Abstract: This paper describes a new method for affine parameter
estimation between image sequences. Usually, the parameter
estimation techniques can be done by least squares in a quadratic
way. However, this technique can be sensitive to the presence
of outliers. Therefore, parameter estimation techniques for various
image processing applications are robust enough to withstand the
influence of outliers. Progressively, some robust estimation functions
demanding non-quadratic and perhaps non-convex potentials adopted
from statistics literature have been used for solving these. Addressing
the optimization of the error function in a factual framework for
finding a global optimal solution, the minimization can begin with
the convex estimator at the coarser level and gradually introduce nonconvexity
i.e., from soft to hard redescending non-convex estimators
when the iteration reaches finer level of multiresolution pyramid.
Comparison has been made to find the performance of the results
of proposed method with the results found individually using two
different estimators.
Abstract: Wireless LAN technologies have picked up
momentum in the recent years due to their ease of deployment, cost
and availability. The era of wireless LAN has also given rise to
unique applications like VOIP, IPTV and unified messaging.
However, these real-time applications are very sensitive to network
and handoff latencies. To successfully support these applications,
seamless roaming during the movement of mobile station has become
crucial. Nowadays, centralized architecture models support roaming
in WLANs. They have the ability to manage, control and
troubleshoot large scale WLAN deployments. This model is managed
by Control and Provision of Wireless Access Point protocol
(CAPWAP). This paper covers the CAPWAP architectural solution
along with its proposals that have emerged. Based on the literature
survey conducted in this paper, we found that the proposed
algorithms to reduce roaming latency in CAPWAP architecture do
not support seamless roaming. Additionally, they are not sufficient
during the initial period of the network. This paper also suggests
important design consideration for mobility support in future
centralized IEEE 802.11 networks.
Abstract: The motion of a sphere moving along the axis of a
rotating viscous fluid is studied at high Reynolds numbers and
moderate values of Taylor number. The Higher Order Compact
Scheme is used to solve the governing Navier-Stokes equations. The
equations are written in the form of Stream function, Vorticity
function and angular velocity which are highly non-linear, coupled
and elliptic partial differential equations. The flow is governed by
two parameters Reynolds number (Re) and Taylor number (T). For
very low values of Re and T, the results agree with the available
experimental and theoretical results in the literature. The results are
obtained at higher values of Re and moderate values of T and
compared with the experimental results. The results are fourth order
accurate.
Abstract: The hidden-point bar method is useful in many
surveying applications. The method involves determining the
coordinates of a hidden point as a function of horizontal and vertical
angles measured to three fixed points on the bar. Using these
measurements, the procedure involves calculating the slant angles,
the distances from the station to the fixed points, the coordinates of
the fixed points, and then the coordinates of the hidden point. The
propagation of the measurement errors in this complex process has
not been fully investigated in the literature. This paper evaluates the
effect of the bar geometry on the position accuracy of the hidden
point which depends on the measurement errors of the horizontal and
vertical angles. The results are used to establish some guidelines
regarding the inclination angle of the bar and the location of the
observed points that provide the best accuracy.
Abstract: In this paper we are to find the optimum multiwavelet for compression of electrocardiogram (ECG) signals and then, selecting it for using with SPIHT codec. At present, it is not well known which multiwavelet is the best choice for optimum compression of ECG. In this work, we examine different multiwavelets on 24 sets of ECG data with entirely different characteristics, selected from MIT-BIH database. For assessing the functionality of the different multiwavelets in compressing ECG signals, in addition to known factors such as Compression Ratio (CR), Percent Root Difference (PRD), Distortion (D), Root Mean Square Error (RMSE) in compression literature, we also employed the Cross Correlation (CC) criterion for studying the morphological relations between the reconstructed and the original ECG signal and Signal to reconstruction Noise Ratio (SNR). The simulation results show that the Cardinal Balanced Multiwavelet (cardbal2) by the means of identity (Id) prefiltering method to be the best effective transformation. After finding the most efficient multiwavelet, we apply SPIHT coding algorithm on the transformed signal by this multiwavelet.
Abstract: The paper presents a one-dimensional transient
mathematical model of compressible non-isothermal multicomponent
fluid mixture flow in a pipe. The set of the mass,
momentum and enthalpy conservation equations for gas phase is
solved in the model. Thermo-physical properties of multi-component
gas mixture are calculated by solving the Equation of State (EOS)
model. The Soave-Redlich-Kwong (SRK-EOS) model is chosen. Gas
mixture viscosity is calculated on the basis of the Lee-Gonzales-
Eakin (LGE) correlation. Numerical analysis of rapid gas
decompression process in rich and base natural gases is made on the
basis of the proposed mathematical model. The model is successfully
validated on the experimental data [1]. The proposed mathematical
model shows a very good agreement with the experimental data [1] in
a wide range of pressure values and predicts the decompression in
rich and base gas mixtures much better than analytical and
mathematical models, which are available from the open source
literature.
Abstract: Owing to extensive use of hydrogen in refining or
petrochemical units, it is essential to manage hydrogen network in
order to make the most efficient utilization of hydrogen. On the other
hand, hydrogen is an important byproduct not properly used through
petrochemical complexes and mostly sent to the fuel system. A few
works have been reported in literature to improve hydrogen network
for petrochemical complexes. In this study a comprehensive analysis
is carried out on petrochemical units using a modified automated
targeting technique which is applied to determine the minimum
hydrogen consumption. Having applied the modified targeting
method in two petrochemical cases, the results showed a significant
reduction in required fresh hydrogen.
Abstract: The growth of open networks created the interest to commercialise it. The establishment of an electronic business mechanism must be accompanied by a digital-electronic payment system to transfer the value of transactions. Financial organizations are requested to offer a secure e-payment synthesis with equivalent levels of trust and security served in conventional paper-based payment transactions. The paper addresses the challenge of the first trade problem in e-commerce, provides a brief literature review on electronic payment and attempts to explain the underlying concept and method of trust in relevance to electronic payment.
Abstract: A fully implicit finite-difference method has been proposed for the numerical solutions of one dimensional coupled nonlinear Burgers’ equations on the uniform mesh points. The method forms a system of nonlinear difference equations which is to be solved at each iteration. Newton’s iterative method has been implemented to solve this nonlinear assembled system of equations. The linear system has been solved by Gauss elimination method with partial pivoting algorithm at each iteration of Newton’s method. Three test examples have been carried out to illustrate the accuracy of the method. Computed solutions obtained by proposed scheme have been compared with analytical solutions and those already available in the literature by finding L2 and L∞ errors.
Abstract: Place is a where dimension formed by people-s
relationship with physical settings, individual and group activities,
and meanings. 'Place Attachment', 'Place Identity'and 'Sense of
Place' are some concepts that could describe the quality of people-s
relationships with a place. The concept of Sense of place is used in
studying human-place bonding, attachment and place meaning. Sense
of Place usually is defined as an overarching impression
encompassing the general ways in which people feel about places,
senses it, and assign concepts and values to it. Sense of place is
highlighted in this article as one of the prevailing concepts among
place-based researches. Considering dimensions of sense of place has
always been beneficial for investigating public place attachment and
pro-environmental attitudes towards these places. The creation or
preservation of Sense of place is important in maintaining the quality
of the environment as well as the integrity of human life within it.
While many scholars argued that sense of place is a vague concept,
this paper will summarize and analyze the existing seminal literature.
Therefore, in this paper first the concept of Sense of place and its
characteristics will be examined afterward the scales of Sense of
place will be reviewed and the factors that contribute to form Sense
of place will be evaluated and finally Place Attachment as an
objective dimension for measuring the sense of place will be
described.
Abstract: Starting from the basic pillars of the supportability
analysis this paper queries its characteristics in LCI (Life Cycle
Integration) environment. The research methodology contents a
review of modern logistics engineering literature with the objective to
collect and synthesize the knowledge relating to standards of
supportability design in e-logistics environment. The results show
that LCI framework has properties which are in fully compatibility
with the requirement of simultaneous logistics support and productservice
bundle design. The proposed approach is a contribution to the
more comprehensive and efficient supportability design process.
Also, contributions are reflected through a greater consistency of
collected data, automated creation of reports suitable for different
analysis, as well as the possibility of their customization according
with customer needs. In addition to this, convenience of this approach
is its practical use in real time. In a broader sense, LCI allows
integration of enterprises on a worldwide basis facilitating electronic
business.
Abstract: With the proliferation of Weblogs (blogs) use in
educational contexts, gaining a better understanding of why
students are willing to utilize blog systems has become an
important topic for practitioners and academics. While perceived
enjoyment has been found to have a significant influence on
behavioral intentions to use blogs or hedonic systems, few studies
have investigated the antecedents of perceived enjoyment in the
acceptance of blogging. The main purpose of the present study is to
explore the individual difference antecedents of perceived
enjoyment and examine how they influence behavioral intention to
blog through the mediation of perceived enjoyment. Based on the
previous literature, the Big Five personality traits (i.e.,
extraversion, agreeableness, conscientiousness, neuroticism, and
openness to experience), as well as computer self-efficacy and
personal innovation in information technology (PIIT), are
hypothesized as potential antecedents of perceived enjoyment in
the acceptance of blogging. Data collected from 358 respondents in
Taiwan are tested against the research model using the structural
equation modeling approach. The results indicate that extraversion,
agreeableness, conscientiousness, and PIIT have a significant
influence on perceived enjoyment, which in turn significantly
influences the behavioral intention to blog. These findings lead to
several important implications for future research.
Abstract: Linear two-point boundary value problems of order
two are solved using cubic trigonometric B-spline interpolation
method (CTBIM). Cubic trigonometric B-spline is a piecewise
function consisting of trigonometric equations. This method is tested
on some problems and the results are compared with cubic B-spline
interpolation method (CBIM) from the literature. CTBIM is found to
approximate the solution slightly more accurately than CBIM if the
problems are trigonometric.
Abstract: In this paper, a bond graph dynamic model for a valvecontrolled
hydraulic cylinder has been developed. A simplified bond
graph model of the inter-actuator interactions in a multi-cylinder
hydraulic system has also been presented. The overall bond graph
model of a valve-controlled hydraulic cylinder was developed by
combining the bond graph sub-models of the pump, spool valve and
the actuator using junction structures. Causality was then assigned
in order to obtain a computational model which could be simulated.
The causal bond graph model of the hydraulic cylinder was verified
by comparing the open loop state responses to those of an ODE
model which had been developed in literature based on the same
assumptions. The results were found to correlate very well both
in the shape of the curves, magnitude and the response times,
thus indicating that the developed model represents the hydraulic
dynamics of a valve-controlled cylinder. A simplified model for interactuator
interaction was presented by connecting an effort source with
constant pump pressure to the zero-junction from which the cylinders
in a multi-cylinder system are supplied with a constant pressure from
the pump. On simulating the state responses of the developed model
under different situations of cylinder operations, indicated that such
a simple model can be used to predict the inter-actuator interactions.
Abstract: This study explored the relationship between
psychological traits, demographics and financial behavioral biases for
individual investors in Taiwan stock market. By using questionnaire
survey method conducted in 2010, there are 554 valid convenient
samples collected to examine the determinants of three types of
behavioral biases. Based on literature review, two hypothesized
models are constructed and further used to evaluate the effects of big
five personality traits and demographic variables on investment biases
through Structural Equation Model (SEM) analysis. The results
showed that investment biases of individual investors are significantly
related to four personality traits as well as some demographics.
Abstract: The job shop scheduling problem (JSSP) is a
notoriously difficult problem in combinatorial optimization. This
paper presents a hybrid artificial immune system for the JSSP with the
objective of minimizing makespan. The proposed approach combines
the artificial immune system, which has a powerful global exploration
capability, with the local search method, which can exploit the optimal
antibody. The antibody coding scheme is based on the operation based
representation. The decoding procedure limits the search space to the
set of full active schedules. In each generation, a local search heuristic
based on the neighborhood structure proposed by Nowicki and
Smutnicki is applied to improve the solutions. The approach is tested
on 43 benchmark problems taken from the literature and compared
with other approaches. The computation results validate the
effectiveness of the proposed algorithm.
Abstract: In this paper a combination approach of two heuristic-based algorithms: genetic algorithm and tabu search is proposed. It has been developed to obtain the least cost based on the split-pipe design of looped water distribution network. The proposed combination algorithm has been applied to solve the three well-known water distribution networks taken from the literature. The development of the combination of these two heuristic-based algorithms for optimization is aimed at enhancing their strengths and compensating their weaknesses. Tabu search is rather systematic and deterministic that uses adaptive memory in search process, while genetic algorithm is probabilistic and stochastic optimization technique in which the solution space is explored by generating candidate solutions. Split-pipe design may not be realistic in practice but in optimization purpose, optimal solutions are always achieved with split-pipe design. The solutions obtained in this study have proved that the least cost solutions obtained from the split-pipe design are always better than those obtained from the single pipe design. The results obtained from the combination approach show its ability and effectiveness to solve combinatorial optimization problems. The solutions obtained are very satisfactory and high quality in which the solutions of two networks are found to be the lowest-cost solutions yet presented in the literature. The concept of combination approach proposed in this study is expected to contribute some useful benefits in diverse problems.
Abstract: During last decades, developing multi-objective
evolutionary algorithms for optimization problems has found
considerable attention. Flexible job shop scheduling problem, as an
important scheduling optimization problem, has found this attention
too. However, most of the multi-objective algorithms that are
developed for this problem use nonprofessional approaches. In
another words, most of them combine their objectives and then solve
multi-objective problem through single objective approaches. Of
course, except some scarce researches that uses Pareto-based
algorithms. Therefore, in this paper, a new Pareto-based algorithm
called controlled elitism non-dominated sorting genetic algorithm
(CENSGA) is proposed for the multi-objective FJSP (MOFJSP). Our
considered objectives are makespan, critical machine work load, and
total work load of machines. The proposed algorithm is also
compared with one the best Pareto-based algorithms of the literature
on some multi-objective criteria, statistically.
Abstract: Academics and researchers are interested in the effects of social media on college students, with a specific focus on the most popular social media website; Facebook. Previous studied have found contradictory result on the relationship between Facebook usage and the student engagement with positive, detrimental and no significant relationships. However, these studies were limited to western higher education system. This paper fills a gap in the literature by using a sample (300) of Sri Lankan management undergraduates to examine the relationship between Facebook usage and student engagement. Student engagement was measured 35 item scale based on the National Survey of Student Engagement and Facebook usage by Facebook intensity scale. Descriptive statistics, path analysis and structural equation modeling were applied as statistical tools and techniques. Results indicate that student engagement scale was significantly negatively related with the Facebook usage with the influence from student engagement on Facebook usage.
Abstract: Knowledge management (KM) is generally
considered to be a positive process in an organisation, facilitating
opportunities to achieve competitive advantage via better quality
information handling, compilation of expert know-how and rapid
response to fluctuations in the business environment. The KM
paradigm as portrayed in the literature informs the processes that can
increase intangible assets so that corporate knowledge is preserved.
However, in some instances, knowledge management exists in a
universe of dynamic tension among the conflicting needs to respect
privacy and intellectual property (IP), to guard against data theft, to
protect national security and to stay within the laws. While the
Knowledge Management literature focuses on the bright side of the
paradigm, there is also a different side in which knowledge is
distorted, suppressed or misappropriated due to personal or
organisational motives (the paradox). This paper describes the ethical
paradoxes that occur within the taxonomy and deontology of
knowledge management and suggests that recognising both the
promises and pitfalls of KM requires wisdom.