Abstract: We propose a multi-agent based utilitarian approach
to model and understand information flows in social networks that
lead to Pareto optimal informational exchanges. We model the
individual expected utility function of the agents to reflect the net
value of information received. We show how this model, adapted
from a theorem by Karl Borch dealing with an actuarial Risk
Exchange concept in the Insurance industry, can be used for social
network analysis. We develop a utilitarian framework that allows us
to interpret Pareto optimal exchanges of value as potential
information flows, while achieving a maximization of a sum of
expected utilities of information of the group of agents. We examine
some interesting conditions on the utility function under which the
flows are optimal. We illustrate the promise of this new approach to
attach economic value to information in networks with a synthetic
example.
Abstract: Pressure driven microscale gas flow-separation has
been investigated by solving the compressible Navier-Stokes (NS)
system of equations. A two dimensional explicit finite volume (FV)
compressible flow solver has been developed using modified
advection upwind splitting methods (AUSM+) with no-slip/first
order Maxwell-s velocity slip conditions to predict the flowseparation
behavior in microdimensions. The effects of scale-factor
of the flow geometry and gas species on the microscale gas flowseparation
have been studied in this work. The intensity of flowseparation
gets reduced with the decrease in scale of the flow
geometry. In reduced dimension, flow-separation may not at all be
present under similar flow conditions compared to the larger flow
geometry. The flow-separation patterns greatly depend on the
properties of the medium under similar flow conditions.
Abstract: Prolonged immobilization leads to significant
weakness and atrophy of the skeletal muscle and can also impair the
recovery of muscle strength following injury. Therefore, it is
important to minimize the period under immobilization and accelerate
the return to normal activity. This study examined the effects of heat
treatment and rest-inserted exercise on the muscle activity of the lower
limb during knee flexion/extension. Twelve healthy subjects were
assigned to 4 groups that included: (1) heat treatment + rest-inserted
exercise; (2) heat + continuous exercise; (3) no heat + rest-inserted
exercise; and (4) no heat + continuous exercise. Heat treatment was
applied for 15 mins prior to exercise. Continuous exercise groups
performed knee flexion/extension at 0.5 Hz for 300 cycles without rest
whereas rest-inserted exercise groups performed the same exercise but
with 2 mins rest inserted every 60 cycles of continuous exercise.
Changes in the rectus femoris and hamstring muscle activities were
assessed at 0, 1, and 2 weeks of treatment by measuring the
electromyography signals of isokinetic maximum voluntary
contraction. Significant increases in both the rectus femoris and
hamstring muscles were observed after 2 weeks of treatment only
when both heat treatment and rest-inserted exercise were performed.
These results suggest that combination of various treatment techniques,
such as heat treatment and rest-inserted exercise, may expedite the
recovery of muscle strength following immobilization.
Abstract: CFD simulations are carried out in arterial stenoses
with 48 % areal occlusion. Non-newtonian fluid model is selected for
the blood flow as the same problem has been solved before with
Newtonian fluid model. Studies on flow resistance with the presence
of surface irregularities are carried out. Investigations are also
performed on the pressure drop at various Reynolds numbers. The
present study revealed that the pressure drop across a stenosed artery
is practically unaffected by surface irregularities at low Reynolds
numbers, while flow features are observed and discussed at higher
Reynolds numbers.
Abstract: When programming in languages such as C, Java, etc.,
it is difficult to reconstruct the programmer's ideas only from the
program code. This occurs mainly because, much of the programmer's
ideas behind the implementation are not recorded in the code during
implementation. For example, physical aspects of computation such as
spatial structures, activities, and meaning of variables are not required
as instructions to the computer and are often excluded. This makes the
future reconstruction of the original ideas difficult. AIDA, which is a
multimedia programming language based on the cyberFilm model, can
solve these problems allowing to describe ideas behind programs
using advanced annotation methods as a natural extension to
programming. In this paper, a development environment that
implements the AIDA language is presented with a focus on the
annotation methods. In particular, an actual scientific numerical
computation code is created and the effects of the annotation methods
are analyzed.
Abstract: Context awareness is a capability whereby mobile
computing devices can sense their physical environment and adapt
their behavior accordingly. The term context-awareness, in
ubiquitous computing, was introduced by Schilit in 1994 and has
become one of the most exciting concepts in early 21st-century
computing, fueled by recent developments in pervasive computing
(i.e. mobile and ubiquitous computing). These include computing
devices worn by users, embedded devices, smart appliances, sensors
surrounding users and a variety of wireless networking technologies.
Context-aware applications use context information to adapt
interfaces, tailor the set of application-relevant data, increase the
precision of information retrieval, discover services, make the user
interaction implicit, or build smart environments. For example: A
context aware mobile phone will know that the user is currently in a
meeting room, and reject any unimportant calls. One of the major
challenges in providing users with context-aware services lies in
continuously monitoring their contexts based on numerous sensors
connected to the context aware system through wireless
communication. A number of context aware frameworks based on
sensors have been proposed, but many of them have neglected the
fact that monitoring with sensors imposes heavy workloads on
ubiquitous devices with limited computing power and battery. In this
paper, we present CALEEF, a lightweight and energy efficient
context aware framework for resource limited ubiquitous devices.
Abstract: In this paper the General Game problem is described.
In this problem the competition or cooperation dilemma occurs as the
two basic types of strategies. The strategy possibilities have been
analyzed for finding winning strategy in uncertain situations (no
information about the number of players and their strategy types).
The winning strategy is missing, but a good solution can be found by
simulation by varying the ratio of the two types of strategies. This
new method has been used in a real contest with human players,
where the created strategies by simulation have reached very good
ranks. This construction can be applied in other real social games as
well.
Abstract: Finger spelling is an art of communicating by signs
made with fingers, and has been introduced into sign language to serve
as a bridge between the sign language and the verbal language.
Previous approaches to finger spelling recognition are classified into
two categories: glove-based and vision-based approaches. The
glove-based approach is simpler and more accurate recognizing work
of hand posture than vision-based, yet the interfaces require the user to
wear a cumbersome and carry a load of cables that connected the
device to a computer. In contrast, the vision-based approaches provide
an attractive alternative to the cumbersome interface, and promise
more natural and unobtrusive human-computer interaction. The
vision-based approaches generally consist of two steps: hand
extraction and recognition, and two steps are processed independently.
This paper proposes real-time vision-based Korean finger spelling
recognition system by integrating hand extraction into recognition.
First, we tentatively detect a hand region using CAMShift algorithm.
Then fill factor and aspect ratio estimated by width and height
estimated by CAMShift are used to choose candidate from database,
which can reduce the number of matching in recognition step. To
recognize the finger spelling, we use DTW(dynamic time warping)
based on modified chain codes, to be robust to scale and orientation
variations. In this procedure, since accurate hand regions, without
holes and noises, should be extracted to improve the precision, we use
graph cuts algorithm that globally minimize the energy function
elegantly expressed by Markov random fields (MRFs). In the
experiments, the computational times are less than 130ms, and the
times are not related to the number of templates of finger spellings in
database, as candidate templates are selected in extraction step.
Abstract: Dielectric sheet perturbation to the dominant TE111
mode resonant frequency of a circular cavity is studied and presented
in this paper. The dielectric sheet, placed at the middle of the airfilled
cavity, introduces discontinuities and disturbs the configuration
of electromagnetic fields in the cavity. For fixed dimensions of cavity
and fixed thickness of the loading dielectric, the dominant resonant
frequency varies quite linearly with the permittivity of the dielectric.
This quasi-linear relationship is plotted using Maple software and
verified using 3D electromagnetic simulations. Two probes are used
in the simulation for wave excitation into and from the cavity. The
best length of probe is found to be 3 mm, giving the closest resonant
frequency to the one calculated using Maple. A total of fourteen
different dielectrics of permittivity ranging from 1 to 12.9 are tested
one by one in the simulation. The works show very close agreement
between the results from Maple and the simulation. A constant
difference of 0.04 GHz is found between the resonant frequencies
collected during simulation and the ones from Maple. The success of
this project may lead to the possibility of using the middle loaded
cavity at TE111 mode as a microwave non-destructive testing of solid
materials.
Abstract: Company strategy expresses a basic idea of how to reach company objectives. A whole range of models of strategic management are used in practice. The concept of strategic management should fulfill some basic requirements to make it applicable for both the typical, but also more specific company environment. The financial strategy plays an important role in corporate strategy. The paper develops a methodology of strategic model implementing into the category of micro, small and medium-sized enterprises (SMEs). Furthermore, the methodology recommends procedures while solving an up-to-date worldwide task of the definition of the company strategy and its financial strategy.
Abstract: Localization is one of the critical issues in the field of
robot navigation. With an accurate estimate of the robot pose, robots will be capable of navigating in the environment autonomously and efficiently. In this paper, a hybrid Distributed Vision System (DVS)
for robot localization is presented. The presented approach integrates
odometry data from robot and images captured from overhead cameras
installed in the environment to help reduce possibilities of fail
localization due to effects of illumination, encoder accumulated errors,
and low quality range data. An odometry-based motion model is applied to predict robot poses, and robot images captured by overhead
cameras are then used to update pose estimates with HSV histogram-based measurement model. Experiment results show the
presented approach could localize robots in a global world coordinate system with localization errors within 100mm.
Abstract: Social bookmarking is an environment in which
the user gradually changes interests over time so that the tag
data associated with the current temporal period is usually more
important than tag data temporally far from the current period.
This implies that in the social tagging system, the newly tagged
items by the user are more relevant than older items. This study
proposes a novel recommender system that considers the users-
recent tag preferences. The proposed system includes the
following stages: grouping similar users into clusters using an
E-M clustering algorithm, finding similar resources based on
the user-s bookmarks, and recommending the top-N items to
the target user. The study examines the system-s information
retrieval performance using a dataset from del.icio.us, which is
a famous social bookmarking web site. Experimental results
show that the proposed system is better and more effective than
traditional approaches.
Abstract: The purpose of this study is to revisit the concept of
rape as represented by professionals in the literature as well as its
perception (beliefs and attitudes) in the population at large and to
propose methodological improvements to its measurement tool. Rape
is a serious crime threatening its victim-s physical and mental health
and integrity; and as such is legally prosecuted in all modern
societies. The problem is not in accepting or rejecting rape as a
criminal act, but rather in the vagueness of its interpretations and
“justifications" maintained in the mentality of modern societies -
known in the literature as the phenomenon of "rape-myth". The rapemyth
can be studied from different perspectives: criminology,
sociology, ethics, medicine and psychology. Its investigation requires
rigorous scientific objectivity, free of passion (victims of rape are at
risk of emotional bias), free of activism (social activists, even if wellintentioned
are also biased), free of any pre-emptive assumptions or
prejudices. To apply a rigorous scientific procedure, we need a solid,
valid and reliable measurement. Rape is a form of heterosexual or
homosexual aggression, violently forcing the victim to give-in in the
sexual activity of the aggressor against her/his will. Human beings
always try to “understand" or find a reason justifying their acts.
Psychological literature provides multiple clinical and experimental
examples of it; just to mention the famous studies by Milgram on the
level of electroshock delivered by the “teacher" towards the “learner"
if “scientifically justifiable" or the studies on the behavior of
“prisoners" and the “guards" and many other experiments and field
observations. Sigmund Freud presented the phenomenon of
unconscious justification and called it rationalization. The multiple
justifications, rationalizations and repeated opinions about sexual
behavior contribute to a myth maintained in the society. What kind of
“rationale" our societies apply to “understand" the non-consensual
sexual behavior? There are many, just to mention few:
• Sex is a ludistic activity for both participants, therefore –
even if not consented – it should bring pleasure to both.
• Everybody wants sex, but only men are allowed to manifest
it openly while women have to pretend the opposite, thus men have
to initiate sexual behavior and women would follow.
• A person who strongly needs sex is free to manifest it and
struggle to get it; the person who doesn-t want it must not reveal
her/his sexual attraction and avoid risky situations; otherwise she/he
is perceived as a promiscuous seducer.
• A person who doesn-t fight against the sexual initiator
unconsciously accepts the rape (does it explain why homosexual
rapes are reported less frequently than rapes against women?).
• Women who are raped deserve it because their wardrobe is
very revealing and seducing and they ''willingly'' go to highly risky
places (alleys, dark roads, etc.).
• Men need to ventilate their sexual energy and if they are
deprived of a partner their urge to have sex is difficult to control.
• Men are supposed to initiate and insist even by force to have
sex (their testosterone makes them both sexual and aggressive).
The paper overviews numerous cultural beliefs about masculine
versus feminine behavior and their impact on the “rape myth".
Abstract: The notions of I-vague groups with membership and
non-membership functions taking values in an involutary dually
residuated lattice ordered semigroup are introduced which generalize
the notions with truth values in a Boolean algebra as well as those
usual vague sets whose membership and non-membership functions
taking values in the unit interval [0, 1]. Moreover, various operations
and properties are established.
Abstract: Transportation is of great importance in the current
life of human beings. The transportation system plays many roles,
from economical development to after-catastrophe aids such as
rescue operation in the first hours and days after an earthquake. In
after earthquakes response phase, transportation system acts as a
basis for ground operations including rescue and relief operation,
food providing for victims and etc. It is obvious that partial or
complete obstruction of this system results in the stop of these
operations. Bridges are one of the most important elements of
transportation network. Failure of a bridge, in the most optimistic
case, cuts the relation between two regions and in more developed
countries, cuts the relation of numerous regions. In this paper, to
evaluate the vulnerability and estimate the damage level of Tehran
bridges, HAZUS method, developed by Federal Emergency
Management Agency (FEMA) with the aid of National Institute of
Building Science (NIBS), is used for the first time in Iran. In this
method, to evaluate the collapse probability, fragility curves are
used. Iran is located on seismic belt and thus, it is vulnerable to
earthquakes. Thus, the study of the probability of bridge collapses, as
an important part of transportation system, during earthquakes is of
great importance. The purpose of this study is to provide fragility
curves for Gisha Bridge, one of the longest steel bridges in Tehran,
as an important lifeline element. Besides, the damage probability for
this bridge during a specific earthquake, introduced as scenario
earthquakes, is calculated. The fragility curves show that for the
considered scenario, the probability of occurrence of complete
collapse for the bridge is 8.6%.
Abstract: The modified Arcan fixture was used in order to
investigate the mixed mode fracture properties of high strength steel
butt weld through experimental and numerical analysis. The fixture
consisted of a central section with "butterfly-shaped" specimen that
had central crack. The specimens were under pure mode I (opening),
pure mode II (shearing) and all in plane mixed mode loading angles
starting from 0 to 90 degrees. The geometric calibration factors were
calculated with the aid of finite element analysis for various loading
mode and different crack length (0.45≤ a/w ≤0.55) and the critical
fracture loads obtained experimentally. The critical fracture
toughness (KIC & KIIC) estimated with experimental and numerical
analysis under mixed mode loading conditions.
Abstract: Preprocessing of speech signals is considered a crucial step in the development of a robust and efficient speech or speaker recognition system. In this paper, we present some popular statistical outlier-detection based strategies to segregate the silence/unvoiced part of the speech signal from the voiced portion. The proposed methods are based on the utilization of the 3 σ edit rule, and the Hampel Identifier which are compared with the conventional techniques: (i) short-time energy (STE) based methods, and (ii) distribution based methods. The results obtained after applying the proposed strategies on some test voice signals are encouraging.
Abstract: This paper focuses on a technique for identifying the geological boundary of the ground strata in front of a tunnel excavation site using the first order adjoint method based on the optimal control theory. The geological boundary is defined as the boundary which is different layers of elastic modulus. At tunnel excavations, it is important to presume the ground situation ahead of the cutting face beforehand. Excavating into weak strata or fault fracture zones may cause extension of the construction work and human suffering. A theory for determining the geological boundary of the ground in a numerical manner is investigated, employing excavating blasts and its vibration waves as the observation references. According to the optimal control theory, the performance function described by the square sum of the residuals between computed and observed velocities is minimized. The boundary layer is determined by minimizing the performance function. The elastic analysis governed by the Navier equation is carried out, assuming the ground as an elastic body with linear viscous damping. To identify the boundary, the gradient of the performance function with respect to the geological boundary can be calculated using the adjoint equation. The weighed gradient method is effectively applied to the minimization algorithm. To solve the governing and adjoint equations, the Galerkin finite element method and the average acceleration method are employed for the spatial and temporal discretizations, respectively. Based on the method presented in this paper, the different boundary of three strata can be identified. For the numerical studies, the Suemune tunnel excavation site is employed. At first, the blasting force is identified in order to perform the accuracy improvement of analysis. We identify the geological boundary after the estimation of blasting force. With this identification procedure, the numerical analysis results which almost correspond with the observation data were provided.
Abstract: The continued growth of the cities is causing an
increase of the amount of surface to illuminate. However, this rise
into lighting brings some unintended consequences such as increased
of energy consumption or the light pollution. To make these effects
less intrusive as possible some councils have chosen to perform a
part-night lighting in some areas. Nonetheless, this kind of shutdown
may cause serious problems which we intend to highlight in this
paper.
Abstract: Breast cancer detection techniques have been reported
to aid radiologists in analyzing mammograms. We note that most
techniques are performed on uncompressed digital mammograms.
Mammogram images are huge in size necessitating the use of
compression to reduce storage/transmission requirements. In this
paper, we present an algorithm for the detection of
microcalcifications in the JPEG2000 domain. The algorithm is based
on the statistical properties of the wavelet transform that the
JPEG2000 coder employs. Simulation results were carried out at
different compression ratios. The sensitivity of this algorithm ranges
from 92% with a false positive rate of 4.7 down to 66% with a false
positive rate of 2.1 using lossless compression and lossy compression
at a compression ratio of 100:1, respectively.