Abstract: Wireless Sensor Networks consist of inexpensive, low power sensor nodes deployed to monitor the environment and collect
data. Gathering information in an energy efficient manner is a critical aspect to prolong the network lifetime. Clustering algorithms have an advantage of enhancing the network lifetime. Current clustering algorithms usually focus on global re-clustering and local re-clustering separately. This paper, proposed a combination of those two reclustering methods to reduce the energy consumption of the network. Furthermore, the proposed algorithm can apply to homogeneous as well as heterogeneous wireless sensor networks. In addition, the cluster head rotation happens, only when its energy drops below a dynamic threshold value computed by the algorithm. The simulation result shows that the proposed algorithm prolong the network lifetime compared to existing algorithms.
Abstract: Because of the requirement for low sulfur content of
fuel oils, it is necessary to develop alternative methods for desulfurization of heavy fuel oil. Due to the disadvantages of HDS
technologies such as costs, safety and green environment, new
methods have been developed. Among these methods is ultrasoundassisted
oxidative desulfurization. Using ultrasound-assisted
oxidative desulfurization, compounds such as benzothiophene and
dibenzothiophene can be oxidized. As an alternative method is sulfur
elimination of heavy fuel oil by using of activated carbon in a packed column in batch condition. The removal of sulfur compounds in this
case to reach about 99%. The most important property of activated carbon is ability of it for adsorption, which is due to high surface area
and pore volume of it.
Abstract: In this study, the performance of a high-frequency arc
welding machine including a two-switch inverter is analyzed. The
control of the system is achieved using two different control
techniques i- fuzzy logic control (FLC) ii- state space averaging
based sliding control. Fuzzy logic control does not need accurate
mathematical model of a plant and can be used in nonlinear
applications. The second method needs the mathematical model of
the system. In this method the state space equations of the system are
derived for two different “on" and “off" states of the switches. The
derived state equations are combined with the sliding control rule
considering the duty-cycle of the converter. The performance of the
system is analyzed by simulating the system using SIMULINK tool
box of MATLAB. The simulation results show that fuzzy logic
controller is more robust and less sensitive to parameter variations.
Abstract: Although the Vietnamese catfish farming has grown
at very high rates in recent years, the industry has also faced many
problems affecting its sustainability. This paper studies the
perceptions of catfish farmers regarding risk and risk management
strategies in their production activities. Specifically, the study aims
to measure the consequences, likelihoods, and levels of risks as well
as the efficacy of risk management in Vietnamese catfish farming.
Data for the study were collected through a sample of 261 catfish
farmers in the Mekong Delta, Vietnam using a questionnaire survey
in 2008. Results show that, in general, price and production risks
were perceived as the most important risks. Farm management and
technical measures were perceived more effective than other kinds of
risk management strategies in risk reduction. Although price risks
were rated as important risks, price risk management strategies were
not perceived as important measures for risk mitigation. The results
of the study are discussed to provide implications for various
industry stakeholders, including policy makers, processors, advisors,
and developers of new risk management strategies.
Abstract: Cities expansion, urban travels increase, the
technology development, the automobile price cheapen, and the
families' income ascending cause the considerable increase in
automobile numbers of the city. This fact has led to the traffic
creation and the automobile parking site shortage in the city. Also in
Esfahan metropolis, the parking lots shortage has been the great
problem of this town; in addition, in designing and constructing of
the parking sites the traditional methods are utilized which do not
have a reasonable and optimized usage of the valuable urban lands. In
this article, by introducing the prefabricate mechanized parking
system which is inexpensive, simple and quick, and occupies very
small space, therefore provides the high content of parking site for
the cities, we can eliminate the parking space shortage difficulty of
the cities. The achieved results of this research represent that an
optimized utilization of the existent urban spaces for parking site
construction has not been accomplished. By employing the new
parking site technologies such as mechanization categorized parking
sites and the capacity prefabricate mechanized of each parking space
have become 8 multiples; in this case, the valuable urban lands can
be used in an optimized way.
Abstract: In this article, we consider the estimation of P[Y < X], when strength, X and stress, Y are two independent variables of Burr Type XII distribution. The MLE of the R based on one simple iterative procedure is obtained. Assuming that the common parameter is known, the maximum likelihood estimator, uniformly minimum variance unbiased estimator and Bayes estimator of P[Y < X] are discussed. The exact confidence interval of the R is also obtained. Monte Carlo simulations are performed to compare the different proposed methods.
Abstract: According to Rostler method (ASTM D 2006), saturates content of bitumen is determined based on its reactivity to sulphuric acid. While Corbett method (ASTM D 4124) based on its polarity level. This paper presents results from the study on the effect of saturates content determined by two different fractionation methods on the rheological and aging characteristics of bitumen. The result indicated that the increment of saturates content tended to reduce all the rheological characteristics concerned. Bitumen became less elastic, less viscous, and less resistant to plastic deformation, but became more resistant to fatigue cracking. After short and long term aging process, the treatment effect coefficients of saturates decreased, saturates became thicker due to aging process. This study concludes that saturates is not really stable or reactive in aging process. Therefore, the reactivity of saturates should be considered in bitumen aging index
Abstract: Economic models are complex dynamic systems with a lot of uncertainties and fuzzy data. Conventional modeling approaches using well known methods and techniques cannot provide realistic and satisfactory answers to today-s challenging economic problems. Qualitative modeling using fuzzy logic and intelligent system theories can be used to model macroeconomic models. Fuzzy Cognitive maps (FCM) is a new method been used to model the dynamic behavior of complex systems. For the first time FCMs and the Mamdani Model of Intelligent control is used to model macroeconomic models. This new model is referred as the Mamdani Rule-Based Fuzzy Cognitive Map (MBFCM) and provides the academic and research community with a new promising integrated advanced computational model. A new economic model is developed for a qualitative approach to Macroeconomic modeling. Fuzzy Controllers for such models are designed. Simulation results for an economic scenario are provided and extensively discussed
Abstract: Exchange algorithm with constraints on magnitude and phase error separately in new way is presented in this paper. An important feature of the algorithms presented in this paper is that they allow for design constraints which often arise in practical filter design problems. Meeting required minimum stopband attenuation or a maximum deviation from the desired magnitude and phase responses in the passbands are common design constraints that can be handled by the methods proposed here. This new algorithm may have important advantages over existing technique, with respect to the speed and stability of convergence, memory requirement and low ripples.
Abstract: Islamic institutions in Malaysia play a variety of
socioeconomic roles such as poverty alleviation. To perform this role,
these institutions face a major task in identifying the poverty group.
Most of these institutions measure and operationalize poverty from
the monetary perspective using variables such as income, expenditure
or consumption. In practice, most Islamic institutions in Malaysia use
the monetary approach in measuring poverty through the
conventional Poverty Line Income (PLI) method and recently, the
had al kifayah (HAK) method using total necessities of a household
from an Islamic perspective. The objective of this paper is to present
the PLI and also the HAK method. This micro-data study would
highlight the similarities and differences of both the methods.A
survey aided by a structured questionnaire was carried out on 260
selected head of households in the state of Selangor. The paper
highlights several demographic factors that are associated with the
three monetary indicators in the study, namely income, PLI and
HAK. In addition, the study found that these monetary variables are
significantly related with each other.
Abstract: In this study, a comparison of two control methods,
Proportional Control (PC) and Fuzzy Logic Control (FLC), which
have been used to develop an ideal thermoelectric renal hypothermia
system in order to use in renal surgery, has been carried out. Since
the most important issues in long-lasting parenchymatous renal
surgery are to provide an operation medium free of blood and to
prevent renal dysfunction in the postoperative period, control of the
temperature has become very important in renal surgery. The final
product is seriously affected from the changes in temperature,
therefore, it is necessary to reach some desired temperature points
quickly and avoid large overshoot. PIC16F877 microcontroller has
been used as controller for both of these two methods. Each control
method can simply ensure extra renal hypothermia in the targeted
way. But investigation of advantages and disadvantages of every
control method to each other is aimed and carried out by the
experimental implementations. Shortly, investigation of the most
appropriate method to use for development of system and that can be
applied to people safely in the future, has been performed. In this
sense, experimental results show that fuzzy logic control gives out
more reliable responses and efficient performance.
Abstract: In data mining, the association rules are used to search
for the relations of items of the transactions database. Following the
data is collected and stored, it can find rules of value through
association rules, and assist manager to proceed marketing strategy
and plan market framework. In this paper, we attempt fuzzy partition
methods and decide membership function of quantitative values of
each transaction item. Also, by managers we can reflect the
importance of items as linguistic terms, which are transformed as
fuzzy sets of weights. Next, fuzzy weighted frequent pattern growth
(FWFP-Growth) is used to complete the process of data mining. The
method above is expected to improve Apriori algorithm for its better
efficiency of the whole association rules. An example is given to
clearly illustrate the proposed approach.
Abstract: An exploration in the competency of the optical
multilevel Mapping Multiplexing Technique (MMT) system in
tolerating to the impact of nonlinearities as Self Phase Modulation
(SPM) during the presence of dispersion compensation methods. The
existence of high energy pulses stimulates deterioration in the chirp
compression process attained by SPM which introduces an upper
power boundary limit. An evaluation of the post and asymmetric prepost
fiber compensation methods have been deployed on the MMT
system compared with others of the same bit rate modulation formats.
The MMT 40 Gb/s post compensation system has 1.4 dB
enhancements to the 40 Gb/s 4-Arysystem and less than 3.9 dB
penalty compared to the 40 Gb/s OOK-RZsystem. However, the
optimized Pre-Post asymmetric compensation has an enhancement of
4.6 dB compared to the Post compensation MMT configuration for a
30% pre compensation dispersion.
Abstract: HIV-1 genome is highly heterogeneous. Due to this
variation, features of HIV-I genome is in a wide range. For this
reason, the ability to infection of the virus changes depending on
different chemokine receptors. From this point of view, R5 HIV
viruses use CCR5 coreceptor while X4 viruses use CXCR5 and
R5X4 viruses can utilize both coreceptors. Recently, in
Bioinformatics, R5X4 viruses have been studied to classify by using
the experiments on HIV-1 genome.
In this study, R5X4 type of HIV viruses were classified using
Auto Regressive (AR) model through Artificial Neural Networks
(ANNs). The statistical data of R5X4, R5 and X4 viruses was
analyzed by using signal processing methods and ANNs. Accessible
residues of these virus sequences were obtained and modeled by AR
model since the dimension of residues is large and different from
each other. Finally the pre-processed data was used to evolve various
ANN structures for determining R5X4 viruses. Furthermore ROC
analysis was applied to ANNs to show their real performances. The
results indicate that R5X4 viruses successfully classified with high
sensitivity and specificity values training and testing ROC analysis
for RBF, which gives the best performance among ANN structures.
Abstract: Intrusion detection systems (IDS)are crucial components
of the security mechanisms of today-s computer systems.
Existing research on intrusion detection has focused on sequential
intrusions. However, intrusions can also be formed by concurrent
interactions of multiple processes. Some of the intrusions caused
by these interactions cannot be detected using sequential intrusion
detection methods. Therefore, there is a need for a mechanism that
views the distributed system as a whole. L-BIDS (Lattice-Based
Intrusion Detection System) is proposed to address this problem. In
the L-BIDS framework, a library of intrusions and distributed traces
are represented as lattices. Then these lattices are compared in order
to detect intrusions in the distributed traces.
Abstract: The fast growth in complexity coupled with requests for shorter development periods for embedded systems are bringing demands towards a more effective, i.e. higher-abstract, design process for hardaware/software integrated design. In Software Engineering area, Model Driven Architecture (MDA) and Executable UML (xUML) has been accepted to bring further improvement in software design. This paper constructs MDA and xUML stepwise transformations from an abstract specification model to a more concrete implementation model using the refactoring technique for hardaware/software integrated design. This approach provides clear and structured models which enables quick exploration and synthesis, and early stage verification.
Abstract: In this paper we apply one of approaches in category of heuristic methods as Genetic Algorithms for obtaining approximate solution of optimal control problems. The firs we convert optimal control problem to a quasi Assignment Problem by defining some usual characters as defined in Genetic algorithm applications. Then we obtain approximate optimal control function as an piecewise constant function. Finally the numerical examples are given.
Abstract: Reducing energy consumption of embedded systems requires careful memory management. It has been shown that Scratch- Pad Memories (SPMs) are low size, low cost, efficient (i.e. energy saving) data structures directly managed at the software level. In this paper, the focus is on heuristic methods for SPMs management. A method is efficient if the number of accesses to SPM is as large as possible and if all available space (i.e. bits) is used. A Tabu Search (TS) approach for memory management is proposed which is, to the best of our knowledge, a new original alternative to the best known existing heuristic (BEH). In fact, experimentations performed on benchmarks show that the Tabu Search method is as efficient as BEH (in terms of energy consumption) but BEH requires a sorting which can be computationally expensive for a large amount of data. TS is easy to implement and since no sorting is necessary, unlike BEH, the corresponding sorting time is saved. In addition to that, in a dynamic perspective where the maximum capacity of the SPM is not known in advance, the TS heuristic will perform better than BEH.
Abstract: The various types of frequent pattern discovery
problem, namely, the frequent itemset, sequence and graph mining
problems are solved in different ways which are, however, in certain
aspects similar. The main approach of discovering such patterns can
be classified into two main classes, namely, in the class of the levelwise
methods and in that of the database projection-based methods.
The level-wise algorithms use in general clever indexing structures
for discovering the patterns. In this paper a new approach is proposed
for discovering frequent sequences and tree-like patterns efficiently
that is based on the level-wise issue. Because the level-wise
algorithms spend a lot of time for the subpattern testing problem, the
new approach introduces the idea of using automaton theory to solve
this problem.
Abstract: The image segmentation method described in this
paper has been developed as a pre-processing stage to be used in
methodologies and tools for video/image indexing and retrieval by
content. This method solves the problem of whole objects extraction
from background and it produces images of single complete objects
from videos or photos. The extracted images are used for calculating
the object visual features necessary for both indexing and retrieval
processes.
The segmentation algorithm is based on the cooperation among an
optical flow evaluation method, edge detection and region growing
procedures. The optical flow estimator belongs to the class of
differential methods. It permits to detect motions ranging from a
fraction of a pixel to a few pixels per frame, achieving good results in
presence of noise without the need of a filtering pre-processing stage
and includes a specialised model for moving object detection.
The first task of the presented method exploits the cues from
motion analysis for moving areas detection. Objects and background
are then refined using respectively edge detection and seeded region
growing procedures. All the tasks are iteratively performed until
objects and background are completely resolved.
The method has been applied to a variety of indoor and outdoor
scenes where objects of different type and shape are represented on
variously textured background.