2016 (80)
2015 (71)
2014 (86)
2013 (123)
2012 (121)
2011 (116)
2010 (65)
2009 (68)
2008 (12)
An Improved Online Tamil Character Recognition Using Neural Networks
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper we propose a Conventional Neural Network which recognizes the online Tamil characters. Convolutional Neural Networks are a special kind of multi-layer neural networks. Like almost every other neural networks they are trained with a version of the back- propagation algorithm, where they differ is in the architecture. Convolutional Neural Networks are designed to recognize visual patterns directly from pixel images with minimal preprocessing. They can recognize patterns with extreme variability (such as handwritten characters), and with robustness to distortions and geometric transformations. The existing script-specific post processing schemes improved the recognition rate of online Tamil characters. At the first level, features derived at each sample point of the preprocessed character are used to construct a subspace using the 2DPCA algorithm. Recognition of the test sample is performed using a nearest neighbor classifier. This strategy reduces the recognition error among the confused character sets handled, by more than 4%.
On Using Redundant Parity Check Equation for LDPCA decoding in Distributed Video Coding
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.11-18
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the video coding, the most significant problem is the encoding complexity. It is the distributed video coding (DVC) that the encoding complexity is decreased but the decoding complexity is increased. In the DVC, the encoding complexity is decreased by using the channel coding. Especially, LDPC(A) codes are widely used. In this paper, we introduce a new decoding method for LDPC(A) code improving the error correcting capability for both the AWGN and the DVC channels.
Study of Gene Regulatory Network Using Polynomial, Rational Polynomial and Circular function
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.19-32
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Genome contains vital genetic information. It becomes necessary to uncover vast genetic information that is hidden in genetic code. Different types of mathematical models have been evolved over the years but still a lot needs to be done. The regulatory function of genes can be modeled mathematically by using various types of polynomials and also by changing its degree, one can conclude whether increase of the degree of polynomial has any impact on predicate value. In this paper, solution of differential equation for analysis of regulatory gene network using different functions has been studied. In section 2 and 3 related research work and mathematical formulation are discussed. In section 4and 5, model is solved using polynomial, circular function and rational polynomial. The degree of the polynomial also changes the influence of one gene on another gene in gene regulatory network which is non-linear in nature the present study. The study shows that gene regulatory network can be expressed as polynomial and rational polynomials of degree two, three and four. The mathematical models are tested on four different organism i.e Yest, E.coli, drosophila and mycobacterium. The results shows that further increasing the degree does not improve the accuracy of prediction but by enlarge remains same in most of the cases. In case of rational polynomial when degree is changed from 2 to 3 accuracy deteriorates.
The Performance of Modified Silicone-Dammar Resin in Nanoindentation Test
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.33-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Dammar plant resin (dipterocaupecea sp.) was mixed with silicone in various wt% and these two components were modified by using a volatile organic solvent to form Silicone-dammar (SD) coating material. A thin SD coating film layered on aluminium Q-panel was obtained by using spin coating method and cured at room temperature, labeled as SD0, SD5, SD10, SD15, SD20, SD25, SD30, SD35, SD40 and SD45 according to weight % of dammar. A nano-indentation test was carried out to investigate the mechanical performance of the coating film in nanoscale measurement. From the creep indentation profile, the elastic behavior of the coating material was evaluated and result shows that SD5, SD35 and SD40 have high modulus of elasticity. By using Berkovich nano-indentation with Vickers Hardness formula, SD 10 was found to be the hardest coating with hardness of 28.533 Pa and highest reduced modulus (Er) of 4.89E+02 MPa.
Tele-presence Based Patient Monitoring Robot
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.45-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Tele-presence is a vast terminology incorporating techniques, methods and ways to make someone present at a location virtually to achieve a specific goal. Tele-presence systems can take many forms ranging from a simple software to a complex artificial intelligence based robots. In this paper, we develop a simple and cost effective tele-presence and multi-purpose robot controlled by both Wi-Fi and through web. Furthermore, the developed system supports live video streaming from any location as well as the video and audio transmission. The robot is tested for patient monitoring and a complete system is designed for this purpose.
The Efficient Hybrid Approach to Channel Routing Problem
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.61-68
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Known as an NP-Complete problem, the channel routing problem is very important in the automatic layout design of VLSI circuit and printed circuit boards. A distributed hybrid algorithm for this channel routing problem is presented in MPI environments. This system is implemented on a network of personal computers running Linux operating system connected via 100Mbps Ethernet. Each slave processor generates its own sub-population using genetic operations and communicates with the master processor in an asynchronous manner to form the global population. The proposed hybrid algorithm of Mean Field Annealing and Simulated annealing-like Genetic Algorithm combines the benefit of rapid convergence property of MFA and the effective genetic operations of SGA. The experimental results show that the proposed algorithm maintains the convergence properties of sequential genetic algorithm while it achieves linear speedup as the nets of the channel routing and the number of computing processors increase.
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.69-82
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Sludge samples from nine drinking water purification stations in El-Mynia governorate namely Kedwan, Elhawarta, Demsher, Tewa, Ard Sultan, Tokh Elkhel, Abu Flow, Saft Elkhmar and Zohrt Elporgi, were analyzed for its naturally occurring radionuclides (226Ra, 232Th and 40K) by gamma- ray spectrometry system using (sodium iodide NaI (Tl) detector).The results show that the specific activity for 226Ra, 232Th and 40K in range of 6±0.7 to 113±6.7, from 5±1 to 117±5.8 and from 47±4.5 to 412±20.6 Bq Kg-1 respectively. The results indicate that sludge of drinking water purification stations in El-Mynia governorate from large scale do not pose a significant radiological risk. Additionally evaluations have been made of the absorbed gamma dose rate in air and the annual effective dose equivalent.
An Approach to Overcome Inference Channels on k-anonymous Data
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.83-90
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The concept of k-anonymity protection model has been proposed as an effective way to protect the identities of subjects in a disclosed database. However, from a k-anonymous dataset it may be possible to directly infer private data. This direct disclosure is called attribute linkage. k-anonymity also suffer to another form of attack based on data mining results. In fact, data mining models and patterns pose a privacy threat even if the k-anonymity is satisfied. In this paper, we discuss how the privacy requirements characterized by k-anonymity can be violated by data mining results and introduce an approach to limit privacy breaches. We experiment it by using the adult dataset from the UCI KDD archive. We report the experimental results which show its effectiveness.
Proposal for Improve the Electrical Power Supply in Port Sudan Town
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.91-100
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This study discusses the lack of electrical power generation at Port Sudan (Sudan) and suggests solution to this problem. Information on the existing power plant and the grid at the town was analyzed, in addition to estimation of the power demand on the current grid and its future expansion for ten years were made. Different economical measures such as annual, internal and external rate of return were taken and the economical feasibility is proven to be within standard prescribed measures.
An Efficient Decision Feedback Equalizer Combining the LDPC Code in Cellular Relay System
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.42 2012.05 pp.101-110
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, a repeater system is studied which is basically used for the relay in the cellular communication. The LDPC (Low Density Parity Check) code is introduced into DFE (decision feedback equalizer) in the receiver for the BER (bit error rate) performance. For the better quality of service (QoS) and the higher convenience, the wireless repeater was considered for the relay system. In this paper, we propose an efficient equalizer algorithm for the cellular relay system, which uses the DFE combining the LDPC code. The proposed equalizer helps to compensate RF impairments and improve better performance than used independently. In addition, proposed equalizer has less iterative number of LDPC code. So, the proposed equalizer system has low complexity. Therefore, in this paper, BER performance of DFE combining the LDPC code for cellular relay system is satisfied with 4.3dB at 10-4.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.