Abstract: We have applied new accelerated algorithm for linear
discriminate analysis (LDA) in face recognition with support vector
machine. The new algorithm has the advantage of optimal selection
of the step size. The gradient descent method and new algorithm has
been implemented in software and evaluated on the Yale face
database B. The eigenfaces of these approaches have been used to
training a KNN. Recognition rate with new algorithm is compared
with gradient.
Abstract: Online discussions are an important component of
both blended and online courses. This paper examines the varieties of
online discussions and the perils, pitfalls and possibilities of this
rather new technological tool for enhanced learning. The discussion
begins with possible perils and pitfalls inherent in this educational
tool and moves to a consideration of the advantages of the varieties
of online discussions feasible for use in teacher education programs.
Abstract: The quality improvements of the environmental
elements could increase the recreational opportunities in a certain
area (destination). The technique of the need for recreation focuses
on choosing certain destinations for recreational purposes. The basic
exchange taken into consideration is the one between the satisfaction
gained after staying in that area and the value expressed in money
and time allocated. The number of tourists in the respective area, the
duration of staying and the money spent including transportation
provide information on how individuals rank the place or certain
aspects of the area (such as the quality of the environmental
elements).
For the statistical analysis of the environmental benefits offered by
an area through the need of recreation technique, the following stages
are suggested:
- characterization of the reference area based on the
statistical variables considered;
- estimation of the environmental benefit through
comparing the reference area with other similar areas
(having the same environmental characteristics), from
the perspective of the statistical variables considered.
The model compared in recreation technique faced with a series of
difficulties which refers to the reference area and correct
transformation of time in money.
Abstract: Low-carbon economy means the energy conservation and emission reduction. How to measure and evaluate the regional low-carbon economy is an important problem which should be solved immediately. This paper proposed the eco-efficiency ratio based on the ecological efficiency to evaluate the current situation of the low-carbon economy in Jiangsu province and to analyze the efficiency of the low-carbon economy in Jiangsu and other provinces, compared both advantages and disadvantages. And then this paper put forward some advices for the government to formulate the correct development policy of low-carbon economy, to improve the technology innovation capacity and the efficiency of resource allocation.
Abstract: In this paper, we propose an approach for the classification of fingerprint databases. It is based on the fact that a fingerprint image is composed of regular texture regions that can be successfully represented by co-occurrence matrices. So, we first extract the features based on certain characteristics of the cooccurrence matrix and then we use these features to train a neural network for classifying fingerprints into four common classes. The obtained results compared with the existing approaches demonstrate the superior performance of our proposed approach.
Abstract: This paper deals with the project selection problem. Project selection problem is one of the problems arose firstly in the field of operations research following some production concepts from primary product mix problem. Afterward, introduction of managerial considerations into the project selection problem have emerged qualitative factors and criteria to be regarded as well as quantitative ones. To overcome both kinds of criteria, an analytic network process is developed in this paper enhanced with fuzzy sets theory to tackle the vagueness of experts- comments to evaluate the alternatives. Additionally, a modified version of Least-Square method through a non-linear programming model is augmented to the developed group decision making structure in order to elicit the final weights from comparison matrices. Finally, a case study is considered by which developed structure in this paper is validated. Moreover, a sensitivity analysis is performed to validate the response of the model with respect to the condition alteration.
Abstract: A bird strike can cause damage to stationary and
rotating aircraft engine parts, especially the engine fan. This paper
presents a bird strike simulated by blocking four stator blade
passages. It includes the numerical results of the unsteady lowfrequency
aerodynamic forces and the aeroelastic behaviour caused
by a non-symmetric upstream flow affecting the first two rotor blade
stages in the axial-compressor of a jet engine. The obtained results
show that disturbances in the engine inlet strongly influence the level
of unsteady forces acting on the rotor blades. With a partially
blocked inlet the whole spectrum of low-frequency harmonics is
observed. Such harmonics can lead to rotor blade damage. The lowfrequency
amplitudes are higher in the first stage rotor blades than in
the second stage. In both rotor blades stages flutter appeared as a
result of bird strike.
Abstract: A novel low-cost flight simulator with the development
goals cost effectiveness and high performance has been realized for
meeting the huge pilot training needs of airlines. The simulator
consists of an aircraft dynamics model, a sophisticated designed
low-profile electrical driven motion system with a subsided cabin, a
mixed reality based semi-virtual cockpit system, a control loading
system and some other subsystems. It shows its advantages over
traditional flight simulator by its features achieved with open
architecture, software solutions and low-cost hardware.
Abstract: This paper presents the adaptation of the knowledge management model and intellectual capital measurement NOVA to the needs of work or research project must be developed when conducting a program of graduate-level master. Brackets are added in each of the blocks which is represented in the original model NOVA and which allows to represent those involved in each of these.
Abstract: Locality Sensitive Hashing (LSH) is one of the most
promising techniques for solving nearest neighbour search problem in
high dimensional space. Euclidean LSH is the most popular variation
of LSH that has been successfully applied in many multimedia
applications. However, the Euclidean LSH presents limitations that
affect structure and query performances. The main limitation of the
Euclidean LSH is the large memory consumption. In order to achieve
a good accuracy, a large number of hash tables is required. In this
paper, we propose a new hashing algorithm to overcome the storage
space problem and improve query time, while keeping a good
accuracy as similar to that achieved by the original Euclidean LSH.
The Experimental results on a real large-scale dataset show that the
proposed approach achieves good performances and consumes less
memory than the Euclidean LSH.
Abstract: Combining classifiers is a useful method for solving
complex problems in machine learning. The ECOC (Error Correcting
Output Codes) method has been widely used for designing combining
classifiers with an emphasis on the diversity of classifiers. In this
paper, in contrast to the standard ECOC approach in which individual
classifiers are chosen homogeneously, classifiers are selected
according to the complexity of the corresponding binary problem. We
use SATIMAGE database (containing 6 classes) for our experiments.
The recognition error rate in our proposed method is %10.37 which
indicates a considerable improvement in comparison with the
conventional ECOC and stack generalization methods.
Abstract: This paper covers various aspects of film piracy over the Internet. In order to successfully deal with this matter, it is needed to recognize motivational factors related to film piracy. Thus, this study discusses group factors that could motivate individuals to engage in pirate activities. Furthermore, the paper discusses the theoretical effect on box office revenues and explains it on a proposed scheme of solutions for decreasing revenues. The article also maps the scheme of incentive motivational anti-piracy campaigns. Moreover, the paper proposes the preliminary scheme for system dynamic modeling of the Internet film piracy. Scheme is developed as a model of behaviors, influences and relations among the elements pertaining to the Internet film piracy.
Abstract: Naive Bayes Nearest Neighbor (NBNN) and its variants, i,e., local NBNN and the NBNN kernels, are local feature-based classifiers that have achieved impressive performance in image classification. By exploiting instance-to-class (I2C) distances (instance means image/video in image/video classification), they avoid quantization errors of local image descriptors in the bag of words (BoW) model. However, the performances of NBNN, local NBNN and the NBNN kernels have not been validated on video analysis. In this paper, we introduce these three classifiers into human action recognition and conduct comprehensive experiments on the benchmark KTH and the realistic HMDB datasets. The results shows that those I2C based classifiers consistently outperform the SVM classifier with the BoW model.
Abstract: Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants- collusion. We propose a cheating model for the secret sharing schemes based on linear memory cellular automata. For this purpose we present a novel uniform model for representation of all secret sharing schemes based on cellular automata. Participants can cheat by means of sending bogus shares or bogus transition rules. Cheaters can cooperate to corrupt a shared secret and compute a cheating value added to it. Honest participants are not aware of cheating and suppose the incorrect secret as the valid one. We prove that cheaters can recover valid secret by removing the cheating value form the corrupted secret. We provide methods of calculating the cheating value.
Abstract: This paper discusses an artificial mind model and its
applications. The mind model is based on some theories which assert
that emotion is an important function in human decision making. An
artificial mind model with emotion is built, and the model is applied to
action selection of autonomous agents. In three examples, the agents
interact with humans and their environments. The examples show the
proposed model effectively work in both virtual agents and real robots.
Abstract: Home is important for Chinese people. Because the
information regarding the house attributes and surrounding
environments is incomplete in most real estate agency, most house
buyers are difficult to consider the overall factors effectively and only
can search candidates by sorting-based approach. This study aims to
develop a decision support system for housing purchasing, in which
surrounding facilities of each house are quantified. Then, all
considered house factors and customer preferences are incorporated
into Simple Multi-Attribute Ranking Technique (SMART) to support
the housing evaluation. To evaluate the validity of proposed approach,
an empirical study was conducted from a real estate agency. Based on
the customer requirement and preferences, the proposed approach can
identify better candidate house with consider the overall house
attributes and surrounding facilities.
Abstract: Market segmentation is one of the most
fundamental strategic marketing concepts. The better the
segment which is chosen for targeting by a particular
organisation, the more successful the organisation is assumed to
be in the marketplace. Also higher education institutions have to
improve their marketing tools for attracting foreign students,
particularly when demanding tuition fees. This contribution
aims at demonstrating the proper usage of the cluster analysis
for segmentation (represented by students' willingness to study
abroad) and also, based on large international survey, offers
some practical marketing implications.
Abstract: Anaerobic digestion process is one of the alternative
methods to convert organic waste into methane gas which is a fuel
and energy source. Activities of various kinds of microorganisms are
the main factor for anaerobic digestion which produces methane gas.
Therefore, in this study a modified Anaerobic Baffled Reactor (ABR)
with working volume of 50 liters was designed to identify the
microorganisms through biogas production. The mixture of 75%
kitchen waste and 25% sewage sludge was used as substrate.
Observations on microorganisms in the ABR showed that there exists
a small amount of protozoa (5%) and fungi (2%) in the system, but
almost 93% of the microorganism population consists of bacteria. It
is definitely clear that bacteria are responsible for anaerobic
biodegradation of kitchen waste. Results show that in the
acidification zone of the ABR (front compartments of reactor) fast
growing bacteria capable of growth at high substrate levels and
reduced pH was dominant. A shift to slower growing scavenging
bacteria that grow better at higher pH was occurring towards the end
of the reactor. Due to the ability of activity in acetate environment the
percentages of Methanococcus, Methanosarcina and Methanotrix
were higher than other kinds of methane former in the system.
Abstract: Human pose estimation can be executed using Active Shape Models. The existing techniques for applying to human-body research using Active Shape Models, such as human detection, primarily take the form of silhouette of human body. This technique is not able to estimate accurately for human pose to concern two arms and legs, as the silhouette of human body represents the shape as out of round. To solve this problem, we applied the human body model as stick-figure, “skeleton". The skeleton model of human body can give consideration to various shapes of human pose. To obtain effective estimation result, we applied background subtraction and deformed matching algorithm of primary Active Shape Models in the fitting process. The images which were used to make the model were 600 human bodies, and the model has 17 landmark points which indicate body junction and key features of human pose. The maximum iteration for the fitting process was 30 times and the execution time was less than .03 sec.
Abstract: After the terrorist attack on September 11, 2001 in
U.S., the container security issue got high attention, especially by U.S.
government, which deployed a lot of measures to promote or improve
security systems. U.S. government not only enhances its national
security system, but allies with other countries against the potential
terrorist attacks in the future. For example CSI (Container Security
Initiative), it encourages foreign ports outside U.S. to become CSI
ports as a part of U.S. anti-terrorism network. Although promotion of
the security could partly reach the goal of anti-terrorism, that will
influence the efficiency of container supply chain, which is the main
concern when implementing the inspection measurements. This paper
proposes a quick estimation methodology for an inspection service
rate by a berth allocation heuristic such that the inspection activities
will not affect the original container supply chain. Theoretical and
simulation results show this approach is effective.