Abstract: Fault detection determines faultexistence and detecting
time. This paper discusses two layered fault detection methods to
enhance the reliability and safety. Two layered fault detection methods
consist of fault detection methods of component level controllers and
system level controllers. Component level controllers detect faults by
using limit checking, model-based detection, and data-driven
detection and system level controllers execute detection by stability
analysis which can detect unknown changes. System level controllers
compare detection results via stability with fault signals from lower
level controllers. This paper addresses fault detection methods via
stability and suggests fault detection criteria in nonlinear systems. The
fault detection method applies tothe hybrid control unit of a military
hybrid electric vehicleso that the hybrid control unit can detect faults
of the traction motor.
Abstract: In this paper a new robust digital image watermarking
algorithm based on the Complex Wavelet Transform is proposed. This
technique embeds different parts of a watermark into different blocks
of an image under the complex wavelet domain. To increase security
of the method, two chaotic maps are employed, one map is used to
determine the blocks of the host image for watermark embedding,
and another map is used to encrypt the watermark image. Simulation
results are presented to demonstrate the effectiveness of the proposed
algorithm.
Abstract: In this paper we introduce an effective ECG compression algorithm based on two dimensional multiwavelet transform. Multiwavelets offer simultaneous orthogonality, symmetry and short support, which is not possible with scalar two-channel wavelet systems. These features are known to be important in signal processing. Thus multiwavelet offers the possibility of superior performance for image processing applications. The SPIHT algorithm has achieved notable success in still image coding. We suggested applying SPIHT algorithm to 2-D multiwavelet transform of2-D arranged ECG signals. Experiments on selected records of ECG from MIT-BIH arrhythmia database revealed that the proposed algorithm is significantly more efficient in comparison with previously proposed ECG compression schemes.
Abstract: Microscopic emission and fuel consumption models
have been widely recognized as an effective method to quantify real
traffic emission and energy consumption when they are applied with
microscopic traffic simulation models. This paper presents a
framework for developing the Microscopic Emission (HC, CO, NOx,
and CO2) and Fuel consumption (MEF) models for light-duty
vehicles. The variable of composite acceleration is introduced into
the MEF model with the purpose of capturing the effects of historical
accelerations interacting with current speed on emission and fuel
consumption. The MEF model is calibrated by multivariate
least-squares method for two types of light-duty vehicle using
on-board data collected in Beijing, China by a Portable Emission
Measurement System (PEMS). The instantaneous validation results
shows the MEF model performs better with lower Mean Absolute
Percentage Error (MAPE) compared to other two models. Moreover,
the aggregate validation results tells the MEF model produces
reasonable estimations compared to actual measurements with
prediction errors within 12%, 10%, 19%, and 9% for HC, CO, NOx
emissions and fuel consumption, respectively.
Abstract: An adaptive Chinese hand-talking system is presented
in this paper. By analyzing the 3 data collecting strategies for new
users, the adaptation framework including supervised and unsupervised
adaptation methods is proposed. For supervised adaptation,
affinity propagation (AP) is used to extract exemplar subsets, and enhanced
maximum a posteriori / vector field smoothing (eMAP/VFS)
is proposed to pool the adaptation data among different models. For
unsupervised adaptation, polynomial segment models (PSMs) are
used to help hidden Markov models (HMMs) to accurately label
the unlabeled data, then the "labeled" data together with signerindependent
models are inputted to MAP algorithm to generate
signer-adapted models. Experimental results show that the proposed
framework can execute both supervised adaptation with small amount
of labeled data and unsupervised adaptation with large amount
of unlabeled data to tailor the original models, and both achieve
improvements on the performance of recognition rate.
Abstract: The porous silicon (PS), formed from the anodization
of a p+ type substrate silicon, consists of a network organized in a
pseudo-column as structure of multiple side ramifications. Structural
micro-topology can be interpreted as the fraction of the interconnected
solid phase contributing to thermal transport. The
reduction of dimensions of silicon of each nanocristallite during the
oxidation induced a reduction in thermal conductivity. Integration of
thermal sensors in the Microsystems silicon requires an effective
insulation of the sensor element. Indeed, the low thermal conductivity
of PS consists in a very promising way in the fabrication of integrated
thermal Microsystems.In this work we are interesting in the
measurements of thermal conductivity (on the surface and in depth)
of PS by the micro-Raman spectroscopy. The thermal conductivity is
studied according to the parameters of anodization (initial doping and
current density. We also, determine porosity of samples by
spectroellipsometry.
Abstract: This paper presents a new Quality-Controlled, wavelet based, compression method for electrocardiogram (ECG) signals. Initially, an ECG signal is decomposed using the wavelet transform. Then, the resulting coefficients are iteratively thresholded to guarantee that a predefined goal percent root mean square difference (GPRD) is matched within tolerable boundaries. The quantization strategy of extracted non-zero wavelet coefficients (NZWC), according to the combination of RLE, HUFFMAN and arithmetic encoding of the NZWC and a resulting look up table, allow the accomplishment of high compression ratios with good quality reconstructed signals.
Abstract: Email has become a fast and cheap means of online
communication. The main threat to email is Unsolicited Bulk Email
(UBE), commonly called spam email. The current work aims at
identification of unigrams in more than 2700 UBE that advertise
body-enhancement drugs. The identification is based on the
requirement that the unigram is neither present in dictionary, nor is a
slang term. The motives of the paper are many fold. This is an
attempt to analyze spamming behaviour and employment of wordmutation
technique. On the side-lines of the paper, we have
attempted to better understand the spam, the slang and their interplay.
The problem has been addressed by employing Tokenization
technique and Unigram BOW model. We found that the non-lexicon
words constitute nearly 66% of total number of lexis of corpus
whereas non-slang words constitute nearly 2.4% of non-lexicon
words. Further, non-lexicon non-slang unigrams composed of 2
lexicon words, form more than 71% of the total number of such
unigrams. To the best of our knowledge, this is the first attempt to
analyze usage of non-lexicon non-slang unigrams in any kind of
UBE.
Abstract: The main objective of this paper is to identify and
disseminate good practice in quality assurance and enhancement as
well as in teaching and learning at master level. This paper focuses
on the experience of the Erasmus Mundus Master program CIMET
(Color in Informatics and Media Technology). Amongst topics
covered, we discuss the adjustments necessary to a curriculum
designed for excellent international students and their preparation for
a global labor market.
Abstract: This paper proposes a stroke extraction method for use in off-line signature verification. After giving a brief overview of the current ongoing researches an algorithm is introduced for detecting and following strokes in static images of signatures. Problems like the handling of junctions and variations in line width and line intensity are discussed in detail. Results are validated by both using an existing on-line signature database and by employing image registration methods.
Abstract: In this paper, we investigated the characteristic of a
clinical dataseton the feature selection and classification
measurements which deal with missing values problem.And also
posed the appropriated techniques to achieve the aim of the activity;
in this research aims to find features that have high effect to mortality
and mortality time frame. We quantify the complexity of a clinical
dataset. According to the complexity of the dataset, we proposed the
data mining processto cope their complexity; missing values, high
dimensionality, and the prediction problem by using the methods of
missing value replacement, feature selection, and classification.The
experimental results will extend to develop the prediction model for
cardiology.
Abstract: In this work, the influence of temperature on the
different parameters of solar cells based on organic semiconductors
are studied. The short circuit current Isc increases so monotonous
with temperature and then saturates to a maximum value before
decreasing at high temperatures. The open circuit voltage Vco
decreases linearly with temperature. The fill factor FF and efficiency,
which are directly related with Isc and Vco follow the variations of
the letters. The phenomena are explained by the behaviour of the
mobility which is a temperature activated process.
Abstract: Text categorization is the problem of classifying text
documents into a set of predefined classes. After a preprocessing
step, the documents are typically represented as large sparse vectors.
When training classifiers on large collections of documents, both the
time and memory restrictions can be quite prohibitive. This justifies
the application of feature selection methods to reduce the
dimensionality of the document-representation vector. In this paper,
we present three feature selection methods: Information Gain,
Support Vector Machine feature selection called (SVM_FS) and
Genetic Algorithm with SVM (called GA_SVM). We show that the
best results were obtained with GA_SVM method for a relatively
small dimension of the feature vector.
Abstract: Superelastic Shape Memory Alloy (SMA) is accepted
when it used as connection in steel structures. The seismic behaviour
of steel frames with SMA is being assessed in this study. Three eightstorey
steel frames with different SMA systems are suggested, the
first one of which is braced with diagonal bracing system, the second
one is braced with nee bracing system while the last one is which the
SMA is used as connection at the plastic hinge regions of beams.
Nonlinear time history analyses of steel frames with SMA subjected
to two different ground motion records have been performed using
Seismostruct software. To evaluate the efficiency of suggested
systems, the dynamic responses of the frames were compared. From
the comparison results, it can be concluded that using SMA element
is an effective way to improve the dynamic response of structures
subjected to earthquake excitations. Implementing the SMA braces
can lead to a reduction in residual roof displacement. The shape
memory alloy is effective in reducing the maximum displacement at
the frame top and it provides a large elastic deformation range. SMA
connections are very effective in dissipating energy and reducing the
total input energy of the whole frame under severe seismic ground
motion. Using of the SMA connection system is more effective in
controlling the reaction forces at the base frame than other bracing
systems. Using SMA as bracing is more effective in reducing the
displacements. The efficiency of SMA is dependant on the input
wave motions and the construction system as well.
Abstract: This paper deals with the formulation of Maxwell-s equations in a cavity resonator in the presence of the gravitational field produced by a blackhole. The metric of space-time due to the blackhole is the Schwarzchild metric. Conventionally, this is expressed in spherical polar coordinates. In order to adapt this metric to our problem, we have considered this metric in a small region close to the blackhole and expressed this metric in a cartesian system locally.
Abstract: This paper present lease agreement regulations in
selected European countries. The lease agreement has a long history
and now is one of the main ways to manage agricultural lands in
Europe. The analysis of individual regulations, which has been done,
indicates that this agreement is very important to build social
relations in agriculture and society. This article provides an analysis
of the legal regulations concerning the lease in France, Spain,
Switzerland, Ukraine and Italy. Article is example of study of the
legal regulations and can be used for legal changes in individual
countries.
Abstract: A novel behavioral detection framework is proposed
to detect zero day buffer overflow vulnerabilities (based on network
behavioral signatures) using zero-day exploits, instead of the
signature-based or anomaly-based detection solutions currently
available for IDPS techniques. At first we present the detection
model that uses shadow honeypot. Our system is used for the online
processing of network attacks and generating a behavior detection
profile. The detection profile represents the dataset of 112 types of
metrics describing the exact behavior of malware in the network. In
this paper we present the examples of generating behavioral
signatures for two attacks – a buffer overflow exploit on FTP server
and well known Conficker worm. We demonstrated the visualization
of important aspects by showing the differences between valid
behavior and the attacks. Based on these metrics we can detect
attacks with a very high probability of success, the process of
detection is however very expensive.
Abstract: Knowledge sharing culture contributes to a positive
working environment. Currently, there is no platform for the Faculty
of Industrial Information Technology (FIIT), Unisel academic staff to
share knowledge among them. As it is done manually, the sharing
process is through common meeting or by any offline discussions.
There is no repository for future retrieval. However, with open
source solution the development of knowledge based application may
reduce the cost tremendously. In this paper we discuss about the
domain on which this knowledge portal is being developed and also
the deployment of open source tools such as JOOMLA, PHP
programming language and MySQL. This knowledge portal is
evidence that open source tools also reliable in developing
knowledge based portal. These recommendations will be useful to
the open source community to produce more open source products in
future.
Abstract: In this paper, an automatic system of diagnosis was
developed to detect and locate in real time the defects of the wound
rotor asynchronous machine associated to electronic converter. For
this purpose, we have treated the signals of the measured parameters
(current and speed) to use them firstly, as indicating variables of the
machine defects under study and, secondly, as inputs to the Artificial
Neuron Network (ANN) for their classification in order to detect the
defect type in progress. Once a defect is detected, the interpretation
system of information will give the type of the defect and its place of
appearance.
Abstract: Defect prevention is the most vital but habitually
neglected facet of software quality assurance in any project. If
functional at all stages of software development, it can condense the
time, overheads and wherewithal entailed to engineer a high quality
product. The key challenge of an IT industry is to engineer a
software product with minimum post deployment defects.
This effort is an analysis based on data obtained for five selected
projects from leading software companies of varying software
production competence. The main aim of this paper is to provide
information on various methods and practices supporting defect
detection and prevention leading to thriving software generation. The
defect prevention technique unearths 99% of defects. Inspection is
found to be an essential technique in generating ideal software
generation in factories through enhanced methodologies of abetted
and unaided inspection schedules. On an average 13 % to 15% of
inspection and 25% - 30% of testing out of whole project effort time
is required for 99% - 99.75% of defect elimination.
A comparison of the end results for the five selected projects
between the companies is also brought about throwing light on the
possibility of a particular company to position itself with an
appropriate complementary ratio of inspection testing.