to the real world scenario, using examples of a data storage webpage server Ulozto.net and webpage Piratebay.org gathering information about downloadable BitTorrents. Moreover, the theory is further supported by description of behavior of real Internet uploaders.