Abstract: This paper presents the effectiveness of artificial
intelligent technique to apply for pattern recognition and
classification of Partial Discharge (PD). Characteristics of PD signal
for pattern recognition and classification are computed from the
relation of the voltage phase angle, the discharge magnitude and the
repeated existing of partial discharges by using statistical and fractal
methods. The simplified fuzzy ARTMAP (SFAM) is used for pattern
recognition and classification as artificial intelligent technique. PDs
quantities, 13 parameters from statistical method and fractal method
results, are inputted to Simplified Fuzzy ARTMAP to train system
for pattern recognition and classification. The results confirm the
effectiveness of purpose technique.
Abstract: Due to the rise of aging population, effective utilization
of healthcare resources has become an important issue. With the
advance of ICT technology, the application of tele-healthcare service
has received more attention than ever. The main purpose of this
research is to investigate how to conduct innovative design for
tele-healthcare service based on user-s perspectives. First, the
healthcare service blueprint was used to describe the processes
of tele-healthcare service delivery, and then construct PZB service
quality gap model based on the literature and practitioners-
interviews. Next, TRIZ theory is applied to implement service
innovation. We found the proposed service innovation procedures can
effectively improve the quality of service design.
Abstract: Prior research evidenced that unimodal biometric
systems have several tradeoffs like noisy data, intra-class variations,
restricted degrees of freedom, non-universality, spoof attacks, and
unacceptable error rates. In order for the biometric system to be more
secure and to provide high performance accuracy, more than one
form of biometrics are required. Hence, the need arise for multimodal
biometrics using combinations of different biometric modalities. This
paper introduces a multimodal biometric system (MMBS) based on
fusion of whole dorsal hand geometry and fingerprints that acquires
right and left (Rt/Lt) near-infra-red (NIR) dorsal hand geometry (HG)
shape and (Rt/Lt) index and ring fingerprints (FP). Database of 100
volunteers were acquired using the designed prototype. The acquired
images were found to have good quality for all features and patterns
extraction to all modalities. HG features based on the hand shape
anatomical landmarks were extracted. Robust and fast algorithms for
FP minutia points feature extraction and matching were used. Feature
vectors that belong to similar biometric traits were fused using
feature fusion methodologies. Scores obtained from different
biometric trait matchers were fused using the Min-Max
transformation-based score fusion technique. Final normalized scores
were merged using the sum of scores method to obtain a single
decision about the personal identity based on multiple independent
sources. High individuality of the fused traits and user acceptability
of the designed system along with its experimental high performance
biometric measures showed that this MMBS can be considered for
med-high security levels biometric identification purposes.
Abstract: The objective of this study is to propose a statistical
modeling method which enables simultaneous term structure
estimation of the risk-free interest rate, hazard and loss given default,
incorporating the characteristics of the bond issuing company such as
credit rating and financial information. A reduced form model is used
for this purpose. Statistical techniques such as spline estimation and
Bayesian information criterion are employed for parameter estimation
and model selection. An empirical analysis is conducted using the
information on the Japanese bond market data. Results of the
empirical analysis confirm the usefulness of the proposed method.
Abstract: As data to be stored in storage subsystems
tremendously increases, data protection techniques have become more
important than ever, to provide data availability and reliability. In this
paper, we present the file system-based data protection (WOWSnap)
that has been implemented using WORM (Write-Once-Read-Many)
scheme. In the WOWSnap, once WORM files have been created, only
the privileged read requests to them are allowed to protect data against
any intentional/accidental intrusions. Furthermore, all WORM files
are related to their protection cycle that is a time period during which
WORM files should securely be protected. Once their protection cycle
is expired, the WORM files are automatically moved to the
general-purpose data section without any user interference. This
prevents the WORM data section from being consumed by
unnecessary files. We evaluated the performance of WOWSnap on
Linux cluster.
Abstract: Purpose: To develop a method for automatic segmentation of adipose and muscular tissue in thighs from magnetic resonance images. Materials and methods: Thirty obese women were scanned on a Siemens Impact Expert 1T resonance machine. 1500 images were finally used in the tests. The developed segmentation method is a recursive and multilevel process that makes use of several concepts such as shaped histograms, adaptative thresholding and connectivity. The segmentation process was implemented in Matlab and operates without the need of any user interaction. The whole set of images were segmented with the developed method. An expert radiologist segmented the same set of images following a manual procedure with the aid of the SliceOmatic software (Tomovision). These constituted our 'goal standard'. Results: The number of coincidental pixels of the automatic and manual segmentation procedures was measured. The average results were above 90 % of success in most of the images. Conclusions: The proposed approach allows effective automatic segmentation of MRIs from thighs, comparable to expert manual performance.
Abstract: Today technological process makes possible surface
control of producing parts which is needful for product quality
guarantee. Geometrical structure of part surface includes form,
proportion, accuracy to shape, accuracy to size, alignment and
surface topography (roughness, waviness, etc.). All these parameters
are dependence at technology, production machine parameters,
material properties, but also at human, etc. Every parameters
approves at total part accuracy, it is means at accuracy to shape. One
of the most important accuracy to shape element is roundness. This
paper will be deals by comparison of roughness deviations at
coordination measuring machines and at special single purpose
machines. Will describing measuring by discreet method
(discontinuous) and scanning method (continuous) at coordination
measuring machines and confrontation with reference method using
at single purpose machines.
Abstract: This paper describes a computer model of Quantum Field Theory (QFT), referred to in this paper as QTModel. After specifying the initial configuration for a QFT process (e.g. scattering) the model generates the possible applicable processes in terms of Feynman diagrams, the equations for the scattering matrix, and evaluates probability amplitudes for the scattering matrix and cross sections. The computations of probability amplitudes are performed numerically. The equations generated by QTModel are provided for demonstration purposes only. They are not directly used as the base for the computations of probability amplitudes. The computer model supports two modes for the computation of the probability amplitudes: (1) computation according to standard QFT, and (2) computation according to a proposed functional interpretation of quantum theory.
Abstract: In syntactic pattern recognition a pattern can be
represented by a graph. Given an unknown pattern represented by
a graph g, the problem of recognition is to determine if the graph g
belongs to a language L(G) generated by a graph grammar G. The
so-called IE graphs have been defined in [1] for a description of
patterns. The IE graphs are generated by so-called ETPL(k) graph
grammars defined in [1]. An efficient, parsing algorithm for ETPL(k)
graph grammars for syntactic recognition of patterns represented by
IE graphs has been presented in [1]. In practice, structural
descriptions may contain pattern distortions, so that the assignment
of a graph g, representing an unknown pattern, to
a graph language L(G) generated by an ETPL(k) graph grammar G is
rejected by the ETPL(k) type parsing. Therefore, there is a need for
constructing effective parsing algorithms for recognition of distorted
patterns. The purpose of this paper is to present a new approach to
syntactic recognition of distorted patterns. To take into account all
variations of a distorted pattern under study, a probabilistic
description of the pattern is needed. A random IE graph approach is
proposed here for such a description ([2]).
Abstract: This paper presents a distributed intrusion
detection system IDS, based on the concept of specialized
distributed agents community representing agents with the
same purpose for detecting distributed attacks. The semantic of
intrusion events occurring in a predetermined network has been
defined. The correlation rules referring the process which our
proposed IDS combines the captured events that is distributed
both spatially and temporally. And then the proposed IDS tries
to extract significant and broad patterns for set of well-known
attacks. The primary goal of our work is to provide intrusion
detection and real-time prevention capability against insider
attacks in distributed and fully automated environments.
Abstract: Purpose of this work is the development of an
automatic classification system which could be useful for radiologists
in the investigation of breast cancer. The software has been designed
in the framework of the MAGIC-5 collaboration.
In the automatic classification system the suspicious regions with
high probability to include a lesion are extracted from the image as
regions of interest (ROIs). Each ROI is characterized by some
features based on morphological lesion differences.
Some classifiers as a Feed Forward Neural Network, a K-Nearest
Neighbours and a Support Vector Machine are used to distinguish the
pathological records from the healthy ones.
The results obtained in terms of sensitivity (percentage of
pathological ROIs correctly classified) and specificity (percentage of
non-pathological ROIs correctly classified) will be presented through
the Receive Operating Characteristic curve (ROC). In particular the
best performances are 88% ± 1 of area under ROC curve obtained
with the Feed Forward Neural Network.
Abstract: A solar powered air heating system using one ended evacuated tubes is experimentally investigated. A solar air heater containing forty evacuated tubes is used for heating purpose. The collector surface area is about 4.44 m2. The length and outer diameters of the outer glass tube and absorber tube are 1500, 47 and 37 mm, respectively. In this experimental setup, we have a header (heat exchanger) of square shape (190 mm x 190 mm). The length of header is 1500 mm. The header consists of a hollow pipe in the center whose diameter is 60 mm through which the air is made to flow. The experimental setup contains approximately 108 liters of water. Water is working as heat collecting medium which collects the solar heat falling on the tubes. This heat is delivered to the air flowing through the header pipe. This heat flow is due to natural convection and conduction. The outlet air temperature depends upon several factors along with air flow rate and solar radiation intensity. The study has been done for both up-flow and down-flow of air in header in similar weather conditions, at different flow rates. In the present investigations the study has been made to find the effect of intensity of solar radiations and flow rate of air on the out let temperature of the air with time and which flow is more efficient. The obtained results show that the system is highly effective for the heating in this region. Moreover, it has been observed that system is highly efficient for the particular flow rate of air. It was also observed that downflow configuration is more effective than up-flow condition at all flow rates due to lesser losses in down-flow. The results show that temperature differences of upper head and lower head, both of water and surface of pipes on the respective ends is lower in down-flow.
Abstract: The morphological short-term evolution of Ponta do Tubarão Island (PTI) was investigated through high accurate surveys based on post-processed kinematic (PPK) relative positioning on Global Navigation Satellite Systems (GNSS). PTI is part of a barrier island system on a high energy northeast Brazilian coastal environment and also an area of high environmental sensitivity. Surveys were carried out quarterly over a two years period from May 2010 to May 2012. This paper assesses statically the performance of digital elevation models (DEM) derived from different interpolation methods to represent morphologic features and to quantify volumetric changes and TIN models shown the best results to that purposes. The MDE allowed quantifying surfaces and volumes in detail as well as identifying the most vulnerable segments of the PTI to erosion and/or accumulation of sediments and relate the alterations to climate conditions. The coastal setting and geometry of PTI protects a significant mangrove ecosystem and some oil and gas facilities installed in the vicinities from damaging effects of strong oceanwaves and currents. Thus, the maintenance of PTI is extremely required but the prediction of its longevity is uncertain because results indicate an irregularity of sedimentary balance and a substantial decline in sediment supply to this coastal area.
Abstract: The low power wireless sensor devices which usually
uses the low power wireless private area network (IEEE 802.15.4)
standard are being widely deployed for various purposes and in
different scenarios. IPv6 low power wireless private area network
(6LoWPAN) was adopted as part of the IETF standard for the
wireless sensor devices so that it will become an open standard
compares to other dominated proprietary standards available in the
market. 6LoWPAN also allows the integration and communication of
sensor nodes with the Internet more viable. This paper presents a
comparative study on different available IPv6 platforms for wireless
sensor networks including open and close sources. It also discusses
about the platforms used by these stacks. Finally it evaluates and
provides appropriate suggestions which can be use for selection of
required IPv6 stack for low power devices.
Abstract: Anxiety is a common disorder that attacks many people in society and often accompanied by physiological sensations such as tachycardia, chest pain, shortness of breath, insensitivity and etc. The purpose of this study is to characterize the putative anxiolytic-like effects of DEV (dichloromethane extracts of valerian) using the elevated plus maze (EPM) in rats. DEV was dissolved in DMSO and orally administered at different doses to adult male wistar rats, 0.5, 1.5 and 3 hours before behavioral evaluation in an EPM respectively. Control rats were treated with an equal volume of DMSO. Single treatment of DEV (at 0.1,0.2. 0.3, and 0.4 g/kg) significantly increased time-spent and arm entries into open arms of EPM versus control groups (p
Abstract: The nutrient composition and sensory properties of
poultry-based patties (PBPs) incorporated with various levels of grey
oyster mushroom (Pleurotus sajor-caju, PSC) were studied. The
PBPs were formulated with either 0%, 25% or 50% of fresh ground
PSC. Results show poultry patty formulated with 25% PSC had
protein content of 17.46% lower than the control patty which had
18.13% but it was not significant. Meanwhile, both cooked poultry
patties containing 25% and 50% PSC significantly recorded lower
concentration of fat at 10.67% and 7.15%, respectively. On the other
hand, poultry patty added with 50% ground PSC shows the highest
concentration of total dietary fibre (TDF) of 4.90 g/100g compared to
poultry patty containing 25% of mushroom (3.40 g/100g) and to the
control (1.90g/100g). In addition, patty incorporated with 25% PSC
had moisture content of 57.91% which is significantly lower than
patty formulated with 50% which had moisture of 61.80%. In the
sensory evaluation, there were no differences recorded in all sensory
attributes of PSC-based patties judged by untrained panelists. In
conclusion, the addition of PSC to replace poultry meat can be
recommended for the purpose of lowering production cost, enhancing
nutritional composition and maintaining the acceptability of poultry
patties.
Abstract: In this paper, a novel multipurpose audio watermarking
algorithm is proposed based on Vector Quantization (VQ) in Discrete
Cosine Transform (DCT) domain using the codeword labeling and
index-bit constrained method. By using this algorithm, it can fulfill the
requirements of both the copyright protection and content integrity
authentication at the same time for the multimedia artworks. The
robust watermark is embedded in the middle frequency coefficients of
the DCT transform during the labeled codeword vector quantization
procedure. The fragile watermark is embedded into the indices of the
high frequency coefficients of the DCT transform by using the
constrained index vector quantization method for the purpose of
integrity authentication of the original audio signals. Both the robust
and the fragile watermarks can be extracted without the original audio
signals, and the simulation results show that our algorithm is effective
with regard to the transparency, robustness and the authentication
requirements
Abstract: Unmanned aerial vehicles (UAVs) performing their
operations for a long time have been attracting much attention in
military and civil aviation industries for the past decade. The
applicable field of UAV is changing from the military purpose only to
the civil one. Because of their low operation cost, high reliability and
the necessity of various application areas, numerous development
programs have been initiated around the world. To obtain the optimal
solutions of the design variable (i.e., sectional airfoil profile, wing
taper ratio and sweep) for high performance of UAVs, both the lift and
lift-to-drag ratio are maximized whereas the pitching moment should
be minimized, simultaneously. It is found that the lift force and
lift-to-drag ratio are linearly dependent and a unique and dominant
solution are existed. However, a trade-off phenomenon is observed
between the lift-to-drag ratio and pitching moment. As the result of
optimization, sixty-five (65) non-dominated Pareto individuals at the
cutting edge of design spaces that are decided by airfoil shapes can be
obtained.
Abstract: This main purpose of the study reported here was to
investigate the extent to which the form of school
governance (particularly decision-making) had an impact upon the
effectiveness of the school with reference to parental involvement,
planning and budgeting, professional development of teachers,
school facilities and resources, and student outcomes. Particular
attention was given to decision-making within the governance
arrangements. The study was based on four case studies of high
schools in New South Wales, Australia including one government
school, one independent Christian community school, one
independent Catholic school, and one Catholic systemic school.
The focus of the research was principals, teachers, parents, and
students of four schools with varying governance structures. To
gain a greater insight into the issues, the researchers collected
information by questionnaire, semi-structured interview, and
review of school key documents. This study found that it was not
so much structure but the centrality of the school Principal and the
way that the Principal perceived his/her roles in relation to others
that impacted most on school governance.
Abstract: This paper presents a smart-card applet that is able to
verify X.509 certificates and to use the public key contained in the
certificate for verifying digital signatures that have been created
using the corresponding private key, e.g. for the purpose of authenticating
the certificate owner against the card. The approach has been
implemented as an operating prototype on Java cards.