Abstract: This paper introduces two decoders for binary linear
codes based on Metaheuristics. The first one uses a genetic algorithm
and the second is based on a combination genetic algorithm with
a feed forward neural network. The decoder based on the genetic
algorithms (DAG) applied to BCH and convolutional codes give good
performances compared to Chase-2 and Viterbi algorithm respectively
and reach the performances of the OSD-3 for some Residue
Quadratic (RQ) codes. This algorithm is less complex for linear
block codes of large block length; furthermore their performances
can be improved by tuning the decoder-s parameters, in particular the
number of individuals by population and the number of generations.
In the second algorithm, the search space, in contrast to DAG which
was limited to the code word space, now covers the whole binary
vector space. It tries to elude a great number of coding operations
by using a neural network. This reduces greatly the complexity of
the decoder while maintaining comparable performances.
Abstract: This paper presents a remote on-line diagnostic system
for vehicles via the use of On-Board Diagnostic (OBD), GPS, and 3G
techniques. The main parts of the proposed system are on-board
computer, vehicle monitor server, and vehicle status browser. First,
the on-board computer can obtain the location of deriver and vehicle
status from GPS receiver and OBD interface, respectively. Then
on-board computer will connect with the vehicle monitor server
through 3G network to transmit the real time vehicle system status.
Finally, vehicle status browser could show the remote vehicle status
including vehicle speed, engine rpm, battery voltage, engine coolant
temperature, and diagnostic trouble codes. According to the
experimental results, the proposed system can help fleet managers and
car knockers to understand the remote vehicle status. Therefore this
system can decrease the time of fleet management and vehicle repair
due to the fleet managers and car knockers who find the diagnostic
trouble messages in time.
Abstract: This work presents a methodology for the design and
manufacture of propellers oriented to the experimental verification of
theoretical results based on the combined model. The design process
begins by using algorithms in Matlab which output data contain the
coordinates of the points that define the blade airfoils, in this case the
NACA 6512 airfoil was used. The modeling for the propeller blade
was made in NX7, through the imported files in Matlab and with the
help of surfaces. Later, the hub and the clamps were also modeled.
Finally, NX 7 also made possible to create post-processed files to the
required machine. It is possible to find the block of numbers with G
& M codes about the type of driver on the machine. The file
extension is .ptp. These files made possible to manufacture the blade,
and the hub of the propeller.
Abstract: loss of feedwater accident is one of the frequently sever accidents in steam boiler facilities. It threatens the system structural integrity and generates serious hazards and economic loses. The safety analysis of the thermal installations, based extensively on the numeric simulation. The simulation analysis using realistic computer codes like Relap5/Mod3.2 will help understand steam boiler thermal-hydraulic behavior during normal and abnormal conditions. In this study, we are interested on the evaluation of the radiant steam boiler assessment and response to loss-of-feedwater accident. Pressure, temperature and flow rate profiles are presented in various steam boiler system components. The obtained results demonstrate the importance and capability of the Relap5/Mod3.2 code in the thermal-hydraulic analysis of the steam boiler facilities.
Abstract: Low power consumption is a major constraint for battery-powered system like computer notebook or PDA. In the past, specialists usually designed both specific optimized equipments and codes to relief this concern. Doing like this could work for quite a long time, however, in this era, there is another significant restraint, the time to market. To be able to serve along the power constraint while can launch products in shorter production period, objectoriented programming (OOP) has stepped in to this field. Though everyone knows that OOP has quite much more overhead than assembly and procedural languages, development trend still heads to this new world, which contradicts with the target of low power consumption. Most of the prior power related software researches reported that OOP consumed much resource, however, as industry had to accept it due to business reasons, up to now, no papers yet had mentioned about how to choose the best OOP practice in this power limited boundary. This article is the pioneer that tries to specify and propose the optimized strategy in writing OOP software under energy concerned environment, based on quantitative real results. The language chosen for studying is C# based on .NET Framework 2.0 which is one of the trendy OOP development environments. The recommendation gotten from this research would be a good roadmap that can help developers in coding that well balances between time to market and time of battery.
Abstract: Semnan is a city in semnan province, northern Iran
with a population estimated at 119,778 inhabitants. It is the
provincial capital of semnan province. Iran is a developing country
and construction is a basic factor of developing too. Hence, Semnan
city needs to a special programming for construction of buildings,
structures and infrastructures. Semnan municipality tries to begin this
program. In addition to, city has some historical monuments which
can be interesting for tourists. Hence, Semnan inhabitants can benefit
from tourist industry. Optimization of Energy in construction
industry is another activity of this municipality and the inhabitants
who execute these regulations receive some discounts. Many parts of
Iran such as semnan are located in highly seismic zones and
structures must be constructed safe e.g., according to recent seismic
codes. In this paper opportunities of IT in construction industry of
Iran are investigated in three categories. Pre-construction phase,
construction phase and earthquake disaster mitigation are studied.
Studies show that information technology can be used in these items
for reducing the losses and increasing the benefits. Both government
and private sectors must contribute to this strategic project for
obtaining the best result.
Abstract: This paper presents a single correlator RAKE receiver for direct sequence code division multiple access (DS-CDMA) systems. In conventional RAKE receivers, multiple correlators are used to despread the multipath signals and then to align and combine those signals in a later stage before making a bit decision. The simplified receiver structure presented here uses a single correlator and single code sequence generator to recover the multipaths. Modified Walsh- Hadamard codes are used here for data spreading that provides better uncorrelation properties for the multipath signals. The main advantage of this receiver structure is that it requires only a single correlator and a code generator in contrary to the conventional RAKE receiver concept with multiple correlators. It is shown in results that the proposed receiver achieves better bit error rates in comparison with the conventional one for more than one multipaths.
Abstract: The presented work is motivated by a french law regarding nuclear waste management. In order to avoid the limitation coming with the usage of the existing scenario codes, as COSI, VISION or FAMILY, the Core Library for Advance Scenario Simulation (CLASS) is being develop. CLASS is an open source tool, which allows any user to simulate an electronuclear scenario. The main CLASS asset, is the possibility to include any type of reactor, even a complitely new concept, through the generation of its ACSII evolution database. In the present article, the CLASS working basis will be presented as well as a simple exemple in order to show his potentiel. In the considered exemple, the effect of the transmutation will be assessed on Minor Actinide Inventory produced by PWR reactors.
Abstract: In this study, a frame work for verification of famous seismic codes is utilized. To verify the seismic codes performance, damage quantity of RC frames is compared with the target performance. Due to the randomness property of seismic design and earthquake loads excitation, in this paper, fragility curves are developed. These diagrams are utilized to evaluate performance level of structures which are designed by the seismic codes. These diagrams further illustrate the effect of load combination and reduction factors of codes on probability of damage exceedance. Two types of structures; very high important structures with high ductility and medium important structures with intermediate ductility are designed by different seismic codes. The Results reveal that usually lower damage ratio generate lower probability of exceedance. In addition, the findings indicate that there are buildings with higher quantity of bars which they have higher probability of damage exceedance. Life-cycle cost analysis utilized for comparison and final decision making process.
Abstract: Ambiguities in effects of earthquake on various
structures in all earthquake codes would necessitate more study and
research concerning influential factors on dynamic behavior.
Previous studies which were done on different features in different
buildings play a major role in the type of response a structure makes
to lateral vibrations. Diagnosing each of these irregularities can help
structure designers in choosing appropriate setbacks for decreasing
possible damages. Therefore vertical setback is one of the irregularity
factors in the height of the building where can be seen in skyscrapers
and hotels. Previous researches reveal notable changes in the place of
these setbacks showing dynamic response of the structure.
Consequently analyzing 48 models of concrete frames for 3, 6 and 9
stories heights with three different bays in general shape of a surface
decline by height have been constructed in ETABS2000 software,
and then the shape effect of each and every one of these frames in
period scale has been discussed. The result of this study reveals that
not only mass, stiffness and height but also shape of the frame is
influential.
Abstract: Combining classifiers is a useful method for solving
complex problems in machine learning. The ECOC (Error Correcting
Output Codes) method has been widely used for designing combining
classifiers with an emphasis on the diversity of classifiers. In this
paper, in contrast to the standard ECOC approach in which individual
classifiers are chosen homogeneously, classifiers are selected
according to the complexity of the corresponding binary problem. We
use SATIMAGE database (containing 6 classes) for our experiments.
The recognition error rate in our proposed method is %10.37 which
indicates a considerable improvement in comparison with the
conventional ECOC and stack generalization methods.
Abstract: For a quick and accurate calculation of spatial neutron
distribution in nuclear power reactors 3D nodal codes are usually
used aiming at solving the neutron diffusion equation for a given
reactor core geometry and material composition. These codes use a
second order polynomial to represent the transverse leakage term. In
this work, a nodal method based on the well known nodal expansion
method (NEM), developed at COPPE, making use of this polynomial
expansion was modified to treat the transverse leakage term for the
external surfaces of peripheral reflector nodes.
The proposed method was implemented into a computational
system which, besides solving the diffusion equation, also solves the
burnup equations governing the gradual changes in material
compositions of the core due to fuel depletion. Results confirm the
effectiveness of this modified treatment of peripheral nodes for
practical purposes in PWR reactors.
Abstract: Active network was developed to solve the problem of
the current sharing-based network–difficulty in applying new
technology, service or standard, and duplicated operation at several
protocol layers. Active network can transport the packet loaded with
the executable codes, which enables to change the state of the network
node. However, if the network node is placed in the sharing-based
network, security and safety issues should be resolved. To satisfy this
requirement, various security aspects are required such as
authentication, authorization, confidentiality and integrity. Among
these security components, the core factor is the encryption key. As a
result, this study is designed to propose the scheme that manages the
encryption key, which is used to provide security of the
comprehensive active directory, based on the domain.
Abstract: In this paper, LDPC Codes based on defected fullerene
graphs have been generated. And it is found that the codes generated
are fast in encoding and better in terms of error performance on
AWGN Channel.
Abstract: In this paper, the effect of transmission codes on the
performance of coherent square M-ary quadrature amplitude
modulation (CSMQAM) under hybrid selection/maximal-ratio
combining (H-S/MRC) diversity is analysed. The fading channels are
modeled as frequency non-selective slow independent and identically
distributed Rayleigh fading channels corrupted by additive white
Gaussian noise (AWGN). The results for coded MQAM are
computed numerically for the case of (24,12) extended Golay code
and compared with uncoded MQAM under H-S/MRC diversity by
plotting error probabilities versus average signal to noise ratio (SNR)
for various values L and N in order to examine the improvement in
the performance of the digital communications system as the number
of selected diversity branches is increased. The results for no
diversity, conventional SC and Lth order MRC schemes are also
plotted for comparison. Closed form analytical results derived in this
paper are sufficiently simple and therefore can be computed
numerically without any approximations. The analytical results
presented in this paper are expected to provide useful information
needed for design and analysis of digital communication systems
over wireless fading channels.
Abstract: For Seismic design, it is important to estimate,
maximum lateral displacement (inelastic displacement) of the
structures due to sever earthquakes for several reasons. Seismic
design provisions estimate the maximum roof and storey drifts
occurring in major earthquakes by amplifying the drifts of the
structures obtained by elastic analysis subjected to seismic design
load, with a coefficient named “displacement amplification factor"
which is greater than one. Here, this coefficient depends on various
parameters, such as ductility and overstrength factors. The present
research aims to evaluate the value of the displacement amplification
factor in seismic design codes and then tries to propose a value to
estimate the maximum lateral structural displacement from sever
earthquakes, without using non-linear analysis. In seismic codes,
since the displacement amplification is related to “force reduction
factor" hence; this aspect has been accepted in the current study.
Meanwhile, two methodologies are applied to evaluate the value of
displacement amplification factor and its relation with the force
reduction factor. In the first methodology, which is applied for all
structures, the ratio of displacement amplification and force reduction
factors is determined directly. Whereas, in the second methodology
that is applicable just for R/C moment resisting frame, the ratio is
obtained by calculating both factors, separately. The acquired results
of these methodologies are alike and estimate the ratio of two factors
from 1 to 1.2. The results indicate that the ratio of the displacement
amplification factor and the force reduction factor differs to those
proposed by seismic provisions such as NEHRP, IBC and Iranian
seismic code (standard no. 2800).
Abstract: Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss.
Abstract: Cryptography provides the secure manner of
information transmission over the insecure channel. It authenticates
messages based on the key but not on the user. It requires a lengthy
key to encrypt and decrypt the sending and receiving the messages,
respectively. But these keys can be guessed or cracked. Moreover,
Maintaining and sharing lengthy, random keys in enciphering and
deciphering process is the critical problem in the cryptography
system. A new approach is described for generating a crypto key,
which is acquired from a person-s iris pattern. In the biometric field,
template created by the biometric algorithm can only be
authenticated with the same person. Among the biometric templates,
iris features can efficiently be distinguished with individuals and
produces less false positives in the larger population. This type of iris
code distribution provides merely less intra-class variability that aids
the cryptosystem to confidently decrypt messages with an exact
matching of iris pattern. In this proposed approach, the iris features
are extracted using multi resolution wavelets. It produces 135-bit iris
codes from each subject and is used for encrypting/decrypting the
messages. The autocorrelators are used to recall original messages
from the partially corrupted data produced by the decryption process.
It intends to resolve the repudiation and key management problems.
Results were analyzed in both conventional iris cryptography system
(CIC) and non-repudiation iris cryptography system (NRIC). It
shows that this new approach provides considerably high
authentication in enciphering and deciphering processes.
Abstract: In this paper, we have compared the performance of a Turbo and Trellis coded optical code division multiple access (OCDMA) system. The comparison of the two codes has been accomplished by employing optical orthogonal codes (OOCs). The Bit Error Rate (BER) performances have been compared by varying the code weights of address codes employed by the system. We have considered the effects of optical multiple access interference (OMAI), thermal noise and avalanche photodiode (APD) detector noise. Analysis has been carried out for the system with and without double optical hard limiter (DHL). From the simulation results it is observed that a better and distinct comparison can be drawn between the performance of Trellis and Turbo coded systems, at lower code weights of optical orthogonal codes for a fixed number of users. The BER performance of the Turbo coded system is found to be better than the Trellis coded system for all code weights that have been considered for the simulation. Nevertheless, the Trellis coded OCDMA system is found to be better than the uncoded OCDMA system. Trellis coded OCDMA can be used in systems where decoding time has to be kept low, bandwidth is limited and high reliability is not a crucial factor as in local area networks. Also the system hardware is less complex in comparison to the Turbo coded system. Trellis coded OCDMA system can be used without significant modification of the existing chipsets. Turbo-coded OCDMA can however be employed in systems where high reliability is needed and bandwidth is not a limiting factor.
Abstract: We considered repeated-root cyclic codes whose
block length is divisible by the characteristic of the underlying field.
Cyclic self dual codes are also the repeated root cyclic codes. It is
known about the one-level squaring construction for binary repeated
root cyclic codes. In this correspondence, we introduced of two
level squaring construction for binary repeated root cyclic codes of
length 2a b , a > 0, b is odd.