Abstract: Modeling of complex dynamic systems, which are
very complicated to establish mathematical models, requires new and
modern methodologies that will exploit the existing expert
knowledge, human experience and historical data. Fuzzy cognitive
maps are very suitable, simple, and powerful tools for simulation and
analysis of these kinds of dynamic systems. However, human experts
are subjective and can handle only relatively simple fuzzy cognitive
maps; therefore, there is a need of developing new approaches for an
automated generation of fuzzy cognitive maps using historical data.
In this study, a new learning algorithm, which is called Big Bang-Big
Crunch, is proposed for the first time in literature for an automated
generation of fuzzy cognitive maps from data. Two real-world
examples; namely a process control system and radiation therapy
process, and one synthetic model are used to emphasize the
effectiveness and usefulness of the proposed methodology.
Abstract: Vertex configuration for a vertex in an orthogonal
pseudo-polyhedron is an identity of a vertex that is determined by the
number of edges, dihedral angles, and non-manifold properties
meeting at the vertex. There are up to sixteen vertex configurations
for any orthogonal pseudo-polyhedron (OPP). Understanding the
relationship between these vertex configurations will give us insight
into the structure of an OPP and help us design better algorithms for
many 3-dimensional geometric problems. In this paper, 16 vertex
configurations for OPP are described first. This is followed by a
number of formulas giving insight into the relationship between
different vertex configurations in an OPP. These formulas
will be useful as an extension of orthogonal polyhedra usefulness on
pattern analysis in 3D-digital images.
Abstract: Purpose of this work is the development of an
automatic classification system which could be useful for radiologists
in the investigation of breast cancer. The software has been designed
in the framework of the MAGIC-5 collaboration.
In the automatic classification system the suspicious regions with
high probability to include a lesion are extracted from the image as
regions of interest (ROIs). Each ROI is characterized by some
features based on morphological lesion differences.
Some classifiers as a Feed Forward Neural Network, a K-Nearest
Neighbours and a Support Vector Machine are used to distinguish the
pathological records from the healthy ones.
The results obtained in terms of sensitivity (percentage of
pathological ROIs correctly classified) and specificity (percentage of
non-pathological ROIs correctly classified) will be presented through
the Receive Operating Characteristic curve (ROC). In particular the
best performances are 88% ± 1 of area under ROC curve obtained
with the Feed Forward Neural Network.
Abstract: An important structuring mechanism for knowledge bases is building clusters based on the content of their knowledge objects. The objects are clustered based on the principle of maximizing the intraclass similarity and minimizing the interclass similarity. Clustering can also facilitate taxonomy formation, that is, the organization of observations into a hierarchy of classes that group similar events together. Hierarchical representation allows us to easily manage the complexity of knowledge, to view the knowledge at different levels of details, and to focus our attention on the interesting aspects only. One of such efficient and easy to understand systems is Hierarchical Production rule (HPRs) system. A HPR, a standard production rule augmented with generality and specificity information, is of the following form Decision If < condition> Generality Specificity . HPRs systems are capable of handling taxonomical structures inherent in the knowledge about the real world. In this paper, a set of related HPRs is called a cluster and is represented by a HPR-tree. This paper discusses an algorithm based on cumulative learning scenario for dynamic structuring of clusters. The proposed scheme incrementally incorporates new knowledge into the set of clusters from the previous episodes and also maintains summary of clusters as Synopsis to be used in the future episodes. Examples are given to demonstrate the behaviour of the proposed scheme. The suggested incremental structuring of clusters would be useful in mining data streams.
Abstract: Digital signature is a useful primitive to attain the integrity and authenticity in various wire or wireless communications. Proxy signature is one type of the digital signatures. It helps the proxy signer to sign messages on behalf of the original signer. It is very useful when the original signer (e.g. the president of a company) is not available to sign a specific document. If the original signer can not forge valid proxy signatures through impersonating the proxy signer, it will be robust in a virtual environment; thus the original signer can not shift any illegal action initiated by herself to the proxy signer. In this paper, we propose a new proxy signature scheme. The new scheme can prevent the original signer from impersonating the proxy signer to sign messages. The proposed scheme is based on the regular ElGamal signature. In addition, the fair privacy of the proxy signer is maintained. That means, the privacy of the proxy signer is preserved; and the privacy can be revealed when it is necessary.
Abstract: Skin color can provide a useful and robust cue
for human-related image analysis, such as face detection,
pornographic image filtering, hand detection and tracking,
people retrieval in databases and Internet, etc. The major
problem of such kinds of skin color detection algorithms is
that it is time consuming and hence cannot be applied to a real
time system. To overcome this problem, we introduce a new
fast technique for skin detection which can be applied in a real
time system. In this technique, instead of testing each image
pixel to label it as skin or non-skin (as in classic techniques),
we skip a set of pixels. The reason of the skipping process is
the high probability that neighbors of the skin color pixels are
also skin pixels, especially in adult images and vise versa. The
proposed method can rapidly detect skin and non-skin color
pixels, which in turn dramatically reduce the CPU time
required for the protection process. Since many fast detection
techniques are based on image resizing, we apply our
proposed pixel skipping technique with image resizing to
obtain better results. The performance evaluation of the
proposed skipping and hybrid techniques in terms of the
measured CPU time is presented. Experimental results
demonstrate that the proposed methods achieve better result
than the relevant classic method.
Abstract: The information on the Web increases tremendously.
A number of search engines have been developed for searching Web
information and retrieving relevant documents that satisfy the
inquirers needs. Search engines provide inquirers irrelevant
documents among search results, since the search is text-based rather
than semantic-based. Information retrieval research area has
presented a number of approaches and methodologies such as
profiling, feedback, query modification, human-computer interaction,
etc for improving search results. Moreover, information retrieval has
employed artificial intelligence techniques and strategies such as
machine learning heuristics, tuning mechanisms, user and system
vocabularies, logical theory, etc for capturing user's preferences and
using them for guiding the search based on the semantic analysis
rather than syntactic analysis. Although a valuable improvement has
been recorded on search results, the survey has shown that still
search engines users are not really satisfied with their search results.
Using ontologies for semantic-based searching is likely the key
solution. Adopting profiling approach and using ontology base
characteristics, this work proposes a strategy for finding the exact
meaning of the query terms in order to retrieve relevant information
according to user needs. The evaluation of conducted experiments
has shown the effectiveness of the suggested methodology and
conclusion is presented.
Abstract: Temperature, humidity and precipitation in an area,
are parameters proved influential in the climate of that area, and one
should recognize them so that he can determine the climate of that
area. Climate changes are of primary importance in climatology, and
in recent years, have been of great concern to researchers and even
politicians and organizations, for they can play an important role in
social, political and economic activities. Even though the real cause
of climate changes or their stability is not yet fully recognized, they
are a matter of concern to researchers and their importance for
countries has prompted them to investigate climate changes in
different levels, especially in regional, national and continental level.
This issue has less been investigated in our country. However, in
recent years, there have been some researches and conferences on
climate changes. This study is also in line with such researches and
tries to investigate and analyze the trends of climate changes
(temperature and precipitation) in Sefid-roud (the name of a river)
basin. Three parameters of mean annual precipitation, temperature,
and maximum and minimum temperatures in 36 synoptic and
climatology stations in a statistical period of 49 years (1956-2005) in
the stations of Sefid-roud basin were analyzed by Mann-Kendall test.
The results obtained by data analysis show that climate changes are
short term and have a trend. The analysis of mean temperature
revealed that changes have a significantly rising trend, besides the
precipitation has a significantly falling trend.
Abstract: Optimum communication and performance in
Wireless Sensor Networks, constitute multi-facet challenges due to
the specific networking characteristics as well as the scarce resource
availability. Furthermore, it is becoming increasingly apparent that
isolated layer based approaches often do not meet the demands posed
by WSNs applications due to omission of critical inter-layer
interactions and dependencies. As a counterpart, cross-layer is
receiving high interest aiming to exploit these interactions and
increase network performance. However, in order to clearly identify
existing dependencies, comprehensive performance studies are
required evaluating the effect of different critical network parameters
on system level performance and behavior.This paper-s main
objective is to address the need for multi-parametric performance
evaluations considering critical network parameters using a well
known network simulator, offering useful and practical conclusions
and guidelines. The results reveal strong dependencies among
considered parameters which can be utilized by and drive future
research efforts, towards designing and implementing highly efficient
protocols and architectures.
Abstract: In this paper a new method is suggested for risk
management by the numerical patterns in data-mining. These patterns
are designed using probability rules in decision trees and are cared to
be valid, novel, useful and understandable. Considering a set of
functions, the system reaches to a good pattern or better objectives.
The patterns are analyzed through the produced matrices and some
results are pointed out. By using the suggested method the direction
of the functionality route in the systems can be controlled and best
planning for special objectives be done.
Abstract: In rotating machinery one of the critical components
that is prone to premature failure is the rolling bearing.
Consequently, early warning of an imminent bearing failure is much
critical to the safety and reliability of any high speed rotating
machines. This study is concerned with the application of Recurrence
Quantification Analysis (RQA) in fault detection of rolling element
bearings in rotating machinery. Based on the results from this study it
is reported that the RQA variable, percent determinism, is sensitive
to the type of fault investigated and therefore can provide useful
information on bearing damage in rolling element bearings.
Abstract: Methods of contemporary mathematical physics such
as chaos theory are useful for analyzing and understanding the
behavior of complex biological and physiological systems. The three
dimensional model of HIV/AIDS is the basis of active research since
it provides a complete characterization of disease dynamics and the
interaction of HIV-1 with the immune system. In this work, the
behavior of the HIV system is analyzed using the three dimensional
HIV model and a chaotic measure known as the Hurst exponent.
Results demonstrate that Hurst exponents of CD4, CD8 cells and
viral load vary nonlinearly with respect to variations in system
parameters. Further, it was observed that the three dimensional HIV
model can accommodate both persistent (H>0.5) and anti-persistent
(H
Abstract: Surgical site infections (SSIs) are the most common
nosocomial infection in surgical patients resulting in significant
increases in postoperative morbidity and mortality. The commonly
causative bacteria developed resistance to virtually all antibiotics
available. The aim of this study was to isolation and identification the
most common bacteria that cause SSIs in Medical Research Institute,
and to compare their sensitivity to selected group of antibiotics and
natural products (garlic, oregano, olive, and Nigella sativa oils). The
isolated pathogens collected from infected surgical wounds were
identified, and their sensitivities to the antibiotics commonly
available for clinical use, and also to the different concentrations of
the used natural products were investigated. The results indicate to
the potential therapeutic effect of the tested natural products in
treatment of surgical wound infections.
Abstract: An appropriate project delivery system (PDS) is crucial
to the success of a construction projects. Case-based Reasoning (CBR)
is a useful support for PDS selection. However, the traditional CBR
approach represents cases as attribute-value vectors without taking
relations among attributes into consideration, and could not calculate
the similarity when the structures of cases are not strictly same.
Therefore, this paper solves this problem by adopting the Relational
Case-based Reasoning (RCBR) approach for PDS selection,
considering both the structural similarity and feature similarity. To
develop the feature terms of the construction projects, the criteria and
factors governing PDS selection process are first identified. Then
feature terms for the construction projects are developed. Finally, the
mechanism of similarity calculation and a case study indicate how
RCBR works for PDS selection. The adoption of RCBR in PDS
selection expands the scope of application of traditional CBR method
and improves the accuracy of the PDS selection system.
Abstract: The article contains results of the flour and bread
quality assessment from the grains of spring spelt, also called as an
ancient wheat. Spelt was cultivated on heavy and medium soils
observing principles of organic farming. Based on flour and bread
laboratory studies, as well as laboratory baking, the technological
usefulness of studied flour has been determined. These results were
referred to the standard derived from common wheat cultivated in the
same conditions. Grain of spring spelt is a good raw material for
manufacturing bread flour, from which to get high-quality bakery
products, but this is strictly dependent on the variety of ancient
wheat.
Abstract: The hidden-point bar method is useful in many
surveying applications. The method involves determining the
coordinates of a hidden point as a function of horizontal and vertical
angles measured to three fixed points on the bar. Using these
measurements, the procedure involves calculating the slant angles,
the distances from the station to the fixed points, the coordinates of
the fixed points, and then the coordinates of the hidden point. The
propagation of the measurement errors in this complex process has
not been fully investigated in the literature. This paper evaluates the
effect of the bar geometry on the position accuracy of the hidden
point which depends on the measurement errors of the horizontal and
vertical angles. The results are used to establish some guidelines
regarding the inclination angle of the bar and the location of the
observed points that provide the best accuracy.
Abstract: In general dynamic analyses, lower mode response is
of interest, however the higher modes of spatially discretized
equations generally do not represent the real behavior and not affects
to global response much. Some implicit algorithms, therefore, are
introduced to filter out the high-frequency modes using intended
numerical error. The objective of this study is to introduce the
P-method and PC α-method to compare that with dissipation method
and Newmark method through the stability analysis and numerical
example. PC α-method gives more accuracy than other methods
because it based on the α-method inherits the superior properties of the
implicit α-method. In finite element analysis, the PC α-method is more
useful than other methods because it is the explicit scheme and it
achieves the second order accuracy and numerical damping
simultaneously.
Abstract: MiRNAs participate in gene regulation of translation.
Some studies have investigated the interactions between genes and
intragenic miRNAs. It is important to study the miRNA binding sites
of genes involved in carcinogenesis. RNAHybrid 2.1 and ERNAhybrid
programmes were used to compute the hybridization free
energy of miRNA binding sites. Of these 54 mRNAs, 22.6%, 37.7%,
and 39.7% of miRNA binding sites were present in the 5'UTRs,
CDSs, and 3'UTRs, respectively. The density of the binding sites for
miRNAs in the 5'UTR ranged from 1.6 to 43.2 times and from 1.8 to
8.0 times greater than in the CDS and 3'UTR, respectively. Three
types of miRNA interactions with mRNAs have been revealed: 5'-
dominant canonical, 3'-compensatory, and complementary binding
sites. MiRNAs regulate gene expression, and information on the
interactions between miRNAs and mRNAs could be useful in
molecular medicine. We recommend that newly described sites
undergo validation by experimental investigation.
Abstract: In industry, on of the most important subjects is die
and it's characteristics in which for cutting and forming different
mechanical pieces, various punch and matrix metal die are used.
whereas the common parts which form the main frame die are not
often proportion with pieces and dies therefore using a part as socalled
common part for frames in specified dimension ranges can
decrease the time of designing, occupied space of warehouse and
manufacturing costs. Parts in dies with getting uniform in their shape
and dimension make common parts of dies. Common parts of punch
and matrix metal die are as bolster, guide bush, guide pillar and
shank. In this paper the common parts and effective parameters in
selecting each of them as the primary information are studied,
afterward for selection and design of mechanical parts an
introduction and investigation based on the Mech. Desk. software is
done hence with developing this software can standardize the metal
common parts of punch and matrix. These studies will be so useful
for designer in their designing and also using it has with very much
advantage for manufactures of products in decreasing occupied
spaces by dies.
Abstract: Result of the study on knowledge management systems in businesses was shown that the most of these businesses provide internet accessibility for their employees in order to study new knowledge via internet, corporate website, electronic mail, and electronic learning system. These business organizations use information technology application for knowledge management because of convenience, time saving, ease of use, accuracy of information and knowledge usefulness. The result indicated prominent improvements for corporate knowledge management systems as the following; 1) administrations must support corporate knowledge management system 2) the goal of corporate knowledge management must be clear 3) corporate culture should facilitate the exchange and sharing of knowledge within the organization 4) cooperation of personnel of all levels must be obtained 5) information technology infrastructure must be provided 6) they must develop the system regularly and constantly.