Intracranial hemorrhage refers to bleeding that occurs within the skull. Several factors have been attributed to the mortality of posterior fossa hemorrhage, including clinical presentations such as Glascow coma scale, obstructive hydrocephalus, imaging features such as hematoma size, intraventricular hemorrhage, brain stem compression, and combined factor such as ICH score. First, this study attempts to identify the most influential factor combinations to explore mortality of posterior fossa hemorrhage. We will adopt appropriate algorithms to cluster the data so that the patient data with similar features are appropriately clustered. And we will build a corresponding prediction model for each cluster data to construct a multiple prediction classifier.
{"title":"To explore mortality of posterior fossa hemorrhage with artificial intelligence approach","authors":"Hui-Chu Chiu, Yao-Hsien Lee, Chih-Wei Wang, Deng-Yiv Chiu, C. Juan, Wei-Jun Chang","doi":"10.1109/ICAWST.2017.8256524","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256524","url":null,"abstract":"Intracranial hemorrhage refers to bleeding that occurs within the skull. Several factors have been attributed to the mortality of posterior fossa hemorrhage, including clinical presentations such as Glascow coma scale, obstructive hydrocephalus, imaging features such as hematoma size, intraventricular hemorrhage, brain stem compression, and combined factor such as ICH score. First, this study attempts to identify the most influential factor combinations to explore mortality of posterior fossa hemorrhage. We will adopt appropriate algorithms to cluster the data so that the patient data with similar features are appropriately clustered. And we will build a corresponding prediction model for each cluster data to construct a multiple prediction classifier.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132552312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAWST.2017.8256460
Yi-Chi Tsai, Kun-Wei Lin
In this study we have fabricated a hydrogen detection device based on semiconductor type with the advantages of smaller in size, higher sensitivity and capable to operate under room temperature. We have also demonstrated an improvement by applying back propagation neuron network to the system in order to minimize the amount of data transmission without influencing data quality. In the practical situation that monitoring the designate sites requires multiple sensing and wireless data transmission. Such function requires massive data transmission volume and would normally result higher power consumption and data lost in transmission. This study has developed a self-made hydrogen detection device and applied neuron network to assist the real time detection system deducing transmission volume. The empirical result has successfully reduced 97.4% of the transmitted data without sacrificing the original data quality. Which suggested an effective methodology to reduce data transmission volume requirement and conserve detection device power usage.
{"title":"Application of back propagation neuron network on data linkage transmission of semiconductor hydrogen detection device","authors":"Yi-Chi Tsai, Kun-Wei Lin","doi":"10.1109/ICAWST.2017.8256460","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256460","url":null,"abstract":"In this study we have fabricated a hydrogen detection device based on semiconductor type with the advantages of smaller in size, higher sensitivity and capable to operate under room temperature. We have also demonstrated an improvement by applying back propagation neuron network to the system in order to minimize the amount of data transmission without influencing data quality. In the practical situation that monitoring the designate sites requires multiple sensing and wireless data transmission. Such function requires massive data transmission volume and would normally result higher power consumption and data lost in transmission. This study has developed a self-made hydrogen detection device and applied neuron network to assist the real time detection system deducing transmission volume. The empirical result has successfully reduced 97.4% of the transmitted data without sacrificing the original data quality. Which suggested an effective methodology to reduce data transmission volume requirement and conserve detection device power usage.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"2007 15","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134475135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAWST.2017.8256476
Koichi Sato, Junbo Wang, Zixue Cheng
There is a high demand for observation of events of public concern in a real time manner by analyzing Big Data. Twitter is a suitable data resource for event detection due to amount of data/users in the Twitter system, and high frequency of data generation. The possibility of event detection by tweets has been proved by a lot of researches. However it still has the following two problems. The first problem is the reliability of information, since tweets are always very noisy and fake information appears in them. The second problem is the lack of enough information for each tweet. It is because a tweet is restricted to 140 letters, so that it can not describe much information. One possible solution is to retrieve additional information, which is related to a Twitter based event detection result, from heterogeneous data resources such as articles, Web Pages, blog posts etc. If the information is retrieved, it can be used to validate the detection result and also provide as further information to enhance the detection result. However properly retrieving related contents from heterogeneous data resources is not easy because of different types of data. To solve the above problem, we propose a method to retrieve additional information related to a set of tweets, which is detected as an event, from heterogeneous data resources by measuring similarity (distance) between them with Normalized Compression Distance. We mainly consider articles in the web as the additional information for Twitter based event detection, since they are well validated and edited. We evaluate the proposed method in experiments, and the results show that it has high anti-noise capability and performs well in practical situation.
{"title":"Design of a method to support Twitter based event detection with heterogeneous data resources","authors":"Koichi Sato, Junbo Wang, Zixue Cheng","doi":"10.1109/ICAWST.2017.8256476","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256476","url":null,"abstract":"There is a high demand for observation of events of public concern in a real time manner by analyzing Big Data. Twitter is a suitable data resource for event detection due to amount of data/users in the Twitter system, and high frequency of data generation. The possibility of event detection by tweets has been proved by a lot of researches. However it still has the following two problems. The first problem is the reliability of information, since tweets are always very noisy and fake information appears in them. The second problem is the lack of enough information for each tweet. It is because a tweet is restricted to 140 letters, so that it can not describe much information. One possible solution is to retrieve additional information, which is related to a Twitter based event detection result, from heterogeneous data resources such as articles, Web Pages, blog posts etc. If the information is retrieved, it can be used to validate the detection result and also provide as further information to enhance the detection result. However properly retrieving related contents from heterogeneous data resources is not easy because of different types of data. To solve the above problem, we propose a method to retrieve additional information related to a set of tweets, which is detected as an event, from heterogeneous data resources by measuring similarity (distance) between them with Normalized Compression Distance. We mainly consider articles in the web as the additional information for Twitter based event detection, since they are well validated and edited. We evaluate the proposed method in experiments, and the results show that it has high anti-noise capability and performs well in practical situation.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAWST.2017.8256428
Asma Rosyidah, I. Surjandari
As the need of people towards internet is increasing, fixed broadband market is growing. The growth of the market leads to bigger opportunity for provider in penetrating the market and gaining new customers. To penetrate the market, fixed broadband provider needs to make big investment in building and upgrading the network infrastructures as it offers more stability in service through the network configuration. Thus, it is important for fixed broadband provider to analyze its historical data to know which location it should choose and prioritize. Supporting the need of provider, this study was conducted to explore spatially the trends and emerging hot spots of customer acquisition through geographical information system based data of customer order. The research was conducted using spatio-temporal analysis on space time cube created from the data. The results show that the overall trend of number of customer acquisition is increasing and the emerging hot spots happen in the northern area of this study scoped region. The results of this research visualize the trends and emerging hot spots in the form of thematic map.
{"title":"Spatio-temporal analysis of fixed broadband customer acquisition","authors":"Asma Rosyidah, I. Surjandari","doi":"10.1109/ICAWST.2017.8256428","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256428","url":null,"abstract":"As the need of people towards internet is increasing, fixed broadband market is growing. The growth of the market leads to bigger opportunity for provider in penetrating the market and gaining new customers. To penetrate the market, fixed broadband provider needs to make big investment in building and upgrading the network infrastructures as it offers more stability in service through the network configuration. Thus, it is important for fixed broadband provider to analyze its historical data to know which location it should choose and prioritize. Supporting the need of provider, this study was conducted to explore spatially the trends and emerging hot spots of customer acquisition through geographical information system based data of customer order. The research was conducted using spatio-temporal analysis on space time cube created from the data. The results show that the overall trend of number of customer acquisition is increasing and the emerging hot spots happen in the northern area of this study scoped region. The results of this research visualize the trends and emerging hot spots in the form of thematic map.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134239826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAWST.2017.8256425
Yuching Lu, G. Chakraborty, T. Lu
In normal Steganography, the main motivation is to maintain high quality of the stego image, so that one is not suspicious that there is a hidden image. At times, it is important that the hidden image quality needs to be maintained after recovery. How to achieve high quality of hidden image is the motivation of this work. To solve this problem, before the hiding procedure, pixels of the secret image are analyzed to generate the optimum code book. Most frequently occurring pixel value is encoded with the shortest code to minimize stego-image distortion. For evaluation, we not only tested the distortion of simple hidden images like a logo, but also high resolution images. Using the proposed method, PSNR value of more than 45.6 db for the stedo-image was achieved even for high resolution hidden image. Secret image PSNR after recovery was 50 db or more. We could conclude that the proposed method can yield good results regardless of the type of hidden image.
{"title":"Hidden content quality aware stego-image hiding method using re-encoding strategy","authors":"Yuching Lu, G. Chakraborty, T. Lu","doi":"10.1109/ICAWST.2017.8256425","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256425","url":null,"abstract":"In normal Steganography, the main motivation is to maintain high quality of the stego image, so that one is not suspicious that there is a hidden image. At times, it is important that the hidden image quality needs to be maintained after recovery. How to achieve high quality of hidden image is the motivation of this work. To solve this problem, before the hiding procedure, pixels of the secret image are analyzed to generate the optimum code book. Most frequently occurring pixel value is encoded with the shortest code to minimize stego-image distortion. For evaluation, we not only tested the distortion of simple hidden images like a logo, but also high resolution images. Using the proposed method, PSNR value of more than 45.6 db for the stedo-image was achieved even for high resolution hidden image. Secret image PSNR after recovery was 50 db or more. We could conclude that the proposed method can yield good results regardless of the type of hidden image.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131189198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAWST.2017.8256487
S. Horng, Shieh-Shing Lin
In this work, a two-stage approach is proposed for solving a class of Quadratic programming Problems containing Continuous and Discrete control variables (QPCD). In the firststage, a heuristic search technique was used to choose N excellent solutions from entire solution space. In the second-stage, the sensitivity theory was utilized to evaluate the N excellent solutions and pick the top S solutions to build the candidate subset. These S candidate solutions in the candidate subset were evaluated using the exact model. The Ordinal Optimization theory showed that the optimal solution chosen from candidate subset belongs to the good enough solution with high probability. The proposed approach was compared with the traditional Lagrange relaxing method for solving the IEEE 30-bus power systems. The performances were evaluated by two compared indexes, Time Reducing Index and Objective value Reducing Index. Test results demonstrate that the proposed approach outperforms the traditional Lagrange relaxing method.
{"title":"Apply ordinal optimization to solve the quadratic programming problems","authors":"S. Horng, Shieh-Shing Lin","doi":"10.1109/ICAWST.2017.8256487","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256487","url":null,"abstract":"In this work, a two-stage approach is proposed for solving a class of Quadratic programming Problems containing Continuous and Discrete control variables (QPCD). In the firststage, a heuristic search technique was used to choose N excellent solutions from entire solution space. In the second-stage, the sensitivity theory was utilized to evaluate the N excellent solutions and pick the top S solutions to build the candidate subset. These S candidate solutions in the candidate subset were evaluated using the exact model. The Ordinal Optimization theory showed that the optimal solution chosen from candidate subset belongs to the good enough solution with high probability. The proposed approach was compared with the traditional Lagrange relaxing method for solving the IEEE 30-bus power systems. The performances were evaluated by two compared indexes, Time Reducing Index and Objective value Reducing Index. Test results demonstrate that the proposed approach outperforms the traditional Lagrange relaxing method.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127654317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAWST.2017.8256505
Zhang Lin, Lin Xu, Fuquan Zhang
This paper based on the existential difficulties on setting up network in medical field's calling system. The difficulties included calling delay and the large costs in both installation and maintenance. In this paper, integrate the circuits of blood pressure, heart rate, temperature measurement, the embedded ARM core and communication. Based on experiment, developed acquisition and transmission system, it can collect and transmit the data of vital signs. With this system, people can measure their vital signs just at home, such as blood pressure, heart rate, temperature, and so on. What's more, they can send the results to network to some medical institutions, let them consult timely. This system based on ARM series processor. The control core is S3C2440, the control terminal screen is TFT colored LCD screen and the wireless transmitter is GPRS module. Computers are used as the wireless medical monitoring system.
{"title":"Based on ARM wireless intelligent control system for vital-sign monitoring","authors":"Zhang Lin, Lin Xu, Fuquan Zhang","doi":"10.1109/ICAWST.2017.8256505","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256505","url":null,"abstract":"This paper based on the existential difficulties on setting up network in medical field's calling system. The difficulties included calling delay and the large costs in both installation and maintenance. In this paper, integrate the circuits of blood pressure, heart rate, temperature measurement, the embedded ARM core and communication. Based on experiment, developed acquisition and transmission system, it can collect and transmit the data of vital signs. With this system, people can measure their vital signs just at home, such as blood pressure, heart rate, temperature, and so on. What's more, they can send the results to network to some medical institutions, let them consult timely. This system based on ARM series processor. The control core is S3C2440, the control terminal screen is TFT colored LCD screen and the wireless transmitter is GPRS module. Computers are used as the wireless medical monitoring system.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"260 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121145522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we proposed a system which can detect the skin condition such as wrinkles, skin pores and acnes on smartphone using multi-feature decision method. After the user inputs the facial image into our system, the system will conduct the image preprocessing in the first place, then divide the face into 11 regions for doing the next stage of detection. Next, our system will detect the following different kinds of skin conditions: wrinkles, skin pores, and acnes using our multi-feature decision method based on Laws mask, Gabor filter and Kirsch filter. At last, after users receiving their personal results, they will not only find out their skin condition but also get the appropriate and customized suggestions to take care of their skin.
{"title":"Skin condition detection of smartphone face image using multi-feature decision method","authors":"Chiun-Li Chin, Guei-Ru Wu, Tzu-Chieh Weng, Yun-Yun Kang, Bing-Jhang Lin, Ho-Feng Chen","doi":"10.1109/ICAWST.2017.8256483","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256483","url":null,"abstract":"In this paper, we proposed a system which can detect the skin condition such as wrinkles, skin pores and acnes on smartphone using multi-feature decision method. After the user inputs the facial image into our system, the system will conduct the image preprocessing in the first place, then divide the face into 11 regions for doing the next stage of detection. Next, our system will detect the following different kinds of skin conditions: wrinkles, skin pores, and acnes using our multi-feature decision method based on Laws mask, Gabor filter and Kirsch filter. At last, after users receiving their personal results, they will not only find out their skin condition but also get the appropriate and customized suggestions to take care of their skin.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121355471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAWST.2017.8256530
Chin-Ling Chen, Yung-Wen Tang, N. Zhang, J. Shin
In recent years, neurofeedback training becomes a gradual non-pharmacological treatment trend for attention-deficit/ hyperactivity disorder (ADHD) to improve attention. In this study, we design a 3D game to improve and assess children with ADHD. We observed the brainwave change to integrate computer game training to explore the impact of training on children. In the process of the training, children can learn to focus and relax. And then children can further to control attention and meditation, helping to improve the efficiency of their learning and inhibit the frequency of ADHD symptoms. After training, we record these data and analyze the parameters and brainwave status. In addition, we found the progress obviously on children with ADHD through the game training. The prosed scheme can give a feedback and improve children's attention and meditation significantly.
{"title":"Neurofeedback based attention training for children with ADHD","authors":"Chin-Ling Chen, Yung-Wen Tang, N. Zhang, J. Shin","doi":"10.1109/ICAWST.2017.8256530","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256530","url":null,"abstract":"In recent years, neurofeedback training becomes a gradual non-pharmacological treatment trend for attention-deficit/ hyperactivity disorder (ADHD) to improve attention. In this study, we design a 3D game to improve and assess children with ADHD. We observed the brainwave change to integrate computer game training to explore the impact of training on children. In the process of the training, children can learn to focus and relax. And then children can further to control attention and meditation, helping to improve the efficiency of their learning and inhibit the frequency of ADHD symptoms. After training, we record these data and analyze the parameters and brainwave status. In addition, we found the progress obviously on children with ADHD through the game training. The prosed scheme can give a feedback and improve children's attention and meditation significantly.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132534145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/ICAWST.2017.8256520
Yung-Fu Huang, Ming-Wei Weng, Ching-Chang Lee, H. Huang
This purpose of the research presented in this article is to examine an imperfect production system with shortages. The method to carry out the deterioration process was using the Markov chain is a discrete-time process. We also prove that the model has a unique optimal lot size. In search of the bounds for the optimal lot size by mean of the proposed algorithm. Computational results using created data instances are presented to illustrate the performance of our proposed model. It is shown that significant cost savings can be achieved by our model. Therefore, our proposed model shows better performance than previous production lot size models by incorporating the effects of system deterioration, corrective maintenance and considering allowable shortages on lot sizing policies. Furthermore, sensitivity analysis of optimal solution with respect to the effects of the model parameters is also carried out.
{"title":"An economic production quantity model with imperfect production processes and corrective maintenance under allowable shortages","authors":"Yung-Fu Huang, Ming-Wei Weng, Ching-Chang Lee, H. Huang","doi":"10.1109/ICAWST.2017.8256520","DOIUrl":"https://doi.org/10.1109/ICAWST.2017.8256520","url":null,"abstract":"This purpose of the research presented in this article is to examine an imperfect production system with shortages. The method to carry out the deterioration process was using the Markov chain is a discrete-time process. We also prove that the model has a unique optimal lot size. In search of the bounds for the optimal lot size by mean of the proposed algorithm. Computational results using created data instances are presented to illustrate the performance of our proposed model. It is shown that significant cost savings can be achieved by our model. Therefore, our proposed model shows better performance than previous production lot size models by incorporating the effects of system deterioration, corrective maintenance and considering allowable shortages on lot sizing policies. Furthermore, sensitivity analysis of optimal solution with respect to the effects of the model parameters is also carried out.","PeriodicalId":378618,"journal":{"name":"2017 IEEE 8th International Conference on Awareness Science and Technology (iCAST)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130495524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}