Abstract: This paper discusses a method for improving accuracy
of fuzzy-rule-based classifiers using particle swarm optimization
(PSO). Two different fuzzy classifiers are considered and optimized.
The first classifier is based on Mamdani fuzzy inference system
(M_PSO fuzzy classifier). The second classifier is based on Takagi-
Sugeno fuzzy inference system (TS_PSO fuzzy classifier). The
parameters of the proposed fuzzy classifiers including premise
(antecedent) parameters, consequent parameters and structure of
fuzzy rules are optimized using PSO. Experimental results show that
higher classification accuracy can be obtained with a lower number
of fuzzy rules by using the proposed PSO fuzzy classifiers. The
performances of M_PSO and TS_PSO fuzzy classifiers are compared
to other fuzzy based classifiers
Abstract: This paper presents the findings of two experiments that were performed on the Redundancy in Wireless Connection Model (RiWC) using the 802.11b standard. The experiments were simulated using OPNET 11.5 Modeler software. The first was aimed at finding the maximum number of simultaneous Voice over Internet Protocol (VoIP) users the model would support under the G.711 and G.729 codec standards when the packetization interval was 10 milliseconds (ms). The second experiment examined the model?s VoIP user capacity using the G.729 codec standard along with background traffic using the same packetization interval as in the first experiment. To determine the capacity of the model under various experiments, we checked three metrics: jitter, delay and data loss. When background traffic was added, we checked the response time in addition to the previous three metrics. The findings of the first experiment indicated that the maximum number of simultaneous VoIP users the model was able to support was 5, which is consistent with recent research findings. When using the G.729 codec, the model was able to support up to 16 VoIP users; similar experiments in current literature have indicated a maximum of 7 users. The finding of the second experiment demonstrated that the maximum number of VoIP users the model was able to support was 12, with the existence of background traffic.
Abstract: In this paper, a new robust audio fingerprinting
algorithm in MP3 compressed domain is proposed with high
robustness to time scale modification (TSM). Instead of simply
employing short-term information of the MP3 stream, the new
algorithm extracts the long-term features in MP3 compressed domain
by using the modulation frequency analysis. Our experiment has
demonstrated that the proposed method can achieve a hit rate of
above 95% in audio retrieval and resist the attack of 20% TSM. It has
lower bit error rate (BER) performance compared to the other
algorithms. The proposed algorithm can also be used in other
compressed domains, such as AAC.
Abstract: Methane is the second most important greenhouse gas
(GHG) after carbon dioxide. Amount of methane emission from
energy sector is increasing day by day with various activities. In
present work, various sources of methane emission from upstream,
middle stream and downstream of oil & gas sectors are identified and
categorised as per IPCC-2006 guidelines. Data were collected from
various oil & gas sector like (i) exploration & production of oil & gas
(ii) supply through pipelines (iii) refinery throughput & production
(iv) storage & transportation (v) usage. Methane emission factors for
various categories were determined applying Tier-II and Tier-I
approach using the collected data. Total methane emission from
Indian Oil & Gas sectors was thus estimated for the year 1990 to
2007.
Abstract: This study used positivist quantitative approach to examine the mathematical concepts acquisition of- KS4 (14-16) Special Education Needs (SENs) students within the school sector education in England. The research is based on a pilot study and the design is completely holistic in its approach with mixing methodologies. The study combines the qualitative and quantitative methods of approach in gathering formative data for the design process. Although, the approach could best be described as a mix method, fundamentally with a strong positivist paradigm, hence my earlier understanding of the differentiation of the students, student – teacher body and the various elements of indicators that is being measured which will require an attenuated description of individual research subjects. The design process involves four phases with five key stages which are; literature review and document analysis, the survey, interview, and observation; then finally the analysis of data set. The research identified the need for triangulation with Reid-s phases of data management providing scaffold for the study. The study clearly identified the ideological and philosophical aspects of educational research design for the study of mathematics by the special education needs (SENs) students in England using the virtual learning environment (VLE) platform.
Abstract: Gesture recognition is a challenging task for extracting
meaningful gesture from continuous hand motion. In this paper, we propose an automatic system that recognizes isolated gesture,
in addition meaningful gesture from continuous hand motion for Arabic numbers from 0 to 9 in real-time based on Hidden Markov Models (HMM). In order to handle isolated gesture, HMM using
Ergodic, Left-Right (LR) and Left-Right Banded (LRB) topologies is applied over the discrete vector feature that is extracted from stereo
color image sequences. These topologies are considered to different
number of states ranging from 3 to 10. A new system is developed to recognize the meaningful gesture based on zero-codeword detection
with static velocity motion for continuous gesture. Therefore, the
LRB topology in conjunction with Baum-Welch (BW) algorithm for
training and forward algorithm with Viterbi path for testing presents the best performance. Experimental results show that the proposed system can successfully recognize isolated and meaningful gesture and achieve average rate recognition 98.6% and 94.29% respectively.
Abstract: Meshless Finite Element Methods, namely element-free Galerkin and point-interpolation method were implemented and tested concerning their applicability to typical engineering problems like electrical fields and structural mechanics. A class-structure was developed which allows a consistent implementation of these methods together with classical FEM in a common framework. Strengths and weaknesses of the methods under investigation are discussed. As a result of this work joint usage of meshless methods together with classical Finite Elements are recommended.
Abstract: This paper proposes a visual cryptography by random
grids scheme with identifiable shares. The method encodes an image
O in two shares that exhibits the following features: (1) each generated
share has the same scale as O, (2) any share singly has noise-like
appearance that reveals no secret information on O, (3) the secrets can
be revealed by superimposing the two shares, (4) folding a share up
can disclose some identification patterns, and (5) both of the secret
information and the designated identification patterns are recognized
by naked eye without any computation. The property to show up
identification patterns on folded shares establishes a simple and
friendly interface for users to manage the numerous shares created by
VC schemes.
Abstract: The aim of the study is to determine the effects of
perceived organizational support on organizational identification. In
accordance with this purpose was applied on 131 family physicians in
Konya. The data obtained by means of the survey method were
analyzed. According to the results of correlation analysis, while
positive relationship between perceived organizational support,
organizational identification and supervisor support was revealed.
Also, with the scope of the research, relationships between these
variables and certain demographic variables were detected.
According to difference analysis results of the research, significant
differences between organizational identification and gender variable
were determined. However, significant differences were not
determined between demographic variables and perceived
organizational support.
Abstract: Contemporary science and technologies largely widen
the gap between the spiritual and rational of the society. Industrial
and technological breakthroughs might radically affect most
processes in the society, thus losing the cultural heritage. The
thinkers recognized the dangers of the decadence in the first place. In
the present article the ways of preserving cultural heritage have been
investigated. Memory has always been a necessary condition for selfidentification,
- continuity is based on this. The authors have
supported the hypothesis that continuity and ethnic memory are the
very mechanisms that preserve cultural heritage. Such problemformulating
will facilitate another, new look at the material, spiritual
and arts spheres of the cultural heritage of numerous ethnic groups.
The fundamental works by major European and Kazakh scientists
have been taken as a basis for the research done.
Abstract: Operational risk has become one of the most discussed topics in the financial industry in the recent years. The reasons for this attention can be attributed to higher investments in information systems and technology, the increasing wave of mergers and acquisitions and emergence of new financial instruments. In addition, the New Basel Capital Accord (known as Basel II) demands a capital requirement for operational risk and further motivates financial institutions to more precisely measure and manage this type of risk. The aim of this paper is to shed light on main characteristics of operational risk management and common applied methods: scenario analysis, key risk indicators, risk control self assessment and loss distribution approach.
Abstract: Rural areas of Tanzania are still disadvantaged in terms of diffusion of IP-based services; this is due to lack of Information and Communication Technology (ICT) infrastructures, especially lack of connectivity. One of the limitations for connectivity problems in rural areas of Tanzania is the high cost to establish infrastructures for IP-based services [1-2]. However the cost of connectivity varies from one technology to the other and at the same time, the cost is also different from one operator (service provider) to another within the country. This paper presents development of software system to calculate cost of connectivity to rural areas of Tanzania. The system is developed to make an easy access of connectivity cost from different technologies and different operators. The development of the calculator follows the V-model software development lifecycle. The calculator is used to evaluate the economic viability of different technologies considered as being potential candidates to provide rural connectivity. In this paper, the evaluation is based on the techno-economic analysis approach.
Abstract: The work reported in this paper proposes
Swarm-Array computing, a novel technique inspired by swarm
robotics, and built on the foundations of autonomic and parallel
computing. The approach aims to apply autonomic computing
constructs to parallel computing systems and in effect achieve the
self-ware objectives that describe self-managing systems. The
constitution of swarm-array computing comprising four constituents,
namely the computing system, the problem/task, the swarm and the
landscape is considered. Approaches that bind these constituents
together are proposed. Space applications employing FPGAs are
identified as a potential area for applying swarm-array computing for
building reliable systems. The feasibility of a proposed approach is
validated on the SeSAm multi-agent simulator and landscapes are
generated using the MATLAB toolkit.
Abstract: The design of methods of the 20 K large dimension cold shield used for infrared radiation demarcating in space environment simulation test were introduced in this paper. The cold shield were cooled by five G-M cryocoolers , and the dimension of the cold shield is the largest in our country.Cold shield installation and distribution and compensator for contraction on cooling were introduced detailedly. The temperature distribution and cool-down time of cold shield surface were also calculated and analysed in this paper. The design of cold shield resolves the difficulty of compensator for contraction on cooling successfully. Test results show that the actual technical performance indicators of cold shield met and exceeded the design requirements.
Abstract: Cooperative learning has been defined as learners working together as a team to solve a problem to complete a task or to accomplish a common goal, which emphasizes the importance of interactions among members to promote the whole learning performance. With the popularity of society networks, cooperative learning is no longer limited to traditional classroom teaching activities. Since society networks facilitate to organize online learners, to establish common shared visions, and to advance learning interaction, the online community and online learning community have triggered the establishment of web-based societies. Numerous research literatures have indicated that the collaborative learning community is a critical issue to enhance learning performance. Hence, this paper proposes a learning community recommendation approach to facilitate that a learner joins the appropriate learning communities, which is based on k-nearest neighbor (kNN) classification. To demonstrate the viability of the proposed approach, the proposed approach is implemented for 117 students to recommend learning communities. The experimental results indicate that the proposed approach can effectively recommend appropriate learning communities for learners.
Abstract: The essential oil of M. × piperita L. was formulated
into a topical gel. The prepared gel was characterized for its pH,
viscosity, spreadiblity, consistency and extrudiblity, while its stability
was evaluated under different temperature conditions. The prepared
M. × piperita oil gel was clear and transparent. The pH value of
developed gel was 6.6, while its viscosity was 1200 cP. Spreadability
and consistency of the M. × piperita oil gel was 10.7 g.cm/sec and 7
mm, respectively. The prepared gel showed good extrudiblity. During
the stability studies, no significant change in pH and viscosity as a
function of time for gel was observed, indicating stability of prepared
formulation. The gel developed in this study is expected to forward
the usage of M. × piperita essential towards commercial application.
Abstract: This paper details few mechanical modeling and
design issues of RF MEMS switches. We concentrate on an
electrostatically actuated broad side series switch; surface
micromachined with a crab leg membrane. The same results are
extended to any complex structure. With available experimental data
and fabrication results, we present the variation in dynamic
performance and compliance of the switch with reference to few
design issues, which we find are critical in deciding the dynamic
behavior of the switch, without compromise on the RF
characteristics. The optimization of pull in voltage, transient time and
resonant frequency with regard to these critical design parameters are
also presented.
Abstract: Inthis paper, design and fabrication of vertical
micromirror for optical switching applications of single mode optical
fibers are proposed. The structure of micromirror will be created
from negative photoresist (SU-8) on X-ray lithography using X-ray
from synchrotron light source. The properties of X-ray from
synchrotron light source are high-energy electrons which can
construct materials that have a high aspect ratio. In addition, the
technique of gold coating of reflective material has been used for
change direction of light between two pairs of optical fibers. At a
wavelength of 1310 nm with minimum average loss of 5.305 dB is
obtained.
Abstract: Iris localization is a very important approach in
biometric identification systems. Identification process usually is
implemented in three levels: iris localization, feature extraction, and
pattern matching finally. Accuracy of iris localization as the first step
affects all other levels and this shows the importance of iris
localization in an iris based biometric system. In this paper, we
consider Daugman iris localization method as a standard method,
propose a new method in this field and then analyze and compare the
results of them on a standard set of iris images. The proposed method
is based on the detection of circular edge of iris, and improved by
fuzzy circles and surface energy difference contexts. Implementation
of this method is so easy and compared to the other methods, have a
rather high accuracy and speed. Test results show that the accuracy of
our proposed method is about Daugman method and computation
speed of it is 10 times faster.
Abstract: A direct downconversion receiver implemented in 0.13 μm 1P8M process is presented. The circuit is formed by a single-end LNA, an active balun for conversion into balanced mode, a quadrature double-balanced passive switch mixer and a quadrature voltage-controlled oscillator. The receiver operates in the 2.4 GHz ISM band and complies with IEEE 802.15.4 (ZigBee) specifications. The circuit exhibits a very low noise figure of only 2.27 dB and dissipates only 14.6 mW with a 1.2 V supply voltage and is hence suitable for low-power applications.