Abstract: Social bookmarking is an environment in which
the user gradually changes interests over time so that the tag
data associated with the current temporal period is usually more
important than tag data temporally far from the current period.
This implies that in the social tagging system, the newly tagged
items by the user are more relevant than older items. This study
proposes a novel recommender system that considers the users-
recent tag preferences. The proposed system includes the
following stages: grouping similar users into clusters using an
E-M clustering algorithm, finding similar resources based on
the user-s bookmarks, and recommending the top-N items to
the target user. The study examines the system-s information
retrieval performance using a dataset from del.icio.us, which is
a famous social bookmarking web site. Experimental results
show that the proposed system is better and more effective than
traditional approaches.
Abstract: The control of sprayer boom undesired vibrations pose a great challenge to investigators due to various disturbances and conditions. Sprayer boom movements lead to reduce of spread efficiency and crop yield. This paper describes the design of a novel control method for an active suspension system applying proportional-integral-derivative (PID) controller with an active force control (AFC) scheme integration of an iterative learning algorithm employed to a sprayer boom. The iterative learning as an intelligent method is principally used as a method to calculate the best value of the estimated inertia of the sprayer boom needed for the AFC loop. Results show that the proposed AFC-based scheme performs much better than the standard PID control technique. Also, this shows that the system is more robust and accurate.
Abstract: Sparse representation has long been studied and several
dictionary learning methods have been proposed. The dictionary
learning methods are widely used because they are adaptive. In this
paper, a new dictionary learning method for audio is proposed. Signals
are at first decomposed into different degrees of Intrinsic Mode
Functions (IMF) using Empirical Mode Decomposition (EMD)
technique. Then these IMFs form a learned dictionary. To reduce the
size of the dictionary, the K-means method is applied to the dictionary
to generate a K-EMD dictionary. Compared to K-SVD algorithm, the
K-EMD dictionary decomposes audio signals into structured
components, thus the sparsity of the representation is increased by
34.4% and the SNR of the recovered audio signals is increased by
20.9%.
Abstract: The purpose of this study is to revisit the concept of
rape as represented by professionals in the literature as well as its
perception (beliefs and attitudes) in the population at large and to
propose methodological improvements to its measurement tool. Rape
is a serious crime threatening its victim-s physical and mental health
and integrity; and as such is legally prosecuted in all modern
societies. The problem is not in accepting or rejecting rape as a
criminal act, but rather in the vagueness of its interpretations and
“justifications" maintained in the mentality of modern societies -
known in the literature as the phenomenon of "rape-myth". The rapemyth
can be studied from different perspectives: criminology,
sociology, ethics, medicine and psychology. Its investigation requires
rigorous scientific objectivity, free of passion (victims of rape are at
risk of emotional bias), free of activism (social activists, even if wellintentioned
are also biased), free of any pre-emptive assumptions or
prejudices. To apply a rigorous scientific procedure, we need a solid,
valid and reliable measurement. Rape is a form of heterosexual or
homosexual aggression, violently forcing the victim to give-in in the
sexual activity of the aggressor against her/his will. Human beings
always try to “understand" or find a reason justifying their acts.
Psychological literature provides multiple clinical and experimental
examples of it; just to mention the famous studies by Milgram on the
level of electroshock delivered by the “teacher" towards the “learner"
if “scientifically justifiable" or the studies on the behavior of
“prisoners" and the “guards" and many other experiments and field
observations. Sigmund Freud presented the phenomenon of
unconscious justification and called it rationalization. The multiple
justifications, rationalizations and repeated opinions about sexual
behavior contribute to a myth maintained in the society. What kind of
“rationale" our societies apply to “understand" the non-consensual
sexual behavior? There are many, just to mention few:
• Sex is a ludistic activity for both participants, therefore –
even if not consented – it should bring pleasure to both.
• Everybody wants sex, but only men are allowed to manifest
it openly while women have to pretend the opposite, thus men have
to initiate sexual behavior and women would follow.
• A person who strongly needs sex is free to manifest it and
struggle to get it; the person who doesn-t want it must not reveal
her/his sexual attraction and avoid risky situations; otherwise she/he
is perceived as a promiscuous seducer.
• A person who doesn-t fight against the sexual initiator
unconsciously accepts the rape (does it explain why homosexual
rapes are reported less frequently than rapes against women?).
• Women who are raped deserve it because their wardrobe is
very revealing and seducing and they ''willingly'' go to highly risky
places (alleys, dark roads, etc.).
• Men need to ventilate their sexual energy and if they are
deprived of a partner their urge to have sex is difficult to control.
• Men are supposed to initiate and insist even by force to have
sex (their testosterone makes them both sexual and aggressive).
The paper overviews numerous cultural beliefs about masculine
versus feminine behavior and their impact on the “rape myth".
Abstract: Transportation is of great importance in the current
life of human beings. The transportation system plays many roles,
from economical development to after-catastrophe aids such as
rescue operation in the first hours and days after an earthquake. In
after earthquakes response phase, transportation system acts as a
basis for ground operations including rescue and relief operation,
food providing for victims and etc. It is obvious that partial or
complete obstruction of this system results in the stop of these
operations. Bridges are one of the most important elements of
transportation network. Failure of a bridge, in the most optimistic
case, cuts the relation between two regions and in more developed
countries, cuts the relation of numerous regions. In this paper, to
evaluate the vulnerability and estimate the damage level of Tehran
bridges, HAZUS method, developed by Federal Emergency
Management Agency (FEMA) with the aid of National Institute of
Building Science (NIBS), is used for the first time in Iran. In this
method, to evaluate the collapse probability, fragility curves are
used. Iran is located on seismic belt and thus, it is vulnerable to
earthquakes. Thus, the study of the probability of bridge collapses, as
an important part of transportation system, during earthquakes is of
great importance. The purpose of this study is to provide fragility
curves for Gisha Bridge, one of the longest steel bridges in Tehran,
as an important lifeline element. Besides, the damage probability for
this bridge during a specific earthquake, introduced as scenario
earthquakes, is calculated. The fragility curves show that for the
considered scenario, the probability of occurrence of complete
collapse for the bridge is 8.6%.
Abstract: The knowledge of the nature of loading is very
important in order to hold account on the total behavior such as
vibration, shock, fatigue, etc. Fatigue present 90% of failure when
loadings fatigues are very complex. In this paper a study of double
through crack at hole for plate subjected to fatigue loading is
presented. Various modes loading are studied where the applied load
is the same one. The fatigue life is given where the effect of stress
ratio is highlighted. This work is conducted on aluminum alloy 2024
T351 used for much aerospace and aeronautics applications. The
fatigue crack growth behavior with constant amplitude is studied
using the AFGROW code when Forman model is applied. The
fatigue crack growth rate and fatigue life for different loading modes
are compared with variation of others geometrical parameter such as
thickness and dimensions of notch hole.
Abstract: In this paper, periodic force operation of a wastewater treatment process has been studied for the improved process performance. A previously developed dynamic model for the process is used to conduct the performance analysis. The static version of the model was utilized first to determine the optimal productivity conditions for the process. Then, feed flow rate in terms of dilution rate i.e. (D) is transformed into sinusoidal function. Nonlinear model predictive control algorithm is utilized to regulate the amplitude and period of the sinusoidal function. The parameters of the feed cyclic functions are determined which resulted in improved productivity than the optimal productivity under steady state conditions. The improvement in productivity is found to be marginal and is satisfactory in substrate conversion compared to that of the optimal condition and to the steady state condition, which corresponds to the average value of the periodic function. Successful results were also obtained in the presence of modeling errors and external disturbances.
Abstract: The modified Arcan fixture was used in order to
investigate the mixed mode fracture properties of high strength steel
butt weld through experimental and numerical analysis. The fixture
consisted of a central section with "butterfly-shaped" specimen that
had central crack. The specimens were under pure mode I (opening),
pure mode II (shearing) and all in plane mixed mode loading angles
starting from 0 to 90 degrees. The geometric calibration factors were
calculated with the aid of finite element analysis for various loading
mode and different crack length (0.45≤ a/w ≤0.55) and the critical
fracture loads obtained experimentally. The critical fracture
toughness (KIC & KIIC) estimated with experimental and numerical
analysis under mixed mode loading conditions.
Abstract: Aims of this research were to study Thai Buddhist temple festivals and Balinese Hindu temple festivals, to compare Thai Buddhist temple festival dress with Balinese Hindu temple festival dress, and to create the knowledge which can be useful for Thai attitudes and cultural perceptions, especially for Thai children and youth. The findings of the research disclosed that there are four temple festivals of Thai Buddhists in Thailand, namely Songkran Festival, Buddhist Lent Festival, Sart Thai Festival and End of Buddhist Lent Festival. In island of Bali, Indonesia, there are three Balinese Hindu temple festivals, namely Odalan Festival, Galungan Festival and Nyepi Festival. Thai Songkran Festival is similar to New Year Celebration in Balinese Nyepi Festival. Thai Songkran Festival and Sart Thai Festival have the same purpose as that of Balinese Galungan Festival in practice of dedicating merit to the spirits of deceased relatives. In these temple festivals, Thai Buddhist men will wear round collar outerwear and wide leg trousers or loincloths but will never wear headdresses, while Balinese Hindu men wear turbans or fabric headbands, shirts and Sarong, which are similar to Sarong of Thai Buddhist men in central and northern part of Thailand. Most of Thai Buddhist women wear Sarong like Balinese Hindu women but wear only round collar outerwear, while Balinese Hindu women wear diamond neck camisole as inner wear and shawl collar as outerwear.
Abstract: This paper focuses on a technique for identifying the geological boundary of the ground strata in front of a tunnel excavation site using the first order adjoint method based on the optimal control theory. The geological boundary is defined as the boundary which is different layers of elastic modulus. At tunnel excavations, it is important to presume the ground situation ahead of the cutting face beforehand. Excavating into weak strata or fault fracture zones may cause extension of the construction work and human suffering. A theory for determining the geological boundary of the ground in a numerical manner is investigated, employing excavating blasts and its vibration waves as the observation references. According to the optimal control theory, the performance function described by the square sum of the residuals between computed and observed velocities is minimized. The boundary layer is determined by minimizing the performance function. The elastic analysis governed by the Navier equation is carried out, assuming the ground as an elastic body with linear viscous damping. To identify the boundary, the gradient of the performance function with respect to the geological boundary can be calculated using the adjoint equation. The weighed gradient method is effectively applied to the minimization algorithm. To solve the governing and adjoint equations, the Galerkin finite element method and the average acceleration method are employed for the spatial and temporal discretizations, respectively. Based on the method presented in this paper, the different boundary of three strata can be identified. For the numerical studies, the Suemune tunnel excavation site is employed. At first, the blasting force is identified in order to perform the accuracy improvement of analysis. We identify the geological boundary after the estimation of blasting force. With this identification procedure, the numerical analysis results which almost correspond with the observation data were provided.
Abstract: The continued growth of the cities is causing an
increase of the amount of surface to illuminate. However, this rise
into lighting brings some unintended consequences such as increased
of energy consumption or the light pollution. To make these effects
less intrusive as possible some councils have chosen to perform a
part-night lighting in some areas. Nonetheless, this kind of shutdown
may cause serious problems which we intend to highlight in this
paper.
Abstract: Breast cancer detection techniques have been reported
to aid radiologists in analyzing mammograms. We note that most
techniques are performed on uncompressed digital mammograms.
Mammogram images are huge in size necessitating the use of
compression to reduce storage/transmission requirements. In this
paper, we present an algorithm for the detection of
microcalcifications in the JPEG2000 domain. The algorithm is based
on the statistical properties of the wavelet transform that the
JPEG2000 coder employs. Simulation results were carried out at
different compression ratios. The sensitivity of this algorithm ranges
from 92% with a false positive rate of 4.7 down to 66% with a false
positive rate of 2.1 using lossless compression and lossy compression
at a compression ratio of 100:1, respectively.
Abstract: Many algorithms are available for sorting the unordered elements. Most important of them are Bubble sort, Heap sort, Insertion sort and Shell sort. These algorithms have their own pros and cons. Shell Sort which is an enhanced version of insertion sort, reduces the number of swaps of the elements being sorted to minimize the complexity and time as compared to insertion sort. Shell sort improves the efficiency of insertion sort by quickly shifting values to their destination. Average sort time is O(n1.25), while worst-case time is O(n1.5). It performs certain iterations. In each iteration it swaps some elements of the array in such a way that in last iteration when the value of h is one, the number of swaps will be reduced. Donald L. Shell invented a formula to calculate the value of ?h?. this work focuses to identify some improvement in the conventional Shell sort algorithm. ''Enhanced Shell Sort algorithm'' is an improvement in the algorithm to calculate the value of 'h'. It has been observed that by applying this algorithm, number of swaps can be reduced up to 60 percent as compared to the existing algorithm. In some other cases this enhancement was found faster than the existing algorithms available.
Abstract: Typically thermal power plants are located near to
surface coal mines that produce huge amount of fly ash as a waste
byproduct. Disposal of fly ash causes significant economic and
environmental problems. Now-a-days, research is going on for bulk
utilization of fly ash. In order to increase its percentage utilization, an
investigation was carried out to evaluate its potential for haul road
construction. This paper presents the laboratory California bearing
ratio (CBR) tests and evaluates the effect of lime on CBR behavior of
fly ash - mine overburden mixes. Tests were performed with different
percentages of lime (2%, 3%, 6%, and 9%). The results show that the
increase in bearing ratio of fly ash-overburden mixes was achieved
by lime treatment. Scanning electron microscopy (SEM) analyses
were conducted on 28 days cured specimens. The SEM study showed
that the bearing ratio development is related to the microstructural
development.
Abstract: With the extensive inclusion of document, especially
text, in the business systems, data mining does not cover the full
scope of Business Intelligence. Data mining cannot deliver its impact
on extracting useful details from the large collection of unstructured
and semi-structured written materials based on natural languages.
The most pressing issue is to draw the potential business intelligence
from text. In order to gain competitive advantages for the business, it
is necessary to develop the new powerful tool, text mining, to expand
the scope of business intelligence.
In this paper, we will work out the strong points of text mining in
extracting business intelligence from huge amount of textual
information sources within business systems. We will apply text
mining to each stage of Business Intelligence systems to prove that
text mining is the powerful tool to expand the scope of BI. After
reviewing basic definitions and some related technologies, we will
discuss the relationship and the benefits of these to text mining. Some
examples and applications of text mining will also be given. The
motivation behind is to develop new approach to effective and
efficient textual information analysis. Thus we can expand the scope
of Business Intelligence using the powerful tool, text mining.
Abstract: Sustainability in rural production system can only be achieved if it can suitably satisfy the local requirement as well as the outside demand with the changing time. With the increased pressure from the food sector in a globalised world, the agrarian economy
needs to re-organise its cultivable land system to be compatible with new management practices as well as the multiple needs of various stakeholders and the changing resource scenario. An attempt has been made to transform this problem into a multi-objective decisionmaking problem considering various objectives, resource constraints and conditional constraints. An interactive fuzzy multi-objective
programming approach has been used for such a purpose taking a
case study in Indian context to demonstrate the validity of the method.
Abstract: Inner class is a specialized class that defined within a
regular outer class. It is used in some programming languages such as
Java to carry out the task which is related to its outer class. The
functional relatedness between inner class and outer class is always
the main concern of defining an inner class. However, excessive use
of inner class could sabotage the class cohesiveness. In addition,
excessive inner class leads to the difficulty of software maintenance
and comprehension. Our research aims at determining the minimum
threshold for the functional relatedness of inner-outer class. Such
minimum threshold is a guideline for removing or relocating the
excessive inner class. Our research provides a feasible way for
software developers to define inner classes which are functionally
related to the outer class.
Abstract: In this paper, we propose an improved 3D star skeleton
technique, which is a suitable skeletonization for human posture representation
and reflects the 3D information of human posture.
Moreover, the proposed technique is simple and then can be performed
in real-time. The existing skeleton construction techniques, such as
distance transformation, Voronoi diagram, and thinning, focus on the
precision of skeleton information. Therefore, those techniques are not
applicable to real-time posture recognition since they are computationally
expensive and highly susceptible to noise of boundary. Although
a 2D star skeleton was proposed to complement these problems,
it also has some limitations to describe the 3D information of the
posture. To represent human posture effectively, the constructed skeleton
should consider the 3D information of posture. The proposed 3D
star skeleton contains 3D data of human, and focuses on human action
and posture recognition. Our 3D star skeleton uses the 8 projection
maps which have 2D silhouette information and depth data of human
surface. And the extremal points can be extracted as the features of 3D
star skeleton, without searching whole boundary of object. Therefore,
on execution time, our 3D star skeleton is faster than the “greedy" 3D
star skeleton using the whole boundary points on the surface. Moreover,
our method can offer more accurate skeleton of posture than the
existing star skeleton since the 3D data for the object is concerned.
Additionally, we make a codebook, a collection of representative 3D
star skeletons about 7 postures, to recognize what posture of constructed
skeleton is.
Abstract: There are many studies in the literature on
institutional investors- efforts to improve corporate governance,
generally focused on the role of pension funds and private equity
firms. There are only a few studies that analyze the influence of
development banks in the governance of investee companies. The
objective of this research is to examine the role of the Brazilian
Development Bank (BNDES) in the governance of listed companies.
Our analysis provides evidence that companies in which BNDES is a
shareholder have better governance.
Abstract: In a recent year usage of VoIP subscription has increased tremendously as compare to Public Switching Telephone System(PSTN). A VoIP subscriber would like to know the exact tariffs of the calls made using VoIP. As the usage increases, the rate of fraud is also increases, causing users complain about excess billing. This in turn hampers the growth of VoIP .This paper describe the common frauds and attack on VoIP based system and make an attempt to solve the billing attack by creating secured channel between caller and callee.