Abstract: Evolvable Hardware (EHW) has been regarded as adaptive system acquired by wide application market. Consumer market of any good requires diversity to satisfy consumers- preferences. Adaptation of EHW is a key technology that could provide individual approach to every particular user. This situation raises a question: how to set target for evolutionary algorithm? The existing techniques do not allow consumer to influence evolutionary process. Only designer at the moment is capable to influence the evolution. The proposed consumer-triggered evolution overcomes this problem by introducing new features to EHW that help adaptive system to obtain targets during consumer stage. Classification of EHW is given according to responsiveness, imitation of human behavior and target circuit response. Home intelligent water heating system is considered as an example.
Abstract: Mobile WiMAX is a broadband wireless solution that
enables convergence of mobile and fixed broadband networks
through a common wide area broadband radio access technology and
flexible network architecture. It adopts Orthogonal Frequency
Division Multiple Access (OFDMA) for improved multi-path
performance in Non-Line-Of-Sight (NLOS) environments. Scalable
OFDMA (SOFDMA) is introduced in the IEEE 802e[1]. WIMAX
system uses one of different types of channel coding but The
mandatory channel coding scheme is based on binary nonrecursive
Convolutional Coding (CC). There are other several optional channel
coding schemes such as block turbo codes, convolutional turbo
codes, and low density parity check (LDPC).
In this paper a comparison between the performance of WIMAX
using turbo code and using convolutional product code (CPC) [2] is
made. Also a combination between them had been done. The CPC
gives good results at different SNR values compared to both the
turbo system, and the combination between them. For example, at
BER equal to 10-2 for 128 subcarriers, the amount of improvement
in SNR equals approximately 3 dB higher than turbo code and equals
approximately 2dB higher than the combination respectively. Several
results are obtained at different modulating schemes (16QAM and
64QAM) and different numbers of sub-carriers (128 and 512).
Abstract: In this paper DJess is presented, a novel distributed production system that provides an infrastructure for factual and procedural knowledge sharing. DJess is a Java package that provides programmers with a lightweight middleware by which inference systems implemented in Jess and running on different nodes of a network can communicate. Communication and coordination among inference systems (agents) is achieved through the ability of each agent to transparently and asynchronously reason on inferred knowledge (facts) that might be collected and asserted by other agents on the basis of inference code (rules) that might be either local or transmitted by any node to any other node.
Abstract: The objective of this study is to evaluate the threshold
stress of the clay with sand subgrade soil. Threshold stress can be
defined as the stress level above which cyclic loading leads to
excessive deformation and eventual failure. The thickness
determination of highways formations using the threshold stress
approach is a more realistic assessment of the soil behaviour because
it is subjected to repeated loadings from moving vehicles. Threshold
stress can be evaluated by plastic strain criterion, which is based on
the accumulated plastic strain behaviour during cyclic loadings [1].
Several conditions of the all-round pressure the subgrade soil namely,
zero confinement, low all-round pressure and high all-round pressure
are investigated. The threshold stresses of various soil conditions are
determined. Threshold stress of the soil are 60%, 31% and 38.6% for
unconfined partially saturated sample, low effective stress saturated
sample, high effective stress saturated sample respectively.
Abstract: Steganography, derived from Greek, literally means
“covered writing". It includes a vast array of secret communications
methods that conceal the message-s very existence. These methods
include invisible inks, microdots, character arrangement, digital
signatures, covert channels, and spread spectrum communications.
This paper proposes a new improved version of Least Significant Bit
(LSB) method. The approach proposed is simple for implementation
when compared to Pixel value Differencing (PVD) method and yet
achieves a High embedding capacity and imperceptibility. The
proposed method can also be applied to 24 bit color images and
achieve embedding capacity much higher than PVD.
Abstract: In this paper we study the resource allocation problem
for an OFDMA based cooperative two-way relaying (TWR) network.
We focus on amplify and forward (AF) analog network coding
(ANC) protocol. An optimization problem for two basic resources
namely, sub-carrier and power is formulated for multi-user TWR
networks. A joint optimal optimization problem is investigated and
two-step low complexity sub-optimal resource allocation algorithm is
proposed for multi-user TWR networks with ANC protocol. The
proposed algorithm has been evaluated in term of total achievable
system sum-rate and achievable individual sum-rate for each userpair.
The good tradeoff between system sum-rate and fairness is
observed in the two-step proportional resource allocation scheme.
Abstract: In this paper, we propose a novel fast search algorithm for short MPEG video clips from video database. This algorithm is based on the adjacent pixel intensity difference quantization (APIDQ) algorithm, which had been reliably applied to human face recognition previously. An APIDQ histogram is utilized as the feature vector of the frame image. Instead of fully decompressed video frames, partially decoded data, namely DC images are utilized. Combined with active search [4], a temporal pruning algorithm, fast and robust video search can be realized. The proposed search algorithm has been evaluated by 6 hours of video to search for given 200 MPEG video clips which each length is 15 seconds. Experimental results show the proposed algorithm can detect the similar video clip in merely 80ms, and Equal Error Rate (ERR) of 3 % is achieved, which is more accurately and robust than conventional fast video search algorithm.
Abstract: In this paper the effect of faults in the elements and
parts of discrete event systems is investigated. In the occurrence of
faults, some states of the system must be changed and some of them
must be forbidden. For this goal, different states of these elements are
examined and a model for fail-safe behavior of each state is
introduced. Replacing new models of the target elements in the
preliminary model by a systematic method, leads to a fail-safe
discrete event system.
Abstract: Launch and recovery helicopter wind envelope for a
ship type was determined as the first step to the helicopter
qualification program. Flight deck velocities data were obtained by
means of a two components laser Doppler anemometer testing a
1/50th model in the wind tunnel stream. Full-scale flight deck
measurements were obtained on board the ship using a sonic
anemometer. Wind tunnel and full-scale measurements were
compared, showing good agreement and finally, a preliminary launch
and recovery helicopter wind envelope for this specific ship was
built.
Abstract: Motion control of flexible arms is more difficult than
that of rigid arms, however utilizing its dynamics enables improved
performance such as a fast motion in short operation time. This paper
investigates a ball throwing robot with one rigid link and one flexible
link. This robot throws a ball at a set speed with a proper control torque.
A mathematical model of this ball throwing robot is derived through
Hamilton’s principle. Several patterns of torque input are designed and
tested through the proposed simulation models. The parameters of
each torque input pattern is optimized and determined by chaos
embedded vector evaluated particle swarm optimization (CEVEPSO).
Then, the residual vibration of the manipulator after throwing is
suppressed with input shaping technique. Finally, a real experiment is
set up for the model checking.
Abstract: This research aimed to develop plasma system used in air conditioners. This developed plasma system could be installed in the air conditioners - all split type. The quality of air could be improved to be equal to present plasma system. Development processes were as follows: 1) to study the plasma system used in the air conditioners, 2) to design a plasma generator, 3) to develop the plasma generator, and 4) to test its performance in many types of the air conditioners. This plasma system was developed by AC high voltage – 14 kv with a frequency of 50 kHz. Carbon was a conductor to generate arc in air purifier system. The research was tested by installing the plasma generator in the air conditioners - wall type. Whereas, there were 3 types of installations: air flow out, air flow in, and room center. The result of the plasma generator installed in the air conditioners, split type, revealed that the air flow out installation provided the highest average of o-zone at 223 mg/h. This type of installation provided the highest efficiency of air quality improvement. Moreover, the air flow in installation and the room center installation provided the average of the o-zone at 163 mg/h and 64 mg/h, respectively.
Abstract: Among many agro- based cottage industries in India
sericulture has been promoted as an agro-based, labor intensive, rural
oriented cottage industry, providing gainful employment mainly to
the weaker and marginalized section of the society specially tribal.
Sericulture occupies the place of pride in the rural economy can be
practiced even with very low land holding, low gestation, high
returns make sericulture an ideal program, requiring little capital
investment. In 2010-2011 the employment in sericulture sector was
72.5 lakh persons. The involvement of landless rural people in tasar
sericulture is because they understood its potential for rural and tribal
upliftment. This article demonstrates that certain developmental
initiatives have been playing an important role in the socio-economic
progress of tribal masses in Raigarh district and explains the
increased returns from sericulture as a result of development
programs. The study concludes with some suggestions to improve the
long term feasibility of sericulture.
Abstract: Von Willebrand-s disease is the most common
inherited bleeding disorder in humans, it
caused by qualitative abnormalities of the von Willebrand factor
(vWF). Our objective is to determine the prevalence of this disease at
part of the Algerian population in the East and the South by a
biological diagnosis based on specific biological tests (automated
platelet count, the bleeding time (TS), the time of cephalin + activator
(TCA), measure of the prothrombin rate (TP), vWF rate and factor
VIII rate, Molecular electrophoresis of vWF multimers in agarose gel
in the presence of SDS). Four patients of type III or severe
Willebrand-s disease were found on 200 suspect cases. All cases are
showed a deficit in vWF rate (< 5%), and factor VIII (P
Abstract: K-Modes is an extension of K-Means clustering algorithm, developed to cluster the categorical data, where the mean is replaced by the mode. The similarity measure proposed by Huang is the simple matching or mismatching measure. Weight of attribute values contribute much in clustering; thus in this paper we propose a new weighted dissimilarity measure for K-Modes, based on the ratio of frequency of attribute values in the cluster and in the data set. The new weighted measure is experimented with the data sets obtained from the UCI data repository. The results are compared with K-Modes and K-representative, which show that the new measure generates clusters with high purity.
Abstract: Cultural stories are political. They register cultural
phenomena and their relations with the world and society in term of
their existence, function, characteristics by using different context.
This paper will provide a new way of rethinking which will help us
to rethink the relationship between fiction and politics. It discusses
the theme of human rights and it shows the relevance between art and
politics by studying the civil society through a literary framework.
Reasons to establish a relationship between fiction and politics are
the relevant themes and universal issues among the two disciplines.
Both disciplines are sets of views and ideas formulated by the human
mind to explain political or cultural phenomenon. Other reasons are
the complexity and depth of the author-s vision, and the need to
explain the violations of human rights in a more active structure
which can relate to emotional and social existence.
Abstract: The cost of developing the software from scratch can
be saved by identifying and extracting the reusable components from
already developed and existing software systems or legacy systems
[6]. But the issue of how to identify reusable components from
existing systems has remained relatively unexplored. We have used
metric based approach for characterizing a software module. In this
present work, the metrics McCabe-s Cyclometric Complexity
Measure for Complexity measurement, Regularity Metric, Halstead
Software Science Indicator for Volume indication, Reuse Frequency
metric and Coupling Metric values of the software component are
used as input attributes to the different types of Neural Network
system and reusability of the software component is calculated. The
results are recorded in terms of Accuracy, Mean Absolute Error
(MAE) and Root Mean Squared Error (RMSE).
Abstract: This paper presents a modified version of the
maximum urgency first scheduling algorithm. The maximum
urgency algorithm combines the advantages of fixed and dynamic
scheduling to provide the dynamically changing systems with
flexible scheduling. This algorithm, however, has a major
shortcoming due to its scheduling mechanism which may cause a
critical task to fail. The modified maximum urgency first scheduling
algorithm resolves the mentioned problem. In this paper, we propose
two possible implementations for this algorithm by using either
earliest deadline first or modified least laxity first algorithms for
calculating the dynamic priorities. These two approaches are
compared together by simulating the two algorithms. The earliest
deadline first algorithm as the preferred implementation is then
recommended. Afterwards, we make a comparison between our
proposed algorithm and maximum urgency first algorithm using
simulation and results are presented. It is shown that modified
maximum urgency first is superior to maximum urgency first, since it
usually has less task preemption and hence, less related overhead. It
also leads to less failed non-critical tasks in overloaded situations.
Abstract: This paper proposes a resonant dc link in PWM ac
chopper. This can solve the spike problems and also reduce the
switching loss. The configuration and PWM pattern of the proposed
technique are presented. The simulation results are used to confirm
the theory.
Abstract: Nowadays for algae cell ultrasonication the
longitudinal ultrasonic piezosystems are used. In this paper a
possibility of creating unique ultrasonic piezoelectric system, which
would allow reducing energy losses and concentrating this energy to
a small closed volume are proposed. The current vibrating systems
whose ultrasonic energy is concentrated inside of hollow cylinder in
which water-algae mixture is flowing. Two, three or multiply
ultrasonic composite systems to concentrate total energy into a
hollow cylinder to creating strong algae cell ultrasonication are used.
The experiments and numerical FEM analysis results using diskshaped
transducer and the first biological test results on algae cell
disruption by ultrasonication are presented as well.
Abstract: The survey and classification of the different security
attacks in structured peer-to-peer (P2P) overlay networks can be
useful to computer system designers, programmers, administrators,
and users. In this paper, we attempt to provide a taxonomy of
structured P2P overlay networks security attacks. We have specially
focused on the way these attacks can arise at each level of the
network. Moreover, we observed that most of the existing systems
such as Content Addressable Network (CAN), Chord, Pastry,
Tapestry, Kademlia, and Viceroy suffer from threats and vulnerability
which lead to disrupt and corrupt their functioning. We hope that our
survey constitutes a good help for who-s working on this area of
research.