Abstract: This paper proposes a novel feature extraction method,
based on Discrete Wavelet Transform (DWT) and K-L Seperability
(KLS), for the classification of Functional Data (FD). This method
combines the decorrelation and reduction property of DWT and the
additive independence property of KLS, which is helpful to extraction
classification features of FD. It is an advanced approach of the
popular wavelet based shrinkage method for functional data reduction
and classification. A theory analysis is given in the paper to prove the
consistent convergence property, and a simulation study is also done
to compare the proposed method with the former shrinkage ones. The
experiment results show that this method has advantages in improving
classification efficiency, precision and robustness.
Abstract: We employ the idea of Hirota-s bilinear method, to obtain some new exact soliton solutions for high nonlinear form of (2+1)-dimensional potential Kadomtsev-Petviashvili equation. Multiple singular soliton solutions were obtained by this method. Moreover, multiple singular soliton solutions were also derived.
Abstract: The paper presents frame and burst acquisition in a satellite communication network based on time division multiple access (TDMA) in which the transmissions may be carried on different transponders. A unique word pattern is used for the acquisition process. The search for the frame is aided by soft-decision of QPSK modulated signals in an additive white Gaussian channel. Results show that when the false alarm rate is low the probability of detection is also low, and the acquisition time is long. Conversely when the false alarm rate is high, the probability of detection is also high and the acquisition time is short. Thus the system operators can trade high false alarm rates for high detection probabilities and shorter acquisition times.
Abstract: In this researcha particle swarm optimization (PSO)
algorithm is proposedfor no-wait flowshopsequence dependent
setuptime scheduling problem with weighted earliness-tardiness
penalties as the criterion (|,
|Σ
"
).The
smallestposition value (SPV) rule is applied to convert the continuous
value of position vector of particles in PSO to job permutations.A
timing algorithm is generated to find the optimal schedule and
calculate the objective function value of a given sequence in PSO
algorithm. Twodifferent neighborhood structures are applied to
improve the solution quality of PSO algorithm.The first one is based
on variable neighborhood search (VNS) and the second one is a
simple one with invariable structure. In order to compare the
performance of two neighborhood structures, random test problems
are generated and solved by both neighborhood
approaches.Computational results show that the VNS algorithmhas
better performance than the other one especially for the large sized
problems.
Abstract: The Yazd-Ardakan basin in Central Iran has two separated aquifers. The shallow unconfined aquifer is supplies 40 Qanats. The deep saturated confined aquifer is the main water storage. Due to over-withdrawal, water table has been decreasing during last 25 years. Recent study shows that the shortage of the aquifer is about 16 meters and land subsidence is 0.5 - 1.2 meters. Long deep cracks are found just above the aquifer and devour the irrigation water and floods. Although the most cracks direction is NW-SE and could be compared to the main direction of YA basin, there is no direct evidence for relation between land subsidence and the huge cracks. Large-scale water pumping has been decreased the water pressure in aquifer. The pressure decline disturbed the balance and increased the pressure of overlying sediments. So porosity decreased and compaction started. Then, sediments compaction developed and made land subsidence and some huge cracks slowly.
Abstract: Large-scale systems such as Grids offer
infrastructures for both data distribution and parallel processing. The
use of Grid infrastructures is a more recent issue that is already
impacting the Distributed Database Management System industry. In
DBMS, distributed query processing has emerged as a fundamental
technique for ensuring high performance in distributed databases.
Database placement is particularly important in large-scale systems
because it reduces communication costs and improves resource
usage. In this paper, we propose a dynamic database placement
policy that depends on query patterns and Grid sites capabilities. We
evaluate the performance of the proposed database placement policy
using simulations. The obtained results show that dynamic database
placement can significantly improve the performance of distributed
query processing.
Abstract: The main issue discussed is on the role of education system in the process of nation building as a means in uniting different community ethnics which later on, hoped to shape the future ethnic relation of this country. It is generally known that political socialization experienced by each ethnic community has given birth to a vernacular education system, separated along the ethnic line. Every community shapes their own education system based on their respective mother tongue language, however all are based on the same curriculum. As a result the role of education as a uniting force is not significantly effective. Historically, it has been shown that government efforts to unite the country education system under the wing of national education system (national school) is not that successful since every community (Chinese) will defend the existence of their community education system because they want to spur their mother tongue language. The clash between national education system and vernacular education system is the root cause of stalemate in the ethnic relation in Malaysia and it always becomes a flash point when the issue is raised. The question now is what is the best solution to enhance the national education system in multiethnic Malaysia?
Abstract: Wireless sensor networks include small nodes which
have sensing ability; calculation and connection extend themselves
everywhere soon. Such networks have source limitation on
connection, calculation and energy consumption. So, since the nodes
have limited energy in sensor networks, the optimized energy
consumption in these networks is of more importance and has created
many challenges. The previous works have shown that by organizing
the network nodes in a number of clusters, the energy consumption
could be reduced considerably. So the lifetime of the network would
be increased. In this paper, we used the Queen-bee algorithm to
create energy efficient clusters in wireless sensor networks. The
Queen-bee (QB) is similar to nature in that the queen-bee plays a
major role in reproduction process. The QB is simulated with J-sim
simulator. The results of the simulation showed that the clustering by
the QB algorithm decreases the energy consumption with regard to
the other existing algorithms and increases the lifetime of the
network.
Abstract: As a matter of the fact that online social networks like
Twitter, Facebook and MySpace have experienced an extensive
growth in recent years. Social media offers individuals with a tool for
communicating and interacting with one another. These social
networks enable people to stay in touch with other people and
express themselves. This process makes the users of online social
networks active creators of content rather than being only consumers
of traditional media. That’s why millions of people show strong
desire to learn the methods and tools of digital content production
and necessary communication skills. However, the booming interest
in communication and interaction through online social networks and
high level of eagerness to invent and implement the ways to
participate in content production raise some privacy and security
concerns.
This presentation aims to open the assumed revolutionary,
democratic and liberating nature of the online social media up for
discussion by reviewing some recent political developments in
Turkey. Firstly, the role of Internet and online social networks in
mobilizing collective movements through social interactions and
communications will be questioned. Secondly, some cases from Gezi
and Okmeydanı Protests and also December 17-25 period will be
presented in order to illustrate misinformation and manipulation in
social media and violation of individual privacy through online social
networks in order to damage social unity and stability contradictory
to democratic nature of online social networking.
Abstract: Due to their high power-to-weight ratio and low cost,
pneumatic actuators are attractive for robotics and automation
applications; however, achieving fast and accurate control of their
position have been known as a complex control problem. A
methodology for obtaining high position accuracy with a linear
pneumatic actuator is presented. During experimentation with a
number of PID classical control approaches over many operations of
the pneumatic system, the need for frequent manual re-tuning of the
controller could not be eliminated. The reason for this problem is
thermal and energy losses inside the cylinder body due to the
complex friction forces developed by the piston displacements.
Although PD controllers performed very well over short periods, it
was necessary in our research project to introduce some form of
automatic gain-scheduling to achieve good long-term performance.
We chose a fuzzy logic system to do this, which proved to be an
easily designed and robust approach. Since the PD approach showed
very good behaviour in terms of position accuracy and settling time,
it was incorporated into a modified form of the 1st order Tagaki-
Sugeno fuzzy method to build an overall controller. This fuzzy gainscheduler
uses an input variable which automatically changes the PD
gain values of the controller according to the frequency of repeated
system operations. Performance of the new controller was
significantly improved and the need for manual re-tuning was
eliminated without a decrease in performance. The performance of
the controller operating with the above method is going to be tested
through a high-speed web network (GRID) for research purposes.
Abstract: The expression of LFA-1 diverges from the
physiological condition, thus active targeting carrier can provide the
benefits from difference into LFA-1 expression in various conditions.
Here, the selectivity of cIBR-conjugated nanoparticles (cIBR-NPs),
in terms of uptake, was investigated using PBMCs, Mixed PBMCMolt-
3 cells and Molt-3 cells. The expressions of LFA-1 on Molt-3
cells, from flow cytometry and Western blot, possessed the highest
level whereas PBMCs showed the lowest level. The kinetic uptake
profiles of cIBR-NPs were obtained by flow cytometry, which the
degree of cellular uptake presented a similar trend with the level of
LFA-1 indicating the influence of LFA-1 expression on the cellular
uptake of cIBR-NPs. The conformation of LFA-1 had a slight effect
on the cellular uptake of cIBR-NPs. Overall we demonstrated that
cIBR-NPs enhanced cellular uptake and improved the selectivity of
drug carriers to LFA-1 on the leukemia cells, which related with the
order of LFA-1 expression.
Abstract: The aim of this work is to study the elastic transfer
phenomenon which takes place in the elastic scattering of 16O on 12C
at energies near the Coulomb barrier. Where, the angular distribution
decrease steadily with increasing the scattering angle, then the cross
section will increase at backward angles due to the α-transfer process.
This reaction was also studied at different energies for tracking the
nuclear rainbow phenomenon. The experimental data of the angular
distribution at these energies were compared to the calculation
predictions. The optical potential codes such as SPIVAL and
Distorted Wave Born Approximation (DWUCK5) were used in
analysis.
Abstract: In this paper, we construct and implement a new
Steganography algorithm based on learning system to hide a large
amount of information into color BMP image. We have used adaptive
image filtering and adaptive non-uniform image segmentation with
bits replacement on the appropriate pixels. These pixels are selected
randomly rather than sequentially by using new concept defined by
main cases with sub cases for each byte in one pixel. According to
the steps of design, we have been concluded 16 main cases with their
sub cases that covere all aspects of the input information into color
bitmap image. High security layers have been proposed through four
layers of security to make it difficult to break the encryption of the
input information and confuse steganalysis too. Learning system has
been introduces at the fourth layer of security through neural
network. This layer is used to increase the difficulties of the statistical
attacks. Our results against statistical and visual attacks are discussed
before and after using the learning system and we make comparison
with the previous Steganography algorithm. We show that our
algorithm can embed efficiently a large amount of information that
has been reached to 75% of the image size (replace 18 bits for each
pixel as a maximum) with high quality of the output.
Abstract: In this study, Friction Stir Processing (FSP) a recent grain refinement technique was employed to disperse micron-sized (2 *m) SiCp particles into aluminum alloy AA6063. The feasibility to fabricate bulk composites through FSP was analyzed and experiments were conducted at different traverse speeds and wider volumes of the specimens. Micro structural observation were carried out by employing optical microscopy test of the cross sections in both parallel and perpendicular to the tool traverse direction. Mechanical property including micro hardness was evaluated in detail at various regions on the specimen. The composites had an excellent bonding with aluminum alloy substrate and a significant increase of 30% in the micro hardness value of metal matrix composite (MMC) as to that of the base metal has observed. The observations clearly indicate that SiC particles were uniformly distributed within the aluminum matrix.
Abstract: In a wind power generator using doubly fed induction
generator (DFIG), the three-phase pulse width modulation (PWM)
voltage source converter (VSC) is used as grid side converter (GSC)
and rotor side converter (RSC). The standard linear control laws
proposed for GSC provides not only instablity against comparatively
large-signal disturbances, but also the problem of stability due to
uncertainty of load and variations in parameters. In this paper, a
nonlinear controller is designed for grid side converter (GSC) of a
DFIG for wind power application. The nonlinear controller is
designed based on the input-output feedback linearization control
method. The resulting closed-loop system ensures a sufficient
stability region, make robust to variations in circuit parameters and
also exhibits good transient response. Computer simulations and
experimental results are presented to confirm the effectiveness of the
proposed control strategy.
Abstract: The article examines the methods of protection of
citizens' personal data on the Internet using biometric identity
authentication technology. It`s celebrated their potential danger due
to the threat of loss of base biometric templates. To eliminate the
threat of compromised biometric templates is proposed to use neural
networks large and extra-large sizes, which will on the one hand
securely (Highly reliable) to authenticate a person by his biometrics,
and on the other hand make biometrics a person is not available for
observation and understanding. This article also describes in detail
the transformation of personal biometric data access code. It`s formed
the requirements for biometrics converter code for his work with the
images of "Insider," "Stranger", all the "Strangers". It`s analyzed the
effect of the dimension of neural networks on the quality of
converters mystery of biometrics in access code.
Abstract: In the paper a detailed analysis of the dynamic
response of a cooling tower shell to mining tremors originated from
two main regions of mining activity in Poland (Upper Silesian Coal
Basin and Legnica-Glogow Copper District) was presented. The
representative time histories registered in the both regions were used
as ground motion data in calculations of the dynamic response of the
structure. It was proved that the dynamic response of the shell is
strongly dependent not only on the level of vibration amplitudes but
on the dominant frequency range of the mining shock typical for the
mining region as well. Also a vertical component of vibrations
occurred to have considerable influence on the total dynamic
response of the shell. Finally, it turned out that non-uniformity of
kinematic excitation resulting from spatial variety of ground motion
plays a significant role in dynamic analysis of large-dimensional
shells under mining shocks.
Abstract: The hydrodynamic and thermal lattice Boltzmann
methods are applied to investigate the turbulent convective heat
transfer in the wavy channel flows. In this study, the turbulent
phenomena are modeling by large-eddy simulations with the
Smagorinsky model. As a benchmark, the laminar and turbulent
backward-facing step flows are simulated first. The results give good
agreement with other numerical and experimental data. For wavy
channel flows, the distribution of Nusselt number and the skin-friction
coefficients are calculated to evaluate the heat transfer effect and the
drag force. It indicates that the vortices at the trough would affect the
magnitude of drag and weaken the heat convection effects on the wavy
surface. In turbulent cases, if the amplitude of the wavy boundary is
large enough, the secondary vortices would be generated at troughs
and contribute to the heat convection. Finally, the effects of different
Re on the turbulent transport phenomena are discussed.
Abstract: This paper considers the integration of assembly
operations and product structure to Cellular Manufacturing System
(CMS) design so that to correct the drawbacks of previous researches
in the literature. For this purpose, a new mathematical model is
developed which dedicates machining and assembly operations to
manufacturing cells while the objective function is to minimize the
intercellular movements resulting due to both of them. A
linearization method is applied to achieve optimum solution through
solving aforementioned nonlinear model by common programming
language such as Lingo. Then, using different examples and
comparing the results, the importance of integrating assembly
considerations is demonstrated.
Abstract: Due to the increasing penetration of wind energy, it is
necessary to possess design tools that are able to simulate the impact
of these installations in utility grids. In order to provide a net
contribution to this issue a detailed wind park model has been
developed and is briefly presented. However, the computational costs
associated with the performance of such a detailed model in
describing the behavior of a wind park composed by a considerable
number of units may render its practical application very difficult. To
overcome this problem integral manifolds theory has been applied to
reduce the order of the detailed wind park model, and therefore
create the conditions for the development of a dynamic equivalent
which is able to retain the relevant dynamics with respect to the
existing a.c. system. In this paper integral manifold method has been
introduced for order reduction. Simulation results of the proposed
method represents that integral manifold method results fit the
detailed model results with a higher precision than singular
perturbation method.