Abstract: In this paper, a robust decentralized congestion control strategy is developed for a large scale network with Differentiated Services (Diff-Serv) traffic. The network is modeled by a nonlinear fluid flow model corresponding to two classes of traffic, namely the premium traffic and the ordinary traffic. The proposed congestion controller does take into account the associated physical network resource limitations and is shown to be robust to the unknown and time-varying delays. Our proposed decentralized congestion control strategy is developed on the basis of Diff-Serv architecture by utilizing a robust adaptive technique. A Linear Matrix Inequality (LMI) condition is obtained to guarantee the ultimate boundedness of the closed-loop system. Numerical simulation implementations are presented by utilizing the QualNet and Matlab software tools to illustrate the effectiveness and capabilities of our proposed decentralized congestion control strategy.
Abstract: Plenty researches have reported techniques to harvest energy from piezoelectric transducer. In the earlier years, the researches mainly report linear energy harvesting techniques whereby interface circuitry is designed to have input impedance that match with the impedance of the piezoelectric transducer. In recent years non-linear techniques become more popular. The non-linear technique employs voltage waveform manipulation to boost the available-for-extraction energy at the time of energy transfer. The fact that non-linear energy extraction provides larger available-for-extraction energy doesn’t mean the linear energy extraction is completely obsolete. In some scenarios, such as where initial power is not available, linear energy extraction is still preferred. A modified Buck Boost circuit which is capable of harvesting piezoelectric energy using both linear and non-linear techniques is reported in this paper. Efficiency of at least 64% can be achieved using this circuit. For linear extraction, the modified Buck Boost circuit is controlled using a fix frequency and duty cycle clock. A voltage sensor and a pulse generator are added as the controller for the non-linear extraction technique.
Abstract: The exponential increase in the volume of medical image database has imposed new challenges to clinical routine in maintaining patient history, diagnosis, treatment and monitoring. With the advent of data mining and machine learning techniques it is possible to automate and/or assist physicians in clinical diagnosis. In this research a medical image classification framework using data mining techniques is proposed. It involves feature extraction, feature selection, feature discretization and classification. In the classification phase, the performance of the traditional kNN k nearest neighbor classifier is improved using a feature weighting scheme and a distance weighted voting instead of simple majority voting. Feature weights are calculated using the interestingness measures used in association rule mining. Experiments on the retinal fundus images show that the proposed framework improves the classification accuracy of traditional kNN from 78.57 % to 92.85 %.
Abstract: Darcy’s Law is a well-known constitutive equation describing the flow of a fluid through a porous medium. The equation shows a relationship between the superficial or Darcy velocity and the pressure gradient which was first experimentally observed by Henry Darcy in 1855-1856. In this study, we apply homogenization method to Stokes equation in order to derive Darcy’s Law. The process of deriving the equation is complicated, especially in multidimensional domain. Thus, for the sake of simplicity, we use the indicial notation as well as the homogenization. This combination provides a smooth, simple and easy technique to derive Darcy’s Law.
Abstract: The problem of optimal planning of multiple sources
of distributed generation (DG) in distribution networks is treated in
this paper using an improved Ant Colony Optimization algorithm
(ACO). This objective of this problem is to determine the DG
optimal size and location that in order to minimize the network real
power losses. Considering the multiple sources of DG, both size and
location are simultaneously optimized in a single run of the proposed
ACO algorithm. The various practical constraints of the problem are
taken into consideration by the problem formulation and the
algorithm implementation. A radial power flow algorithm for
distribution networks is adopted and applied to satisfy these
constraints. To validate the proposed technique and demonstrate its
effectiveness, the well-know 69-bus feeder standard test system is
employed.cm.
Abstract: In this paper, we present a comparative study of the
genetic algorithms and Hessian-s methods for optimal research of the
active powers in an electric network of power. The objective function
which is the performance index of production of electrical energy is
minimized by satisfying the constraints of the equality type and
inequality type initially by the Hessian-s methods and in the second
time by the genetic Algorithms. The results found by the application
of AG for the minimization of the electric production costs of power
are very encouraging. The algorithms seem to be an effective
technique to solve a great number of problems and which are in
constant evolution. Nevertheless it should be specified that the
traditional binary representation used for the genetic algorithms
creates problems of optimization of management of the large-sized
networks with high numerical precision.
Abstract: Purpose: To compare attitudes and perceptions of
Israeli native born mothers versus former Soviet Union (FSU)
immigrant mothers regarding the physical health of their infant.
Methodology: cross-sectional design. A convenience sample of 50
participants was recruited by face to face and snowball technique. A
questionnaire was constructed according to the instructions of the
Ministry of Health for the care and treatment of infants. The main
areas explored were: sources of knowledge that the young mother
acquired regarding the care of her infant, ways of caring for the
infant, hygiene and sanitary habits, and the pattern of referral to
health professionals. The last topic relates to emotions mothers might
experience towards their infant.
Results: Mothers from both cultural groups present some similar
caring behaviors, which may express a universal aspect of mothers'
behavior towards their infants. However, immigrant mothers differ
significantly from native born by relying less on their mothers' and
grandmothers' experience, they wean their infants from diapers
earlier, they are stricter about hygiene and sanitary habits and they
tend to consult a physician when their infant has low fever. Native
born and immigrant mothers differ in their expressions of pride and
wonder. Immigrant mothers report of a lesser degree of these
emotions towards their infants than native born mothers.
Conclusion: The theoretical model of socialization and
acculturation of immigrant mothers is employed as an explanatory
model for the current findings Young immigrant mothers undergo a
complex acculturation process and adapt behavioral patterns in
various areas to comply with Israeli norms and values, demonstrating
assimilation. In other areas they adhere to the norms of their original
culture.
Abstract: Now a days video data embedding approach is a very challenging and interesting task towards keeping real time video data secure. We can implement and use this technique with high-level applications. As the rate-distortion of any image is not confirmed, because the gain provided by accurate image frame segmentation are balanced by the inefficiency of coding objects of arbitrary shape, with a lot factors like losses that depend on both the coding scheme and the object structure. By using rate controller in association with the encoder one can dynamically adjust the target bitrate. This paper discusses about to keep secure videos by mixing signature data with negligible distortion in the original video, and to keep steganographic video as closely as possible to the quality of the original video. In this discussion we propose the method for embedding the signature data into separate video frames by the use of block Discrete Cosine Transform. These frames are then encoded by real time encoding H.264 scheme concepts. After processing, at receiver end recovery of original video and the signature data is proposed.
Abstract: Thermite welding is mainly used in world. The
reasons why the thermite welding method is widely used are
that the equipment has good mobility and total working time
of that is shorter than that of the enclosed arc welding method
on site. Moreover, the operating skill, which required for
thermite welding, is less than that of for enclosed arc welding.
In the present research work, heat treatment and combined
'expulsion and heat treatment' techniques were used improve
the mechanical properties and weldment structure. The
specimens were cut in the transverse direction from expulsion
with Heat treated and heat treated Thermite Welded rails.
Specimens were prepared according to AWS standard and
subjected to tensile test, Impact test and hardness and their
results were tabulated. Microstructural analysis was carried
out with the help of SEM. Then analyze to effect of heat
treated and 'expulsion with heat treated' with the properties of
their thermite welded rails. Compare the mechanical and
microstructural properties of thermite welded rails between
heat expulsion with heat treated and heat treated. Mechanical
and microstructural response expulsion with heat treated
thermite welded rail is higher value as compared to heat
treatment.
Abstract: Steganography is the process of hiding one file inside another such that others can neither identify the meaning of the embedded object, nor even recognize its existence. Current trends favor using digital image files as the cover file to hide another digital file that contains the secret message or information. One of the most common methods of implementation is Least Significant Bit Insertion, in which the least significant bit of every byte is altered to form the bit-string representing the embedded file. Altering the LSB will only cause minor changes in color, and thus is usually not noticeable to the human eye. While this technique works well for 24-bit color image files, steganography has not been as successful when using an 8-bit color image file, due to limitations in color variations and the use of a colormap. This paper presents the results of research investigating the combination of image compression and steganography. The technique developed starts with a 24-bit color bitmap file, then compresses the file by organizing and optimizing an 8-bit colormap. After the process of compression, a text message is hidden in the final, compressed image. Results indicate that the final technique has potential of being useful in the steganographic world.
Abstract: Themain goal of this article is to find efficient
methods for elemental and molecular analysis of living
microorganisms (algae) under defined environmental conditions and
cultivation processes. The overall knowledge of chemical
composition is obtained utilizing laser-based techniques, Laser-
Induced Breakdown Spectroscopy (LIBS) for acquiring information
about elemental composition and Raman Spectroscopy for gaining
molecular information, respectively. Algal cells were suspended in
liquid media and characterized using their spectra. Results obtained
employing LIBS and Raman Spectroscopy techniques will help to
elucidate algae biology (nutrition dynamics depending on cultivation
conditions) and to identify algal strains, which have the potential for
applications in metal-ion absorption (bioremediation) and biofuel
industry. Moreover, bioremediation can be readily combined with
production of 3rd generation biofuels. In order to use algae for
efficient fuel production, the optimal cultivation parameters have to
be determinedleading to high production of oil in selected
cellswithout significant inhibition of the photosynthetic activity and
the culture growth rate, e.g. it is necessary to distinguish conditions
for algal strain containing high amount of higher unsaturated fatty
acids. Measurements employing LIBS and Raman Spectroscopy were
utilized in order to give information about alga Trachydiscusminutus
with emphasis on the amount of the lipid content inside the algal cell
and the ability of algae to withdraw nutrients from its environment
and bioremediation (elemental composition), respectively. This
article can serve as the reference for further efforts in describing
complete chemical composition of algal samples employing laserablation
techniques.
Abstract: This paper describes fast and efficient method for page segmentation of document containing nonrectangular block. The segmentation is based on edge following algorithm using small window of 16 by 32 pixels. This segmentation is very fast since only border pixels of paragraph are used without scanning the whole page. Still, the segmentation may contain error if the space between them is smaller than the window used in edge following. Consequently, this paper reduce this error by first identify the missed segmentation point using direction information in edge following then, using X-Y cut at the missed segmentation point to separate the connected columns. The advantage of the proposed method is the fast identification of missed segmentation point. This methodology is faster with fewer overheads than other algorithms that need to access much more pixel of a document.
Abstract: The performance of the Optical Code Division Multiplexing/ Wavelength Division Multiplexing (WDM/OCDM) technique for Optical Packet Switch is investigated. The impact on the performance of the impairment due to both Multiple Access Interference and Beat noise is studied. The Packet Loss Probability due to output packet contentions is evaluated as a function of the main switch and traffic parameters when Gold coherent optical codes are adopted. The Packet Loss Probability of the OCDM/WDM switch can reach 10-9 when M=16 wavelengths, Gold code of length L=511 and only 24 wavelength converters are used in the switch.
Abstract: Nowadays, more engineering systems are using some
kind of Artificial Intelligence (AI) for the development of their
processes. Some well-known AI techniques include artificial neural
nets, fuzzy inference systems, and neuro-fuzzy inference systems
among others. Furthermore, many decision-making applications base
their intelligent processes on Fuzzy Logic; due to the Fuzzy
Inference Systems (FIS) capability to deal with problems that are
based on user knowledge and experience. Also, knowing that users
have a wide variety of distinctiveness, and generally, provide
uncertain data, this information can be used and properly processed
by a FIS. To properly consider uncertainty and inexact system input
values, FIS normally use Membership Functions (MF) that represent
a degree of user satisfaction on certain conditions and/or constraints.
In order to define the parameters of the MFs, the knowledge from
experts in the field is very important. This knowledge defines the MF
shape to process the user inputs and through fuzzy reasoning and
inference mechanisms, the FIS can provide an “appropriate" output.
However an important issue immediately arises: How can it be
assured that the obtained output is the optimum solution? How can it
be guaranteed that each MF has an optimum shape? A viable solution
to these questions is through the MFs parameter optimization. In this
Paper a novel parameter optimization process is presented. The
process for FIS parameter optimization consists of the five simple
steps that can be easily realized off-line. Here the proposed process
of FIS parameter optimization it is demonstrated by its
implementation on an Intelligent Interface section dealing with the
on-line customization / personalization of internet portals applied to
E-commerce.
Abstract: Robust stability and performance are the two most
basic features of feedback control systems. The harmonic balance
analysis technique enables to analyze the stability of limit cycles
arising from a neural network control based system operating over
nonlinear plants. In this work a robust stability analysis based on the
harmonic balance is presented and applied to a neural based control
of a non-linear binary distillation column with unstructured
uncertainty. We develop ways to describe uncertainty in the form of
neglected nonlinear dynamics and high harmonics for the plant and
controller respectively. Finally, conclusions about the performance of
the neural control system are discussed using the Nyquist stability
margin together with the structured singular values of the uncertainty
as a robustness measure.
Abstract: Over the early years of the 21st century, cities
throughout the Middle East, particularly in the Gulf region have
expanded more rapidly than ever before. Given the presence of a
large volume of high-rise buildings allover the region, the local
authority aims to set a new standard for sustainable development;
with an integrated approach to maintain a balance between economy,
quality, environmental protection and safety of life. In the very near
future, as mandatory requirements, sustainability will be the criteria
that should be included in all building projects. It is well known in
the building sustainability topics that structural design engineers do
not have a key role in this matter. In addition, the LEED (Leadership
in Energy and Environmental Design) has looked almost exclusively
on the environmental components and materials specifications. The
objective of this paper is to focus and establish groundwork for
sustainability techniques and applications related to the RC high-rise
buildings design, from the structural point of view. A set of
recommendations related to local conditions, structural modeling and
analysis is given, and some helpful suggestions for structural design
team work are addressed. This paper attempts to help structural
engineers in identifying the building sustainability design, in order to
meet local needs and achieve alternative solutions at an early stage of
project design.
Abstract: Most known methods for measuring the structural similarity of document structures are based on, e.g., tag measures, path metrics and tree measures in terms of their DOM-Trees. Other methods measures the similarity in the framework of the well known vector space model. In contrast to these we present a new approach to measuring the structural similarity of web-based documents represented by so called generalized trees which are more general than DOM-Trees which represent only directed rooted trees.We will design a new similarity measure for graphs representing web-based hypertext structures. Our similarity measure is mainly based on a novel representation of a graph as strings of linear integers, whose components represent structural properties of the graph. The similarity of two graphs is then defined as the optimal alignment of the underlying property strings. In this paper we apply the well known technique of sequence alignments to solve a novel and challenging problem: Measuring the structural similarity of generalized trees. More precisely, we first transform our graphs considered as high dimensional objects in linear structures. Then we derive similarity values from the alignments of the property strings in order to measure the structural similarity of generalized trees. Hence, we transform a graph similarity problem to a string similarity problem. We demonstrate that our similarity measure captures important structural information by applying it to two different test sets consisting of graphs representing web-based documents.
Abstract: The national economy development affects the vehicle
ownership which ultimately increases fuel consumption. The rise of
the vehicle ownership is dominated by the increasing number of
motorcycles. This research aims to analyze and identify the
characteristics of fuel consumption, the city transportation system,
and to analyze the relationship and the effect of the city
transportation system on the fuel consumption. A multivariable
analysis is used in this study. The data analysis techniques include: a
Multivariate Multivariable Analysis by using the R software. More
than 84% of fuel on Java is consumed in metropolitan and large
cities. The city transportation system variables that strongly effect the
fuel consumption are population, public vehicles, private vehicles and
private bus. This method can be developed to control the fuel
consumption by considering the urban transport system and city
tipology. The effect can reducing subsidy on the fuel consumption,
increasing state economic.
Abstract: Creative design requires new approaches to assessment
in vocational and technological education. To date, there has been little
discussion on instruments used to evaluate dies produced by students
in vocational and technological education. Developing a generic
instrument has been very difficult due to the diversity of creative
domains, the specificity of content, and the subjectivity involved in
judgment. This paper presents an instrument for measuring the
creativity in the design of products by expanding the Consensual
Assessment Technique (CAT). The content-based scale was evaluated
for content validity by 5 experts. The scale comprises 5 criteria:
originality; practicability; precision; aesthetics; and exchangeability.
Nine experts were invited to evaluate the dies produced by 38 college
students who enrolled in a Product Design and Development course.
To further explore the degree of rater agreement, inter-rater reliability
was calculated for each dimension using Kendall's coefficient of
concordance test. The inter-judge reliability scores achieved
significance, with coefficients ranging from 0.53 to 0.71.
Abstract: In this paper a new robust digital image watermarking
algorithm based on the Complex Wavelet Transform is proposed. This
technique embeds different parts of a watermark into different blocks
of an image under the complex wavelet domain. To increase security
of the method, two chaotic maps are employed, one map is used to
determine the blocks of the host image for watermark embedding,
and another map is used to encrypt the watermark image. Simulation
results are presented to demonstrate the effectiveness of the proposed
algorithm.