Abstract: A simple analytical model has been developed to
optimize biasing conditions for obtaining maximum linearity among
lattice-matched, pseudomorphic and metamorphic HEMT types as
well as enhancement and depletion HEMT modes. A nonlinear
current-voltage model has been simulated based on extracted data to
study and select the most appropriate type and mode of HEMT in
terms of a given gate-source biasing voltage within the device so as
to employ the circuit for the highest possible output current or
voltage linear swing. Simulation results can be used as a basis for the
selection of optimum gate-source biasing voltage for a given type
and mode of HEMT with regard to a circuit design. The
consequences can also be a criterion for choosing the optimum type
or mode of HEMT for a predetermined biasing condition.
Abstract: This communication is intended to provide some issues for thought on the importance of implementation of Blended Learning in traditional universities, particularly in the Spanish university system. In this respect, we believe that virtual environments are likely to meet some of the needs raised by the Bologna agreement, trying to maintain the quality of teaching and at the same time taking advantage of the functionalities that virtual learning platforms offer. We are aware that an approach of learning from an open and constructivist nature in universities is a complex process that faces significant technological, administrative and human barriers. Therefore, in order to put plans in our universities, it is necessary to analyze the state of the art of some indicators relating to the use of ICT, with special attention to virtual teaching and learning, so that we can identify the main obstacles and design adaptive strategies for their full integration in the education system. Finally, we present major initiatives launched in the European and state framework for the effective implementation of new virtual environments in the area of higher education.
Abstract: This paper deals with an adaptive multiuser detector for direct sequence code division multiple-access (DS-CDMA) systems. A modified receiver, precombinig LMMSE is considered under time varying channel environment. Detector updating is performed with two criterions, mean square estimation (MSE) and MOE optimization technique. The adaptive implementation issues of these two schemes are quite different. MSE criterion updates the filter weights by minimizing error between data vector and adaptive vector. MOE criterion together with canonical representation of the detector results in a constrained optimization problem. Even though the canonical representation is very complicated under time varying channels, it is analyzed with assumption of average power profile of multipath replicas of user of interest. The performance of both schemes is studied for practical SNR conditions. Results show that for poor SNR, MSE precombining LMMSE is better than the blind precombining LMMSE but for greater SNR, MOE scheme outperforms with better result.
Abstract: In recent years, strategic alliances have taken
increasing importance as a means to control competitive forces and to
enter into new markets. Joint ventures are one of the most frequently
used contractual forms in strategic alliances. There are various
motivations for cooperation between two or more firms e.g.,
accessing to technical know-how, accessing to financial resources
and managing risks. The firms must know about these motivations to
encourage for establishing joint venture. So, it is important for
managers to understand about these motives. On the other hand, the
cooperation section is one of the most effective parts in each country.
In this way, our study identifies goals of joint venture between
cooperative manufacturing firms, and prioritizes those using
TOPSIS1. The results show that the most important of joint venture
goals are: accessing to managerial know-how, sharing total capital
investment.
Abstract: The advent of modern technology shadows its impetus repercussions on successful Legacy systems making them obsolete with time. These systems have evolved the large organizations in major problems in terms of new business requirements, response time, financial depreciation and maintenance. Major difficulty is due to constant system evolution and incomplete, inconsistent and obsolete documents which a legacy system tends to have. The myriad dimensions of these systems can only be explored by incorporating reverse engineering, in this context, is the best method to extract useful artifacts and by exploring these artifacts for reengineering existing legacy systems to meet new requirements of organizations. A case study is conducted on six different type of software systems having source code in different programming languages using the architectural recovery framework.
Abstract: Program slicing is the task of finding all statements in a program that directly or indirectly influence the value of a variable occurrence. The set of statements that can affect the value of a variable at some point in a program is called a program slice. In several software engineering applications, such as program debugging and measuring program cohesion and parallelism, several slices are computed at different program points. In this paper, algorithms are introduced to compute all backward and forward static slices of a computer program by traversing the program representation graph once. The program representation graph used in this paper is called Program Dependence Graph (PDG). We have conducted an experimental comparison study using 25 software modules to show the effectiveness of the introduced algorithm for computing all backward static slices over single-point slicing approaches in computing the parallelism and functional cohesion of program modules. The effectiveness of the algorithm is measured in terms of time execution and number of traversed PDG edges. The comparison study results indicate that using the introduced algorithm considerably saves the slicing time and effort required to measure module parallelism and functional cohesion.
Abstract: Aggression is a behavior that cannot be approved by
the society. Vandalism which is aggression towards objects is an
action that tends to damage public or personal property. The
behaviors that are described as vandalism can often be observed in
the schools as well. According to Zwier and Vaughan (1)
previous research about the reasons of and precautionary measures
for vandalism in schools can be grouped in three tendency categories:
conservative, liberal and radical. In this context, the main aim of this
study is to discover which ideological tendency of the reasons of
school vandalism is adopted by the teachers and what are their
physical, environmental, school system and societal solutions for
vandalism. A total of 200 teachers participated in this study, and the
mean age was 34.20 years (SD = 6.54). The sample was made up of
109 females and 91 males. For the analysis of the data, SPSS 15.00,
frequency, percentage, and t-test were used. The research showed
that the teachers have tendencies in the order of conservative, liberal
and radical for the reasons of vandalism. The research also showed
that the teachers do not have any tendency for eliminating vandalism
physically and general solutions on the level of society; on the other
hand they mostly adopt a conservative tendency in terms of
precautions against vandalism in the school system. Second most,
they adopt the liberal tendency in terms of precautions against
vandalism in the school system. . It is observed that the findings of
this study are comparable to the existing literature on the subject.
Future studies should be conducted with multiple variants and
bigger sampling.
Abstract: We present here the results for a comparative study of
some techniques, available in the literature, related to the relevance
feedback mechanism in the case of a short-term learning. Only one
method among those considered here is belonging to the data mining
field which is the K-nearest neighbors algorithm (KNN) while the
rest of the methods is related purely to the information retrieval field
and they fall under the purview of the following three major axes:
Shifting query, Feature Weighting and the optimization of the
parameters of similarity metric. As a contribution, and in addition to
the comparative purpose, we propose a new version of the KNN
algorithm referred to as an incremental KNN which is distinct from
the original version in the sense that besides the influence of the
seeds, the rate of the actual target image is influenced also by the
images already rated. The results presented here have been obtained
after experiments conducted on the Wang database for one iteration
and utilizing color moments on the RGB space. This compact
descriptor, Color Moments, is adequate for the efficiency purposes
needed in the case of interactive systems. The results obtained allow
us to claim that the proposed algorithm proves good results; it even
outperforms a wide range of techniques available in the literature.
Abstract: Fuzzy logic approach is used in this study to predict
the tractive performance in terms of traction force, and motion
resistance for an intelligent air cushion track vehicle while it operates
in the swamp peat. The system is effective to control the intelligent
air –cushion system with measuring the vehicle traction force (TF),
motion resistance (MR), cushion clearance height (CH) and cushion
pressure (CP). Sinkage measuring sensor, magnetic switch, pressure
sensor, micro controller, control valves and battery are incorporated
with the Fuzzy logic system (FLS) to investigate experimentally the
TF, MR, CH, and CP. In this study, a comparison for tractive
performance of an intelligent air cushion track vehicle has been
performed with the results obtained from the predicted values of FLS
and experimental actual values. The mean relative error of actual and
predicted values from the FLS model on traction force, and total
motion resistance are found as 5.58 %, and 6.78 % respectively. For
all parameters, the relative error of predicted values are found to be
less than the acceptable limits. The goodness of fit of the prediction
values from the FLS model on TF, and MR are found as 0.90, and
0.98 respectively.
Abstract: A numerical solution of the initial boundary value
problem of the suspended string vibrating equation with the
particular nonlinear damping term based on the finite difference
scheme is presented in this paper. The investigation of how the
second and third power terms of the nonlinear term affect the
vibration characteristic. We compare the vibration amplitude as a
result of the third power nonlinear damping with the second power
obtained from previous report provided that the same initial shape
and initial velocities are assumed. The comparison results show that
the vibration amplitude is inversely proportional to the coefficient of
the damping term for the third power nonlinear damping case, while
the vibration amplitude is proportional to the coefficient of the
damping term in the second power nonlinear damping case.
Abstract: In this paper we present an energy efficient match-line
(ML) sensing scheme for high-speed ternary content-addressable
memory (TCAM). The proposed scheme isolates the sensing unit of
the sense amplifier from the large and variable ML capacitance. It
employs feedback in the sense amplifier to successfully detect a
match while keeping the ML voltage swing low. This reduced voltage
swing results in large energy saving. Simulation performed using
130nm 1.2V CMOS logic shows at least 30% total energy saving in
our scheme compared to popular current race (CR) scheme for
similar search speed. In terms of speed, dynamic energy, peak power
consumption and transistor count our scheme also shows better
performance than mismatch-dependant (MD) power allocation
technique which also employs feedback in the sense amplifier.
Additionally, the implementation of our scheme is simpler than CR
or MD scheme because of absence of analog control voltage and
programmable delay circuit as have been used in those schemes.
Abstract: An HPLC-UV analytical method was developed to
determine ethylenediaminetetraacetic acid (EDTA) in dairy
wastewater and surface water. The optimizing separation was achieved
by reversed–phase ion-pair liquid chromatography on a C18 column
using methanol as mobile phase solvent, tetrabutylammonium bromide
as the ion-pair reagent in pH 3.3 formate buffer solution at a flow rate
of 0.9 mL min-1 with a UV detector at 265 nm. No interference of Ca,
Mg or NO3
- was detected. Method performance was evaluated in terms
of linearity, repeatability and reproducibility. The method detection
limit was 5 μg L-1. The contents of EDTA in dairy effluents were 72 ~
261 μg L-1 at a large dairy site. A change of EDTA concentration was
observed downstream of the dairy effluent discharge, but this was well
under the predicted no effect concentration for aquatic ecosystem.
Abstract: In this paper, half bridge DC-DC converters with
transformer isolation presented in the literature are analyzed for highcurrent
and low-voltage applications under the same operation
conditions, and compared in terms of losses and efficiency. The
conventional and improved half-bridge DC-DC converters are
simulated, and current and voltage waveforms are obtained for input
voltage Vdc=500V, output current IO=450A, output voltage VO=38V
and switching frequency fS=20kHz. IGBTs are used as power
semiconductor switches. The power losses of the semiconductor
devices are calculated from current and voltage waveforms. From
simulation results, it is seen that the capacitor switched half bridge
converter has the best efficiency value, and can be preferred at high
power and high frequency applications.
Abstract: A modified Saleh-Valenzuela channel model has been
adapted for Ultra Wideband (UWB) system. The suggested realistic
channel is assessed by its distribution of fading amplitude and time of
arrivals. Furthermore, the propagation characteristic has been distinct
into four channel models, namely CM 1 to 4. Each are differentiate in
terms of cluster arrival rates, rays arrival rate within each cluster and
its respective constant decay rates. This paper described the
multiband OFDM system performance simulates under these
multipath conditions. Simulation work described in this paper is
based on WiMedia ECMA-368 standard, which has been deployed
for practical implementation of low cost and low power UWB
devices.
Abstract: Solidarity and kinship has long been an intangible
emblem to Malay community especially in the rural area. It is visibly
seen through the dependability among each unit of the community
either in religious and social events including the matrimonial or
wedding. Nevertheless, the inevitable phenomenon, modernization
legitimately alters every facets of human life not only the routines,
traditions, rituals, norms but also to the daily activities and the
specific occasion. Using triangulation approach of interview and self
completed questionnaire this study empirically examine the level of
alteration of Malays wedding foodways which relate to the
preparation and consumption of it and its impact on the community
social bonding. Some meaningful insights were obtained whereby
modernization through technology (modern equipments) and social
factors (education, migration, and high disposal income) significantly
contribute to the alteration of wedding foodways from preparation up
to consumption stages. The domino effect of this alteration
consequently leads to the fragility of social kinship or somehow
reduced cohesiveness and interaction among the individual of Malay
society in the rural area.
Abstract: Mendelian Disease Genes represent a collection of single points of failure for the various systems they constitute. Such genes have been shown, on average, to encode longer proteins than 'non-disease' proteins. Existing models suggest that this results from the increased likeli-hood of longer genes undergoing mutations. Here, we show that in saturated mutagenesis experiments performed on model organisms, where the likelihood of each gene mutating is one, a similar relationship between length and the probability of a gene being lethal was observed. We thus suggest an extended model demonstrating that the likelihood of a mutated gene to produce a severe phenotype is length-dependent. Using the occurrence of conserved domains, we bring evidence that this dependency results from a correlation between protein length and the number of functions it performs. We propose that protein length thus serves as a proxy for protein cardinality in different networks required for the organism's survival and well-being. We use this example to argue that the collection of Mendelian Disease Genes can, and should, be used to study the rules governing systems vulnerability in living organisms.
Abstract: This paper proposes a fast tree join scheme to provide
seamless multicast handover in the mobile networks based on the Fast
Mobile IPv6 (FMIPv6). In the existing FMIPv6-based multicast
handover scheme, the bi-directional tunnelling or the remote
subscription is employed with the packet forwarding from the previous
access router (AR) to the new AR. In general, the remote subscription
approach is preferred to the bi-directional tunnelling one, since in the
remote subscription scheme we can exploit an optimized multicast
path from a multicast source to many mobile receivers. However, in
the remote subscription scheme, if the tree joining operation takes a
long time, the amount of data packets to be forwarded and buffered for
multicast handover will increase, and thus the corresponding buffer
may overflow, which results in severe packet losses. In order to reduce
these costs associated with packet forwarding and buffering, this paper
proposes the fast join to multicast tree, in which the new AR will join
the multicast tree as fast as possible, so that the new multicast data
packets can also arrive at the new AR, by which the packet forwarding
and buffering costs can be reduced. From numerical analysis, it is
shown that the proposed scheme can give better performance than the
existing FMIPv6-based multicast handover schemes in terms of the
multicast packet delivery costs.
Abstract: A new automatic system for the recognition and re¬construction of resealed and/or rotated partially occluded objects is presented. The objects to be recognized are described by 2D views and each view is occluded by several half-planes. The whole object views and their visible parts (linear cuts) are then stored in a database. To establish if a region R of an input image represents an object possibly occluded, the system generates a set of linear cuts of R and compare them with the elements in the database. Each linear cut of R is associated to the most similar database linear cut. R is recognized as an instance of the object 0 if the majority of the linear cuts of R are associated to a linear cut of views of 0. In the case of recognition, the system reconstructs the occluded part of R and determines the scale factor and the orientation in the image plane of the recognized object view. The system has been tested on two different datasets of objects, showing good performance both in terms of recognition and reconstruction accuracy.
Abstract: Porcine production in China represents approximately
the 50% of the worldwide pig production. Information about pig
husbandry characteristics in China and manure properties from sows
to fatteners in intensive pig farms are not broadly available for
scientific studies as it is a time consuming, expensive task and highly
inaccessible. This study provides a report about solid pig manures
(28% dry matter) in a commercial pig farm located in the peri-urban
area of Beijing as well as a general overview of the current pig
husbandry techniques including pig breeds, feeds, diseases, housing as
well as pig manure and wastewater disposal. The main results are
intended to serve as a literature source for young scientists in order to
understand the main composition of pig manures as well as to identify
the husbandry techniques applied in an intensive pig farm in Beijing.
Abstract: Methods for organizing web data into groups in order
to analyze web-based hypertext data and facilitate data availability
are very important in terms of the number of documents available
online. Thereby, the task of clustering web-based document structures
has many applications, e.g., improving information retrieval on the
web, better understanding of user navigation behavior, improving web
users requests servicing, and increasing web information accessibility.
In this paper we investigate a new approach for clustering web-based
hypertexts on the basis of their graph structures. The hypertexts will
be represented as so called generalized trees which are more general
than usual directed rooted trees, e.g., DOM-Trees. As a important
preprocessing step we measure the structural similarity between the
generalized trees on the basis of a similarity measure d. Then,
we apply agglomerative clustering to the obtained similarity matrix
in order to create clusters of hypertext graph patterns representing
navigation structures. In the present paper we will run our approach
on a data set of hypertext structures and obtain good results in
Web Structure Mining. Furthermore we outline the application of
our approach in Web Usage Mining as future work.