Abstract: In recent years, the number of natural disasters in Laos has a trend to increase, especially the disaster of flood. To make a flood plan risk management in the future, it is necessary to understand and analyze the characteristics of the rainfall and Mekong River level data. To reduce the damage, this paper presents the flood risk analysis in Luangprabang and Vientiane, the prefecture of Laos. In detail, the relationship between the rainfall and the Mekong River level has evaluated and appropriate countermeasure for flood was discussed.
Abstract: This paper proposed high level feature for online Lao handwritten recognition. This feature must be high level enough so that the feature is not change when characters are written by different persons at different speed and different proportion (shorter or longer stroke, head, tail, loop, curve). In this high level feature, a character is divided in to sequence of curve segments where a segment start where curve reverse rotation (counter clockwise and clockwise). In each segment, following features are gathered cumulative change in direction of curve (- for clockwise), cumulative curve length, cumulative length of left to right, right to left, top to bottom and bottom to top ( cumulative change in X and Y axis of segment). This feature is simple yet robust for high accuracy recognition. The feature can be gather from parsing the original time sampling sequence X, Y point of the pen location without re-sampling. We also experiment on other segmentation point such as the maximum curvature point which was widely used by other researcher. Experiments results show that the recognition rates are at 94.62% in comparing to using maximum curvature point 75.07%. This is due to a lot of variations of turning points in handwritten.
Abstract: In this paper, we show that the association of the PI
regulators for the speed and stator currents with a control strategy
using the linearization by state feedback for an induction machine
without speed sensor, and with an adaptation of the rotor resistance.
The rotor speed is estimated by using the model reference adaptive
system approach (MRAS). This method consists of using two
models: The first is the reference model and the second is an
adjustable one in which two components of the stator flux, obtained
from the measurement of the currents and stator voltages are
estimated. The estimated rotor speed is then obtained by canceling
the difference between stator-flux of the reference model and those
of the adjustable one. Satisfactory results of simulation are obtained
and discussed in this paper to highlight the proposed approach.
Abstract: This paper gives an overview of a deep drawing
process by pressurized liquid medium separated from the sheet by a
rubber diaphragm. Hydroforming deep drawing processing of sheet
metal parts provides a number of advantages over conventional
techniques. It generally increases the depth to diameter ratio possible
in cup drawing and minimizes the thickness variation of the drawn
cup. To explore the deformation mechanism, analytical and
numerical simulations are used for analyzing the drawing process of
an AA6061-T4 blank. The effects of key process parameters such as
coefficient of friction, initial thickness of the blank and radius
between cup wall and flange are investigated analytically and
numerically. The simulated results were in good agreement with the
results of the analytical model. According to finite element
simulations, the hydroforming deep drawing method provides a more
uniform thickness distribution compared to conventional deep
drawing and decreases the risk of tearing during the process.
Abstract: The intrusion detection problem has been frequently studied, but intrusion detection methods are often based on a single point of view, which always limits the results. In this paper, we introduce a new intrusion detection model based on the combination of different current methods. First we use a notion of distance to unify the different methods. Second we combine these methods using the Pearson correlation coefficients, which measure the relationship between two methods, and we obtain a combined distance. If the combined distance is greater than a predetermined threshold, an intrusion is detected. We have implemented and tested the combination model with two different public data sets: the data set of masquerade detection collected by Schonlau & al., and the data set of program behaviors from the University of New Mexico. The results of the experiments prove that the combination model has better performances.
Abstract: In this paper, fully developed flow and heat transfer of
viscoelastic materials in curved ducts with square cross section under
constant heat flux have been investigated. Here, staggered mesh is
used as computational grids and flow and heat transfer parameters
have been allocated in this mesh with marker and cell method.
Numerical solution of governing equations has being performed with
FTCS finite difference method. Furthermore, Criminale-Eriksen-
Filbey (CEF) constitutive equation has being used as viscoelastic
model. CEF constitutive equation is a suitable model for studying
steady shear flow of viscoelastic materials which is able to model
both effects of the first and second normal stress differences. Here, it
is shown that the first and second normal stresses differences have
noticeable and inverse effect on secondary flows intensity and mean
Nusselt number which is the main novelty of current research.
Abstract: Modeling of the distributed systems allows us to
represent the whole its functionality. The working system instance
rarely fulfils the whole functionality represented by model; usually
some parts of this functionality should be accessible periodically.
The reporting system based on the Data Warehouse concept seams to
be an intuitive example of the system that some of its functionality is
required only from time to time. Analyzing an enterprise risk
associated with the periodical change of the system functionality, we
should consider not only the inaccessibility of the components
(object) but also their functions (methods), and the impact of such a
situation on the system functionality from the business point of view.
In the paper we suggest that the risk attributes should be estimated
from risk attributes specified at the requirements level (Use Case in
the UML model) on the base of the information about the structure of
the model (presented at other levels of the UML model). We argue
that it is desirable to consider the influence of periodical changes in
requirements on the enterprise risk estimation. Finally, the
proposition of such a solution basing on the UML system model is
presented.
Abstract: The Deoxyribonucleic Acid (DNA) which is a doublestranded helix of nucleotides consists of: Adenine (A), Cytosine (C), Guanine (G) and Thymine (T). In this work, we convert this genetic code into an equivalent digital signal representation. Applying a wavelet transform, such as Haar wavelet, we will be able to extract details that are not so clear in the original genetic code. We compare between different organisms using the results of the Haar wavelet Transform. This is achieved by using the trend part of the signal since the trend part bears the most energy of the digital signal representation. Consequently, we will be able to quantitatively reconstruct different biological families.
Abstract: Trends in business intelligence, e-commerce and
remote access make it necessary and practical to store data in
different ways on multiple systems with different operating systems.
As business evolve and grow, they require efficient computerized
solution to perform data update and to access data from diverse
enterprise business applications. The objective of this paper is to
demonstrate the capability of DTS [1] as a database solution for
automatic data transfer and update in solving business problem. This
DTS package is developed for the sales of variety of plants and
eventually expanded into commercial supply and landscaping
business. Dimension data modeling is used in DTS package to
extract, transform and load data from heterogeneous database
systems such as MySQL, Microsoft Access and Oracle that
consolidates into a Data Mart residing in SQL Server. Hence, the
data transfer from various databases is scheduled to run automatically
every quarter of the year to review the efficient sales analysis.
Therefore, DTS is absolutely an attractive solution for automatic data
transfer and update which meeting today-s business needs.
Abstract: Fuzzy C-means Clustering algorithm (FCM) is a
method that is frequently used in pattern recognition. It has the
advantage of giving good modeling results in many cases, although,
it is not capable of specifying the number of clusters by itself. In
FCM algorithm most researchers fix weighting exponent (m) to a
conventional value of 2 which might not be the appropriate for all
applications. Consequently, the main objective of this paper is to use
the subtractive clustering algorithm to provide the optimal number of
clusters needed by FCM algorithm by optimizing the parameters of
the subtractive clustering algorithm by an iterative search approach
and then to find an optimal weighting exponent (m) for the FCM
algorithm. In order to get an optimal number of clusters, the iterative
search approach is used to find the optimal single-output Sugenotype
Fuzzy Inference System (FIS) model by optimizing the
parameters of the subtractive clustering algorithm that give minimum
least square error between the actual data and the Sugeno fuzzy
model. Once the number of clusters is optimized, then two
approaches are proposed to optimize the weighting exponent (m) in
the FCM algorithm, namely, the iterative search approach and the
genetic algorithms. The above mentioned approach is tested on the
generated data from the original function and optimal fuzzy models
are obtained with minimum error between the real data and the
obtained fuzzy models.
Abstract: A property is persistent if for any many-sorted term rewriting system , has the property if and only if term rewriting system , which results from by omitting its sort information, has the property. Zantema showed that termination is persistent for term rewriting systems without collapsing or duplicating rules. In this paper, we show that the Zantema's result can be extended to term rewriting systems on ordered sorts, i.e., termination is persistent for term rewriting systems on ordered sorts without collapsing, decreasing or duplicating rules. Furthermore we give the example as application of this result. Also we obtain that completeness is persistent for this class of term rewriting systems.
Abstract: The advances in location-based data collection
technologies such as GPS, RFID etc. and the rapid reduction of their
costs provide us with a huge and continuously increasing amount of
data about movement of vehicles, people and goods in an urban area.
This explosive growth of geospatially-referenced data has far
outpaced the planner-s ability to utilize and transform the data into
insightful information thus creating an adverse impact on the return
on the investment made to collect and manage this data. Addressing
this pressing need, we designed and developed DIVAD, a dynamic
and interactive visual analytics dashboard to allow city planners to
explore and analyze city-s transportation data to gain valuable
insights about city-s traffic flow and transportation requirements. We
demonstrate the potential of DIVAD through the use of interactive
choropleth and hexagon binning maps to explore and analyze large
taxi-transportation data of Singapore for different geographic and
time zones.
Abstract: Titanium alloys like Ti-6Al-2Sn-4Zr-6Mo (Ti-
6246) are widely used in aerospace applications. Component
manufacturing, however, is difficult and expensive as their
machinability is extremely poor. A thorough understanding of the
chip formation process is needed to improve related metal cutting
operations.In the current study, orthogonal cutting experiments have
been performed and theresulting chips were analyzed by optical
microscopy and scanning electron microscopy.Chips from aTi-
6246ingot were produced at different cutting speeds and cutting
depths. During the experiments, depending of the cutting conditions,
continuous or segmented chips were formed. Narrow, highly
deformed and grain oriented zones, the so-called shear zone,
separated individual segments. Different material properties have
been measured in the shear zones and the segments.
Abstract: This study aimed at assessing whether and to what extent moral judgment and behaviour were: 1. situation-dependent; 2. selectively dependent on cognitive and affective components; 3. influenced by gender and age; 4. reciprocally congruent. In order to achieve these aims, four different types of moral dilemmas were construed and five types of thinking were presented for each of them – representing five possible ways to evaluate the situation. The judgment criteria included selfishness, altruism, sense of justice, and the conflict between selfishness and the two moral issues. The participants were 250 unpaid volunteers (50% male; 50% female) belonging to two age-groups: young people and adults. The study entailed a 2 (gender) x 2 (age-group) x 5 (type of thinking) x 4 (situation) mixed design: the first two variables were betweensubjects, the others were within-subjects. Results have shown that: 1. moral judgment and behaviour are at least partially affected by the type of situations and by interpersonal variables such as gender and age; 2. moral reasoning depends in a similar manner on cognitive and affective factors; 3. there is not a gender polarity between the ethic of justice and the ethic of cure/ altruism; 4. moral reasoning and behavior are perceived as reciprocally congruent even though their congruence decreases with a more objective assessment. Such results were discussed in the light of contrasting theories on morality.
Abstract: This paper reports a new pattern recognition approach for face recognition. The biological model of light receptors - cones and rods in human eyes and the way they are associated with pattern vision in human vision forms the basis of this approach. The functional model is simulated using CWD and WPD. The paper also discusses the experiments performed for face recognition using the features extracted from images in the AT & T face database. Artificial Neural Network and k- Nearest Neighbour classifier algorithms are employed for the recognition purpose. A feature vector is formed for each of the face images in the database and recognition accuracies are computed and compared using the classifiers. Simulation results show that the proposed method outperforms traditional way of feature extraction methods prevailing for pattern recognition in terms of recognition accuracy for face images with pose and illumination variations.
Abstract: Ground-source heat pumps achieve higher efficiencies
than conventional air-source heat pumps because they exchange heat
with the ground that is cooler in summer and hotter in winter than the
air environment. Earth heat exchangers are essential parts of the
ground-source heat pumps and the accurate prediction of their
performance is of fundamental importance. This paper presents the
development and validation of a numerical model through an
incompressible fluid flow, for the simulation of energy and
temperature changes in and around a U-tube borehole heat
exchanger. The FlexPDE software is used to solve the resulting
simultaneous equations that model the heat exchanger. The validated
model (through a comparison with experimental data) is then used to
extract conclusions on how various parameters like the U-tube
diameter, the variation of the ground thermal conductivity and
specific heat and the borehole filling material affect the temperature
of the fluid.
Abstract: Wireless sensor networks have been used in wide
areas of application and become an attractive area for researchers in
recent years. Because of the limited energy storage capability of
sensor nodes, Energy consumption is one of the most challenging
aspects of these networks and different strategies and protocols deals
with this area. This paper presents general methods for designing low
power wireless sensor network. Different sources of energy
consumptions in these networks are discussed here and techniques for
alleviating the consumption of energy are presented.
Abstract: Phytases are acid phosphatase enzymes, which
efficiently cleave phosphate moieties from phytic acid, thereby
generating myo-inositol and inorganic phosphate. Thirty four
isolates of endophytic fungi to produce of phytases were isolated
from leaf, stem and root fragments of soybean. Screening of 34
isolates of endophytic fungi identified the phytases produced by
Rhizoctonia sp. and Fusarium verticillioides . The phytase
production were the best induced by phytic acid and rice bran
compared the others inducer in submerged fermentation medium
used. The phytase produced by both Rhizoctonia sp. and F.
verticillioides have pH optimum at 4.0 and 5.0 respectively. The
characterization of phytase from Fusarium verticillioides showed that
temperature optimum was 500C and stability until 600C, the pH
optimum 5.0 and pH stability was 2.5 – 6.0, and substrate specificity
were rice bran>soybean meal>corn> coconut cake, respectively.
Abstract: With the necessity of increased processing capacity with less energy consumption; power aware multiprocessor system has gained more attention in the recent future. One of the additional challenges that is to be solved in a multi-processor system when compared to uni-processor system is job allocation. This paper presents a novel task dependent job allocation algorithm: Energy centric- Allocation (Ec-A) and Rate Monotonic (RM) scheduling to minimize energy consumption in a multiprocessor system. A simulation analysis is carried out to verify the performance increase with reduction in energy consumption and required number of processors in the system.
Abstract: In the age of global communications, heterogeneous
networks are seen to be the best choice of strategy to ensure continuous and uninterruptible services. This will allow mobile
terminal to stay in connection even they are migrating into different segment coverage through the handoff process. With the increase of
teletraffic demands in mobile cellular system, hierarchical cellular systems have been adopted extensively for more efficient channel
utilization and better QoS (Quality of Service). This paper presents a
bidirectional call overflow scheme between two layers of microcells and macrocells, where handoffs are decided by the velocity of mobile
making the call. To ensure that handoff calls are given higher priorities, it is assumed that guard channels are assigned in both
macrocells and microcells. A hysteresis value introduced in mobile velocity is used to allow mobile roam in the same cell if its velocity
changes back within the set threshold values. By doing this the number of handoffs is reduced thereby reducing the processing overhead and enhancing the quality of service to the end user.