Abstract: This work is on decision tree-based classification for
the disbursement of scholarship. Tree-based data mining
classification technique is used in other to determine the generic rule
to be used to disburse the scholarship. The system based on the
defined rules from the tree is able to determine the class (status) to
which an applicant shall belong whether Granted or Not Granted. The
applicants that fall to the class of granted denote a successful
acquirement of scholarship while those in not granted class are
unsuccessful in the scheme. An algorithm that can be used to classify
the applicants based on the rules from tree-based classification was
also developed. The tree-based classification is adopted because of its
efficiency, effectiveness, and easy to comprehend features. The
system was tested with the data of National Information Technology
Development Agency (NITDA) Abuja, a Parastatal of Federal
Ministry of Communication Technology that is mandated to develop
and regulate information technology in Nigeria. The system was
found working according to the specification. It is therefore
recommended for all scholarship disbursement organizations.
Abstract: Localization of nodes is one of the key issues of
Wireless Sensor Network (WSN) that gained a wide attention in
recent years. The existing localization techniques can be generally
categorized into two types: range-based and range-free. Compared
with rang-based schemes, the range-free schemes are more costeffective,
because no additional ranging devices are needed. As a
result, we focus our research on the range-free schemes. In this paper
we study three types of range-free location algorithms to compare the
localization error and energy consumption of each one. Centroid
algorithm requires a normal node has at least three neighbor anchors,
while DV-hop algorithm doesn’t have this requirement. The third
studied algorithm is the amorphous algorithm similar to DV-Hop
algorithm, and the idea is to calculate the hop distance between two
nodes instead of the linear distance between them. The simulation
results show that the localization accuracy of the amorphous
algorithm is higher than that of other algorithms and the energy
consumption does not increase too much.
Abstract: Because current wireless communication requires high
reliability in a limited bandwidth environment, this paper proposes
the variable modulation scheme based on the codebook. The variable
modulation scheme adjusts transmission power using the codebook in
accordance with channel state. Also, if the codebook is composed of
many bits, the reliability is more improved by the proposed scheme.
The simulation results show that the performance of proposed scheme
has better reliability than the the performance of conventional scheme.
Abstract: Wireless Sensor Networks (WSNs) enable new
applications and need non-conventional paradigms for the protocol
because of energy and bandwidth constraints, In WSN, sensor node’s
life is a critical parameter. Research on life extension is based on
Low-Energy Adaptive Clustering Hierarchy (LEACH) scheme,
which rotates Cluster Head (CH) among sensor nodes to distribute
energy consumption over all network nodes. CH selection in WSN
affects network energy efficiency greatly. This study proposes an
improved CH selection for efficient data aggregation in sensor
networks. This new algorithm is based on Bacterial Foraging
Optimization (BFO) incorporated in LEACH.
Abstract: This paper presents a power control for a Doubly Fed
Induction Generator (DFIG) using in Wind Energy Conversion
System (WECS) connected to the grid. The proposed control strategy
employs two nonlinear controllers, Backstipping (BSC) and slidingmode
controller (SMC) scheme to directly calculate the required
rotor control voltage so as to eliminate the instantaneous errors of
active and reactive powers. In this paper the advantages of BSC and
SMC are presented, the performance and robustness of this two
controller’s strategy are compared between them. First, we present a
model of wind turbine and DFIG machine, then a synthesis of the
controllers and their application in the DFIG power control.
Simulation results on a 1.5MW grid-connected DFIG system are
provided by MATLAB/Simulink.
Abstract: Establishing a secure communication of Internet
conferences for participants is very important. Before starting the
conference, all the participants establish a common conference key to
encrypt/decrypt communicated messages. It enables participants to
exchange the secure messages. Nevertheless, in the conference, if
there are any malicious participants who may try to upset the key
generation process causing other legal participants to obtain a different
conference key. In this article, we propose an improved conference
key agreement with fault-tolerant capability. The proposed scheme
can filter malicious participants at the beginning of the conference to
ensure that all participants obtain the same conference key. Compare
with other schemes, our scheme is more secure and efficient than
others.
Abstract: In this paper, analysis of an infinite beam resting on
multilayer tensionless extensible geosynthetic reinforced granular
fill-poor soil system overlying soft soil strata under moving load with
constant velocity is presented. The beam is subjected to a
concentrated load moving with constant velocity. The upper
reinforced granular bed is modeled by a rough membrane embedded
in Pasternak shear layer overlying a series of compressible nonlinear
winkler springs representing the underlying the very poor soil. The
multilayer tensionless extensible geosynthetic layer has been
assumed to deform such that at interface the geosynthetic and the soil
have some deformation. Nonlinear behaviour of granular fill and the
very poor soil has been considered in the analysis by means of
hyperbolic constitutive relationships. Governing differential
equations of the soil foundation system have been obtained and
solved with the help of appropriate boundary conditions. The solution
has been obtained by employing finite difference method by means of
Gauss-Siedal iterative scheme. Detailed parametric study has been
conducted to study the influence of various parameters on the
response of soil–foundation system under consideration by means of
deflection and bending moment in the beam and tension mobilized in
the geosynthetic layer. These parameters include magnitude of
applied load, velocity of load, damping, ultimate resistance of poor
soil and granular fill layer. Range of values of parameters has been
considered as per Indian Railway conditions. This study clearly
observed that the comparisons of multilayer tensionless extensible
geosynthetic reinforcement with poor foundation soil and magnitude
of applied load, relative compressibility of granular fill and ultimate
resistance of poor soil has significant influence on the response of
soil–foundation system.
Abstract: In this paper comprehensive studies have been carried
out for the design optimization of a waste heat recovery system for
effectively utilizing the domestic air conditioner heat energy for
producing hot water. Numerical studies have been carried for the
geometry optimization of a waste heat recovery system for domestic
air conditioners. Numerical computations have been carried out using
a validated 2d pressure based, unsteady, 2nd-order implicit, SST k-ω
turbulence model. In the numerical study, a fully implicit finite
volume scheme of the compressible, Reynolds-Averaged, Navier-
Stokes equations is employed. At identical inflow and boundary
conditions various geometries were tried and effort has been taken for
proposing the best design criteria. Several combinations of pipe line
shapes viz., straight and spiral with different number of coils for the
radiator have been attempted and accordingly the design criteria has
been proposed for the waste heat recovery system design. We have
concluded that, within the given envelope, the geometry optimization
is a meaningful objective for getting better performance of waste heat
recovery system for air conditioners.
Abstract: In this paper, the secure BioSemantic Scheme is
presented to bridge biological/biomedical research problems and
computational solutions via semantic computing. Due to the diversity
of problems in various research fields, the semantic capability
description language (SCDL) plays and important role as a common
language and generic form for problem formalization. SCDL is
expected the essential for future semantic and logical computing in
Biosemantic field. We show several example to Biomedical problems
in this paper. Moreover, in the coming age of cloud computing, the
security problem is considered to be crucial issue and we presented a
practical scheme to cope with this problem.
Abstract: Voting algorithms are extensively used to make
decisions in fault tolerant systems where each redundant module
gives inconsistent outputs. Popular voting algorithms include
majority voting, weighted voting, and inexact majority voters. Each
of these techniques suffers from scenarios where agreements do not
exist for the given voter inputs. This has been successfully overcome
in literature using fuzzy theory. Our previous work concentrated on a
neuro-fuzzy algorithm where training using the neuro system
substantially improved the prediction result of the voting system.
Weight training of Neural Network is sub-optimal. This study
proposes to optimize the weights of the Neural Network using
Artificial Bee Colony algorithm. Experimental results show the
proposed system improves the decision making of the voting
algorithms.
Abstract: Multiple User Interference (MUI) considers the
primary problem in Optical Code-Division Multiple Access
(OCDMA), which resulting from the overlapping among the users. In
this article we aim to mitigate this problem by studying an
interference cancellation scheme called successive interference
cancellation (SIC) scheme. This scheme will be tested on two
different detection schemes, spectral amplitude coding (SAC) and
direct detection systems (DS), using partial modified prime (PMP) as
the signature codes. It was found that SIC scheme based on both SAC
and DS methods had a potential to suppress the intensity noise, that is
to say it can mitigate MUI noise. Furthermore, SIC/DS scheme
showed much lower bit error rate (BER) performance relative to
SIC/SAC scheme for different magnitude of effective power. Hence,
many more users can be supported by SIC/DS receiver system.
Abstract: In the cooperative transmission scheme, both the
cellular system and broadcasting system are composed. Two cellular
base stations (CBSs) communicating with a user in the cell edge use
cooperative transmission scheme in the conventional scheme. In the
case that the distance between two CBSs and the user is distant, the
conventional scheme does not guarantee the quality of the
communication because the channel condition is bad. Therefore, if the
distance between CBSs and a user is distant, the performance of the
conventional scheme is decreased. Also, the bad channel condition has
bad effects on the performance. The proposed scheme uses two relays
to communicate well with CBSs when the channel condition between
CBSs and the user is poor. Using the relay in the high attenuation
environment can obtain both advantages of the high bit error rate
(BER) and throughput performance.
Abstract: Background subtraction and temporal difference are
often used for moving object detection in video. Both approaches are
computationally simple and easy to be deployed in real-time image
processing. However, while the background subtraction is highly
sensitive to dynamic background and illumination changes, the
temporal difference approach is poor at extracting relevant pixels of
the moving object and at detecting the stopped or slowly moving
objects in the scene. In this paper, we propose a simple moving object
detection scheme based on adaptive background subtraction and
temporal difference exploiting dynamic background updates. The
proposed technique consists of histogram equalization, a linear
combination of background and temporal difference, followed by the
novel frame-based and pixel-based background updating techniques.
Finally, morphological operations are applied to the output images.
Experimental results show that the proposed algorithm can solve the
drawbacks of both background subtraction and temporal difference
methods and can provide better performance than that of each method.
Abstract: In this paper a novel color image compression
technique for efficient storage and delivery of data is proposed. The
proposed compression technique started by RGB to YCbCr color
transformation process. Secondly, the canny edge detection method is
used to classify the blocks into the edge and non-edge blocks. Each
color component Y, Cb, and Cr compressed by discrete cosine
transform (DCT) process, quantizing and coding step by step using
adaptive arithmetic coding. Our technique is concerned with the
compression ratio, bits per pixel and peak signal to noise ratio, and
produce better results than JPEG and more recent published schemes
(like CBDCT-CABS and MHC). The provided experimental results
illustrate the proposed technique that is efficient and feasible in terms
of compression ratio, bits per pixel and peak signal to noise ratio.
Abstract: In this paper, improved performance scheme for
joint transmission (JT) is proposed in downlink (DL) coordinated
multi-point (CoMP) in case of the constraint transmission power.
This scheme is that a serving transmission point (TP) requests the
JT to an inter-TP and it selects a precoding technique according
to the channel state information (CSI) from user equipment (UE).
The simulation results show that the bit error rate (BER) and the
throughput performances of the proposed scheme provide the high
spectral efficiency and the reliable data at the cell edge.
Abstract: Background in music analysis: Traditionally, when we
think about a composer’s sketches, the chances are that we are
thinking in terms of the working out of detail, rather than the
evolution of an overall concept. Since music is a “time art,” it follows
that questions of a form cannot be entirely detached from
considerations of time. One could say that composers tend to regard
time either as a place gradually and partially intuitively filled, or they
can look for a specific strategy to occupy it. It seems that the one
thing that sheds light on Stockhausen’s compositional thinking is his
frequent use of “form schemas,” that is often a single-page
representation of the entire structure of a piece.
Background in music technology: Sonic Visualiser is a program
used to study a musical recording. It is an open source application for
viewing, analyzing, and annotating music audio files. It contains a
number of visualisation tools, which are designed with useful default
parameters for musical analysis. Additionally, the Vamp plugin
format of SV supports to provide analysis such as for example
structural segmentation.
Aims: The aim of paper is to show how SV may be used to obtain
a better understanding of the specific musical work, and how the
compositional strategy does impact on musical structures and musical
surfaces. It is known that “traditional” music analytic methods don’t
allow indicating interrelationships between musical surface (which is
perceived) and underlying musical/acoustical structure.
Main Contribution: Stockhausen had dealt with the most diverse
musical problems by the most varied methods. A characteristic which
he had never ceased to be placed at the center of his thought and
works, it was the quest for a new balance founded upon an acute
connection between speculation and intuition. In the case with
Mikrophonie I (1964) for tam-tam and 6 players Stockhausen makes
a distinction between the “connection scheme,” which indicates the
ground rules underlying all versions, and the form scheme, which is
associated with a particular version. The preface to the published
score includes both the connection scheme, and a single instance of a
“form scheme,” which is what one can hear on the CD recording. In
the current study, the insight into the compositional strategy chosen
by Stockhausen was been compared with auditory image, that is, with
the perceived musical surface. Stockhausen’s musical work is
analyzed both in terms of melodic/voice and timbre evolution.
Implications: The current study shows how musical structures
have determined of musical surface. The general assumption is this,
that while listening to music we can extract basic kinds of musical
information from musical surfaces. It is shown that interactive
strategies of musical structure analysis can offer a very fruitful way
of looking directly into certain structural features of music.
Abstract: Adopting Most Advantageous Tender (MAT) for the
government procurement projects has become popular in Taiwan. As
time pass by, the problems of MAT has appeared gradually. People
condemn two points that are the result might be manipulated by a
single committee member’s partiality and how to make a fair decision
when the winner has two or more. Arrow’s Impossibility Theorem
proposed that the best scoring method should meet the four reasonable
criteria. According to these four criteria this paper constructed an
“Illegitimate Scores Checking Scheme” for a scoring method and used
the scheme to find out the illegitimate of the current evaluation method
of MAT. This paper also proposed a new scoring method that is called
the “Standardizing Overall Evaluated Score Method”. This method
makes each committee member’s influence tend to be identical. Thus,
the committee members can scoring freely according to their partiality
without losing the fairness. Finally, it was examined by a large-scale
simulation, and the experiment revealed that the it improved the
problem of dictatorship and perfectly avoided the situation of cyclical
majorities, simultaneously. This result verified that the Standardizing
Overall Evaluated Score Method is better than any current evaluation
method of MAT.
Abstract: This paper proposed the comparison made between
Multi-Carrier Pulse Width Modulation, Sinusoidal Pulse Width
Modulation and Selective Harmonic Elimination Pulse Width
Modulation technique for minimization of Total Harmonic Distortion
in Cascaded H-Bridge Multi-Level Inverter. In Multicarrier Pulse
Width Modulation method by using Alternate Position of Disposition
scheme for switching pulse generation to Multi-Level Inverter.
Another carrier based approach; Sinusoidal Pulse Width Modulation
method is also implemented to define the switching pulse generation
system in the multi-level inverter. In Selective Harmonic Elimination
method using Genetic Algorithm and Particle Swarm Optimization
algorithm for define the required switching angles to eliminate low
order harmonics from the inverter output voltage waveform and
reduce the total harmonic distortion value. So, the results validate that
the Selective Harmonic Elimination Pulse Width Modulation method
does capably eliminate a great number of precise harmonics and
minimize the Total Harmonic Distortion value in output voltage
waveform in compared with Multi-Carrier Pulse Width Modulation
method, Sinusoidal Pulse Width Modulation method. In this paper,
comparison of simulation results shows that the Selective Harmonic
Elimination method can attain optimal harmonic minimization
solution better than Multi-Carrier Pulse Width Modulation method,
Sinusoidal Pulse Width Modulation method.
Abstract: Designing cost-efficient, secure network protocols for
Wireless Sensor Networks (WSNs) is a challenging problem because
sensors are resource-limited wireless devices. Security services such
as authentication and improved pairwise key establishment are
critical to high efficient networks with sensor nodes. For sensor
nodes to correspond securely with each other efficiently, usage of
cryptographic techniques is necessary. In this paper, two key
predistribution schemes that enable a mobile sink to establish a
secure data-communication link, on the fly, with any sensor nodes.
The intermediate nodes along the path to the sink are able to verify
the authenticity and integrity of the incoming packets using a
predicted value of the key generated by the sender’s essential power.
The proposed schemes are based on the pairwise key with the mobile
sink, our analytical results clearly show that our schemes perform
better in terms of network resilience to node capture than existing
schemes if used in wireless sensor networks with mobile sinks.
Abstract: A sensory network consists of multiple detection
locations called sensor nodes, each of which is tiny, featherweight
and portable. A single path routing protocols in wireless sensor
network can lead to holes in the network, since only the nodes
present in the single path is used for the data transmission. Apart
from the advantages like reduced computation, complexity and
resource utilization, there are some drawbacks like throughput,
increased traffic load and delay in data delivery. Therefore, multipath
routing protocols are preferred for WSN. Distributing the traffic
among multiple paths increases the network lifetime. We propose a
scheme, for the data to be transmitted through a dominant path to
save energy. In order to obtain a high delivery ratio, a basic route
reconstruction protocol is utilized to reconstruct the path whenever a
failure is detected. A basic reconstruction routing (BRR) algorithm is
proposed, in which a node can leap over path failure by using the
already existing routing information from its neighbourhood while
the composed data is transmitted from the source to the sink. In order
to save the energy and attain high data delivery ratio, data is
transmitted along a multiple path, which is achieved by BRR
algorithm whenever a failure is detected. Further, the analysis of
how the proposed protocol overcomes the drawback of the existing
protocols is presented. The performance of our protocol is compared
to AOMDV and energy efficient node-disjoint multipath routing
protocol (EENDMRP). The system is implemented using NS-2.34.
The simulation results show that the proposed protocol has high
delivery ratio with low energy consumption.