Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 50 of 50

Full-Text Articles in Social and Behavioral Sciences

Feature Subset Selection For Multi-Class Svm Based Image Classification, Lei Wang Jan 2007

Feature Subset Selection For Multi-Class Svm Based Image Classification, Lei Wang

Faculty of Engineering and Information Sciences - Papers: Part A

Multi-class image classification can benefit much from feature subset selection. This paper extends an error bound of binary SVMs to a feature subset selection criterion for the multi-class SVMs. By minimizing this criterion, the scale factors assigned to each feature in a kernel function are optimized to identify the important features. This minimization problem can be efficiently solved by gradient-based search techniques, even if hundreds of features are involved. Also, considering that image classification is often a small sample problem, the regularization issue is investigated for this criterion, showing its robustness in this situation. Experimental study on multiple benchmark image …


Triples In Table Tennis: A Promising New Team Competition Sport - “Introduction And First Findings”, Guenter Arndt Jan 2007

Triples In Table Tennis: A Promising New Team Competition Sport - “Introduction And First Findings”, Guenter Arndt

Faculty of Engineering and Information Sciences - Papers: Part B

A new form of table tennis is presented, with teams of three players playing each other. Apart from recreational applications it is seen as the ultimate test of combined team strength in team competitions, where presently teams never face each other as a team. With 3-player teams now competing in the 2008 Olympics, the new game presents a timely and relevant new table tennis possibility.

Some salient points from a comprehensive textbook on “Table Tennis Triples”, covering the rationale for the new game, its equipment, rules, game plans, umpiring, and possible integration into existing table tennis events [1] are presented. …


Table Tennis Triples, A New Team Sport - Theory, Equipment, Rules, Strategies And Future Possibilities Of A New Form Of Table Tennis, Guenter Arndt Jan 2007

Table Tennis Triples, A New Team Sport - Theory, Equipment, Rules, Strategies And Future Possibilities Of A New Form Of Table Tennis, Guenter Arndt

Faculty of Engineering and Information Sciences - Papers: Part B

Most existing table tennis teams never play each other as a team. "Triples" for the first time allows three-person teams to play "serious" table tennis. The book explains its rationale, equipment and its manufacture, its rules, and its integration into existing table tennis events. It strives to enhance the already popular image of table tennis by adding a "true team sport" to its repertoire, thereby increasing its player, spectator and media appeal. Part 1 establishes the theoretical basis of Triples and provides detailed information on the design and manufacture of its hardware. In analysing its geometrical and physical aspects, it …


Watermarking Protocol Of Secure Verification, Jun Zhang, Weidong Kou, Kai Fan, Lei Ye Jan 2007

Watermarking Protocol Of Secure Verification, Jun Zhang, Weidong Kou, Kai Fan, Lei Ye

Faculty of Engineering and Information Sciences - Papers: Part A

The secure verification is important for watermarking protocols. A malicious arbitrator is able to remove an original watermark from an unauthorized copy of the digital content as a result of a security breach in the phase of arbitration and resell multiple copies of it with impunity. We propose a novel buyer-seller watermarking protocol of secure verification. In this scheme, a seller permutes an original watermark provided by a trusted Watermarking Certification Authority (WCA) and embeds it into digital content in an encrypted domain. In case an unauthorized copy is found, the seller can recover the original watermark from the watermark …


Turbulent Transfer Mechanism In Sediment-Laden Flow, Shu-Qing Yang Jan 2007

Turbulent Transfer Mechanism In Sediment-Laden Flow, Shu-Qing Yang

Faculty of Engineering and Information Sciences - Papers: Part A

Characteristics of turbulent flows in rivers can be significantly modified because of the presence of sediment particles and secondary currents/nonuniformity. This paper investigates why the measured vertical distributions of velocity deviate from the log law. In contrast to previous research that attributed the deviation to Richardson number only, this study demonstrates that like Reynolds shear stress (−equation image), momentum flux (uv) caused by the nonzero wall-normal velocity v is also responsible for these deviations. Starting from Reynolds equations, this paper shows that the classical log law can be obtained only when v = 0; otherwise the velocity v results in …


Discussion, Raymond Chambers Jan 2007

Discussion, Raymond Chambers

Faculty of Engineering and Information Sciences - Papers: Part A

Discussion on Bjornstad, J.F. 2007, "Non-Bayesian Multiple Imputation", Journal of Official Statistics, vol. 23, no. 4, pp. 433.


Integrating Rfid Technology And Epc Network Into A B2b Retail Supply Chain: A Step Toward Intelligent Business Processes, Samuel Fosso Wamba, Louis A. Lefebvre, Elisabeth Lefebvre Jan 2007

Integrating Rfid Technology And Epc Network Into A B2b Retail Supply Chain: A Step Toward Intelligent Business Processes, Samuel Fosso Wamba, Louis A. Lefebvre, Elisabeth Lefebvre

Faculty of Engineering and Information Sciences - Papers: Part A

This article introduces RFID technology and the EPC Network and investigates their potential for B-to-B eCommerce supply chain management. Based on empirical data gathered from four tightly interrelated firms from three layers of a supply chain, several scenarios integrating RFID and the EPC Network have been tested and evaluated. In the context of warehousing activities in one specific retail supply chain, the results indicate that i) the business process approach seems quite appropriate to capture the real potential of RFID and the EPC Network; ii) RFID technology and the EPC Network can improve the "shipping" and the "receiving" processes; iii) …


Orientation Effect On Mechanical Properties Of Commercially Pure Titanium At Room Temperature, M Battaini, E V. Pereloma, Christopher Davies Jan 2007

Orientation Effect On Mechanical Properties Of Commercially Pure Titanium At Room Temperature, M Battaini, E V. Pereloma, Christopher Davies

Faculty of Engineering and Information Sciences - Papers: Part A

The effect of sample orientation on the mechanical properties of commercially pure (CP) titanium plate with a transverse split basal texture was investigated at room temperature (RT) using plane strain compression (PSC). A large variation in flow stress of up to (EBSD) and calculating Schmid factors for all important slip and twinning modes. Importantly, the Schmid factors were calculated for all orientations in Euler space because there are significant variations over all orientations for the PSC stress state, unlike uniaxial compression or tension. The Schmid factor analysis and twin data for the wide variety of orientations tested enabled the conclusion …


Properties Preserved Under Morita Equivalence Of C*-Algebras, Astrid An Huef, Iain Raeburn, Dana Williams Jan 2007

Properties Preserved Under Morita Equivalence Of C*-Algebras, Astrid An Huef, Iain Raeburn, Dana Williams

Faculty of Engineering and Information Sciences - Papers: Part A

We show that important structural properties of C*-algebras and the muliplicity numbers of representations are preserved under Morita equivalence.


Influence Of Microalloying Precipitates On Bauschinger Effect During Uoe Forming Of Line Pipe Steels, Andrii Kostryzhev, Martin Strangwood, Claire L. Davis Jan 2007

Influence Of Microalloying Precipitates On Bauschinger Effect During Uoe Forming Of Line Pipe Steels, Andrii Kostryzhev, Martin Strangwood, Claire L. Davis

Faculty of Engineering and Information Sciences - Papers: Part A

Large diameter steel line pipes are generally produced by cold deforming hot rolled or thermomechanically controlled rolled (TMCR) plate by the three-stage 'UOE' process. Pipe strength has been found to increase or decrease relative to the plate, depending on the steel grade and plate processing history. The strength increase is due to work hardening whereas any decrease in strength arises from the Bauschinger effect due to the reverse cold deformation of the UOE process. The steel chemistry, through the presence of strengthening microalloy precipitates, and prior processing, through the size and distribution of microalloy precipitates and the presence of retained …


Evolution Analysis Of Iterative Lmmse-App Detection For Coded Linear System With Cyclic Prefixes, Xiaojun Yuan, Qinghua Guo, Li Ping Jan 2007

Evolution Analysis Of Iterative Lmmse-App Detection For Coded Linear System With Cyclic Prefixes, Xiaojun Yuan, Qinghua Guo, Li Ping

Faculty of Engineering and Information Sciences - Papers: Part A

This paper is concerned with the iterative detection principles for coded linear systems with cyclic prefixes. We derive a matrix-form low-cost fast Fourier transform (FFT) based iterative LMMSE-APP detector and propose an evolution technique for the performance evaluation of the proposed detector. Numerical results show a good match between simulation and evolution prediction. ©2007 IEEE.


Contact Element Method With Two Relative Coordinates And Its Application To Prediction Of Strip Profile Of A Sendzimir Mill, Hai-Liang Yu, Xiang-Hua Liu, Gyoo-Taek Lee Jan 2007

Contact Element Method With Two Relative Coordinates And Its Application To Prediction Of Strip Profile Of A Sendzimir Mill, Hai-Liang Yu, Xiang-Hua Liu, Gyoo-Taek Lee

Faculty of Engineering and Information Sciences - Papers: Part A

A new numerical method, Contact Element Method with Two Relative Coordinates, has been developed. The main features of this method are that element meshing depends on the contact length between rolls or between the work roll and the strip, and that each element has two relative coordinates based on two separate contact objects. With this method, a program code “Setup Models for Sendzimir Mill” (SM4SM) has been developed for prediction of the strip profile of a 20-high Sendzimir mill with double AS-U-Roll systems. The strip profiles are predicted under various rolling conditions, such as the positions of AS-U racks, the …


Strategic Analysis Adaptation Assessment: An Alternative To The Storyline Scenario, Susan Krumdieck, Mohammed Imroz Sohel Jan 2007

Strategic Analysis Adaptation Assessment: An Alternative To The Storyline Scenario, Susan Krumdieck, Mohammed Imroz Sohel

Faculty of Engineering and Information Sciences - Papers: Part A

Scenarios of future trends are widely used by government and international agencies to inform decision-making. While story line scenarios may be useful for business or government thinking, they are not effective at informing engineering research, innovation and design, and add very little to the understanding of sustainability. This paper presents a strategic analysis approach to complex systems, which relies on identification of risks to important activities and wellbeing. This method mimics the actual processes of anthropogenic continuity, where people explore, experiment, learn from success and mistakes, and adapt and evolve. The method is applied to the case study of transportation …


Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong Jan 2007

Further Discussions On The Security Of A Nominative Signature Scheme, Lifeng Guo, Guilin Wang, Duncan S. Wong

Faculty of Engineering and Information Sciences - Papers: Part A

A nominative signature scheme allows a nominator (or signer) and a nominee (or veri¯er) to jointly generate and publish a signature in such a way that only the nominee can verify the signature and if nec- essary, only the nominee can prove to a third party that the signature is valid. In a recent work, Huang and Wang proposed a new nominative signature scheme which, in addition to the above properties, only allows the nominee to convert a nominative signature to a publicly veri¯able one. In ACISP 2005, Susilo and Mu presented several algorithms and claimed that these algorithms can …


Searchsleuth: The Conceptual Neighbourhood Of An Web Query, Jon Ducrou, Peter Eklund Jan 2007

Searchsleuth: The Conceptual Neighbourhood Of An Web Query, Jon Ducrou, Peter Eklund

Faculty of Engineering and Information Sciences - Papers: Part A

This paper presents SearchSleuth, a program developed to experiment with a form of automatic local analysis that extends the standard Web search interface to include a conceptual neighbourhood focused on a formal concept derived from the query. The conceptual neighbourhood is displayed with upper neighbours representative of a generalisation operation, and lower neighbours representative of a specialisation operation. SearchSleuth also introduces a notion of a categorisation operation, where the conceptual focus can shift to a sibling concept of the search concept.


Reliability Of Fault-Tolerant Systems With Parallel Task Processing, Gregory Levitin, Min Xie, Tieling Zhang Jan 2007

Reliability Of Fault-Tolerant Systems With Parallel Task Processing, Gregory Levitin, Min Xie, Tieling Zhang

Faculty of Engineering and Information Sciences - Papers: Part A

The paper considers performance and reliability of fault-tolerant software running on a hardware system that consists of multiple processing units. The software consists of functionally equivalent but independently developed versions that start execution simultaneously. The computational complexity and reliability of different versions are different. The system completes the task execution when the outputs of a pre-specified number of versions coincide. The processing units are characterized by different availability and processing speed. It is assumed that they are able to share the computational burden perfectly and that execution of each version can be fully parallelized. The algorithm based on the universal …


The Ofdm-Idma Approach To Wireless Communication Systems, Li Ping, Qinghua Guo, Jun Tong Jan 2007

The Ofdm-Idma Approach To Wireless Communication Systems, Li Ping, Qinghua Guo, Jun Tong

Faculty of Engineering and Information Sciences - Papers: Part A

This article outlines the basic principles of OFDM-IDMA. Comparisons with other alternative technologies such as OFDM-CDMA and OFDMA are provided. Some attractive features of OFMD-IDMA are explained, including low-cost iterative multi-user detection, flexible rate adaptation, frequency diversity, and significant advantages regarding spectral and power efficiency. © 2007 IEEE.


Performance Comparison Of Subtractive Resistive Readout With Conventional Resistive Readout For A High-Resolution Compact Gamma Camera, Y J. Qi, M J. Zhang, C L. Zhao, R F. Wojcik Jan 2007

Performance Comparison Of Subtractive Resistive Readout With Conventional Resistive Readout For A High-Resolution Compact Gamma Camera, Y J. Qi, M J. Zhang, C L. Zhao, R F. Wojcik

Faculty of Engineering and Information Sciences - Papers: Part A

The purpose of this study was to investigate an optimal readout for a high-resolution compact gamma camera with maximum performance in crystal element identifications. The compact camera is based on a pixellated Nal(Tl) crystal with 1.2 mm pixel size coupled to a 5" Hamamatsu R3292 PSPMT. A conventional resistive-chain readout was initially developed for the camera. Then a novel subtractive resistive readout developed was utilized to optimize the performance of the camera. The performance of the camera was evaluated by raw flood images of a 137Cs source. The results show that the conventional resistive readout results in a significant shrinkage …


On The Performance Of Short Forward Error-Correcting Codes, Sheng Tong, Dengsheng Lin, Aleksandar Kavcic, Li Ping, Baoming Bai Jan 2007

On The Performance Of Short Forward Error-Correcting Codes, Sheng Tong, Dengsheng Lin, Aleksandar Kavcic, Li Ping, Baoming Bai

Faculty of Engineering and Information Sciences - Papers: Part A

This letter investigates the performance of short forward error-correcting (FEC) codes. Reed-Solomon (RS) codes and concatenated zigzag codes are chosen as representatives of classical algebraic codes and modern simple iteratively decodable codes, respectively. Additionally, random binary linear codes are used as a baseline reference. Our main results (demonstrated by simulations and ensemble distance spectrum analysis) are as follows: 1) Short RS codes are as good as random binary linear codes; 2) Carefully designed short low-density parity-check (LDPC) codes are almost as good as random binary linear codes; 3) Low complexity belief propagation decoders incur considerable performance loss at short coding …


On Short Forward Error-Correcting Codes For Wireless Communication Systems, Sheng Tong, Dengsheng Lin, Aleksandar Kavcic, Baoming Bai, Li Ping Jan 2007

On Short Forward Error-Correcting Codes For Wireless Communication Systems, Sheng Tong, Dengsheng Lin, Aleksandar Kavcic, Baoming Bai, Li Ping

Faculty of Engineering and Information Sciences - Papers: Part A

For real-time wireless communications, short forward error-correcting (FEC) codes are indispensable due to the strict delay requirement. In this paper we study the performance of short FEC codes. Reed-Solomon (RS) codes and concatenated zigzag (CZ) codes are chosen as representatives of classical algebraic codes and modern simple iterative decodable codes, respectively. Additionally, we use random binary linear codes as a baseline reference for comparison. Our main results (demonstrated by both simulation and ensemble distance spectrum analysis) are as follows: 1) Short RS codes are as good as random binary linear codes; 2) Carefully designed short low- density parity-check (LDPC) codes …