Abstract: A novel method of learning complex fuzzy decision regions in the n-dimensional feature space is proposed. Through the fuzzy decision regions, a given pattern's class membership value of every class is determined instead of the conventional crisp class the pattern belongs to. The n-dimensional fuzzy decision region is approximated by union of hyperellipsoids. By explicitly parameterizing these hyperellipsoids, the decision regions are determined by estimating the parameters of each hyperellipsoid.Genetic Algorithm is applied to estimate the parameters of each region component. With the global optimization ability of GA, the learned decision region can be arbitrarily complex.
Abstract: Recent financial international scandals around the world have led to a number of investigations into the effectiveness of corporate governance practices and audit quality. Although evidence of corporate governance practices and audit quality exists from developed economies, very scanty studies have been conducted in Egypt where corporate governance is just evolving. Therefore, this study provides evidence on the effectiveness of corporate governance practices and audit quality from a developing country. The data for analysis are gathered from the top 50 most active companies in the Egyptian Stock Exchange, covering the three year period 2007-2009. Logistic regression was used in investigating the questions that were raised in the study. Findings from the study show that board independence; CEO duality and audit committees significantly have relationship with audit quality. The results also, indicate that institutional investor and managerial ownership have no significantly relationship with audit quality. Evidence also exist that size of the company; complexity and business leverage are important factors in audit quality for companies quoted on the Egypt Stock Exchange.
Abstract: Scale defects are common surface defects in hot steel rolling. The modelling of such defects is problematic and their causes are not straightforward. In this study, we investigated genetic algorithms in search for a mathematical solution to scale formation. For this research, a high-dimensional data set from hot steel rolling process was gathered. The synchronisation of the variables as well as the allocation of the measurements made on the steel strip were solved before the modelling phase.
Abstract: Encryption protects communication partners from
disclosure of their secret messages but cannot prevent traffic analysis
and the leakage of information about “who communicates with
whom". In the presence of collaborating adversaries, this linkability
of actions can danger anonymity. However, reliably providing
anonymity is crucial in many applications. Especially in contextaware
mobile business, where mobile users equipped with PDAs
request and receive services from service providers, providing
anonymous communication is mission-critical and challenging at the
same time. Firstly, the limited performance of mobile devices does
not allow for heavy use of expensive public-key operations which are
commonly used in anonymity protocols. Moreover, the demands for
security depend on the application (e.g., mobile dating vs. pizza
delivery service), but different users (e.g., a celebrity vs. a normal
person) may even require different security levels for the same
application. Considering both hardware limitations of mobile devices
and different sensitivity of users, we propose an anonymity
framework that is dynamically configurable according to user and
application preferences. Our framework is based on Chaum-s mixnet.
We explain the proposed framework, its configuration
parameters for the dynamic behavior and the algorithm to enforce
dynamic anonymity.
Abstract: Within the last years, several technologies have been developed to help building e-learning portals. Most of them follow approaches that deliver a vast amount of functionalities, suitable for class-like learning. The SuGI project, as part of the D-Grid (funded by the BMBF), targets on delivering a highly scalable and sustainable learning solution to provide materials (e.g. learning modules, training systems, webcasts, tutorials, etc.) containing knowledge about Grid computing to the D-Grid community. In this article, the process of the development of an e-learning portal focused on the requirements of this special user group is described. Furthermore, it deals with the conceptual and technical design of an e-learning portal, addressing the special needs of heterogeneous target groups. The main focus lies on the quality management of the software development process, Web templates for uploading new contents, the rich search and filter functionalities which will be described from a conceptual as well as a technical point of view. Specifically, it points out best practices as well as concepts to provide a sustainable solution to a relatively unknown and highly heterogeneous community.
Abstract: The indoor airflow with a mixed natural/forced convection
was numerically calculated using the laminar and turbulent
approach. The Boussinesq approximation was considered for a simplification
of the mathematical model and calculations. The results
obtained, such as mean velocity fields, were successfully compared
with experimental PIV flow visualizations. The effect of the distance
between the cooled wall and the heat exchanger on the temperature
and velocity distributions was calculated. In a room with a simple
shape, the computational code OpenFOAM demonstrated an ability to
numerically predict flow patterns. Furthermore, numerical techniques,
boundary type conditions and the computational grid quality were
examined. Calculations using the turbulence model k-omega had a
significant effect on the results influencing temperature and velocity
distributions.
Abstract: This paper presents a simple approach for load
flow analysis of a radial distribution network. The proposed
approach utilizes forward and backward sweep algorithm
based on Kirchoff-s current law (KCL) and Kirchoff-s voltage
law (KVL) for evaluating the node voltages iteratively. In this
approach, computation of branch current depends only on the
current injected at the neighbouring node and the current in
the adjacent branch. This approach starts from the end nodes
of sub lateral line, lateral line and main line and moves
towards the root node during branch current computation. The
node voltage evaluation begins from the root node and moves
towards the nodes located at the far end of the main, lateral
and sub lateral lines. The proposed approach has been tested
using four radial distribution systems of different size and
configuration and found to be computationally efficient.
Abstract: It has been shown that in most accidents the driver is responsible due to being distracted or misjudging the situation. In order to solve such problems research has been dedicated to developing driver assistance systems that are able to monitor the traffic situation around the vehicle. This paper presents methods for recognizing several circumstances on a road. The methods use both the in-vehicle warning systems and the roadside infrastructure. Preliminary evaluation results for fog and ice-on-road detection are presented. The ice detection results are based on data recorded in a test track dedicated to tyre friction testing. The achieved results anticipate that ice detection could work at a performance of 70% detection with the right setup, which is a good foundation for implementation. However, the full benefit of the presented cooperative system is achieved by fusing the outputs of multiple data sources, which is the key point of discussion behind this publication.
Abstract: Field experiments were conducted at Annamalai University Experimental Farm, Department of Agronomy; to device suitable weed control measures for direct seeded puddled rice and to study the effect of the weed control measures on the soil microbial population. The treatments comprised of incorporation of pressmud @ 6.25 t ha-1 and application of herbicide butachlor @1.5 kg a. i. ha- 1 with and without safener 4 days after sowing (DAS), 8 DAS alone and also in conjunction with hand weeding at 30 DAS. Hand weeding twice and a weedy check were also maintained. At maximum tillering stage, the population of bacteria was significantly reduced by butachlor application. The injury to microbes caused by herbicide disappeared with the advancement of crop's age and at flowering stage of crop, there was no significant difference among the treatments. The fungal and actinomycetes population remained unaltered by weed control treatments at both the stages of observation.
Abstract: The birdhouses and dovecotes, which are the indicator
of naturalness and human-animal relationship, are one of the
traditional cultural values of Turkey. With their structures compatible
with nature and respectful to humans the bird houses and dovecotes,
which have an important position in local urbanization models as a
representative of the civil architecture with their unique form and
function are important subjects that should be evaluated in a wide
frame comprising from architecture to urbanism, from ecologic
agriculture to globalization. The traditional bird houses and
dovecotes are disregarded due to the insensitivity affecting the city
life and the change in the public sense of art. In this study, the
characteristic properties of traditional dovecotes and birdhouses,
started in 13th century and ended in 19th century in Anatolia, are
tried to be defined for the sustainability of the tradition and for giving
a new direction to the designers.
Abstract: Pearson-s correlation coefficient and sequential path
analysis has been used for determining the interrelationship among
yield, yield components, soil minerals and aroma of Khao Dawk Mali
(KDML) 105 rice grown in the area of Tungkularonghai in Roi-Et
province, located in the northeast of Thailand. Pearson-s correlation
coefficient in this study showed that the number of panicles was the
only factor that had positive significant (0.790**) effect on grain
yield. Sequential path analysis revealed that the number of panicles
followed by the number of fertile spikelets and 100-grain weight
were the first-order factors which had positive direct effects on grain
yield. Whereas, other factors analyzed had indirect effects
influencing grain yield. This study also indicated that no significant
relationship was found between the aroma level and any of the
factors analyzed.
Abstract: Company mergers and acquisitions reached their peak
in the twenty-first century. Mergers and acquisitions have become one
of the competitive strategies for external growth. In general, it is
believed that mergers and acquisitions can create synergies. However,
they require complete information technology system and service
integration, especially in the banking industry. Much of the research
has focused on performance evaluation, shareholder equity allocation,
or even the increase of company market value after the merger and
acquisition, whereas few scholars have focused on information system
integration post merger and acquisition. This study indicates the role
of information systems after a merger and acquisition, explaining the
benefits of information system integration using a merger and
acquisition case in the banking industry as an example. In addition, we
discuss factors that affect the performance of information system
integration, and utilize system dynamics to interpret the relationship
among factors that affect information system integration performance
in the banking industry after a merger and acquisition.
Abstract: Application of neural networks in execution of
programmed pulse width modulation (PPWM) of a voltage source
inverter (VSI) is studied in this paper. Using the proposed method it is
possible to cancel out the desired harmonics in output of VSI in
addition to control the magnitude of fundamental harmonic,
contineously. By checking the non-trained values and a performance
index, the most appropriate neural network is proposed. It is shown
that neural networks may solve the custom difficulties of practical
utilization of PPWM such as large size of memory, complex digital
circuits and controlling the magnitude of output voltage in a discrete
manner.
Abstract: An effective approach for unbalanced three-phase
distribution power flow solutions is proposed in this paper. The
special topological characteristics of distribution networks have been
fully utilized to make the direct solution possible. Two matrices–the
bus-injection to branch-current matrix and the branch-current to busvoltage
matrix– and a simple matrix multiplication are used to
obtain power flow solutions. Due to the distinctive solution
techniques of the proposed method, the time-consuming LU
decomposition and forward/backward substitution of the Jacobian
matrix or admittance matrix required in the traditional power flow
methods are no longer necessary. Therefore, the proposed method is
robust and time-efficient. Test results demonstrate the validity of the
proposed method. The proposed method shows great potential to be
used in distribution automation applications.
Abstract: Frequently a group of people jointly decide and authorize
a specific person as a representative in some business/poitical
occasions, e.g., the board of a company authorizes the chief executive
officer to close a multi-billion acquisition deal. In this paper, an
integrated proxy multi-signature scheme that allows anonymously
vetoable delegation is proposed. This protocol integrates mechanisms
of private veto, distributed proxy key generation, secure transmission
of proxy key, and existentially unforgeable proxy multi-signature
scheme. First, a provably secure Guillou-Quisquater proxy signature
scheme is presented, then the “zero-sharing" protocol is extended
over a composite modulus multiplicative group, and finally the above
two are combined to realize the GQ proxy multi-signature with
anonymously vetoable delegation. As a proxy signature scheme, this
protocol protects both the original signers and the proxy signer.
The modular design allows simplified implementation with less
communication overheads and better computation performance than
a general secure multi-party protocol.
Abstract: Most fingerprint recognition techniques are based on minutiae matching and have been well studied. However, this technology still suffers from problems associated with the handling of poor quality impressions. One problem besetting fingerprint matching is distortion. Distortion changes both geometric position and orientation, and leads to difficulties in establishing a match among multiple impressions acquired from the same finger tip. Marking all the minutiae accurately as well as rejecting false minutiae is another issue still under research. Our work has combined many methods to build a minutia extractor and a minutia matcher. The combination of multiple methods comes from a wide investigation into research papers. Also some novel changes like segmentation using Morphological operations, improved thinning, false minutiae removal methods, minutia marking with special considering the triple branch counting, minutia unification by decomposing a branch into three terminations, and matching in the unified x-y coordinate system after a two-step transformation are used in the work.
Abstract: This paper describes the application of a model
predictive controller to the problem of batch reactor temperature
control. Although a great deal of work has been done to improve
reactor throughput using batch sequence control, the control of the
actual reactor temperature remains a difficult problem for many
operators of these processes. Temperature control is important as
many chemical reactions are sensitive to temperature for formation of
desired products. This controller consist of two part (1) a nonlinear
control method GLC (Global Linearizing Control) to create a linear
model of system and (2) a Model predictive controller used to obtain
optimal input control sequence. The temperature of reactor is tuned
to track a predetermined temperature trajectory that applied to the
batch reactor. To do so two input signals, electrical powers and the
flow of coolant in the coil are used. Simulation results show that the
proposed controller has a remarkable performance for tracking
reference trajectory while at the same time it is robust against noise
imposed to system output.
Abstract: Polynomial maps offer analytical properties used to obtain better performances in the scope of chaos synchronization under noisy channels. This paper presents a new method to simplify equations of the Exact Polynomial Kalman Filter (ExPKF) given in [1]. This faster algorithm is compared to other estimators showing that performances of all considered observers vanish rapidly with the channel noise making application of chaos synchronization intractable. Simulation of ExPKF shows that saturation drawn on the emitter to keep it stable impacts badly performances for low channel noise. Then we propose a particle filter that outperforms all other Kalman structured observers in the case of noisy channels.
Abstract: The paper attempts to contribute to the largely
neglected social and anthropological discussion of technology development on the one hand, and to redirecting the emphasis in
anthropology from primitive and exotic societies to problems of high
relevance in contemporary era and how technology is used in
everyday life. It draws upon multidimensional models of intelligence
and ideal type formation. It is argued that the predominance of
computational and cognitive cosmovisions have led to technology alienation. Injection of communicative competence in artificially
intelligent systems and identity technologies in the coming
information society are analyzed
Abstract: Recently, Jia et al. proposed a remote user authentication scheme using bilinear pairings and an Elliptic Curve Cryptosystem (ECC). However, the scheme is vulnerable to privileged insider attack at their proposed registration phase and to forgery attack at their proposed authentication phase. In addition, the scheme can be vulnerable to server spoofing attack because it does not provide mutual authentication between the user and the remote server. Therefore, this paper points out that the Jia et al. scheme is vulnerable to the above three attacks.