Abstract: One-way functions are functions that are easy to
compute but hard to invert. Their existence is an open conjecture; it
would imply the existence of intractable problems (i.e. NP-problems
which are not in the P complexity class).
If true, the existence of one-way functions would have an impact
on the theoretical framework of physics, in particularly, quantum
mechanics. Such aspect of one-way functions has never been shown
before.
In the present work, we put forward the following.
We can calculate the microscopic state (say, the particle spin in the
z direction) of a macroscopic system (a measuring apparatus
registering the particle z-spin) by the system macroscopic state (the
apparatus output); let us call this association the function F. The
question is: can we compute the function F in the inverse direction?
In other words, can we compute the macroscopic state of the system
through its microscopic state (the preimage F -1)?
In the paper, we assume that the function F is a one-way function.
The assumption implies that at the macroscopic level the Schrödinger
equation becomes unfeasible to compute. This unfeasibility plays a
role of limit of the validity of the linear Schrödinger equation.
Abstract: The continued interest in the use of distributed generation in recent years is leading to the growth in number of distributed generators connected to distribution networks. Steady state voltage rise resulting from the connection of these generators can be a major obstacle to their connection at lower voltage levels. The present electric distribution network is designed to keep the customer voltage within tolerance limit. This may require a reduction in connectable generation capacity, under utilization of appropriate generation sites. Thus distribution network operators need a proper voltage regulation method to allow the significant integration of distributed generation systems to existing network. In this work a voltage rise problem in a typical distribution system has been studied. A method for voltage regulation of distribution system with multiple DG system by coordinated operation distributed generator, capacitor and OLTC has been developed. A sensitivity based analysis has been carried out to determine the priority for individual generators in multiple DG environment. The effectiveness of the developed method has been evaluated under various cases through simulation results.
Abstract: The study describes chitosan membrane platform
modified with nanostructure pattern which using nanotechnology to
fabricate. The cell-substrate interaction between neuro-2a neuroblasts
cell lines and chitosan membrane (flat, nanostructure and
nanostructure pattern types) was investigated. The adhered
morphology of neuro-2a cells depends on the topography of chitosan
surface. We have found that neuro-2a showed different morphogenesis
when cells adhered on flat and nanostructure chitosan membrane. The
cell projected area of neuro-2a on flat chitosan membrane is larger
than on nanostructure chitosan membrane. In addition, neuro-2a cells
preferred to adhere on flat chitosan surface region than on
nanostructure chitosan membrane to immobilize and differentiation.
The experiment suggests surface topography can be used as a critical
mechanism to isolate group of neuro-2a to a particular rectangle area
on chitosan membrane. Our finding will provide a platform to take
patch clamp to record electrophysiological behavior about neurons in
vitro in the future.
Abstract: In this paper we present two novel 1-bit full adder
cells in dynamic logic style. NP-CMOS (Zipper) and Multi-Output
structures are used to design the adder blocks. Characteristic of
dynamic logic leads to higher speeds than the other standard static
full adder cells. Using HSpice and 0.18┬Ám CMOS technology
exhibits a significant decrease in the cell delay which can result in a
considerable reduction in the power-delay product (PDP). The PDP
of Multi-Output design at 1.8v power supply is around 0.15 femto
joule that is 5% lower than conventional dynamic full adder cell and
at least 21% lower than other static full adders.
Abstract: This paper develops driver reaction-time models for
car-following analysis based on human factors. The reaction time
was classified as brake-reaction time (BRT) and
acceleration/deceleration reaction time (ADRT). The BRT occurs
when the lead vehicle is barking and its brake light is on, while the
ADRT occurs when the driver reacts to adjust his/her speed using the
gas pedal only. The study evaluates the effect of driver
characteristics and traffic kinematic conditions on the driver reaction
time in a car-following environment. The kinematic conditions
introduced urgency and expectancy based on the braking behaviour
of the lead vehicle at different speeds and spacing. The kinematic
conditions were used for evaluating the BRT and are classified as
normal, surprised, and stationary. Data were collected on a driving
simulator integrated into a real car and included the BRT and ADRT
(as dependent variables) and driver-s age, gender, driving experience,
driving intensity (driving hours per week), vehicle speed, and
spacing (as independent variables). The results showed that there was
a significant difference in the BRT at normal, surprised, and
stationary scenarios and supported the hypothesis that both urgency
and expectancy had significant effects on BRT. Driver-s age, gender,
speed, and spacing were found to be significant variables for the
BRT in all scenarios. The results also showed that driver-s age and
gender were significant variables for the ADRT. The research
presented in this paper is part of a larger project to develop a driversensitive
in-vehicle rear-end collision warning system.
Abstract: ICA which is generally used for blind source separation
problem has been tested for feature extraction in Speech recognition
system to replace the phoneme based approach of MFCC. Applying
the Cepstral coefficients generated to ICA as preprocessing has
developed a new signal processing approach. This gives much better
results against MFCC and ICA separately, both for word and speaker
recognition. The mixing matrix A is different before and after MFCC
as expected. As Mel is a nonlinear scale. However, cepstrals
generated from Linear Predictive Coefficient being independent
prove to be the right candidate for ICA. Matlab is the tool used for
all comparisons. The database used is samples of ISOLET.
Abstract: In order to calculate the flexural strength of
normal-strength concrete (NSC) beams, the nonlinear actual concrete
stress distribution within the compression zone is normally replaced
by an equivalent rectangular stress block, with two coefficients of α
and β to regulate the intensity and depth of the equivalent stress
respectively. For NSC beams design, α and β are usually assumed
constant as 0.85 and 0.80 in reinforced concrete (RC) codes. From an
earlier investigation of the authors, α is not a constant but significantly
affected by flexural strain gradient, and increases with the increasing
of strain gradient till a maximum value. It indicates that larger
concrete stress can be developed in flexure than that stipulated by
design codes. As an extension and application of the authors- previous
study, the modified equivalent concrete stress block is used here to
produce a series of design charts showing the maximum design limits
of flexural strength and ductility of singly- and doubly- NSC beams,
through which both strength and ductility design limits are improved
by taking into account strain gradient effect.
Abstract: Solar water heating (SWH) systems are gaining popularity in ASEAN in the midst of increasing number of affluent population in society and environmental concerns from seemingly unchanged reliance on fossil-based fuels. The penetration of these systems and technologies into ASEAN markets is a welcome development; however there is a need for the method of assessment of their thermal performances. This paper discusses the reasons for this need and a suitable method for thermal performance evaluation of SWH systems in ASEAN. The paper also calls on research to be focused on the establishment of reliable data to be entered into the performance rating software. The establishment of accredited solar systems testing facilities can help boost the competitiveness of ASEAN solar industry.
Abstract: In this paper, a clustering algorithm named KHarmonic
means (KHM) was employed in the training of Radial
Basis Function Networks (RBFNs). KHM organized the data in
clusters and determined the centres of the basis function. The popular
clustering algorithms, namely K-means (KM) and Fuzzy c-means
(FCM), are highly dependent on the initial identification of elements
that represent the cluster well. In KHM, the problem can be avoided.
This leads to improvement in the classification performance when
compared to other clustering algorithms. A comparison of the
classification accuracy was performed between KM, FCM and KHM.
The classification performance is based on the benchmark data sets:
Iris Plant, Diabetes and Breast Cancer. RBFN training with the KHM
algorithm shows better accuracy in classification problem.
Abstract: This paper focuses on the 3D reconstruction of
the architectural design of Darul Ridzuan Museum. It has
concentrated on designing exterior part of the building according
to colored digital photo of the real museum. Besides viewing the
architecture, walkthroughs are generated for the user to control
it in an easier way. User can travel through the museum to get
the feel of the environment and to explore the design of the
museum as a whole; both exterior and interior. The result has
shown positive result in terms of realism, navigation, collision
detection, suitability, usability and user-s acceptance. In brief,
the 3D virtual museum has provided an alternative to present a
real museum.
Abstract: De novo genome assembly is always fragmented. Assembly fragmentation is more serious using the popular next generation sequencing (NGS) data because NGS sequences are shorter than the traditional Sanger sequences. As the data throughput of NGS is high, the fragmentations in assemblies are usually not the result of missing data. On the contrary, the assembled sequences, called contigs, are often connected to more than one other contigs in a complicated manner, leading to the fragmentations. False connections in such complicated connections between contigs, named a contig graph, are inevitable because of repeats and sequencing/assembly errors. Simplifying a contig graph by removing false connections directly improves genome assembly. In this work, we have developed a tool, SIMGraph, to resolve ambiguous connections between contigs using NGS data. Applying SIMGraph to the assembly of a fungus and a fish genome, we resolved 27.6% and 60.3% ambiguous contig connections, respectively. These results can reduce the experimental efforts in resolving contig connections.
Abstract: Construction of tunnels is connected with high
uncertainty in the field of costs, construction period, safety and
impact on surroundings. Risk management became therefore a
common part of tunnel projects, especially after a set of fatal
collapses occurred in 1990's. Such collapses are caused usually by
combination of factors that can be divided into three main groups, i.e.
unfavourable geological conditions, failures in the design and
planning or failures in the execution.
This paper suggests a procedure enabling quantification of the
excavation risk related to extraordinary accidents using FTA and
ETA tools. It will elaborate on a common process of risk analysis and
enable the transfer of information and experience between particular
tunnel construction projects. Further, it gives a guide for designers,
management and other participants, how to deal with risk of such
accidents and how to make qualified decisions based on a
probabilistic approach.
Abstract: This paper presents a semi-supervised learning algorithm called Iterative-Cross Training (ICT) to solve the Web pages classification problems. We apply Inductive logic programming (ILP) as a strong learner in ICT. The objective of this research is to evaluate the potential of the strong learner in order to boost the performance of the weak learner of ICT. We compare the result with the supervised Naive Bayes, which is the well-known algorithm for the text classification problem. The performance of our learning algorithm is also compare with other semi-supervised learning algorithms which are Co-Training and EM. The experimental results show that ICT algorithm outperforms those algorithms and the performance of the weak learner can be enhanced by ILP system.
Abstract: In this work, we experimentally study heat transfer
from exhaust particulate air of detergent spray drying tower to water
by using coiled tube heat exchanger. Water flows in the coiled
tubes, where air loaded with detergent particles of 43 micrometers
in diameter flows within the shell. Four coiled tubes with different
coil pitches are used in a counter-current flow configuration. We
investigate heat transfer coefficients of inside and outside the heat
transfer surfaces through 400 experiments. The correlations between
Nusselt number and Reynolds number, Prandtl number, mass flow
rate of particulates to mass flow rate of air ratio and coiled tube
pitch parameter are proposed. The correlations procured can be used
to predicted heat transfer between tube and shell of the heat
exchanger.
Abstract: Short circuit currents plays a vital role in influencing the design and operation of equipment and power system and could not be avoided despite careful planning and design, good maintenance and thorough operation of the system. This paper discusses the short circuit analysis conducted in KSO briefly comprising of its significances, methods and results. A result sample of the analysis based on a single transformer is detailed in this paper. Furthermore, the results of the analysis and its significances were also discussed and commented.
Abstract: Phase locked loops for data links operating at 10 Gb/s
or faster are low phase noise devices designed to operate with a low
jitter reference clock. Characterization of their jitter transfer function
is difficult because the intrinsic noise of the device is comparable to
the random noise level in the reference clock signal. A linear model
is proposed to account for the intrinsic noise of a PLL. The intrinsic
noise data of a PLL for 10 Gb/s links is presented. The jitter transfer
function of a PLL in a test chip for 12.8 Gb/s data links was
determined in experiments using the 400 MHz reference clock as the
source of simultaneous excitations over a wide range of frequency.
The result shows that the PLL jitter transfer function can be
approximated by a second order linear model.
Abstract: With the advantage of wireless network technology,
there are a variety of mobile applications which make the issue of
wireless sensor networks as a popular research area in recent years.
As the wireless sensor network nodes move arbitrarily with the
topology fast change feature, mobile nodes are often confronted with
the void issue which will initiate packet losing, retransmitting,
rerouting, additional transmission cost and power consumption.
When transmitting packets, we would not predict void problem
occurring in advance. Thus, how to improve geographic routing with
void avoidance in wireless networks becomes an important issue. In
this paper, we proposed a greedy geographical void routing algorithm
to solve the void problem for wireless sensor networks. We use the
information of source node and void area to draw two tangents to
form a fan range of the existence void which can announce voidavoiding
message. Then we use source and destination nodes to draw
a line with an angle of the fan range to select the next forwarding
neighbor node for routing. In a dynamic wireless sensor network
environment, the proposed greedy void avoiding algorithm can be
more time-saving and more efficient to forward packets, and improve
current geographical void problem of wireless sensor networks.
Abstract: In the past years a lot of effort has been made in the
field of face detection. The human face contains important features
that can be used by vision-based automated systems in order to
identify and recognize individuals. Face location, the primary step of
the vision-based automated systems, finds the face area in the input
image. An accurate location of the face is still a challenging task.
Viola-Jones framework has been widely used by researchers in order
to detect the location of faces and objects in a given image. Face
detection classifiers are shared by public communities, such as
OpenCV. An evaluation of these classifiers will help researchers to
choose the best classifier for their particular need. This work focuses
of the evaluation of face detection classifiers minding facial
landmarks.
Abstract: This paper undertakes the problem of optimal
capacitor placement in a distribution system. The problem is how to
optimally determine the locations to install capacitors, the types and
sizes of capacitors to he installed and, during each load level,the
control settings of these capacitors in order that a desired objective
function is minimized while the load constraints,network constraints
and operational constraints (e.g. voltage profile) at different load
levels are satisfied. The problem is formulated as a combinatorial
optimization problem with a nondifferentiable objective function.
Four solution mythologies based on algorithms (GA),tabu search
(TS), and hybrid GA-SA algorithms are presented.The solution
methodologies are preceded by a sensitivity analysis to select the
candidate capacitor installation locations.
Abstract: Connected dominating set (CDS) problem in unit disk
graph has signi£cant impact on an ef£cient design of routing protocols
in wireless sensor networks, where the searching space for a
route is reduced to nodes in the set. A set is dominating if all the
nodes in the system are either in the set or neighbors of nodes in the
set. In this paper, a simple and ef£cient heuristic method is proposed
for £nding a minimum connected dominating set (MCDS) in ad hoc
wireless networks based on the new parameter support of vertices.
With this parameter the proposed heuristic approach effectively
£nds the MCDS of a graph. Extensive computational experiments
show that the proposed approach outperforms the recently proposed
heuristics found in the literature for the MCD