Abstract: Adapting various sensor devices to communicate
within sensor networks empowers us by providing range of
possibilities. The sensors in sensor networks need to know their
measurable belief of trust for efficient and safe communication. In this
paper, we suggested a trust model using fuzzy logic in sensor network.
Trust is an aggregation of consensus given a set of past interaction
among sensors. We applied our suggested model to sensor networks in
order to show how trust mechanisms are involved in communicating
algorithm to choose the proper path from source to destination.
Abstract: This text studies glass bottle intelligent inspector
based machine vision instead of manual inspection. The system
structure is illustrated in detail in this paper. The text presents the
method based on watershed transform methods to segment the
possible defective regions and extract features of bottle wall by rules.
Then wavelet transform are used to exact features of bottle finish
from images. After extracting features, the fuzzy support vector
machine ensemble is putted forward as classifier. For ensuring that
the fuzzy support vector machines have good classification ability,
the GA based ensemble method is used to combining the several
fuzzy support vector machines. The experiments demonstrate that
using this inspector to inspect glass bottles, the accuracy rate may
reach above 97.5%.
Abstract: A phenomenological model for species spreading which incorporates the Allee effect, a species- maximum attainable growth rate, collective dispersal rate and dispersal adaptability is presented. This builds on a well-established reaction-diffusion model for spatial spreading of invading organisms. The model is phrased in terms of the “hostility" (which quantifies the Allee threshold in relation to environmental sustainability) and dispersal adaptability (which measures how a species is able to adapt its migratory response to environmental conditions). The species- invading/retreating speed and the sharpness of the invading boundary are explicitly characterised in terms of the fundamental parameters, and analysed in detail.
Abstract: This paper describes a combined mathematicalgraphical
approach for optimum tool path planning in order to
improve machining efficiency. A methodology has been used that
stabilizes machining operations by adjusting material removal rate in
pocket milling operations while keeping cutting forces within limits.
This increases the life of cutting tool and reduces the risk of tool
breakage, machining vibration, and chatter. Case studies reveal the
fact that application of this approach could result in a slight increase
of machining time, however, a considerable reduction of tooling cost,
machining vibration, noise and chatter can be achieved in addition to
producing a better surface finish.
Abstract: FACTS devices are used to control the power flow, to
increase the transmission capacity and to optimize the stability of the
power system. One of the most widely used FACTS devices is
Unified Power Flow Controller (UPFC). The controller used in the
control mechanism has a significantly effects on controlling of the
power flow and enhancing the system stability of UPFC. According
to this, the capability of UPFC is observed by using different control
mechanisms based on P, PI, PID and fuzzy logic controllers (FLC) in
this study. FLC was developed by taking consideration of Takagi-
Sugeno inference system in the decision process and Sugeno-s
weighted average method in the defuzzification process. Case studies
with different operating conditions are applied to prove the ability of
UPFC on controlling the power flow and the effectiveness of
controllers on the performance of UPFC. PSCAD/EMTDC program
is used to create the FLC and to simulate UPFC model.
Abstract: Innovational development of regions in Russia is generally faced with the essential influence from federal and local authorities. The organization of effective mechanism of innovation development (and self-development) is impossible without establishment of defined institutional conditions in the analyzed field. Creative utilization of scientific concepts and information should merge, giving rise to continuing innovation and advanced production. The paper presents an analysis of institutional conditions in the field of creation and development of innovation activity infrastructure and transferring of knowledge and skills between different economic agents in Russia. Knowledge is mainly privately owned, developed through R&D investments and incorporated into technology or a product. Innovation infrastructure is a strong concentration mechanism of advanced facilities, which are mainly located inside large agglomerations or city-regions in order to benefit from scale effects in both input markets (human capital, private financial capital) and output markets (higher education services, research services). The empirical results of the paper show that in the presence of more efficient innovation and knowledge transfer and transcoding system and of a more open attitude of economic agents towards innovation, the innovation and knowledge capacity of regional economy is much higher.
Abstract: In Secondary Surveillance Radar (SSR) systems, it is
more difficult to locate and recognise aircrafts in the neighbourhood of civil airports since aerial traffic becomes greater. Here, we propose to apply a recent Blind Source Separation (BSS) algorithm based
on Time-Frequency Analysis, in order to separate messages sent by different aircrafts and falling in the same radar beam in reception. The above source separation method involves joint-diagonalization
of a set of smoothed version of spatial Wigner-Ville distributions.
The technique makes use of the difference in the t-f signatures of the nonstationary sources to be separated. Consequently, as the SSR sources emit different messages at different frequencies, the above fitted to this new application. We applied the technique in simulation to separate SSR replies. Results are provided at the end
of the paper.
Abstract: Platinum oxide nanoparticles were prepared by a
simple hydrothermal route and chemical reduction using
carbohydrates (Fructose and sucrose) as the reducing and
stabilizing agents. The crystallite size of these nanoparticles was
evaluated from X-ray diffraction (XRD), atomic force microscopy
(AFM) and transmission electron microscopy (TEM) and was
found to be 10 nm as shown in figure 1, which is the
demonstration of EM bright field and transmission electron
microscopy. The effect of carbohydrates on the morphology of the
nanoparticles was studied using TEM (Figure 1). The
nanoparticles (100 μg/ml) were administered to the Pseudomonas
Stutzeri and Lactobacillus cultures and the incubation was done at
35 oC for 24 hours. The nanocomposites exhibited interesting
inhibitory as well as bactericidal activity against P. Stutzeri and
and Lactobacillus species. Incorporation of nanoparticles also
increased the thermal stability of the carbohydrates.
Abstract: The present work is concerned with the free
convective two dimensional flow and heat transfer, in isotropic fluid
filled porous rectangular enclosure with differentially heated walls for
steady state incompressible flow have been investigated for non-
Darcy flow model. Effects of Darcy number (0.0001 £Da£ 10),
Rayleigh number (10 £Ra£ 5000), and aspect ratio (0.25 £AR£ 4), for
a range of porosity (0.4 £e£ 0.9) with and without moving lower wall
have been studied. The cavity was insulated at the lower and upper
surfaces. The right and left heated surfaces allows convective
transport through the porous medium, generating a thermal
stratification and flow circulations. It was found that the Darcy
number, Rayleigh number, aspect ratio, and porosity considerably
influenced characteristics of flow and heat transfer mechanisms. The
results obtained are discussed in terms of the Nusselt number,
vectors, contours, and isotherms.
Abstract: Asynchronous Transfer Mode (ATM) is widely used
in telecommunications systems to send data, video and voice at a
very high speed. In ATM network optimizing the bandwidth through
dynamic routing is an important consideration. Previous research
work shows that traditional optimization heuristics result in suboptimal
solution. In this paper we have explored non-traditional
optimization technique. We propose comparison of two such
algorithms - Genetic Algorithm (GA) and Tabu search (TS), based on
non-traditional Optimization approach, for solving the dynamic
routing problem in ATM networks which in return will optimize the
bandwidth. The optimized bandwidth could mean that some
attractive business applications would become feasible such as high
speed LAN interconnection, teleconferencing etc. We have also
performed a comparative study of the selection mechanisms in GA
and listed the best selection mechanism and a new initialization
technique which improves the efficiency of the GA.
Abstract: Microbial contamination, most of which are fecal born in drinking water and food industry is a serious threat to humans. Escherichia coli is one of the most common and prevalent among them. We have developed a sensor for rapid and an early detection of contaminants, taking E.coli as a threat indicator organism. The sensor is based on co-polymerizations of aniline and formaldehyde in form of thin film over glass surface using the vacuum deposition technique. The particular doping combination of thin film with Fe-Al and Fe-Cu in different concentrations changes its non conducting properties to p- type semi conductor. This property is exploited to detect the different contaminants, believed to have the different surface charge. It was found through experiments that different microbes at same OD (0.600 at 600 nm) have different conductivity in solution. Also the doping concentration is found to be specific for attracting microbes on the basis of surface charge. This is a simple, cost effective and quick detection method which not only decreases the measurement time but also gives early warnings for highly contaminated samples.
Abstract: 15 strains of oil-destructing microorganisms were
isolated from oil polluted soil of Western Kazakhstan. Strains 2-A
and 41-3 with the highest oil-destructing activities were chosen from
them. It was shown that these strains oxidized n-alkanes very well,
but isoalkanes, isoparaffin, cycloparaffin and heavy aromatic
compounds were destructed very slowly. These both strains were
tested as preparations for bioremediation of oil-polluted soil in model
and field experiments. The degree of utilizing of soil oil by this
preparation was 79-84 % in field experiments.
Abstract: The VoIP networks as alternative method to traditional PSTN system has been implemented in a wide variety of structures
with multiple protocols, codecs, software and hardware–based
distributions. The use of cryptographic techniques let the users to have a secure communication, but the calculate throughput as well as the QoS parameters are affected according to the used algorithm. This
paper analyzes the VoIP throughput and the QoS parameters with
different commercial encryption methods. The measurement–based
approach uses lab scenarios to simulate LAN and WAN
environments. Security mechanisms such as TLS, SIAX2, SRTP,
IPSEC and ZRTP are analyzed with μ-LAW and GSM codecs.
Abstract: The physiological effects of physical exercise on
human body are relatively well known in literature, which describes
in detail the changes that occur in the cardiovascular system, the
respiratory one, in bones and other systems, both during exercise
and after its delivery. However, the effects of exercise on mental
processes are less treated. From the literature reviews discussed in
this study, it can be detached the idea that we can not exactly say that
physical exercise has beneficial effects on mental processes, but
neither that it would have potentially negative effects. This
uncertainty, reflected in the inability to indicate precise and
unequivocal meaning, favorable-unfavorable physical effort in acting
on mental processes, is a prime reason to undertake a study of the
phenomenon influence effort administered physical education classes
on the dynamics of mental processes like attention and memory.
Abstract: For a variety of safety and economic reasons, engineering undergraduates in Australia have experienced diminishing access to the real hardware that is typically the embodiment of their theoretical studies. This trend will delay the development of practical competence, decrease the ability to model and design, and suppress motivation. The author has attempted to address this concern by creating a software tool that contains both photographic images of real machinery, and sets of graphical modeling 'tools'. Academics from a range of disciplines can use the software to set tutorial tasks, and incorporate feedback comments for a range of student responses. An evaluation of the software demonstrated that students who had solved modeling problems with the aid of the electronic tutor performed significantly better in formal examinations with similar problems. The 2-D graphical diagnostic routines in the Tutor have the potential to be used in a wider range of problem-solving tasks.
Abstract: Artificial Neural Networks (ANNs) have been used successfully in many scientific, industrial and business domains as a method for extracting knowledge from vast amounts of data. However the use of ANN techniques in the sporting domain has been limited. In professional sport, data is stored on many aspects of teams, games, training and players. Sporting organisations have begun to realise that there is a wealth of untapped knowledge contained in the data and there is great interest in techniques to utilise this data. This study will use player data from the elite Australian Football League (AFL) competition to train and test ANNs with the aim to predict the onset of injuries. The results demonstrate that an accuracy of 82.9% was achieved by the ANNs’ predictions across all examples with 94.5% of all injuries correctly predicted. These initial findings suggest that ANNs may have the potential to assist sporting clubs in the prediction of injuries.
Abstract: This paper describes a paradigmatic approach to develop architecture of secure systems by describing the requirements from four different points of view: that of the owner, the administrator, the user, and the network. Deriving requirements and developing architecture implies the joint elicitation and describing the problem and the structure of the solution. The view points proposed in this paper are those we consider as requirements towards their contributions as major parties in the design, implementation, usage and maintenance of secure systems. The dramatic growth of the technology of Internet and the applications deployed in World Wide Web have lead to the situation where the security has become a very important concern in the development of secure systems. Many security approaches are currently being used in organizations. In spite of the widespread use of many different security solutions, the security remains a problem. It is argued that the approach that is described in this paper for the development of secure architecture is practical by all means. The models representing these multiple points of view are termed the requirements model (views of owner and administrator) and the operations model (views of user and network). In this paper, this multiple view paradigm is explained by first describing the specific requirements and or characteristics of secure systems (particularly in the domain of networks) and the secure architecture / system development methodology.
Abstract: Identifying protein coding regions in DNA sequences is a basic step in the location of genes. Several approaches based on signal processing tools have been applied to solve this problem, trying to achieve more accurate predictions. This paper presents a new predictor that improves the efficacy of three techniques that use the Fourier Transform to predict coding regions, and that could be computed using an algorithm that reduces the computation load. Some ideas about the combination of the predictor with other methods are discussed. ROC curves are used to demonstrate the efficacy of the proposed predictor, based on the computation of 25 DNA sequences from three different organisms.
Abstract: This paper seeks to give a general idea of the universe of project portfolio management, from its multidisciplinary nature, to the many challenges it raises, passing through the different techniques, models and tools used to solve the multiple problems known. It is intended to contribute to the clarification, with great depth, of the impacts and relationships involved in managing the projects- portfolio. It aims at proposing a technique for the project alignment with the organisational strategy, in order to select projects that later on will be considered in the analysis and selection of the portfolio. We consider the development of a methodology for assessing the project alignment index very relevant in the global market scenario. It can help organisations to gain a greater awareness of market dynamics, speed up the decision process and increase its consistency, thus enabling the strategic alignment and the improvement of the organisational performance.
Abstract: Service discovery is a very important component of Service Oriented Architectures (SOA). This paper presents two alternative approaches to customise the query results of private service registry such as Universal Description, Discovery and Integration (UDDI). The customisation is performed based on some pre-defined and/or real-time changing parameters. This work identifies the requirements, designs and additional mechanisms that must be applied to UDDI in order to support this customisation capability. We also detail the implements of the approaches and examine its performance and scalability. Based on our experimental results, we conclude that both approaches can be used to customise registry query results, but by storing personalization parameters in external resource will yield better performance and but less scalable when size of query results increases. We believe these approaches when combined with semantics enabled service registry will enhance the service discovery methods within a private UDDI registry environment.