Abstract: The most planted cover crops in the Czech Republic
are mustard (Sinapis alba) and phacelia (Phacelia tanacetifolia
Benth.). A field trial was executed to evaluate root system size (RSS)
in eight varieties of mustard and five varieties of phacelia on two
locations, in three BBCH phases and in two years. The relationship
between RSS and aboveground biomass was inquired. The root
system was assessed by measuring its electric capacity. Aboveground
mass and root samples to be evaluated by means of a digital image
analysis were recovered in the BBCH phase 70. The yield of
aboveground biomass of mustard was always statistically
significantly higher than that of phacelia. Mustard showed a
statistically significant negative correlation between root length
density (RLD) within 10 cm and aboveground biomass weight (r = -
0.46*). Phacelia featured a statistically significant correlation
between aboveground biomass production and nitrate nitrogen
content in soil (r=0.782**).
Abstract: Facial recognition and expression analysis is rapidly
becoming an area of intense interest in computer science and humancomputer
interaction design communities. The most expressive way
humans display emotions is through facial expressions. In this paper
skin and non-skin pixels were separated. Face regions were extracted
from the detected skin regions. Facial expressions are analyzed from
facial images by applying Gabor wavelet transform (GWT) and
Discrete Cosine Transform (DCT) on face images. Radial Basis
Function (RBF) Network is used to identify the person and to classify
the facial expressions. Our method reliably works even with faces,
which carry heavy expressions.
Abstract: We demonstrate a nonfaradaic electrochemical impedance spectroscopy measurement of biochemically modified gold plated electrodes using a two-electrode system. The absence of any redox indicator in the impedance measurements provide more precise and accurate characterization of the measured bioanalyte at molecular resolution. An equivalent electrical circuit of the electrodeelectrolyte interface was deduced from the observed impedance data of saline solution at low and high concentrations. The detection of biomolecular interactions was fundamentally correlated to electrical double-layer variation at modified interface. The investigations were done using 20mer deoxyribonucleic acid (DNA) strands without any label. Surface modification was performed by creating mixed monolayer of the thiol-modified single-stranded DNA and a spacer thiol (mercaptohexanol) by a two-step self-assembly method. The results clearly distinguish between the noncomplementary and complementary hybridization of DNA, at low frequency region below several hundreds Hertz.
Abstract: In this paper we study the boundedness properties of
certain oscillatory integrals with polynomial phase. We obtain sharp
estimates for these oscillatory integrals. By the virtue of these
estimates and extrapolation we obtain Lp boundedness for these
oscillatory integrals under rather weak size conditions on the kernel
function.
Abstract: In this work, we study the impact of dynamically
changing link slowdowns on the stability properties of packetswitched
networks under the Adversarial Queueing Theory
framework. Especially, we consider the Adversarial, Quasi-Static
Slowdown Queueing Theory model, where each link slowdown may
take on values in the two-valued set of integers {1, D} with D > 1
which remain fixed for a long time, under a (w, ¤ü)-adversary. In this
framework, we present an innovative systematic construction for the
estimation of adversarial injection rate lower bounds, which, if
exceeded, cause instability in networks that use the LIS (Longest-in-
System) protocol for contention-resolution. In addition, we show that
a network that uses the LIS protocol for contention-resolution may
result in dropping its instability bound at injection rates ¤ü > 0 when
the network size and the high slowdown D take large values. This is
the best ever known instability lower bound for LIS networks.
Abstract: The private theme parks are gradually surpassing
public-owned scenic areas after many years of development and have
become a mainstream choice for domestic tourists. Previous studies
show that visitors from different backgrounds differ in consumer
behavior and satisfaction factors. An understanding of visitor
satisfaction is therefore of extreme importance to operators of
privately-owned theme parks. Importance-Performance Analysis (IPA)
is used to measure consumer's potential satisfaction with services and
has become a widely used management tool for strength and weakness
analysis for brands, products, services and point of sales. As IPA has
so far not been used to evaluate the visitor satisfaction with
privately-owned theme parks, in this study the IPA method is used to
analyze visitor satisfaction with Janfusun Fancyworld (one of the most
popular private theme parks in Taiwan) and to rank visitor focus and
satisfaction on/in theme park facilities and services. Results of the
analysis provide private theme park operators with an understanding
of user or consumer demands as well as an assessment of the quality of
services currently offered.
Abstract: In this document, we have proposed a robust
conceptual strategy, in order to improve the robustness against the manufacturing defects and thus the reliability of logic CMOS circuits. However, in order to enable the use of future CMOS
technology nodes this strategy combines various types of design:
DFR (Design for Reliability), techniques of tolerance: hardware
redundancy TMR (Triple Modular Redundancy) for hard error
tolerance, the DFT (Design for Testability. The Results on largest ISCAS and ITC benchmark circuits show that our approach improves
considerably the reliability, by reducing the key factors, the area costs and fault tolerance probability.
Abstract: One of the ubiquitous routines in medical practice is searching through voluminous piles of clinical documents. In this paper we introduce a distributed system to search and exchange clinical documents. Clinical documents are distributed peer-to-peer. Relevant information is found in multiple iterations of cross-searches between the clinical text and its domain encyclopedia.
Abstract: Computer aided design accounts with the support of
parametric software in the design of machine components as well as
of any other pieces of interest. The complexities of the element under
study sometimes offer certain difficulties to computer design, or ever
might generate mistakes in the final body conception. Reverse
engineering techniques are based on the transformation of already
conceived body images into a matrix of points which can be
visualized by the design software. The literature exhibits several
techniques to obtain machine components dimensional fields, as
contact instrument (MMC), calipers and optical methods as laser
scanner, holograms as well as moiré methods. The objective of this
research work was to analyze the moiré technique as instrument of
reverse engineering, applied to bodies of nom complex geometry as
simple solid figures, creating matrices of points. These matrices were
forwarded to a parametric software named SolidWorks to generate
the virtual object. Volume data obtained by mechanical means, i.e.,
by caliper, the volume obtained through the moiré method and the
volume generated by the SolidWorks software were compared and
found to be in close agreement. This research work suggests the
application of phase shifting moiré methods as instrument of reverse
engineering, serving also to support farm machinery element designs.
Abstract: The paper reports on the results of experimental and
numerical study of nonstationary swirling flow in an isothermal
model of vortex burner. It has been identified that main source of the
instability is related to a precessing vortex core (PVC) phenomenon.
The PVC induced flow pulsation characteristics such as precession
frequency and its variation as a function of flowrate and swirl number
have been explored making use of acoustic probes. Additionally
pressure transducers were used to measure the pressure drops on the
working chamber and across the vortex flow. The experiments have
been included also the mean velocity measurements making use of a
laser-Doppler anemometry. The features of instantaneous flowfield
generated by the PVC were analyzed employing a commercial CFD
code (Star-CCM+) based on Detached Eddy Simulation (DES)
approach. Validity of the numerical code has been checked by
comparison calculated flowfield data with the obtained experimental
results. It has been confirmed particularly that the CFD code applied
correctly reproduces the flow features.
Abstract: Travelling salesman problem (TSP) is a combinational
optimization problem and solution approaches have been applied
many real world problems. Pure TSP assumes the cities to visit are
fixed in time and thus solutions are created to find shortest path
according to these point. But some of the points are canceled to visit
in time. If the problem is not time crucial it is not important to
determine new routing plan but if the points are changing rapidly and
time is necessary do decide a new route plan a new approach should
be applied in such cases. We developed a route plan transfer method
based on transfer learning and we achieved high performance against
determining a new model from scratch in every change.
Abstract: The seismic rehabilitation designs of two reinforced
concrete school buildings, representative of a wide stock of similar
edifices designed under earlier editions of the Italian Technical
Standards, are presented in this paper. The mutual retrofit solution
elaborated for the two buildings consists in the incorporation of a
dissipative bracing system including pressurized fluid viscous springdampers
as passive protective devices. The mechanical parameters,
layouts and locations selected for the constituting elements of the
system; the architectural renovation projects developed to properly
incorporate the structural interventions and improve the appearance
of the buildings; highlights of the installation works already
completed in one of the two structures; and a synthesis of the
performance assessment analyses carried out in original and
rehabilitated conditions, are illustrated. The results of the analyses
show a remarkable enhancement of the seismic response capacities of
both structures. This allows reaching the high performance objectives
postulated in the retrofit designs with much lower costs and
architectural intrusion as compared to traditional rehabilitation
interventions designed for the same objectives.
Abstract: Flat double-layer grid is from category of space structures that are formed from two flat layers connected together with diagonal members. Increased stiffness and better seismic resistance in relation to other space structures are advantages of flat double layer space structures. The objective of this study is assessment and calculation of Behavior factor of flat double layer space structures. With regarding that these structures are used widely but Behavior factor used to design these structures against seismic force is not determined and exact, the necessity of study is obvious. This study is theoretical. In this study we used structures with span length of 16m and 20 m. All connections are pivotal. ANSYS software is used to non-linear analysis of structures.
Abstract: This paper describes the NEAR (Navigating Exhibitions, Annotations and Resources) panel, a novel interactive visualization technique designed to help people navigate and interpret groups of resources, exhibitions and annotations by revealing hidden relations such as similarities and references. NEAR is implemented on A•VI•RE, an extended online information repository. A•VI•RE supports a semi-structured collection of exhibitions containing various resources and annotations. Users are encouraged to contribute, share, annotate and interpret resources in the system by building their own exhibitions and annotations. However, it is hard to navigate smoothly and efficiently in A•VI•RE because of its high capacity and complexity. We present a visual panel that implements new navigation and communication approaches that support discovery of implied relations. By quickly scanning and interacting with NEAR, users can see not only implied relations but also potential connections among different data elements. NEAR was tested by several users in the A•VI•RE system and shown to be a supportive navigation tool. In the paper, we further analyze the design, report the evaluation and consider its usage in other applications.
Abstract: In this paper, we present two new ranking and unranking
algorithms for k-ary trees represented by x-sequences in Gray
code order. These algorithms are based on a gray code generation algorithm
developed by Ahrabian et al.. In mentioned paper, a recursive
backtracking generation algorithm for x-sequences corresponding to
k-ary trees in Gray code was presented. This generation algorithm
is based on Vajnovszki-s algorithm for generating binary trees in
Gray code ordering. Up to our knowledge no ranking and unranking
algorithms were given for x-sequences in this ordering. we present
ranking and unranking algorithms with O(kn2) time complexity for
x-sequences in this Gray code ordering
Abstract: The purpose of the present paper is to study the concept
of fuzzy bi-ideals in ternary semirings. We give some characterizations of fuzzy bi-ideals. Characterizations of regular ternary semirings
are provided.
Abstract: S-boxes (Substitution boxes) are keystones of modern
symmetric cryptosystems (block ciphers, as well as stream ciphers).
S-boxes bring nonlinearity to cryptosystems and strengthen their
cryptographic security. They are used for confusion in data security
An S-box satisfies the strict avalanche criterion (SAC), if and only if
for any single input bit of the S-box, the inversion of it changes each
output bit with probability one half. If a function (cryptographic
transformation) is complete, then each output bit depends on all of
the input bits. Thus, if it were possible to find the simplest Boolean
expression for each output bit in terms of the input bits, each of these
expressions would have to contain all of the input bits if the function
is complete. From some important properties of S-box, the most
interesting property SAC (Strict Avalanche Criterion) is presented
and to analyze this property three analysis methods are proposed.
Abstract: The X-ray technology has been used in non-destructive evaluation in the Power System, in which a visual non-destructive inspection method for the electrical equipment is provided. However, lots of noise is existed in the images that are got from the X-ray digital images equipment. Therefore, the auto defect detection which based on these images will be very difficult to proceed. A theory on X-ray image de-noising algorithm based on wavelet transform is proposed in this paper. Then the edge detection algorithm is used so that the defect can be pushed out. The result of experiment shows that the method which utilized by this paper is very useful for de-noising on the X-ray images.
Abstract: This research intends to introduce a new usage of Artificial Intelligent (AI) approaches in Stepping Stone Detection (SSD) fields of research. By using Self-Organizing Map (SOM) approaches as the engine, through the experiment, it is shown that SOM has the capability to detect the number of connection chains that involved in a stepping stones. Realizing that by counting the number of connection chain is one of the important steps of stepping stone detection and it become the research focus currently, this research has chosen SOM as the AI techniques because of its capabilities. Through the experiment, it is shown that SOM can detect the number of involved connection chains in Network-based Stepping Stone Detection (NSSD).
Abstract: Numerical analysis naturally finds applications in all
fields of engineering and the physical sciences, but in the
21st century, the life sciences and even the arts have adopted
elements of scientific computations. The numerical data analysis
became key process in research and development of all the fields [6].
In this paper we have made an attempt to analyze the specified
numerical patterns with reference to the association rule mining
techniques with minimum confidence and minimum support mining
criteria. The extracted rules and analyzed results are graphically
demonstrated. Association rules are a simple but very useful form of
data mining that describe the probabilistic co-occurrence of certain
events within a database [7]. They were originally designed to
analyze market-basket data, in which the likelihood of items being
purchased together within the same transactions are analyzed.