Abstract: This paper presents an evaluation of the wind potential in the area of the Lagoon of Venice (Italy). A full anemometric campaign of 2 year measurements, performed by the "Osservatorio Bioclimatologico dell'Ospedale al Mare di Venezia" has been analyzed to obtain the Weibull wind speed distribution and the main wind directions. The annual energy outputs of two candidate horizontal-axis wind turbines (“Aventa AV-7 LoWind" and “Gaia Wind 133-11kW") have been estimated on the basis of the computed Weibull wind distribution, registering a better performance of the former turbine, due to a higher ratio between rotor swept area and rated power of the electric generator, determining a lower cut-in wind speed.
Abstract: Video Mosaicing is the stitching of selected frames of
a video by estimating the camera motion between the frames and
thereby registering successive frames of the video to arrive at the
mosaic. Different techniques have been proposed in the literature for
video mosaicing. Despite of the large number of papers dealing with
techniques to generate mosaic, only a few authors have investigated
conditions under which these techniques generate good estimate of
motion parameters. In this paper, these techniques are studied under
different videos, and the reasons for failures are found. We propose
algorithms with incorporation of outlier removal algorithms for better
estimation of motion parameters.
Abstract: The Zung self-depression scale and Beck Anxiety Inventory were used to study the depression and anxiety levels of Armenian Crohn's disease patients, as well as to reveal the relation between emotional status and placebo effect of these patients. Despite of registered high levels of depression and anxiety, the high placebo rate during investigations was described. The importance of use of psychotherapies for optimal outcomes during treatments of Crohn's disease is obvious.
Abstract: Multicast transmissions allow an host (the source) to send only one flow bound for a group of hosts (the receivers). Any equipment eager to belong to the group may explicitly register itself to that group via its multicast router. This router will be given the responsibility to convey all information relating to the group to all registered hosts. However in an environment in which the final receiver or the source frequently moves, the multicast flows need particular treatment. This constitutes one of the multicast transmissions problems around which several proposals were made in the Mobile IPv6 case in general. In this article, we describe the problems involved in this IPv6 multicast mobility and the existing proposals for their resolution. Then architecture will be proposed aiming to satisfy and optimize these transmissions in the specific case of a mobile multicast receiver in NC-HMIPv6 environment.
Abstract: Electronic commerce is growing rapidly with on-line
sales already heading for hundreds of billion dollars per year. Due to
the huge amount of money transferred everyday, an increased
security level is required. In this work we present the architecture of
an intelligent speaker verification system, which is able to accurately
verify the registered users of an e-commerce service using only their
voices as an input. According to the proposed architecture, a
transaction-based e-commerce application should be complemented
by a biometric server where customer-s unique set of speech models
(voiceprint) is stored. The verification procedure requests from the
user to pronounce a personalized sequence of digits and after
capturing speech and extracting voice features at the client side are
sent back to the biometric server. The biometric server uses pattern
recognition to decide whether the received features match the stored
voiceprint of the customer who claims to be, and accordingly grants
verification. The proposed architecture can provide e-commerce
applications with a higher degree of certainty regarding the identity
of a customer, and prevent impostors to execute fraudulent
transactions.
Abstract: The purpose of this study is to identify the underlying
causes of late payment from the contractors- perspective in the
Malaysian construction industry and to recommend effective solutions
to mitigate late payment problems. The target groups of respondents in
this study were Grades G3, G5, G6 and G7 contractors with
specialization in building works and civil engineering works registered
with the Construction Industry Development Board (CIDB) in
Malaysia. Results from this study were analyzed with Statistical
Package for the Social Science (SPSS 15.0). From this study, it was
found that respondents have highest ranked five significant variables
out of a total of forty-one variables which can caused late payment
problems: a) cash flow problems due to deficiencies in client-s
management capacity (mean = 3.96); b) client-s ineffective utilization
of funds (mean = 3.88); c) scarcity of capital to finance the project
(mean = 3.81); d) clients failure to generate income from bank when
sales of houses do not hit the targeted amount (mean=3.72); and e)
poor cash flow because of lack of proper process implementation,
delay in releasing of the retention monies to contractor and delay in the
evaluation and certification of interim and final payment (mean =
3.66).
Abstract: Construction cost in India is increasing at around 50
per cent over the average inflation levels. It have registered increase
of up to 15 per cent every year, primarily due to cost of basic
building materials such as steel, cement, bricks, timber and other
inputs as well as cost of labour. As a result, the cost of construction
using conventional building materials and construction is becoming
beyond the affordable limits particularly for low-income groups of
population as well as a large cross section of the middle - income
groups. Therefore, there is a need to adopt cost-effective construction
methods either by up-gradation of traditional technologies using local
resources or applying modern construction materials and techniques
with efficient inputs leading to economic solutions. This has become
the most relevant aspect in the context of the large volume of housing
to be constructed in both rural and urban areas and the consideration
of limitations in the availability of resources such as building
materials and finance. This paper makes an overview of the housing
status in India and adoption of appropriate and cost effective
technologies in the country.
Abstract: Cognitive Science appeared about 40 years ago,
subsequent to the challenge of the Artificial Intelligence, as common
territory for several scientific disciplines such as: IT, mathematics,
psychology, neurology, philosophy, sociology, and linguistics. The
new born science was justified by the complexity of the problems
related to the human knowledge on one hand, and on the other by the
fact that none of the above mentioned sciences could explain alone
the mental phenomena. Based on the data supplied by the
experimental sciences such as psychology or neurology, models of
the human mind operation are built in the cognition science. These
models are implemented in computer programs and/or electronic
circuits (specific to the artificial intelligence) – cognitive systems –
whose competences and performances are compared to the human
ones, leading to the psychology and neurology data reinterpretation,
respectively to the construction of new models. During these
processes if psychology provides the experimental basis, philosophy
and mathematics provides the abstraction level utterly necessary for
the intermission of the mentioned sciences.
The ongoing general problematic of the cognitive approach
provides two important types of approach: the computational one,
starting from the idea that the mental phenomenon can be reduced to
1 and 0 type calculus operations, and the connection one that
considers the thinking products as being a result of the interaction
between all the composing (included) systems. In the field of
psychology measurements in the computational register use classical
inquiries and psychometrical tests, generally based on calculus
methods. Deeming things from both sides that are representing the
cognitive science, we can notice a gap in psychological product
measurement possibilities, regarded from the connectionist
perspective, that requires the unitary understanding of the quality –
quantity whole. In such approach measurement by calculus proves to
be inefficient. Our researches, deployed for longer than 20 years,
lead to the conclusion that measuring by forms properly fits to the
connectionism laws and principles.
Abstract: Models are placed by modeling paradigm at the center of development process. These models are represented by languages, like UML the language standardized by the OMG which became necessary for development. Moreover the ontology engineering paradigm places ontologies at the center of development process; in this paradigm we find OWL the principal language for knowledge representation. Building ontologies from scratch is generally a difficult task. The bridging between UML and OWL appeared on several regards such as the classes and associations. In this paper, we have to profit from convergence between UML and OWL to propose an approach based on Meta-Modelling and Graph Grammars and registered in the MDA architecture for the automatic generation of OWL ontologies from UML class diagrams. The transformation is based on transformation rules; the level of abstraction in these rules is close to the application in order to have usable ontologies. We illustrate this approach by an example.
Abstract: Proposal for a secure stream cipher based on Linear Feedback Shift Registers (LFSR) is presented here. In this method, shift register structure used for polynomial modular division is combined with LFSR keystream generator to yield a new keystream generator with much higher periodicity. Security is brought into this structure by using the Boolean function to combine state bits of the LFSR keystream generator and taking the output through the Boolean function. This introduces non-linearity and security into the structure in a way similar to the Non-linear filter generator. The security and throughput of the suggested stream cipher is found to be much greater than the known LFSR based structures for the same key length.