Abstract: The development and extension of large cities induced
a need for shallow tunnel in soft ground of building areas. Estimation
of ground settlement caused by the tunnel excavation is important
engineering point. In this paper, prediction of surface subsidence
caused by tunneling in one section of seventh line of Tehran subway
is considered. On the basis of studied geotechnical conditions of the
region, tunnel with the length of 26.9km has been excavated applying
a mechanized method using an EPB-TBM with a diameter of 9.14m.
In this regard, settlement is estimated utilizing both analytical and
numerical finite element method. The numerical method shows that
the value of settlement in this section is 5cm. Besides, the analytical
consequences (Bobet and Loganathan-Polous) are 5.29 and 12.36cm,
respectively. According to results of this study, due tosaturation of
this section, there are good agreement between Bobet and numerical
methods. Therefore, tunneling processes in this section needs a
special consolidation measurement and support system before the
passage of tunnel boring machine.
Abstract: Coated tool inserts can be considered as the backbone
of machining processes due to their wear and heat resistance.
However, defects of coating can degrade the integrity of these inserts
and the number of these defects should be minimized or eliminated if
possible. Recently, the advancement of coating processes and
analytical tools open a new era for optimizing the coating tools.
First, an overview is given regarding coating technology for cutting
tool inserts. Testing techniques for coating layers properties, as well
as the various coating defects and their assessment are also surveyed.
Second, it is introduced an experimental approach to examine the
possible coating defects and flaws of worn multicoated carbide
inserts using two important techniques namely scanning electron
microscopy and atomic force microscopy. Finally, it is
recommended a simple procedure for investigating manufacturing
defects and flaws of worn inserts.
Abstract: Speed estimation is one of the important and practical tasks in machine vision, Robotic and Mechatronic. the availability of high quality and inexpensive video cameras, and the increasing need for automated video analysis has generated a great deal of interest in machine vision algorithms. Numerous approaches for speed estimation have been proposed. So classification and survey of the proposed methods can be very useful. The goal of this paper is first to review and verify these methods. Then we will propose a novel algorithm to estimate the speed of moving object by using fuzzy concept. There is a direct relation between motion blur parameters and object speed. In our new approach we will use Radon transform to find direction of blurred image, and Fuzzy sets to estimate motion blur length. The most benefit of this algorithm is its robustness and precision in noisy images. Our method was tested on many images with different range of SNR and is satisfiable.
Abstract: Nowadays, people are going more and more mobile, both in terms of devices and associated applications. Moreover, services that these devices are offering are getting wider and much more complex. Even though actual handheld devices have considerable computing power, their contexts of utilization are different. These contexts are affected by the availability of connection, high latency of wireless networks, battery life, size of the screen, on-screen or hard keyboard, etc. Consequently, development of mobile applications and their associated mobile Web services, if any, should follow a concise methodology so they will provide a high Quality of Service. The aim of this paper is to highlight and discuss main issues to consider when developing mobile applications and mobile Web services and then propose a framework that leads developers through different steps and modules toward development of efficient and secure mobile applications. First, different challenges in developing such applications are elicited and deeply discussed. Second, a development framework is presented with different modules addressing each of these challenges. Third, the paper presents an example of a mobile application, Eivom Cinema Guide, which benefits from following our development framework.
Abstract: This paper presents a formant-tracking linear prediction
(FTLP) model for speech processing in noise. The main focus of this
work is the detection of formant trajectory based on Hidden Markov
Models (HMM), for improved formant estimation in noise. The
approach proposed in this paper provides a systematic framework for
modelling and utilization of a time- sequence of peaks which satisfies
continuity constraints on parameter; the within peaks are modelled
by the LP parameters. The formant tracking LP model estimation
is composed of three stages: (1) a pre-cleaning multi-band spectral
subtraction stage to reduce the effect of residue noise on formants
(2) estimation stage where an initial estimate of the LP model of
speech for each frame is obtained (3) a formant classification using
probability models of formants and Viterbi-decoders. The evaluation
results for the estimation of the formant tracking LP model tested
in Gaussian white noise background, demonstrate that the proposed
combination of the initial noise reduction stage with formant tracking
and LPC variable order analysis, results in a significant reduction in
errors and distortions. The performance was evaluated with noisy
natual vowels extracted from international french and English vocabulary
speech signals at SNR value of 10dB. In each case, the
estimated formants are compared to reference formants.
Abstract: This paper investigates the issue of building decision
trees from data with imprecise class values where imprecision is
encoded in the form of possibility distributions. The Information
Affinity similarity measure is introduced into the well-known gain
ratio criterion in order to assess the homogeneity of a set of
possibility distributions representing instances-s classes belonging to
a given training partition. For the experimental study, we proposed an
information affinity based performance criterion which we have used
in order to show the performance of the approach on well-known
benchmarks.
Abstract: This paper presents a design and prototype
implementation of new home automation system that uses WiFi
technology as a network infrastructure connecting its parts. The
proposed system consists of two main components; the first part is
the server (web server), which presents system core that manages,
controls, and monitors users- home. Users and system administrator
can locally (LAN) or remotely (internet) manage and control system
code. Second part is hardware interface module, which provides
appropriate interface to sensors and actuator of home automation
system. Unlike most of available home automation system in the
market the proposed system is scalable that one server can manage
many hardware interface modules as long as it exists on WiFi
network coverage. System supports a wide range of home
automation devices like power management components, and
security components. The proposed system is better from the
scalability and flexibility point of view than the commercially
available home automation systems.
Abstract: This paper introduces and studies new indexing techniques for content-based queries in images databases. Indexing is the key to providing sophisticated, accurate and fast searches for queries in image data. This research describes a new indexing approach, which depends on linear modeling of signals, using bases for modeling. A basis is a set of chosen images, and modeling an image is a least-squares approximation of the image as a linear combination of the basis images. The coefficients of the basis images are taken together to serve as index for that image. The paper describes the implementation of the indexing scheme, and presents the findings of our extensive evaluation that was conducted to optimize (1) the choice of the basis matrix (B), and (2) the size of the index A (N). Furthermore, we compare the performance of our indexing scheme with other schemes. Our results show that our scheme has significantly higher performance.
Abstract: Plastic waste is a big issue in Thailand, but the amount of recycled plastic in Thailand is still low due to the high investment and operating cost. Hence, the rest of plastic waste are burnt to destroy or sent to the landfills. In order to be financial viable, an effective reverse logistics infrastructure is required to support the product recovery activities. However, there is a conflict between reducing the cost and raising environmental protection level. The purpose of this study is to build a goal programming (GP) so that it can be used to help analyze the proper planning of the Thailand-s plastic recycling system that involves multiple objectives. This study considers three objectives; reducing total cost, increasing the amount of plastic recovery, and raising the desired plastic materials in recycling process. The results from two priority structures show that it is necessary to raise the total cost budget in order to achieve targets on amount of recycled plastic and desired plastic materials.
Abstract: Training neural networks to capture an intrinsic
property of a large volume of high dimensional data is a difficult
task, as the training process is computationally expensive. Input
attributes should be carefully selected to keep the dimensionality of
input vectors relatively small.
Technical indexes commonly used for stock market prediction
using neural networks are investigated to determine its effectiveness
as inputs. The feed forward neural network of Levenberg-Marquardt
algorithm is applied to perform one step ahead forecasting of
NASDAQ and Dow stock prices.
Abstract: In this paper, the decomposition-aggregation method
is used to carry out connective stability criteria for general linear
composite system via aggregation. The large scale system is
decomposed into a number of subsystems. By associating directed
graphs with dynamic systems in an essential way, we define the
relation between system structure and stability in the sense of
Lyapunov. The stability criteria is then associated with the stability
and system matrices of subsystems as well as those interconnected
terms among subsystems using the concepts of vector differential
inequalities and vector Lyapunov functions. Then, we show that the
stability of each subsystem and stability of the aggregate model
imply connective stability of the overall system. An example is
reported, showing the efficiency of the proposed technique.
Abstract: This paper introduces an approach to construct a set of criteria for evaluating alternative options. Content analysis was used to collet criterion elements. Then the elements were classified and organized yielding to hierarchic structure. The reliability of the constructed criteria was evaluated in an experiment. Finally the criteria were used to evaluate alternative options indecision-making.
Abstract: This work presents a matched field processing (MFP)
algorithm based on Dopplerlet transform for estimating the motion
parameters of a sound source moving along a straight line and with a
constant speed by using a piecewise strategy, which can significantly
reduce the computational burden. Monte Carlo simulation results and
an experimental result are presented to verify the effectiveness of the
algorithm advocated.
Abstract: Society has grown to rely on Internet services, and the
number of Internet users increases every day. As more and more
users become connected to the network, the window of opportunity
for malicious users to do their damage becomes very great and
lucrative. The objective of this paper is to incorporate different
techniques into classier system to detect and classify intrusion from
normal network packet. Among several techniques, Steady State
Genetic-based Machine Leaning Algorithm (SSGBML) will be used
to detect intrusions. Where Steady State Genetic Algorithm (SSGA),
Simple Genetic Algorithm (SGA), Modified Genetic Algorithm and
Zeroth Level Classifier system are investigated in this research.
SSGA is used as a discovery mechanism instead of SGA. SGA
replaces all old rules with new produced rule preventing old good
rules from participating in the next rule generation. Zeroth Level
Classifier System is used to play the role of detector by matching
incoming environment message with classifiers to determine whether
the current message is normal or intrusion and receiving feedback
from environment. Finally, in order to attain the best results,
Modified SSGA will enhance our discovery engine by using Fuzzy
Logic to optimize crossover and mutation probability. The
experiments and evaluations of the proposed method were performed
with the KDD 99 intrusion detection dataset.
Abstract: The increasing complexity of software development based on peer to peer networks makes necessary the creation of new frameworks in order to simplify the developer-s task. Additionally, some applications, e.g. fire detection or security alarms may require real-time constraints and the high level definition of these features eases the application development. In this paper, a service model based on a component model with real-time features is proposed. The high-level model will abstract developers from implementation tasks, such as discovery, communication, security or real-time requirements. The model is oriented to deploy services on small mobile devices, such as sensors, mobile phones and PDAs, where the computation is light-weight. Services can be composed among them by means of the port concept to form complex ad-hoc systems and their implementation is carried out using a component language called UM-RTCOM. In order to apply our proposals a fire detection application is described.
Abstract: In this paper a new method for increasing the speed of
SAGCM-APD is proposed. Utilizing carrier rate equations in
different regions of the structure, a circuit model for the structure is
obtained. In this research, in addition to frequency response, the
effect of added new charge layer on some transient parameters like
slew-rate, rising and falling times have been considered. Finally, by
trading-off among some physical parameters such as different layers
widths and droppings, a noticeable decrease in breakdown voltage
has been achieved. The results of simulation, illustrate some features
of proposed structure improvement in comparison with conventional
SAGCM-APD structures.
Abstract: In the present paper, disc loaded interaction structure
for potential application in wideband Gyro-TWT amplifier has been
analyzed, taking all the space and modal harmonics into
consideration, for the eigenwave solutions. The analysis has been
restricted to azimuthally symmetric TE0,n mode. Dispersion
characteristics have been plotted by varying the structure parameters
and have been validated against HFSS simulation results. The
variation of eigenvalue with respect to different structure parameters
has also been presented. It has been observed that disc periodicity
plays very important role for wideband operation of disc-loaded
Gyro-TWT.
Abstract: An empirical linearly-hyperbolic approximation of the I - V characteristic of a solar cell is presented. This approximation is based on hyperbolic dependence of a current of p-n junctions on voltage for large currents. Such empirical approximation is compared with the early proposed formal linearly-hyperbolic approximation of a solar cell. The expressions defining laws of change of parameters of formal approximation at change of a photo current of family of characteristics are received. It allows simplifying a finding of parameters of approximation on actual curves, to specify their values. Analytical calculation of load regime for linearly - hyperbolic model leads to quadratic equation. Also, this model allows to define soundly a deviation from the maximum power regime and to compare efficiency of regimes of solar cells with different parameters.
Abstract: This paper proposes a method of adaptively generating a gait pattern of biped robot. The gait synthesis is based on human's gait pattern analysis. The proposed method can easily be applied to generate the natural and stable gait pattern of any biped robot. To analyze the human's gait pattern, sequential images of the human's gait on the sagittal plane are acquired from which the gait control values are extracted. The gait pattern of biped robot on the sagittal plane is adaptively generated by a genetic algorithm using the human's gait control values. However, gait trajectories of the biped robot on the sagittal plane are not enough to construct the complete gait pattern because the biped robot moves on 3-dimension space. Therefore, the gait pattern on the frontal plane, generated from Zero Moment Point (ZMP), is added to the gait one acquired on the sagittal plane. Consequently, the natural and stable walking pattern for the biped robot is obtained.
Abstract: This study was conducted to investigate the incidence
of pathogenic bacteria: Salmonella, Shigella, Escherichia coli O157
and Staphylococcus aureus in cakes and tarts collected from thirtyfive
confectionery producing and selling premises located within
Tripoli city, Libya. The results revealed an incidence of S. aureus
with 94.4 and 48.0 %, E. coli O157 with 14.7 and 4.0 % and Salmonella
sp. with 5.9 and 8.0 % in cakes and tarts samples respectively;
while Shigella was not detected in all samples. In order to determine
the source of these pathogenic bacteria, cotton swabs were taken
from the hands of workers on the production line, the surfaces of
preparation tables and cream whipping instruments. The results
showed that the cotton swabs obtained from the hands of workers
contained S. aureus and Salmonella sp. with an incidence of 42.9 and
2.9 %, the cotton swabs obtained from the surfaces of preparation
tables 22.9 and 2.9 % and the cotton swabs obtained from the cream
whipping instruments 14.3 and 0.0 % respectively; while E. coli
O157 and Shigella sp. were not detected in all swabs. Additionally,
other bacteria were isolated from the hands of workers and the Surfaces
of producing equipments included: Aeromonas sp., Pseudomonas
sp., E. coli, Klebsiella sp., Enterobacter sp., Citrobacter sp.,
Proteus sp., Serratia sp. and Acinetobacter sp. These results indicate
that some of the cakes and tarts might pose threat to consumer's
health. Meanwhile, occurrences of pathogenic bacteria on the hands
of those who are working in production line and the surfaces of
equipments reflect poor hygienic practices at most confectionery
premises examined in this study. Thus, firm and continuous surveillance
of these premises is needed to insure the consumer's health and
safety.