Abstract: Almost all universities include some form of assignment in their courses. The assignments are either carried out in either in groups or individually. To effectively manage these submitted assignments, a well-designed assignment submission system is needed, hence the need for an online assignment submission system to facilitate the distribution, and collection of assignments on due dates. The objective of such system is to facilitate interaction of lecturers and students for assessment and grading purposes. The aim of this study was to create a web based online assignment submission system for University of Mauritius. The system was created to eliminate the traditional process of giving an assignment and collecting the answers for the assignment. Lecturers can also create automated assessment to assess the students online. Moreover, the online submission system consists of an automatic mailing system which acts as a reminder for students about the deadlines of the posted assignments. System was tested to measure its acceptance rate among both student and lecturers.
Abstract: In this paper, we propose a hardware and software
design method for automotive Electronic Control Units (ECU)
considering the functional safety. The proposed ECU is considered for
the application to Electro-Mechanical Actuator systems and the
validity of the design method is shown by the application to the
Electro-Mechanical Brake (EMB) control system which is used as a
brake actuator in Brake-By-Wire (BBW) systems. The importance of a
functional safety-based design approach to EMB ECU design has been
emphasized because of its safety-critical functions, which are executed
with the aid of many electric actuators, sensors, and application
software. Based on hazard analysis and risk assessment according to
ISO26262, the EMB system should be ASIL-D-compliant, the highest
ASIL level. To this end, an external signature watchdog and an
Infineon 32-bit microcontroller TriCore are used to reduce risks
considering common-cause hardware failure. Moreover, a software
design method is introduced for implementing functional
safety-oriented monitoring functions based on an asymmetric dual
core architecture considering redundancy and diversity. The validity
of the proposed ECU design approach is verified by using the EMB
Hardware-In-the-Loop (HILS) system, which consists of the EMB
assembly, actuator ECU, a host PC, and a few debugging devices.
Furthermore, it is shown that the existing sensor fault tolerant control
system can be used more effectively for mitigating the effects of
hardware and software faults by applying the proposed ECU design
method.
Abstract: In this paper, a new approach for target recognition based on the Empirical mode decomposition (EMD) algorithm of Huang etal. [11] and the energy tracking operator of Teager [13]-[14] is introduced. The conjunction of these two methods is called Teager-Huang analysis. This approach is well suited for nonstationary signals analysis. The impulse response (IR) of target is first band pass filtered into subsignals (components) called Intrinsic mode functions (IMFs) with well defined Instantaneous frequency (IF) and Instantaneous amplitude (IA). Each IMF is a zero-mean AM-FM component. In second step, the energy of each IMF is tracked using the Teager energy operator (TEO). IF and IA, useful to describe the time-varying characteristics of the signal, are estimated using the Energy separation algorithm (ESA) algorithm of Maragos et al .[16]-[17]. In third step, a set of features such as skewness and kurtosis are extracted from the IF, IA and IMF energy functions. The Teager-Huang analysis is tested on set of synthetic IRs of Sonar targets with different physical characteristics (density, velocity, shape,? ). PCA is first applied to features to discriminate between manufactured and natural targets. The manufactured patterns are classified into spheres and cylinders. One hundred percent of correct recognition is achieved with twenty three echoes where sixteen IRs, used for training, are free noise and seven IRs, used for testing phase, are corrupted with white Gaussian noise.
Abstract: A composite made of plasma functionalized multiwall
carbon nanotubes (MWNTs) coated with SnO2 was synthesized by
sonochemical precipitation method. Thick layer of this
nanocomposite material was used as ethanol sensor at low
temperatures. The composite sensitivity for ethanol has increased by
a factor of 2 at room temperature and by a factor of 13 at 250°C in
comparison to that of pure SnO2. SEM image of nanocomposite
material showed MWNTs were embedded in SnO2 matrix and also a
higher surface area was observed in the presence of functionalized
MWNTs. Greatly improved sensitivity of the composite material to
ethanol can be attributed to new gas accessing passes through
MWNTs and higher specific surface area.
Abstract: In this work, we are interested in developing a speech denoising tool by using a discrete wavelet packet transform (DWPT). This speech denoising tool will be employed for applications of recognition, coding and synthesis. For noise reduction, instead of applying the classical thresholding technique, some wavelet packet nodes are set to zero and the others are thresholded. To estimate the non stationary noise level, we employ the spectral entropy. A comparison of our proposed technique to classical denoising methods based on thresholding and spectral subtraction is made in order to evaluate our approach. The experimental implementation uses speech signals corrupted by two sorts of noise, white and Volvo noises. The obtained results from listening tests show that our proposed technique is better than spectral subtraction. The obtained results from SNR computation show the superiority of our technique when compared to the classical thresholding method using the modified hard thresholding function based on u-law algorithm.
Abstract: The current education system in India is adept in
equipping and assessing the scholastic development of children.
However, there is an immediate need to strengthen co-scholastic
areas like life-skills, values and attitudes to equip students to face real
life challenges. Audio-visual technology and their respective media
can make a significant contribution to a value based learning
curriculum. Thus, co-scholastic skills need to be effectively nurtured
by a medium that is entertaining and impactful. Films in general have
a tremendous impact in our society. Films with a positive message
make a formidable learning experience that can influence and inspire
generations of learners. Leveraging on this powerful medium,
EduMedia India Pvt. Ltd. has introduced School Cinema a well
researched film-based learning module supported by a fun and
exciting workbook, designed to introduce and reaffirm life-skills and
values to children, thereby having a positive influence on their
attitudes.
Abstract: This Paper proposes a new facial feature extraction approach, Wash-Hadamard Transform (WHT). This approach is based on correlation between local pixels of the face image. Its primary advantage is the simplicity of its computation. The paper compares the proposed approach, WHT, which was traditionally used in data compression with two other known approaches: the Principal Component Analysis (PCA) and the Discrete Cosine Transform (DCT) using the face database of Olivetti Research Laboratory (ORL). In spite of its simple computation, the proposed algorithm (WHT) gave very close results to those obtained by the PCA and DCT. This paper initiates the research into WHT and the family of frequency transforms and examines their suitability for feature extraction in face recognition applications.
Abstract: It is important problems to increase the detection rates
and reduce false positive rates in Intrusion Detection System (IDS).
Although preventative techniques such as access control and
authentication attempt to prevent intruders, these can fail, and as a
second line of defence, intrusion detection has been introduced. Rare
events are events that occur very infrequently, detection of rare
events is a common problem in many domains. In this paper we
propose an intrusion detection method that combines Rough set and
Fuzzy Clustering. Rough set has to decrease the amount of data and
get rid of redundancy. Fuzzy c-means clustering allow objects to
belong to several clusters simultaneously, with different degrees of
membership. Our approach allows us to recognize not only known
attacks but also to detect suspicious activity that may be the result of
a new, unknown attack. The experimental results on Knowledge
Discovery and Data Mining-(KDDCup 1999) Dataset show that the
method is efficient and practical for intrusion detection systems.
Abstract: The presented article deals with the description of a
numerical model of a corridor at a Central Interim Spent Fuel Storage
Facility (hereinafter CISFSF). The model takes into account the
effect of air flows on the temperature of stored waste. The
computational model was implemented in the ANSYS/CFX
programming environment in the form of a CFD task solution, which
was compared with an approximate analytical calculation. The article
includes a categorization of the individual alternatives for the
ventilation of such underground systems. The aim was to evaluate a
ventilation system for a CISFSF with regard to its stability and
capacity to provide sufficient ventilation for the removal of heat
produced by stored casks with spent nuclear fuel.
Abstract: This study examines the issue of recommendation
sources from the perspectives of gender and consumers- perceived
risk, and validates a model for the antecedents of consumer online
purchases. The method of obtaining quantitative data was that of the
instrument of a survey questionnaire. Data were collected via
questionnaires from 396 undergraduate students aged 18-24, and a
multiple regression analysis was conducted to identify causal
relationships. Empirical findings established the link between
recommendation sources (word-of-mouth, advertising, and
recommendation systems) and the likelihood of making online
purchases and demonstrated the role of gender and perceived risk as
moderators in this context. The results showed that the effects of
word-of-mouth on online purchase intentions were stronger than those
of advertising and recommendation systems. In addition, female
consumers have less experience with online purchases, so they may be
more likely than males to refer to recommendations during the
decision-making process. The findings of the study will help
marketers to address the recommendation factor which influences
consumers- intention to purchase and to improve firm performances to
meet consumer needs.
Abstract: The study of interaction among the grain, moisture,
and the surrounding space (air) is key to understanding the graindrying
process. In Iran, rice (mostly Indica type) is dried by flat
bed type dryer until the final MC reaches to 6 to 8%. The
experiments were conducted to examine the effect of application of
discharge fan with different heights of paddy on the drying
efficiency. Experiments were designed based on two different
configurations of the drying methods; with and without discharge
fan with three different heights of paddy including; 5, 10, and 15
cm. The humid heated air will be going out immediately by the
suction of discharge fan. The drying time is established upon the
average final MC to achieve about 8%. To save energy and reduce
the drying time, the distribution of temperature between layers
should be fast and uniform with minimum difference; otherwise
the difference of MC gradient between layers will be high and will
induce grain breakage. The difference of final MC between layers
in the two methods was 48-73%. The steady state of temperature
between the two methods has saved time in the range of 10-20%,
and the efficiency of temperature distribution increased 17-26% by
the use of discharge fan.
Abstract: Coverage is one of the main research interests in wireless sensor networks (WSN), it is used to determine the quality of service (QoS) of the networks. Therefore this paper aims to review the common strategies use in solving coverage problem in WSN. The strategies studied are used during deployment phase where the coverage is calculated based on the placement of the sensors on the region of interest (ROI). The strategies reviewed are categorized into three groups based on the approaches used, namely; force based, grid based or computational geometry based approach.
Abstract: The purpose of this paper is to elucidate the flow unsteady behavior for moving plug in convergent-divergent variable thrust nozzle. Compressible axisymmetric Navier-Stokes equations are used to study this physical phenomenon. Different velocities are set for plug to investigate the effect of plug movement on flow unsteadiness. Variation of mass flow rate and thrust are compared under two conditions: First, the plug is placed at different positions and flow is simulated to reach the steady state (quasi steady simulation) and second, the plug is moved with assigned velocity and flow simulation is coupled with plug movement (unsteady simulation). If plug speed is high enough and its movement time scale is at the same order of the flow time scale, variation of the mass flow rate and thrust level versus plug position demonstrate a vital discrepancy under the quasi steady and unsteady conditions. This phenomenon should be considered especially from response time viewpoints in thrusters design.
Abstract: In the past many uneconomic solutions for limitation
and interruption of short-circuit currents in low power applications
have been introduced, especially polymer switch based on the
positive temperature coefficient of resistance (PCTR) concept.
However there are many limitations in the active material, which
consists of conductive fillers. This paper presents a significantly
improved and simplified approach that replaces the existing current
limiters with faster switching elements. Its elegance lies in the
remarkable simplicity and low-cost processes of producing the device
using polyaniline (PANI) doped with methane-sulfonic acid (MSA).
Samples characterized as lying in the metallic and critical regimes of
metal insulator transition have been studied by means of electrical
performance in the voltage range from 1V to 5 V under different
environmental conditions. Moisture presence is shown to increase the
resistivity and also improved its current limiting performance.
Additionally, the device has also been studied for electrical resistivity
in the temperature range 77 K-300 K. The temperature dependence of
the electrical conductivity gives evidence for a transport mechanism
based on variable range hopping in three dimensions.
Abstract: This paper applies fuzzy AHP to evaluate the service
quality of online auction. Service quality is a composition of various
criteria. Among them many intangible attributes are difficult to
measure. This characteristic introduces the obstacles for respondents
on reply in the survey. So as to overcome this problem, we invite
fuzzy set theory into the measurement of performance and use AHP in
obtaining criteria. We found the most concerned dimension of service
quality is Transaction Safety Mechanism and the least is Charge Item.
Other criteria such as information security, accuracy and information
are too vital.
Abstract: The CMLP building was developed to be a model for
sustainability with strategies to reduce water, energy and pollution,
and to provide a healthy environment for the building occupants. The
aim of this paper is to investigate the environmental effects of energy
used by this building. A LCA (life cycle analysis) was led to measure
the real environmental effects produced by the use of energy. The
impact categories most affected by the energy use were found to be
the human health effects, as well as ecotoxicity. Natural gas
extraction, uranium milling for nuclear energy production, and the
blasting for mining and infrastructure construction are the processes
contributing the most to emissions in the human health effect. Data
comparing LCA results of CMLP building with a conventional
building results showed that energy used by the CMLP building has
less damage for the environment and human health than a
conventional building.
Abstract: In this paper we will consider the most known ratios
control schemes ((L/D, V/B),(L/D,V/F), Ryskamp-s, and
(D/(L+D),V/B)) for binary distillation column and we compare them
in the basis of interactions and disturbance propagation. The models
for these configurations are deuced using mathematical
transformations taking the energy balance structure (LV) as a base
model. The dynamic relative magnitude criterion (DRMC) is used to
assess the interactions. The results show that the introduction of
ratios in controlling the column tends to minimize the degree of
interactions between the loops.
Abstract: In the present paper some recommendations for the
use of software package “Mathematica" in a basic numerical analysis
course are presented. The methods which are covered in the course
include solution of systems of linear equations, nonlinear equations
and systems of nonlinear equations, numerical integration,
interpolation and solution of ordinary differential equations. A set of
individual assignments developed for the course covering all the
topics is discussed in detail.
Abstract: In recent years, the use of vector variance as a
measure of multivariate variability has received much attention in
wide range of statistics. This paper deals with a more economic
measure of multivariate variability, defined as vector variance minus
all duplication elements. For high dimensional data, this will increase
the computational efficiency almost 50 % compared to the original
vector variance. Its sampling distribution will be investigated to make
its applications possible.
Abstract: Modular multiplication is the basic operation
in most public key cryptosystems, such as RSA, DSA, ECC,
and DH key exchange. Unfortunately, very large operands
(in order of 1024 or 2048 bits) must be used to provide
sufficient security strength. The use of such big numbers
dramatically slows down the whole cipher system, especially
when running on embedded processors.
So far, customized hardware accelerators - developed on
FPGAs or ASICs - were the best choice for accelerating
modular multiplication in embedded environments. On the
other hand, many algorithms have been developed to speed
up such operations. Examples are the Montgomery modular
multiplication and the interleaved modular multiplication
algorithms. Combining both customized hardware with
an efficient algorithm is expected to provide a much faster
cipher system.
This paper introduces an enhanced architecture for computing
the modular multiplication of two large numbers X
and Y modulo a given modulus M. The proposed design is
compared with three previous architectures depending on
carry save adders and look up tables. Look up tables should
be loaded with a set of pre-computed values. Our proposed
architecture uses the same carry save addition, but replaces
both look up tables and pre-computations with an enhanced
version of sign detection techniques. The proposed architecture
supports higher frequencies than other architectures.
It also has a better overall absolute time for a single operation.