Abstract: Most of fuzzy clustering algorithms have some
discrepancies, e.g. they are not able to detect clusters with convex
shapes, the number of the clusters should be a priori known, they
suffer from numerical problems, like sensitiveness to the
initialization, etc. This paper studies the synergistic combination of
the hierarchical and graph theoretic minimal spanning tree based
clustering algorithm with the partitional Gath-Geva fuzzy clustering
algorithm. The aim of this hybridization is to increase the robustness
and consistency of the clustering results and to decrease the number
of the heuristically defined parameters of these algorithms to
decrease the influence of the user on the clustering results. For the
analysis of the resulted fuzzy clusters a new fuzzy similarity measure
based tool has been presented. The calculated similarities of the
clusters can be used for the hierarchical clustering of the resulted
fuzzy clusters, which information is useful for cluster merging and
for the visualization of the clustering results. As the examples used
for the illustration of the operation of the new algorithm will show,
the proposed algorithm can detect clusters from data with arbitrary
shape and does not suffer from the numerical problems of the
classical Gath-Geva fuzzy clustering algorithm.
Abstract: Realistic 3D face model is desired in various
applications such as face recognition, games, avatars, animations, and
etc. Construction of 3D face model is composed of 1) building a face
shape model and 2) rendering the face shape model. Thus, building a
realistic 3D face shape model is an essential step for realistic 3D face
model. Recently, 3D morphable model is successfully introduced to
deal with the various human face shapes. 3D dense correspondence
problem should be precedently resolved for constructing a realistic 3D
dense morphable face shape model. Several approaches to 3D dense
correspondence problem in 3D face modeling have been proposed
previously, and among them optical flow based algorithms and TPS
(Thin Plate Spline) based algorithms are representative. Optical flow
based algorithms require texture information of faces, which is
sensitive to variation of illumination. In TPS based algorithms
proposed so far, TPS process is performed on the 2D projection
representation in cylindrical coordinates of the 3D face data, not
directly on the 3D face data and thus errors due to distortion in data
during 2D TPS process may be inevitable.
In this paper, we propose a new 3D dense correspondence algorithm
for 3D dense morphable face shape modeling. The proposed algorithm
does not need texture information and applies TPS directly on 3D face
data. Through construction procedures, it is observed that the proposed
algorithm constructs realistic 3D face morphable model reliably and
fast.
Abstract: The aim of this paper is to identify the most suitable
model for churn prediction based on three different techniques. The
paper identifies the variables that affect churn in reverence of
customer complaints data and provides a comparative analysis of
neural networks, regression trees and regression in their capabilities
of predicting customer churn.
Abstract: We report here structural, mechanical and I-V
characteristics of Zn1-xMxO ceramic samples with various x and M.
It is found that the considered dopants does not influence the wellknown
peaks related to wurtzite structure of ZnO ceramics, while the
shape and size of grains are clearly affected. Average crystalline
diameters, deduced from XRD are between 42 nm and 54 nm, which
are 70 times lower than those obtained from SEM micrographs.
Interestingly, the potential barrier could be formed by adding Cu up
to 0.20, and it is completely deformed by 0.025 Ni additions. The
breakdown field could be enhanced up to 4138 V/cm by 0.025 Cu
additions, followed by a decrease with further increase of Cu . On
the other hand a gradual decrease in VHN is reported for both
dopants and their values are higher in Ni samples as compared to Cu
samples. The electrical conductivity is generally improved by Ni,
while addition of Cu improved it only in the over doped region (≥
0.10). These results are discussed in terms of the difference of
valency and ferromagnetic ordering for both dopants as compared to
undoped sample.
Abstract: The usual method of river flow diversion involves construction of tunnels and cofferdams. Given the fact that the cost of diversion works could be as high as 10-20% of the total dam construction cost, due attention should be paid to optimum design of the diversion works. The cost of diversion works depends, on factors, such as: the tunnel dimensions and the intended tunneling support measures during and after excavation; quality and characterizes of the rock through which the tunnel should be excavated; the dimensions of the upstream (and downstream) cofferdams; and the magnitude of river flood the system is designed to divert. In this paper by use of the cost of unit prices for tunnel excavation, tunnel lining, tunnel support (rock bolt + shotcrete) and cofferdam fill the cost function was determined. The function is then minimized by the aid of PSO Algorithm (particle swarm optimization). It is found that the optimum diameter and the total diversion cost are directly related to the river flood discharge (Q). It has also shown that in addition to optimum diameter design discharge (Q), river length, tunnel length, is mainly a function of the ratios (not the absolute values) of the unit prices and does not depend on the overall price levels in the respective country. The results of optimization use in some of the case study lead us to significant changes in the cost.
Abstract: In this paper, we present a new learning algorithm for
anomaly based network intrusion detection using improved self
adaptive naïve Bayesian tree (NBTree), which induces a hybrid of
decision tree and naïve Bayesian classifier. The proposed approach
scales up the balance detections for different attack types and keeps
the false positives at acceptable level in intrusion detection. In
complex and dynamic large intrusion detection dataset, the detection
accuracy of naïve Bayesian classifier does not scale up as well as
decision tree. It has been successfully tested in other problem
domains that naïve Bayesian tree improves the classification rates in
large dataset. In naïve Bayesian tree nodes contain and split as
regular decision-trees, but the leaves contain naïve Bayesian
classifiers. The experimental results on KDD99 benchmark network
intrusion detection dataset demonstrate that this new approach scales
up the detection rates for different attack types and reduces false
positives in network intrusion detection.
Abstract: Isobaric vapor-liquid equilibrium measurements are
reported for the binary mixture of Methyl acetate and
Isopropylbenzene at 97.3 kPa. The measurements have been
performed using a vapor recirculating type (modified Othmer's)
equilibrium still. The mixture shows positive deviation from ideality
and does not form an azeotrope. The activity coefficients have been
calculated taking into consideration the vapor phase nonideality. The
data satisfy the thermodynamic consistency tests of Herington and
Black. The activity coefficients have been satisfactorily correlated by
means of the Margules, NRTL, and Black equations. A comparison
of the values of activity coefficients obtained by experimental data
with the UNIFAC model has been made.
Abstract: Transferring information developed by other peoples is an ordinary event that happens during daily conversations, for example when employees sea each other in the organization, or when they are having lunch together, or attending a meeting, they use to talk about their experience, and discuss about their current projects, and talk about their successes over some specific problems. Despite the potential value of leveraging organizational memory and expertise by using OMS and ER, still small organizations haven-t been able to capitalize on its promised value. Each organization has its internal knowledge management system, in some of organizations the system face the lack of expert people to save their experience in the repository and in another hand on some other organizations there are lots of expert people but the organization doesn-t have the maximum use of their knowledge.
Abstract: Nowadays, many manufacturing companies try to
reinforce their competitiveness or find a breakthrough by considering
collaboration. In Korea, more than 900 manufacturing companies are
using web-based collaboration systems developed by the
government-led project, referred to as i-Manufacturing. The system
supports some similar functions of Product Data Management (PDM)
as well as Project Management System (PMS). A web-based
collaboration system provides many useful functions for collaborative
works. This system, however, does not support new linking services
between buyers and suppliers. Therefore, in order to find new
collaborative partners, this paper proposes a framework which creates
new connections between buyers and suppliers facilitating their
collaboration, referred to as Excellent Manufacturer Scouting System
(EMSS). EMSS plays a role as a bridge between overseas buyers and
suppliers. As a part of study on EMSS, we also propose an evaluation
method of manufacturability of potential partners with six main factors.
Based on the results of evaluation, buyers may get a good guideline to
choose their new partners before getting into negotiation processes
with them.
Abstract: This study aims at investigating the empirical
relationships between risk preference, internet preference, and
internet knowledge which are known as user characteristics, in
addition to perceived risk of the customers on the internet purchase
intention. In order to test the relationships between the variables of
model 174, a questionnaire was collected from the students with
previous online experience. For the purpose of data analysis,
confirmatory factor analysis (CFA) and structural equation model
(SEM) was used.
Test results show that the perceived risk affects the internet
purchase intention, and increase or decrease of perceived risk
influences the purchase intention when the customer does the internet
shopping. Other factors such as internet preference, knowledge of the
internet, and risk preference affect the internet purchase intention.
Abstract: In this paper, we propose a novel spatiotemporal fuzzy
based algorithm for noise filtering of image sequences. Our proposed algorithm uses adaptive weights based on a triangular membership
functions. In this algorithm median filter is used to suppress noise.
Experimental results show when the images are corrupted by highdensity
Salt and Pepper noise, our fuzzy based algorithm for noise filtering of image sequences, are much more effective in suppressing
noise and preserving edges than the previously reported algorithms such as [1-7]. Indeed, assigned weights to noisy pixels are very
adaptive so that they well make use of correlation of pixels. On the other hand, the motion estimation methods are erroneous and in highdensity noise they may degrade the filter performance. Therefore, our
proposed fuzzy algorithm doesn-t need any estimation of motion trajectory. The proposed algorithm admissibly removes noise without having any knowledge of Salt and Pepper noise density.
Abstract: Wireless LAN (WLAN) access in public hotspot areas
becomes popular in the recent years. Since more and more multimedia
information is available in the Internet, there is an increasing demand
for accessing multimedia information through WLAN hotspots.
Currently, the bandwidth offered by an IEEE 802.11 WLAN cannot
afford many simultaneous real-time video accesses. A possible way to
increase the offered bandwidth in a hotspot is the use of multiple access
points (APs). However, a mobile station is usually connected to the
WLAN AP with the strongest received signal strength indicator (RSSI).
The total consumed bandwidth cannot be fairly allocated among those
APs. In this paper, we will propose an effective load-balancing scheme
via the support of the IAPP and SNMP in APs. The proposed scheme is
an open solution and doesn-t need any changes in both wireless stations
and APs. This makes load balancing possible in WLAN hotspots,
where a variety of heterogeneous mobile devices are employed.
Abstract: In this paper, we give an overview of an online elearning
tool which has been developed for kids aged from nine to
eleven years old in Mauritius for the self-study of Mathematics in
order to prepare them for the CPE examination. The software does
not intend to render obsolete the existing pedagogical approaches.
Nowadays, the teaching-learning process is mainly focused towards
the class-room model. Moreover, most of the e-learning platforms
that exist are simply static ways of delivering resources using the
internet. There is nearly no interaction between the learner and the
tool. Our application will enable students to practice exercises online
and also work out sample examination papers. Another interesting
feature is that the kid will not have to wait for someone to correct the
work as the correction will be done online and on the spot. Additional
feedback is also provided for some exercises.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: A new generation of manufacturing machines
so-called MIMCA (modular and integrated machine control
architecture) capable of handling much increased complexity in
manufacturing control-systems is presented. Requirement for more
flexible and effective control systems for manufacturing machine
systems is investigated and dimensioned-which highlights a need for
improved means of coordinating and monitoring production
machinery and equipment used to- transport material. The MIMCA
supports simulation based on machine modeling, was conceived by
the authors to address the issues. Essentially MIMCA comprises an
organized unification of selected architectural frameworks and
modeling methods, which include: NISTRCS, UMC and Colored
Timed Petri nets (CTPN). The unification has been achieved; to
support the design and construction of hierarchical and distributed
machine control which realized the concurrent operation of reusable
and distributed machine control components; ability to handle
growing complexity; and support requirements for real- time control
systems. Thus MIMCA enables mapping between 'what a machine
should do' and 'how the machine does it' in a well-defined but
flexible way designed to facilitate reconfiguration of machine
systems.
Abstract: This research investigates the design of a low-cost 3D
spatial interaction approach using the Wii Remote for immersive
Head-Mounted Display (HMD) virtual reality. Current virtual reality
applications that incorporate the Wii Remote are either desktop
virtual reality applications or systems that use large screen displays.
However, the requirements for an HMD virtual reality system differ
from such systems. This is mainly because in HMD virtual reality,
the display screen does not remain at a fixed location. The user views
the virtual environment through display screens that are in front of
the user-s eyes and when the user moves his/her head, these screens
move as well. This means that the display has to be updated in realtime
based on where the user is currently looking. Normal usage of
the Wii Remote requires the controller to be pointed in a certain
direction, typically towards the display. This is too restrictive for
HMD virtual reality systems that ideally require the user to be able to
turn around in the virtual environment. Previous work proposed a
design to achieve this, however it suffered from a number of
drawbacks. The aim of this study is to look into a suitable method of
using the Wii Remote for 3D interaction in a space around the user
for HMD virtual reality. This paper presents an overview of issues
that had to be considered, the system design as well as experimental
results.
Abstract: Intuitionistic fuzzy sets as proposed by Atanassov,
have gained much attention from past and latter researchers for
applications in various fields. Similarity measures between
intuitionistic fuzzy sets were developed afterwards. However, it does
not cater the conflicting behavior of each element evaluated. We
therefore made some modification to the similarity measure of IFS
by considering conflicting concept to the model. In this paper, we
concentrate on Zhang and Fu-s similarity measures for IFSs and
some examples are given to validate these similarity measures. A
simple modification to Zhang and Fu-s similarity measures of IFSs
was proposed to find the best result according to the use of degree of
indeterminacy. Finally, we mark up with the application to real
decision making problems.
Abstract: For cognitive radio networks, there is a major
spectrum sensing problem, i.e. dynamic spectrum management. It is
an important issue to sense and identify the spectrum holes in
cognitive radio networks. The first-order derivative scheme is usually
used to detect the edge of the spectrum. In this paper, a novel
spectrum sensing technique for cognitive radio is presented. The
proposed algorithm offers efficient edge detection. Then, simulation
results show the performance of the first-order derivative scheme and
the proposed scheme and depict that the proposed scheme obtains
better performance than does the first-order derivative scheme.
Abstract: In this study, single nozzle method used for
electrospinning technique which composite polymer solution with
cellulose nanowiskers (CNW) was treated by ultrasonic sonificator
have been compared with coaxial (double) nozzle method, in terms of
mechanical, thermal and morphological properties of composite
nanofiber. The effect of water content in composite polymer solution
on properties of nanofiber has also been examined. It has been seen
that single nozzle method which polymer solution does not contain
water has better results than that of coaxial method, in terms of
mechanical, thermal and morphological properties of nanofiber.
However, it is necessary to make an optimization study on setting
condition of ultrasonic treatment to get better dispersion of CNW in
composite nanofiber and to get better mechanical and thermal
properties
Abstract: MMR vaccine failure had been reported globally and
here we report that it occurs now in India. Samples were collected from clinically suspected mumps cases were subjected for anti
mumps antibodies, virus isolation, RT-PCR, sequencing and
phylogenetic tree analysis. 56 samples collected from men and women belonging to various age groups. 30 had been vaccinated and
the status of 26 patients was unknown. 28 out of 30 samples were
found to be symptomatic and positive for Mumps IgM, indicating
active mumps infection in 93.4% of the vaccinated population. A
phylogenetic tree comparison of the clinical isolate is shown to be genotype C which is distinct from vaccine strain. Our study clearly sending warning signs that MMR vaccine is a failure and it needs to be revamped for the human use by increasing its efficacy and efficiency.