Abstract: Decision fusion is one of hot research topics in
classification area, which aims to achieve the best possible
performance for the task at hand. In this paper, we
investigate the usefulness of this concept to improve change
detection accuracy in remote sensing. Thereby, outputs of
two fuzzy change detectors based respectively on
simultaneous and comparative analysis of multitemporal
data are fused by using fuzzy integral operators. This
method fuses the objective evidences produced by the
change detectors with respect to fuzzy measures that express
the difference of performance between them. The proposed
fusion framework is evaluated in comparison with some
ordinary fuzzy aggregation operators. Experiments carried
out on two SPOT images showed that the fuzzy integral was
the best performing. It improves the change detection
accuracy while attempting to equalize the accuracy rate in
both change and no change classes.
Abstract: This paper implements the inventory model developed in the first part of this paper in a simplified problem to simultaneously reduce costs and risks in JIT systems. This model is developed to ascertain an optimal ordering strategy for procuring raw materials by using regular multi-external and local backup suppliers to reduce the total cost of the products, and at the same time to reduce the risks arising from this cost reduction within production systems. A comparison between the cost of using the JIT system and using the proposed inventory model shows the superiority of the use of the inventory model.
Abstract: Network Management Systems have played a great important role in information systems. Management is very important and essential in any fields. There are many managements such as configuration management, fault management, performance management, security management, accounting management and etc. Among them, configuration, fault and security management is more important than others. Because these are essential and useful in any fields. Configuration management is to monitor and maintain the whole system or LAN. Fault management is to detect and troubleshoot the system. Security management is to control the whole system. This paper intends to increase the network management functionalities including configuration management, fault management and security management. In configuration management system, this paper specially can support the USB ports and devices to detect and read devices configuration and solve to detect hardware port and software ports. In security management system, this paper can provide the security feature for the user account setting and user management and proxy server feature. And all of the history of the security such as user account and proxy server history are kept in the java standard serializable file. So the user can view the history of the security and proxy server anytime. If the user uses this system, the user can ping the clients from the network and the user can view the result of the message in fault management system. And this system also provides to check the network card and can show the NIC card setting. This system is used RMI (Remote Method Invocation) and JNI (Java Native Interface) technology. This paper is to implement the client/server network management system using Java 2 Standard Edition (J2SE). This system can provide more than 10 clients. And then this paper intends to show data or message structure of client/server and how to work using TCP/IP protocol.
Abstract: A numerical method is developed for simulating
the motion of particles with arbitrary shapes in an effectively
infinite or bounded viscous flow. The particle translational and
angular motions are numerically investigated using a fluid-structure
interaction (FSI) method based on the Arbitrary-Lagrangian-Eulerian
(ALE) approach and the dynamic mesh method (smoothing and
remeshing) in FLUENT ( ANSYS Inc., USA). Also, the effects of
arbitrary shapes on the dynamics are studied using the FSI method
which could be applied to the motions and deformations of a single
blood cell and multiple blood cells, and the primary thrombogenesis
caused by platelet aggregation. It is expected that, combined with a
sophisticated large-scale computational technique, the simulation
method will be useful for understanding the overall properties of blood
flow from blood cellular level (microscopic) to the resulting
rheological properties of blood as a mass (macroscopic).
Abstract: In this paper variation of spot price and total profits of
the generating companies- through wholesale electricity trading are
discussed with and without Central Generating Stations (CGS) share
and seasonal variations are also considered. It demonstrates how
proper analysis of generators- efficiencies and capabilities, types of
generators owned, fuel costs, transmission losses and settling price
variation using the solutions of Optimal Power Flow (OPF), can
allow companies to maximize overall revenue. It illustrates how
solutions of OPF can be used to maximize companies- revenue under
different scenarios. And is also extended to computation of Available
Transfer Capability (ATC) is very important to the transmission
system security and market forecasting. From these results it is
observed that how crucial it is for companies to plan their daily
operations and is certainly useful in an online environment of
deregulated power system. In this paper above tasks are demonstrated
on 124 bus real-life Indian utility power system of Andhra Pradesh
State Grid and results have been presented and analyzed.
Abstract: Disordered function of maniphalanx and difficulty with
ambulation will occur insofar as a human has a failure in the spinal
marrow. Cervical spondylotic myelopathy as one of the myelopathy
emanates from not only external factors but also increased age. In
addition, the diacrisis is difficult since cervical spondylotic
myelopathy is evaluated by a doctor-s neurological remark and
imaging findings. As a quantitative method for measuring the degree
of disability, hand-operated triangle step test (for short, TST) has
formulated. In this research, a full automatic triangle step counter
apparatus is designed and developed to measure the degree of
disability in an accurate fashion according to the principle of TST. The
step counter apparatus whose shape is a low triangle pole displays the
number of stepping upon each corner. Furthermore, the apparatus has
two modes of operation. Namely, one is for measuring the degree of
disability and the other for rehabilitation exercise. In terms of
usefulness, clinical practice should be executed before too long.
Abstract: The ElectroEncephaloGram (EEG) is useful for
clinical diagnosis and biomedical research. EEG signals often
contain strong ElectroOculoGram (EOG) artifacts produced
by eye movements and eye blinks especially in EEG recorded
from frontal channels. These artifacts obscure the underlying
brain activity, making its visual or automated inspection
difficult. The goal of ocular artifact removal is to remove
ocular artifacts from the recorded EEG, leaving the underlying
background signals due to brain activity. In recent times,
Independent Component Analysis (ICA) algorithms have
demonstrated superior potential in obtaining the least
dependent source components. In this paper, the independent
components are obtained by using the JADE algorithm (best
separating algorithm) and are classified into either artifact
component or neural component. Neural Network is used for
the classification of the obtained independent components.
Neural Network requires input features that exactly represent
the true character of the input signals so that the neural
network could classify the signals based on those key
characters that differentiate between various signals. In this
work, Auto Regressive (AR) coefficients are used as the input
features for classification. Two neural network approaches
are used to learn classification rules from EEG data. First, a
Polynomial Neural Network (PNN) trained by GMDH (Group
Method of Data Handling) algorithm is used and secondly,
feed-forward neural network classifier trained by a standard
back-propagation algorithm is used for classification and the
results show that JADE-FNN performs better than JADEPNN.
Abstract: Selection of maize (Zea mays) hybrids with wide adaptability across diverse farming environments is important, prior to recommending them to achieve a high rate of hybrid adoption. Grain yield of 14 maize hybrids, tested in a randomized completeblock design with four replicates across 22 environments in Iran, was analyzed using site regression (SREG) stability model. The biplot technique facilitates a visual evaluation of superior genotypes, which is useful for cultivar recommendation and mega-environment identification. The objectives of this study were (i) identification of suitable hybrids with both high mean performance and high stability (ii) to determine mega-environments for maize production in Iran. Biplot analysis identifies two mega-environments in this study. The first mega-environments included KRM, KSH, MGN, DZF A, KRJ, DRB, DZF B, SHZ B, and KHM, where G10 hybrid was the best performing hybrid. The second mega-environment included ESF B, ESF A, and SHZ A, where G4 hybrid was the best hybrid. According to the ideal-hybrid biplot, G10 hybrid was better than all other hybrids, followed by the G1 and G3 hybrids. These hybrids were identified as best hybrids that have high grain yield and high yield stability. GGE biplot analysis provided a framework for identifying the target testing locations that discriminates genotypes that are high yielding and stable.
Abstract: Ethanol is generally used as a therapeutic reagent against Hepatocellular carcinoma (HCC or hepatoma) worldwide, as it can induce Hepatocellular carcinoma cell apoptosis at low concentration through a multifactorial process regulated by several unknown proteins. This paper provides a simple and available proteomic strategy for exploring differentially expressed proteins in the apoptotic pathway. The appropriate concentrations of ethanol required to induce HepG2 cell apoptosis were first assessed by MTT assay, Gisma and fluorescence staining. Next, the central proteins involved in the apoptosis pathway processs were determined using 2D-PAGE, SDS-PAGE, and bio-software analysis. Finally the downregulation of two proteins, AFP and survivin, were determined by immunocytochemistry and reverse transcriptase PCR (RT-PCR) technology. The simple, useful method demonstrated here provides a new approach to proteomic analysis in key bio-regulating process including proliferation, differentiation, apoptosis, immunity and metastasis.
Abstract: Since 1984 many schemes have been proposed for
digital signature protocol, among them those that based on discrete
log and factorizations. However a new identification scheme based
on iterated function (IFS) systems are proposed and proved to be
more efficient. In this study the proposed identification scheme is
transformed into a digital signature scheme by using a one way hash
function. It is a generalization of the GQ signature schemes. The
attractor of the IFS is used to obtain public key from a private one,
and in the encryption and decryption of a hash function. Our aim is
to provide techniques and tools which may be useful towards
developing cryptographic protocols. Comparisons between the
proposed scheme and fractal digital signature scheme based on RSA
setting, as well as, with the conventional Guillou-Quisquater
signature, and RSA signature schemes is performed to prove that, the
proposed scheme is efficient and with high performance.
Abstract: Mathematical programming has been applied to various
problems. For many actual problems, the assumption that the parameters
involved are deterministic known data is often unjustified. In
such cases, these data contain uncertainty and are thus represented
as random variables, since they represent information about the
future. Decision-making under uncertainty involves potential risk.
Stochastic programming is a commonly used method for optimization
under uncertainty. A stochastic programming problem with recourse
is referred to as a two-stage stochastic problem. In this study, we
consider a stochastic programming problem with simple integer
recourse in which the value of the recourse variable is restricted to a
multiple of a nonnegative integer. The algorithm of a dynamic slope
scaling procedure for solving this problem is developed by using a
property of the expected recourse function. Numerical experiments
demonstrate that the proposed algorithm is quite efficient. The
stochastic programming model defined in this paper is quite useful
for a variety of design and operational problems.
Abstract: In this cyber age, the job market has been rapidly transforming and being digitalized. Submitting a paper-based curriculum vitae (CV) nowadays does not grant a job seeker a high employability rate. This paper calls for attention on the creation of mobile Curriculum Vitae or m-CV (http://mcurriculumvitae. blogspot.com), a sample of an individual CV developed using weblog, which can enhance the job hunter especially fresh graduate-s higher marketability rate. This study is designed to identify the perceptions held by Malaysian university students regarding m-CV grounded on a modified Technology Acceptance Model (TAM). It measures the strength and the direction of relationships among three major variables – Perceived Ease of Use (PEOU), Perceived Usefulness (PU) and Behavioral Intention (BI) to use. The finding shows that university students generally accepted adopting m-CV since they perceived m-CV to be more useful rather than easy to use. Additionally, this study has confirmed TAM to be a useful theoretical model in helping to understand and explain the behavioral intention to use Web 2.0 application-weblog publishing their CV. The result of the study has underlined another significant positive value of using weblog to create personal CV. Further research of m-CV has been highlighted in this paper.
Abstract: In general architecture means the art of creating the
space. Comprehensive and complete body which is created by a
creative and purposeful thought to respond the human needs.
Professionally, architecture is the are of designing and
comprehensive planning of physical spaces that is created for
human-s productivity. The purpose of architectural design is to
respond the human needs which is appeared in physical frame.
Human in response to his needs is always looking to achieve comfort.
Throughout history of human civilization this relative comfort has
been inspired by nature and assimilating the facility and natural
achievement in the format of artifact patterns base on the nature, so
that it is achieved in this comfort level and invention of these factors.
All physical factors like regional, social and economical factors are
made available to human in order to achieve a specific goal and are
made to gain an ideal architecture to respond the functional needs and
consider the aesthetics and elemental principles and pay attention to
residents- comfort. In this study the Persian architecture with
exploiting and transforming the energies into the requisite energies of
architecture spaces and importing fuel products, utilities, etc, in order
to achieve a relative comfort level will be investigated. In this paper
the study of structural and physical specialties of traditional houses in
desert regions and Central Plateau of Iran gave us this opportunity to
being more familiar with important specialties of energy productivity
in architecture body of traditional houses in these regions specially
traditional houses of Kashan and in order to use these principles to
create modern architectures in these regions.
Abstract: Chlorine is one of the most abundant elements in
nature, which undergoes a complex biogeochemical cycle. Chlorine
bound in some substances is partly responsible for atmospheric ozone
depletion and contamination of some ecosystems. As due to
international regulations anthropogenic burden of volatile
organochlorines (VOCls) in atmosphere decreases, natural sources
(plants, soil, abiotic formation) are expected to dominate VOCl
production in the near future. Examples of plant VOCl production are
methyl chloride, and bromide emission from (sub)tropical ferns,
chloroform, 1,1,1-trichloroethane and tetrachloromethane emission
from temperate forest fern and moss. Temperate forests are found to
emit in addition to the previous compounds tetrachloroethene, and
brominated volatile compounds. VOCls can be taken up and further
metabolized in plants. The aim of this work is to identify and
quantitatively analyze the formed VOCls in temperate forest
ecosystems by a cryofocusing/GC-ECD detection method, hence
filling a gap of knowledge in the biogeochemical cycle of chlorine.
Abstract: The one-class support vector machine “support vector
data description” (SVDD) is an ideal approach for anomaly or outlier
detection. However, for the applicability of SVDD in real-world
applications, the ease of use is crucial. The results of SVDD are
massively determined by the choice of the regularisation parameter C
and the kernel parameter of the widely used RBF kernel. While for
two-class SVMs the parameters can be tuned using cross-validation
based on the confusion matrix, for a one-class SVM this is not
possible, because only true positives and false negatives can occur
during training. This paper proposes an approach to find the optimal
set of parameters for SVDD solely based on a training set from
one class and without any user parameterisation. Results on artificial
and real data sets are presented, underpinning the usefulness of the
approach.
Abstract: The characteristics of fluid flow and phase separation
in an oil-water separator were numerically analysed as part of the
work presented herein. Simulations were performed for different
velocities and droplet diameters, and the way this parameters can
influence the separator geometry was studied.
The simulations were carried out using the software package
Fluent 6.2, which is designed for numerical simulation of fluid flow
and mass transfer. The model consisted of a cylindrical horizontal
separator. A tetrahedral mesh was employed in the computational
domain. The condition of two-phase flow was simulated with the
two-fluid model, taking into consideration turbulence effects using
the k-ε model.
The results showed that there is a strong dependency of phase
separation on mixture velocity and droplet diameter. An increase in
mixture velocity will bring about a slow down in phase separation
and as a consequence will require a weir of greater height. An
increase in droplet diameter will produce a better phase separation.
The simulations are in agreement with results reported in literature
and show that CFD can be a useful tool in studying a horizontal oilwater
separator.
Abstract: In this article the accumulated results out of the effects
and length of the manufacture and production projects in the
university and research standard have been settled with the usefulness
definition of the process of project management for the accessibility
to the proportional pattern in the “time and action" stages. Studies
show that many problems confronted by the researchers in these
projects are connected to the non-profiting of: 1) autonomous timing
for gathering the educational theme, 2) autonomous timing for
planning and pattern, presenting before the construction, and 3)
autonomous timing for manufacture and sample presentation from the
output. The result of this study indicates the division of every
manufacture and production projects into three smaller autonomous
projects from its kind, budget and autonomous expenditure, shape
and order of the stages for the management of these kinds of projects.
In this case study real result are compared with theoretical results.
Abstract: This study presents a systematic analysis of the
dynamic behaviors of a gear-bearing system with porous squeeze film
damper (PSFD) under nonlinear suspension, nonlinear oil-film force
and nonlinear gear meshing force effect. It can be found that the
system exhibits very rich forms of sub-harmonic and even the chaotic
vibrations. The bifurcation diagrams also reveal that greater values of
permeability may not only improve non-periodic motions effectively,
but also suppress dynamic amplitudes of the system. Therefore, porous
effect plays an important role to improve dynamic stability of
gear-bearing systems or other mechanical systems. The results
presented in this study provide some useful insights into the design
and development of a gear-bearing system for rotating machinery that
operates in highly rotational speed and highly nonlinear regimes.
Abstract: Complex networks have been intensively studied across
many fields, especially in Internet technology, biological engineering,
and nonlinear science. Software is built up out of many interacting
components at various levels of granularity, such as functions, classes,
and packages, representing another important class of complex networks.
It can also be studied using complex network theory. Over the
last decade, many papers on the interdisciplinary research between
software engineering and complex networks have been published.
It provides a different dimension to our understanding of software
and also is very useful for the design and development of software
systems. This paper will explore how to use the complex network
theory to analyze software structure, and briefly review the main
advances in corresponding aspects.
Abstract: Data mining is the process of sifting through large
volumes of data, analyzing data from different perspectives and
summarizing it into useful information. One of the widely used
desktop applications for data mining is the Weka tool which is
nothing but a collection of machine learning algorithms implemented
in Java and open sourced under the General Public License (GPL). A
web service is a software system designed to support interoperable
machine to machine interaction over a network using SOAP
messages. Unlike a desktop application, a web service is easy to
upgrade, deliver and access and does not occupy any memory on the
system. Keeping in mind the advantages of a web service over a
desktop application, in this paper we are demonstrating how this Java
based desktop data mining application can be implemented as a web
service to support data mining across the internet.