Abstract: Femtocells are regarded as a milestone for next
generation cellular networks. As femtocells are deployed in an
unplanned manner, there is a chance of assigning same resource to
neighboring femtocells. This scenario may induce co-channel
interference and may seriously affect the service quality of
neighboring femtocells. In addition, the dominant transmit power of a
femtocell will induce co-tier interference to neighboring femtocells.
Thus to jointly handle co-tier and co-channel interference, we
propose an interference-free power and resource block allocation
(IFPRBA) algorithm for closely located, closed access femtocells.
Based on neighboring list, inter-femto-base station distance and
uplink noise power, the IFPRBA algorithm assigns non-interfering
power and resource to femtocells. The IFPRBA algorithm also
guarantees the quality of service to femtouser based on the
knowledge of resource requirement, connection type, and the
tolerable delay budget. Simulation result shows that the interference
power experienced in IFPRBA algorithm is below the tolerable
interference power and hence the overall service success ratio, PRB
efficiency and network throughput are maximum when compared to
conventional resource allocation framework for femtocell (RAFF)
algorithm.
Abstract: The main purpose of this research is to
comprehensively explore and identify the problems of attestation of
the public servants and to propose solutions for these issues through
deeply analyzing laws and the legal theoretical literature. For the
detailed analysis of the above-mentioned problems we will use some
research methods, the implementation of which has a goal to ensure
the objectivity and clarity of scientific research and its results.
Abstract: Real time image and video processing is a demand in
many computer vision applications, e.g. video surveillance, traffic
management and medical imaging. The processing of those video
applications requires high computational power. Thus, the optimal
solution is the collaboration of CPU and hardware accelerators. In
this paper, a Canny edge detection hardware accelerator is proposed.
Edge detection is one of the basic building blocks of video and image
processing applications. It is a common block in the pre-processing
phase of image and video processing pipeline. Our presented
approach targets offloading the Canny edge detection algorithm from
processing system (PS) to programmable logic (PL) taking the
advantage of High Level Synthesis (HLS) tool flow to accelerate the
implementation on Zynq platform. The resulting implementation
enables up to a 100x performance improvement through hardware
acceleration. The CPU utilization drops down and the frame rate
jumps to 60 fps of 1080p full HD input video stream.
Abstract: Cloud computing has provided the impetus for change
in the demand, sourcing, and consumption of IT-enabled services.
The technology developed from an emerging trend towards a ‘musthave’.
Many organizations harnessed on the quick-wins of cloud
computing within the last five years but nowadays reach a plateau
when it comes to sustainable savings and performance. This study
aims to investigate what is needed from an organizational perspective
to make cloud computing a sustainable success. The study was
carried out in Germany among senior IT professionals, both in
management and delivery positions. Our research shows that IT
executives must be prepared to realign their IT workforce to sustain
the advantage of cloud computing for today and the near future.
While new roles will undoubtedly emerge, roles alone cannot ensure
the success of cloud deployments. What is needed is a change in the
IT workforce’s business behaviour, or put more simply, the ways in
which the IT personnel works. It gives clear guidance on which
dimensions of an employees’ working behaviour need to be adapted.
The practical implications are drawn from a series of semi-structured
interviews, resulting in a high-level workforce enablement plan.
Lastly, it elaborates on tools and gives clear guidance on which
pitfalls might arise along the proposed workforce enablement
process.
Abstract: This paper presents a novel design of a microstrip
fractal antenna based on the use of Sierpinski triangle shape, it’s
designed and simulated by using FR4 substrate in the operating
frequency bands (GPS, WiMAX), the design is a fractal antenna with
a modified ground structure. The proposed antenna is simulated and
validated by using CST Microwave Studio Software, the simulated
results presents good performances in term of radiation pattern and
matching input impedance.
Abstract: Logistics distributors face the issue of having to
provide increasing service levels while being forced to reduce costs at
the same time. Same-day delivery, quick order processing and rapidly
growing ranges of articles are only some of the prevailing challenges.
One key aspect of the performance of an intra-logistics system is how
often and in which amplitude congestions and dysfunctions affect the
processing operations. By gaining knowledge of the so called
‘performance availability’ of such a system during the planning stage,
oversizing and wasting can be reduced whereas planning
transparency is increased. State of the art for the determination of this
KPI is simulation studies. However, their structure and therefore their
results may vary unforeseeably. This article proposes a concept for
the establishment of ‘certified’ and hence reliable and comparable
simulation models.
Abstract: This paper designs the four-phase Boost Converter
which overcomes the problem of high input ripple current and output
ripple voltage. Digital control is more convenient for such a topology
on basis of synchronization, phase shift operation, etc. Simulation
results are presented for open-loop and closed-loop for four phase
boost converter. This control scheme is applicable for PFC rectifiers
as well. Thus a comparative analysis based on the obtained results is
performed.
Abstract: The star network is one of the promising
interconnection networks for future high speed parallel computers, it
is expected to be one of the future-generation networks. The star
network is both edge and vertex symmetry, it was shown to have
many gorgeous topological proprieties also it is owns hierarchical
structure framework. Although much of the research work has been
done on this promising network in literature, it still suffers from
having enough algorithms for load balancing problem. In this paper
we try to work on this issue by investigating and proposing an
efficient algorithm for load balancing problem for the star network.
The proposed algorithm is called Star Clustered Dimension Exchange
Method SCDEM to be implemented on the star network. The
proposed algorithm is based on the Clustered Dimension Exchange
Method (CDEM). The SCDEM algorithm is shown to be efficient in
redistributing the load balancing as evenly as possible among all
nodes of different factor networks.
Abstract: This work was one of the tasks of the
Manufacturing2Client project, whose objective was to develop a
frontal deflector to be commercialized in the automotive industry,
using new project and manufacturing methods. In this task, in
particular, it was proposed to develop the ability to predict
computationally the aerodynamic influence of flow in vehicles, in an
effort to reduce fuel consumption in vehicles from class 3 to 8. With
this aim, two deflector models were developed and their aerodynamic
performance analyzed. The aerodynamic study was done using the
Computational Fluid Dynamics (CFD) software Ansys CFX and
allowed the calculation of the drag coefficient caused by the vehicle
motion for the different configurations considered. Moreover, the
reduction of diesel consumption and carbon dioxide (CO2) emissions
associated with the optimized deflector geometry could be assessed.
Abstract: Axial flow fans, while incapable of developing high
pressures, they are well suitable for handling large volumes of air at
relatively low pressures. In general, they are low in cost and possess
good efficiency, and can have blades of airfoil shape. Axial flow fans
show good efficiencies, and can operate at high static pressures if
such operation is necessary. Our objective is to model and analyze
the flow through AXIAL FANS using CFD Software and draw
inference from the obtained results, so as to get maximum efficiency.
The performance of an axial fan was simulated using CFD and the
effect of variation of different parameters such as the blade number,
noise level, velocity, temperature and pressure distribution on the
blade surface was studied. This paper aims to present a final 3D CAD
model of axial flow fan. Adapting this model to the available
components in the market, the first optimization was done. After this
step, CFX flow solver is used to do the necessary numerical analyses
on the aerodynamic performance of this model. This analysis results
in a final optimization of the proposed 3D model which is presented
in this article.
Abstract: The final step to complete the “Analytical Systems
Engineering Process” is the “Allocated Architecture” in which all
Functional Requirements (FRs) of an engineering system must be
allocated into their corresponding Physical Components (PCs). At
this step, any design for developing the system’s allocated
architecture in which no clear pattern of assigning the exclusive
“responsibility” of each PC for fulfilling the allocated FR(s) can be
found is considered a poor design that may cause difficulties in
determining the specific PC(s) which has (have) failed to satisfy a
given FR successfully. The present study utilizes the Axiomatic
Design method principles to mathematically address this problem and
establishes an “Axiomatic Model” as a solution for reaching good
alternatives for developing the allocated architecture. This study
proposes a “loss Function”, as a quantitative criterion to monetarily
compare non-ideal designs for developing the allocated architecture
and choose the one which imposes relatively lower cost to the
system’s stakeholders. For the case-study, we use the existing design
of U. S. electricity marketing subsystem, based on data provided by
the U.S. Energy Information Administration (EIA). The result for
2012 shows the symptoms of a poor design and ineffectiveness due to
coupling among the FRs of this subsystem.
Abstract: Self-compacting concrete (SCC) developed in Japan
in the late 80s has enabled the construction industry to reduce
demand on the resources, improve the work condition and also
reduce the impact of environment by elimination of the need for
compaction. Fuzzy logic (FL) approaches has recently been used to
model some of the human activities in many areas of civil
engineering applications. Especially from these systems in the model
experimental studies, very good results have been obtained. In the
present study, a model for predicting compressive strength of SCC
containing various proportions of fly ash, as partial replacement of
cement has been developed by using Fuzzy Inference System (FIS).
For the purpose of building this model, a database of experimental
data were gathered from the literature and used for training and
testing the model. The used data as the inputs of fuzzy logic models
are arranged in a format of five parameters that cover the total binder
content, fly ash replacement percentage, water content,
superplasticizer and age of specimens. The training and testing results
in the fuzzy logic model have shown a strong potential for predicting
the compressive strength of SCC containing fly ash in the considered
range.
Abstract: Safety is one of the most important considerations
when buying a new car. While active safety aims at avoiding
accidents, passive safety systems such as airbags and seat belts
protect the occupant in case of an accident. In addition to legal
regulations, organizations like Euro NCAP provide consumers with
an independent assessment of the safety performance of cars and
drive the development of safety systems in automobile industry.
Those ratings are mainly based on injury assessment reference values
derived from physical parameters measured in dummies during a car
crash test.
The components and sub-systems of a safety system are designed
to achieve the required restraint performance. Sled tests and other
types of tests are then carried out by car makers and their suppliers
to confirm the protection level of the safety system. A Knowledge
Discovery in Databases (KDD) process is proposed in order to
minimize the number of tests. The KDD process is based on the
data emerging from sled tests according to Euro NCAP specifications.
About 30 parameters of the passive safety systems from different data
sources (crash data, dummy protocol) are first analysed together with
experts opinions. A procedure is proposed to manage missing data
and validated on real data sets. Finally, a procedure is developed to
estimate a set of rough initial parameters of the passive system before
testing aiming at reducing the number of tests.
Abstract: Fuzzy inference method based approach to the
forming of modular intellectual system of assessment the quality of
communication services is proposed. Developed under this approach
the basic fuzzy estimation model takes into account the
recommendations of the International Telecommunication Union in
respect of the operation of packet switching networks based on IPprotocol.
To implement the main features and functions of the fuzzy
control system of quality telecommunication services it is used
multilayer feedforward neural network.
Abstract: In this work, we propose and analyze a model of
Phytoplankton-Zooplankton interaction with harvesting considering
that some species are exploited commercially for food. Criteria for
local stability, instability and global stability are derived and some
threshold harvesting levels are explored to maintain the population
at an appropriate equilibrium level even if the species are exploited
continuously.Further,biological and bionomic equilibria of the system
are obtained and an optimal harvesting policy is also analysed using
the Pantryagin’s Maximum Principle.Finally analytical findings are
also supported by some numerical simulations.
Abstract: Several of the practical industrial control processes are
multivariable processes. Due to the relation amid the variables
(interaction), delay in the loops, it is very intricate to design a
controller directly for these processes. So first, the interaction of the
variables is analyzed using Relative Normalized Gain Array
(RNGA), which considers the time constant, static gain and delay
time of the processes. Based on the effect of RNGA, relative gain
array (RGA) and NI, the pair (control configuration) of variables to
be controlled by decentralized control is selected. The equivalent
transfer function (ETF) of the process model is estimated as first
order process with delay using the corresponding elements in the
Relative gain array and Relative average residence time array
(RARTA) of the processes. Secondly, a decentralized Proportional-
Integral (PI) controller is designed for each ETF simply using
frequency response specifications. Finally, the performance and
robustness of the algorithm is comparing with existing related
approaches to validate the effectiveness of the projected algorithm.
Abstract: Image spam is a kind of email spam where the spam
text is embedded with an image. It is a new spamming technique
being used by spammers to send their messages to bulk of internet
users. Spam email has become a big problem in the lives of internet
users, causing time consumption and economic losses. The main
objective of this paper is to detect the image spam by using histogram
properties of an image. Though there are many techniques to
automatically detect and avoid this problem, spammers employing
new tricks to bypass those techniques, as a result those techniques are
inefficient to detect the spam mails. In this paper we have proposed a
new method to detect the image spam. Here the image features are
extracted by using RGB histogram, HSV histogram and combination
of both RGB and HSV histogram. Based on the optimized image
feature set classification is done by using k- Nearest Neighbor(k-NN)
algorithm. Experimental result shows that our method has achieved
better accuracy. From the result it is known that combination of RGB
and HSV histogram with k-NN algorithm gives the best accuracy in
spam detection.
Abstract: Now-a-days autonomous mobile robots have found
applications in diverse fields. An autonomous robot system must be
able to behave in an intelligent manner to deal with complex and
changing environment. This work proposes the performance of path
planning and navigation of autonomous mobile robot using
Gravitational Search Algorithm (GSA), Simulated Annealing (SA)
and Particle Swarm optimization (PSO) based intelligent controllers
in an unstructured environment. The approach not only finds a valid
collision free path but also optimal one. The main aim of the work is
to minimize the length of the path and duration of travel from a
starting point to a target while moving in an unknown environment
with obstacles without collision. Finally, a comparison is made
between the three controllers, it is found that the path length and time
duration made by the robot using GSA is better than SA and PSO
based controllers for the same work.
Abstract: Steganography is the art and science that hides the information in an appropriate cover carrier like image, text, audio and video media. In this work the authors propose a new image based steganographic method for hiding information within the complex bit planes of the image. After slicing into bit planes the cover image is analyzed to extract the most complex planes in decreasing order based on their bit plane complexity. The complexity function next determines the complex noisy blocks of the chosen bit plane and finally pixel mapping method (PMM) has been used to embed secret bits into those regions of the bit plane. The novel approach of using pixel mapping method (PMM) in bit plane domain adaptively embeds data on most complex regions of image, provides high embedding capacity, better imperceptibility and resistance to steganalysis attack.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.