Abstract: This paper aims to present a survey of object
recognition/classification methods based on image moments. We
review various types of moments (geometric moments, complex
moments) and moment-based invariants with respect to various
image degradations and distortions (rotation, scaling, affine
transform, image blurring, etc.) which can be used as shape
descriptors for classification. We explain a general theory how to
construct these invariants and show also a few of them in explicit
forms. We review efficient numerical algorithms that can be used
for moment computation and demonstrate practical examples of
using moment invariants in real applications.
Abstract: The effect of phosphorus supplementation of ammoniated rice straw was studied. The in vitro experiment was carried out following the first stage of Tilley and Terry method. The treatments consisting of four diets were A = 50% ammoniated rice straw + 50% concentrate (control), B = A + 0.2% Phosphor (P) supplement, C = A + 0.4% Phosphor (P) supplement, and D = A + 0.6% Phosphor (P) supplement of dry matter. Completely randomized design was used as the experimental design with differences among treatment means were examined using Duncan multiple range test. Variables measured were total bacterial and cellulolytic bacterial population, cellulolytic enzyme activity, ammonia (NH3) and volatile fatty acid (VFA) concentrations, as fermentability indicators and synthesized microbial protein, as well as degradability indicators including dry matter (DM), organic matter (OM), neutral detergent fibre (NDF), acid detergent fibre (ADF) and cellulose. The results indicated that fermentability and degradability of diets consisting ammoniated rice straw with P supplementation were significantly higher than the control diet (P< 0.05). It is concluded that P supplementation is important to improve fermentability and degradability of rations containing ammoniated RS and concentrate. In terms of the most effective level of P supplementation occurred at a supplementation rate of 0.4% of dry matter.
Abstract: This paper focuses on reducing the power consumption
of wireless sensor networks. Therefore, a communication protocol
named LEACH (Low-Energy Adaptive Clustering Hierarchy) is modified.
We extend LEACHs stochastic cluster-head selection algorithm
by a modifying the probability of each node to become cluster-head
based on its required energy to transmit to the sink. We present
an efficient energy aware routing algorithm for the wireless sensor
networks. Our contribution consists in rotation selection of clusterheads
considering the remoteness of the nodes to the sink, and then,
the network nodes residual energy. This choice allows a best distribution
of the transmission energy in the network. The cluster-heads
selection algorithm is completely decentralized. Simulation results
show that the energy is significantly reduced compared with the
previous clustering based routing algorithm for the sensor networks.
Abstract: Dilated cardiomyopathy (DCM) is a severe
cardiovascular disorder characterized by progressive systolic
dysfunction due to cardiac chamber dilatation and inefficient
myocardial contractility often leading to chronic heart failure.
Recently, a genome-wide association studies (GWASs) on DCM
indicate that the ZBTB17 gene rs10927875 single nucleotide
polymorphism is associated with DCM. The aim of the study was to
identify the distribution of ZBTB17 gene rs10927875 polymorphism
in 50 Slovak patients with DCM and 80 healthy control subjects
using the Custom Taqman®SNP Genotyping assays. Risk factors
detected at baseline in each group included age, sex, body mass
index, smoking status, diabetes and blood pressure. The mean age of
patients with DCM was 52.9±6.3 years; the mean age of individuals
in control group was 50.3±8.9 years. The distribution of investigated
genotypes of rs10927875 polymorphism within ZBTB17 gene in the
cohort of Slovak patients with DCM was as follows: CC (38.8%), CT
(55.1%), TT (6.1%), in controls: CC (43.8%), CT (51.2%), TT
(5.0%). The risk allele T was more common among the patients with
dilated cardiomyopathy than in normal controls (33.7% versus
30.6%). The differences in genotype or allele frequencies of ZBTB17
gene rs10927875 polymorphism were not statistically significant
(p=0.6908; p=0.6098). The results of this study suggest that ZBTB17
gene rs10927875 polymorphism may be a risk factor for
susceptibility to DCM in Slovak patients with DCM. Studies of
numerous files and additional functional investigations are needed to
fully understand the roles of genetic associations.
Abstract: This paper analyzes different techniques of the fine grained security of relational databases for the two variables-data accessibility and inference. Data accessibility measures the amount of data available to the users after applying a security technique on a table. Inference is the proportion of information leakage after suppressing a cell containing secret data. A row containing a secret cell which is suppressed can become a security threat if an intruder generates useful information from the related visible information of the same row. This paper measures data accessibility and inference associated with row, cell, and column level security techniques. Cell level security offers greatest data accessibility as it suppresses secret data only. But on the other hand, there is a high probability of inference in cell level security. Row and column level security techniques have least data accessibility and inference. This paper introduces cell plus innocent security technique that utilizes the cell level security method but suppresses some innocent data to dodge an intruder that a suppressed cell may not necessarily contain secret data. Four variations of the technique namely cell plus innocent 1/4, cell plus innocent 2/4, cell plus innocent 3/4, and cell plus innocent 4/4 respectively have been introduced to suppress innocent data equal to 1/4, 2/4, 3/4, and 4/4 percent of the true secret data inside the database. Results show that the new technique offers better control over data accessibility and inference as compared to the state-of-theart security techniques. This paper further discusses the combination of techniques together to be used. The paper shows that cell plus innocent 1/4, 2/4, and 3/4 techniques can be used as a replacement for the cell level security.
Abstract: In this paper, we focused primarily on Istanbul data
that is gathered by using intelligent transportation systems (ITS), and
considered the developments in traffic information delivery and
future applications that are being planned for implementation. Since
traffic congestion is increasing and travel times are becoming less
consistent and less predictable, traffic information delivery has
become a critical issue. Considering the fuel consumption and wasted
time in traffic, advanced traffic information systems are becoming
increasingly valuable which enables travelers to plan their trips more
accurately and easily.
Abstract: The objective of this research was to study influence
parameters affecting to mechanical property of austenitic stainless
steel grade 304 (AISI 304) with Gas Metal Arc Welding (GMAW).
The research was applying factorial design experiment, which have
following interested parameters: welding current at 80, 90, and 100
Amps, welding speeds at 250, 300, and 350 mm/min, and shield gas
of 75% Ar + 25% CO2, 70% Ar + 25% CO2 + 5% O2 and 69.5% Ar +
25% CO2 + 5% O2 + 0.5% He gas. The study was done in following
aspects: ultimate tensile strength and elongation. A research study of
ultimate tensile strength found that main factor effect, which had the
highest strength to AISI 304 welding was shield gas of 70% Ar +
25% CO2 + 5% O2 at average of 954.81 N/mm2. Result of the highest
elongation was showed significantly different at interaction effect
between shield gas of 69.5%Ar+25%CO2+5%O2+.5%He and
welding speed at 250 mm/min at 47.94%.
Abstract: In this paper we proposed a novel method to acquire
the ROI (Region of interest) of unsupervised and touch-less palmprint
captured from a web camera in real-time. We use Viola-Jones
approach and skin model to get the target area in real time. Then an
innovative course-to-fine approach to detect the key points on the hand
is described. A new algorithm is used to find the candidate key points
coarsely and quickly. In finely stage, we verify the hand key points
with the shape context descriptor. To make the user much comfortable,
it can process the hand image with different poses, even the hand is
closed. Experiments show promising result by using the proposed
method in various conditions.
Abstract: Many water supply systems in Australia are currently
undergoing significant reconfiguration due to reductions in long term
average rainfall and resulting low inflows to water supply reservoirs
since the second half of the 20th century. When water supply systems
undergo change, it is necessary to develop new operating rules,
which should consider climate, because the climate change is likely
to further reduce inflows. In addition, water resource systems are
increasingly intended to be operated to meet complex and multiple
objectives representing social, economic, environmental and
sustainability criteria. This is further complicated by conflicting
preferences on these objectives from diverse stakeholders. This paper
describes a methodology to develop optimum operating rules for
complex multi-reservoir systems undergoing significant change,
considering all of the above issues. The methodology is demonstrated
using the Grampians water supply system in northwest Victoria,
Australia. Initial work conducted on the project is also presented in
this paper.
Abstract: Web services are pieces of software that can be invoked via a standardized protocol. They can be combined via formalized taskflow languages. The Open Knowledge system is a fully distributed system using P2P technology, that allows users to publish the setaskflows, and programmers to register their web services or publish implementations of them, for the roles described in these workflows.Besides this, the system offers the functionality to select a peer that could coordinate such an interaction model and inform web services when it is their 'turn'. In this paper we describe the architecture and implementation of the Open Knowledge Kernel which provides the core functionality of the Open Knowledge system.
Abstract: Given a simple connected unweighted undirected graph G = (V (G), E(G)) with |V (G)| = n and |E(G)| = m, we present a new algorithm for the all-pairs shortest-path (APSP) problem. The running time of our algorithm is in O(n2 log n). This bound is an improvement over previous best known O(n2.376) time bound of Raimund Seidel (1995) for general graphs. The algorithm presented does not rely on fast matrix multiplication. Our algorithm with slight modifications, enables us to compute the APSP problem for unweighted directed graph in time O(n2 log n), improving a previous best known O(n2.575) time bound of Uri Zwick (2002).
Abstract: Among neural models the Support Vector Machine
(SVM) solutions are attracting increasing attention, mostly because
they eliminate certain crucial questions involved by neural network
construction. The main drawback of standard SVM is its high
computational complexity, therefore recently a new technique, the
Least Squares SVM (LS–SVM) has been introduced. In this paper we
present an extended view of the Least Squares Support Vector
Regression (LS–SVR), which enables us to develop new
formulations and algorithms to this regression technique. Based on
manipulating the linear equation set -which embodies all information
about the regression in the learning process- some new methods are
introduced to simplify the formulations, speed up the calculations
and/or provide better results.
Abstract: Turbine blade cooling is considered as the most
effective way of maintaining high operating temperature making use
of the available materials, and turbine systems with wet compression
have a potential for future power generation because of high efficiency
and high specific power with a relatively low cost. In this paper
performance analysis of wet-compression gas turbine cycle with
turbine blade cooling is carried out. The wet compression process is
analytically modeled based on non-equilibrium droplet evaporation.
Special attention is paid for the effects of pressure ratio and water
injection ratio on the important system variables such as ratio of
coolant fluid flow, fuel consumption, thermal efficiency and specific
power. Parametric studies show that wet compression leads to
insignificant improvement in thermal efficiency but significant
enhancement of specific power in gas turbine systems with turbine
blade cooling.
Abstract: Relational databases are often used as a basis for persistent storage of ontologies to facilitate rapid operations such as search and retrieval, and to utilize the benefits of relational databases management systems such as transaction management, security and integrity control. On the other hand, there appear more and more OWL files that contain ontologies. Therefore, this paper proposes to extract ontologies from OWL files and then store them in relational databases. A prerequisite for this storing is transformation of ontologies to relational databases, which is the purpose of this paper.
Abstract: Two cultivars ('Rutuliai', 'Saint Perrie') and five
hybrids ('Tolstoi', 'Brooklyn', 'Tocayo', 'Benito', 'Tourist') of edible
tomato (Lycopersicon esculentum Mill.) were investigated at the
LRCAF Institute of Horticulture. The following fruit quality
parameters were evaluated: the amount of lycopene, β-carotene,
ascorbic acid, total and inverted sugar, sucrose, dry matter soluble
solids in fresh tomato matter, also were determined fruit skin and
flesh firmness, color indexes (CIE L*a*b*) and calculated hue angle
(h°) with chroma (C).
Abstract: Westudy a dual-channel supply chain under
decentralized setting in which manufacturer sells to retailer and to
customers directly usingan online channel. A customer chooses the
purchase-channel based on price and service quality. Also, to buy
product from the retail store, the customer incurs a transportation cost
influenced by the fluctuating gasoline cost. Both companies are under
the revenue sharing contract. In this contract the retailer share a
portion of the revenue to the manufacturer while the manufacturer
will charge the lower wholesales price. The numerical result shows
that the effects of gasoline costs, the revenue sharing ratio and the
wholesale price play an important role in determining optimal prices.
The result shows that when the gasoline price fluctuatesthe optimal
on-line priceis relatively stable while the optimal retail price moves
in the opposite direction of the gasoline prices.
Abstract: This paper reports a new and accurate method for load-flow solution of radial distribution networks with minimum data preparation. The node and branch numbering need not to be sequential like other available methods. The proposed method does not need sending-node, receiving-node and branch numbers if these are sequential. The proposed method uses the simple equation to compute the voltage magnitude and has the capability to handle composite load modelling. The proposed method uses the set of nodes of feeder, lateral(s) and sub lateral(s). The effectiveness of the proposed method is compared with other methods using two examples. The detailed load-flow results for different kind of load-modellings are also presented.
Abstract: Proprietary sensor network systems are typically expensive, rigid and difficult to incorporate technologies from other vendors. When using competing and incompatible technologies, a non-proprietary system is complex to create because it requires significant technical expertise and effort, which can be more expensive than a proprietary product. This paper presents the Sensor Abstraction Layer (SAL) that provides middleware architectures with a consistent and uniform view of heterogeneous sensor networks, regardless of the technologies involved. SAL abstracts and hides the hardware disparities and specificities related to accessing, controlling, probing and piloting heterogeneous sensors. SAL is a single software library containing a stable hardware-independent interface with consistent access and control functions to remotely manage the network. The end-user has near-real-time access to the collected data via the network, which results in a cost-effective, flexible and simplified system suitable for novice users. SAL has been used for successfully implementing several low-cost sensor network systems.
Abstract: This paper was to study the clothes dryer using waste
heat from a split type air conditioner with a capacity of 12,648 btu/h.
The drying chamber had a minimum cross section area with the size
of 0.5 x 1.0 m2. The chamber was constructed by sailcloth and was
inside folded with aluminium foil. Then, it was connected to the
condensing unit of an air conditioner. The experiment was carried out
in two aspects which were the clothes drying with and without
auxiliary fan unit. The results showed that the drying rate of clothes
in the chamber installed with and without auxiliary fan unit were
2.26 and 1.1 kg/h, respectively. In case of the chamber installed with
a auxiliary fan unit, the additional power of 0.011 kWh was
consumed and the drying rate was higher than that of clothes drying
without auxiliary fan unit. Without auxiliary fan unit installation, no
energy was required but there was a portion of hot air leaks away
through the punctured holes at the wall of the drying chamber, hence
the drying rate was dropped below. The drying rate of clothes drying
using waste heat was higher than natural indoor drying and
commercial dryer which their drying rate were 0.17 and 1.9 kg/h,
respectively. It was noted that the COP of the air conditioner did not
change during the operating of clothes drying.
Abstract: To increase precision and reliability of automatic control systems, we have to take into account of random factors affecting the control system. Thus, operational matrix technique is used for statistical analysis of first order plus time delay system with uniform random parameter. Examples with deterministic and stochastic disturbance are considered to demonstrate the validity of the method. Comparison with Monte Carlo method is made to show the computational effectiveness of the method.