Abstract: Wireless Sensor Networks (WSNs) have wide variety
of applications and provide limitless future potentials. Nodes in
WSNs are prone to failure due to energy depletion, hardware failure,
communication link errors, malicious attacks, and so on. Therefore,
fault tolerance is one of the critical issues in WSNs. We study how
fault tolerance is addressed in different applications of WSNs. Fault
tolerant routing is a critical task for sensor networks operating in
dynamic environments. Many routing, power management, and data
dissemination protocols have been specifically designed for WSNs
where energy awareness is an essential design issue. The focus,
however, has been given to the routing protocols which might differ
depending on the application and network architecture.
Abstract: Cloud computing is a new technology in industry and
academia. The technology has grown and matured in last half decade
and proven their significant role in changing environment of IT
infrastructure where cloud services and resources are offered over the
network. Cloud technology enables users to use services and
resources without being concerned about the technical implications of
technology. There are substantial research work has been performed
for the usage of cloud computing in educational institutes and
majority of them provides cloud services over high-end blade servers
or other high-end CPUs. However, this paper proposes a new stack
called “CiCKAStack” which provide cloud services over unutilized
computing resources, named as commodity computers.
“CiCKAStack” provides IaaS and PaaS using underlying commodity
computers. This will not only increasing the utilization of existing
computing resources but also provide organize file system, on
demand computing resource and design and development
environment.
Abstract: Today’s VLSI networks demands for high speed. And
in this work the compact form mathematical model for current mode
signalling in VLSI interconnects is presented.RLC interconnect line
is modelled using characteristic impedance of transmission line and
inductive effect. The on-chip inductance effect is dominant at lower
technology node is emulated into an equivalent resistance. First order
transfer function is designed using finite difference equation, Laplace
transform and by applying the boundary conditions at the source and
load termination. It has been observed that the dominant pole
determines system response and delay in the proposed model. The
novel proposed current mode model shows superior performance as
compared to voltage mode signalling. Analysis shows that current
mode signalling in VLSI interconnects provides 2.8 times better
delay performance than voltage mode. Secondly the damping factor
of a lumped RLC circuit is shown to be a useful figure of merit.
Abstract: An innovative concept called “Flexy-Energy” is developing at 2iE. This concept aims to produce electricity at lower cost by smartly mix different available energy sources in accordance to the load profile of the region. With a higher solar irradiation and due to the fact that Diesel generator are massively used in sub-Saharan rural areas, PV/Diesel hybrid systems could be a good application of this concept and a good solution to electrify this region, provided they are reliable, cost effective and economically attractive to investors. Presentation of the developed approach is the aims of this paper. The PV/Diesel hybrid system designed consists to produce electricity and/or heat from a coupling between Diesel Diesel generators and PV panels without batteries storage, while ensuring the substitution of gasoil by bio-fuels available in the area where the system will be installed. The optimal design of this system is based on his technical performances; the Life Cycle Cost (LCC) and Levelized Cost of Energy are developed and use as economic criteria. The Net Present Value (NPV), the internal rate of return (IRR) and the discounted payback (DPB) are also evaluated according to dual electricity pricing (in sunny and unsunny hours). The PV/Diesel hybrid system obtained is compared to the standalone Diesel Diesel generators. The approach carried out in this paper has been applied to Siby village in Mali (Latitude 12 ° 23'N 8 ° 20'W) with 295 kWh as daily demand.This approach provides optimal physical characteristics (size of the components, number of component) and dynamical characteristics in real time (number of Diesel generator on, their load rate, fuel specific consumptions, and PV penetration rate) of the system. The system obtained is slightly cost effective; but could be improved with optimized tariffing strategies.
Abstract: This paper attempts to define the validity domain of
LSDP (Loop Shaping Design Procedure) controller system, by
determining the suitable uncertainty region, so that linear system be
stable. Indeed the LSDP controller cannot provide stability for any
perturbed system. For this, we will use the gap metric tool that is
introduced into the control literature for studying robustness
properties of feedback systems with uncertainty. A 2nd order electric
linear system example is given to define the validity domain of LSDP
controller and effectiveness gap metric.
Abstract: In recent years parasitic antenna play major role in
MIMO systems because of their gain and spectral efficiency. In this
paper, single RF chain MIMO transmitter is designed using
reconfigurable parasitic antenna. The Spatial Modulation (SM) is a
recently proposed scheme in MIMO scenario which activates only
one antenna at a time. The SM entirely avoids ICI and IAS, and only
requires a single RF chain at the transmitter. This would switch ON a
single transmit-antenna for data transmission while all the other
antennas are kept silent. The purpose of the parasitic elements is to
change the radiation pattern of the radio waves which is emitted from
the driven element and directing them in one direction and hence
introduces transmit diversity. Diode is connect between the patch and
ground by changing its state (ON and OFF) the parasitic element act
as reflector and director and also capable of steering azimuth and
elevation angle. This can be achieved by changing the input
impedance of each parasitic element through single RF chain. The
switching of diode would select the single parasitic antenna for
spatial modulation. This antenna is expected to achieve maximum
gain with desired efficiency.
Abstract: Generating random numbers are mainly used to create
secret keys or random sequences. It can be carried out by various
techniques. In this paper we present a very simple and efficient
pseudo random number generator (PRNG) based on chaotic maps
and S-Box tables. This technique adopted two main operations one to
generate chaotic values using two logistic maps and the second to
transform them into binary words using random S-Box tables.
The simulation analysis indicates that our PRNG possessing
excellent statistical and cryptographic properties.
Abstract: Data mining idea is mounting rapidly in admiration
and also in their popularity. The foremost aspire of data mining
method is to extract data from a huge data set into several forms that
could be comprehended for additional use. The data mining is a
technology that contains with rich potential resources which could be
supportive for industries and businesses that pay attention to collect
the necessary information of the data to discover their customer’s
performances. For extracting data there are several methods are
available such as Classification, Clustering, Association,
Discovering, and Visualization… etc., which has its individual and
diverse algorithms towards the effort to fit an appropriate model to
the data. STATISTICA mostly deals with excessive groups of data
that imposes vast rigorous computational constraints. These results
trials challenge cause the emergence of powerful STATISTICA Data
Mining technologies. In this survey an overview of the STATISTICA
software is illustrated along with their significant features.
Abstract: In this paper, we investigate the effect of friendly
jamming power allocation strategies on the achievable average
secrecy rate over a bank of parallel fading wiretap channels.
We investigate the achievable average secrecy rate in parallel
fading wiretap channels subject to Rayleigh and Rician fading.
The achievable average secrecy rate, due to the presence of a
line-of-sight component in the jammer channel is also evaluated.
Moreover, we study the detrimental effect of correlation across the
parallel sub-channels, and evaluate the corresponding decrease in the
achievable average secrecy rate for the various fading configurations.
We also investigate the tradeoff between the transmission power
and the jamming power for a fixed total power budget. Our
results, which are applicable to current orthogonal frequency division
multiplexing (OFDM) communications systems, shed further light on
the achievable average secrecy rates over a bank of parallel fading
channels in the presence of friendly jammers.
Abstract: A Smart Building Controller (SBC) is a server
software that offers secured access to a pool of building specific
resources, executes monitoring tasks and performs automatic
administration of a building, thus optimizing the exploitation cost and
maximizing comfort. This paper brings to discussion the issues that
arise with the secure exploitation of the SBC administered resources
and proposes a technical solution to implement a robust secure access
system based on roles, individual rights and privileges (special
rights).
Abstract: The effects of hypertension are often lethal thus its
early detection and prevention is very important for everybody. In
this paper, a neural network (NN) model was developed and trained
based on a dataset of hypertension causative parameters in order to
forecast the likelihood of occurrence of hypertension in patients. Our
research goal was to analyze the potential of the presented NN to
predict, for a period of time, the risk of hypertension or the risk of
developing this disease for patients that are or not currently
hypertensive. The results of the analysis for a given patient can
support doctors in taking pro-active measures for averting the
occurrence of hypertension such as recommendations regarding the
patient behavior in order to lower his hypertension risk. Moreover,
the paper envisages a set of three example scenarios in order to
determine the age when the patient becomes hypertensive, i.e.
determine the threshold for hypertensive age, to analyze what
happens if the threshold hypertensive age is set to a certain age and
the weight of the patient if being varied, and, to set the ideal weight
for the patient and analyze what happens with the threshold of
hypertensive age.
Abstract: In this paper, we discuss the performance of applying
hybrid spiral dynamic bacterial chemotaxis (HSDBC) optimisation
algorithm on an intelligent controller for a differential drive robot. A
unicycle class of differential drive robot is utilised to serve as a basis
application to evaluate the performance of the HSDBC algorithm. A
hybrid fuzzy logic controller is developed and implemented for the
unicycle robot to follow a predefined trajectory. Trajectories of
various frictional profiles and levels were simulated to evaluate the
performance of the robot at different operating conditions. Controller
gains and scaling factors were optimised using HSDBC and the
performance is evaluated in comparison to previously adopted
optimisation algorithms. The HSDBC has proven its feasibility in
achieving a faster convergence toward the optimal gains and resulted
in a superior performance.
Abstract: Electronic Word-Of-Mouth (eWOM) communities
represent today an important source of information in which more
and more customers base their purchasing decisions. They include
thousands of reviews concerning very different products and services
posted by many individuals geographically distributed all over the
world. Due to their massive audience, eWOM communities can help
users to find the product they are looking for even if they are less
popular or rare. This is known as the long tail effect, which leads to a
larger number of lower-selling niche products. This paper analyzes
the long tail effect in a well-known eWOM community and defines a
tool for finding niche products unavailable through conventional
channels.
Abstract: Customer churn prediction is one of the most useful
areas of study in customer analytics. Due to the enormous amount
of data available for such predictions, machine learning and data
mining have been heavily used in this domain. There exist many
machine learning algorithms directly applicable for the problem of
customer churn prediction, and here, we attempt to experiment on
a novel approach by using a cognitive learning based technique in
an attempt to improve the results obtained by using a combination
of supervised learning methods, with cognitive unsupervised learning
methods.
Abstract: Attributes and methods are the basic contents of an
object-oriented class. The connectivity among these class members
and the relationship between the class and other classes play an
important role in determining the quality of an object-oriented
system. Class cohesion evaluates the degree of relatedness of class
attributes and methods, whereas class coupling refers to the degree to
which a class is related to other classes. Researchers have proposed
several class cohesion and class coupling measures. However, the
correlation between class coupling and class cohesion measures has
not been thoroughly studied. In this paper, using classes of three
open-source Java systems, we empirically investigate the correlation
between several measures of connectivity-based class cohesion and
coupling. Four connectivity-based cohesion measures and eight
coupling measures are considered in the empirical study. The
empirical study results show that class connectivity-based cohesion
and coupling internal quality attributes are inversely correlated. The
strength of the correlation depends highly on the cohesion and
coupling measurement approaches.
Abstract: Nowadays, huge amount of multimedia repositories
make the browsing, retrieval and delivery of video contents very slow
and even difficult tasks. Video summarization has been proposed to
improve faster browsing of large video collections and more efficient
content indexing and access. In this paper, we focus on approaches to
video summarization. The video summaries can be generated in many
different forms. However, two fundamentals ways to generate
summaries are static and dynamic. We present different techniques
for each mode in the literature and describe some features used for
generating video summaries. We conclude with perspective for
further research.
Abstract: In this paper we are presenting some spamming
techniques their behaviour and possible solutions. We have analyzed
how Spammers enters into online social networking sites (OSNSs) to
target them and diverse techniques used by them for this purpose.
Spamming is very common issue in present era of Internet
especially through Online Social Networking Sites (like Facebook,
Twitter, and Google+ etc.). Spam messages keep wasting Internet
bandwidth and the storage space of servers. On social networking
sites; spammers often disguise themselves by creating fake accounts
and hijacking user’s accounts for personal gains. They behave like
normal user and they continue to change their spamming strategy.
Following spamming techniques are discussed in this paper like
clickjacking, social engineered attacks, cross site scripting, URL
shortening, and drive by download. We have used elgg framework
for demonstration of some of spamming threats and respective
implementation of solutions.
Abstract: Offering a Product-Service System (PSS) is a
well-accepted strategy that companies may adopt to provide a set of
systemic solutions to customers. PSSs were initially provided in a
simple form but now take diversified and complex forms involving
multiple services, products and technologies. With the growing
interest in the PSS, frameworks for the PSS development have been
introduced by many researchers. However, most of the existing
frameworks fail to examine various relations existing in a complex
PSS. Since designing a complex PSS involves full integration of
multiple products and services, it is essential to identify not only
product-service relations but also product-product/ service-service
relations. It is also equally important to specify how they are related
for better understanding of the system. Moreover, as customers tend to
view their purchase from a more holistic perspective, a PSS should be
developed based on the whole system’s requirements, rather than
focusing only on the product requirements or service requirements.
Thus, we propose a framework to develop a complex PSS that is
coordinated fully with the requirements of both worlds. Specifically,
our approach adopts a multi-domain matrix (MDM). A MDM
identifies not only inter-domain relations but also intra-domain
relations so that it helps to design a PSS that includes highly desired
and closely related core functions/ features. Also, various dependency
types and rating schemes proposed in our approach would help the
integration process.
Abstract: Despite the highly touted benefits, emerging
technologies have unleashed pervasive concerns regarding unintended
and unforeseen social impacts. Thus, those wishing to create safe and
socially acceptable products need to identify such side effects and
mitigate them prior to the market proliferation. Various methodologies
in the field of technology assessment (TA), namely Delphi, impact
assessment, and scenario planning, have been widely incorporated in
such a circumstance. However, literatures face a major limitation in
terms of sole reliance on participatory workshop activities. They
unfortunately missed out the availability of a massive untapped data
source of futuristic information flooding through the Internet. This
research thus seeks to gain insights into utilization of futuristic data,
future-oriented documents from the Internet, as a supplementary
method to generate social impact scenarios whilst capturing
perspectives of experts from a wide variety of disciplines. To this end,
network analysis is conducted based on the social keywords extracted
from the futuristic documents by text mining, which is then used as a
guide to produce a comprehensive set of detailed scenarios. Our
proposed approach facilitates harmonized depictions of possible
hazardous consequences of emerging technologies and thereby makes
decision makers more aware of, and responsive to, broad qualitative
uncertainties.
Abstract: The detection of moving objects from a video image
sequences is very important for object tracking, activity recognition,
and behavior understanding in video surveillance.
The most used approach for moving objects detection / tracking is
background subtraction algorithms. Many approaches have been
suggested for background subtraction. But, these are illumination
change sensitive and the solutions proposed to bypass this problem
are time consuming.
In this paper, we propose a robust yet computationally efficient
background subtraction approach and, mainly, focus on the ability to
detect moving objects on dynamic scenes, for possible applications in
complex and restricted access areas monitoring, where moving and
motionless persons must be reliably detected. It consists of three
main phases, establishing illumination changes invariance,
background/foreground modeling and morphological analysis for
noise removing.
We handle illumination changes using Contrast Limited Histogram
Equalization (CLAHE), which limits the intensity of each pixel to
user determined maximum. Thus, it mitigates the degradation due to
scene illumination changes and improves the visibility of the video
signal. Initially, the background and foreground images are extracted
from the video sequence. Then, the background and foreground
images are separately enhanced by applying CLAHE.
In order to form multi-modal backgrounds we model each channel
of a pixel as a mixture of K Gaussians (K=5) using Gaussian Mixture
Model (GMM). Finally, we post process the resulting binary
foreground mask using morphological erosion and dilation
transformations to remove possible noise.
For experimental test, we used a standard dataset to challenge the
efficiency and accuracy of the proposed method on a diverse set of
dynamic scenes.