Abstract: Wireless Sensor Networks consist of small battery
powered devices with limited energy resources. once deployed, the
small sensor nodes are usually inaccessible to the user, and thus
replacement of the energy source is not feasible. Hence, One of the
most important issues that needs to be enhanced in order to improve
the life span of the network is energy efficiency. to overcome this
demerit many research have been done. The clustering is the one of
the representative approaches. in the clustering, the cluster heads
gather data from nodes and sending them to the base station. In this
paper, we introduce a dynamic clustering algorithm using genetic
algorithm. This algorithm takes different parameters into
consideration to increase the network lifetime. To prove efficiency of
proposed algorithm, we simulated the proposed algorithm compared
with LEACH algorithm using the matlab
Abstract: Aiming the application of localized hyperthermia, a
magnetic induction system with new approaches is proposed. The techniques in this system for improving the effectiveness of localized hyperthermia are that using magnetic circuit and the multiple-coil array instead of a giant coil for generating magnetic field. Specially, amorphous metal is adopted as the material of magnetic circuit. Detail
design parameters of hardware are well described. Simulation tool is
employed for this work and experiment result is reported as well.
Abstract: In this paper, half bridge DC-DC converters with
transformer isolation presented in the literature are analyzed for highcurrent
and low-voltage applications under the same operation
conditions, and compared in terms of losses and efficiency. The
conventional and improved half-bridge DC-DC converters are
simulated, and current and voltage waveforms are obtained for input
voltage Vdc=500V, output current IO=450A, output voltage VO=38V
and switching frequency fS=20kHz. IGBTs are used as power
semiconductor switches. The power losses of the semiconductor
devices are calculated from current and voltage waveforms. From
simulation results, it is seen that the capacitor switched half bridge
converter has the best efficiency value, and can be preferred at high
power and high frequency applications.
Abstract: Through the analysis of the process digital design
based on digital mockup, the fact indicates that a distributed
cooperative supporting environment is the foundation conditions to
adopt design approach based on DMU. Data access authorization is
concerned firstly because the value and sensitivity of the data for the
enterprise. The access control for administrators is often rather weak
other than business user. So authors established an enhanced system to
avoid the administrators accessing the engineering data by potential
approach and without authorization. Thus the data security is
improved.
Abstract: The 9/11 suicide attacks in New York, Washington, D.C., and Pennsylvania, triggered a number of security responses both in the United States of America and other Countries in the World. Kenya, which is an ally and a close partner to North America and Europe, was not left behind. While many states had been parties to numerous terrorism conventions, their response in implementing them had been slow and needed this catalyst. This special case offered a window of opportunity for many “security conscious" regimes in cementing their legal-criminological and political security apparatus. At the international level, the 9/11 case led to the hasty adoption of Security Council resolution 1373 in 2001, which called upon states to adopt wide-ranging and comprehensive steps and strategies to combat international terrorism and to become parties to the relevant international conventions and protocols relating to terrorism. Since then, Kenya has responded with speed in devising social-legal-criminological-political actions.
Abstract: We depend upon explanation in order to “make sense"
out of our world. And, making sense is all the more important when
dealing with change. But, what happens if our explanations are
wrong? This question is examined with respect to two types of
explanatory model. Models based on labels and categories we shall
refer to as “representations." More complex models involving
stories, multiple algorithms, rules of thumb, questions, ambiguity we
shall refer to as “compressions." Both compressions and
representations are reductions. But representations are far more
reductive than compressions. Representations can be treated as a set
of defined meanings – coherence with regard to a representation is
the degree of fidelity between the item in question and the definition
of the representation, of the label. By contrast, compressions contain
enough degrees of freedom and ambiguity to allow us to make
internal predictions so that we may determine our potential actions in
the possibility space. Compressions are explanatory via mechanism.
Representations are explanatory via category. Managers are often
confusing their evocation of a representation (category inclusion) as
the creation of a context of compression (description of mechanism).
When this type of explanatory error occurs, more errors follow. In
the drive for efficiency such substitutions are all too often proclaimed
– at the manager-s peril..
Abstract: As a result of the high cost of housing, the increasing population is forced to live in substandard housing and unhealthy conditions giving rise to poor residential neighborhoods. The paper examines the causes and characteristics of poor residential neighborhood. The paper finds the problems that have influence poor neighborhoods to; poverty, growth of informal sector and housing shortage. The paper asserts that poor residential neighborhoods have adverse effects on the people.
The secondary data was obtained from books, journals and seminar papers while primary data relating to building and environmental quality from structured questionnaire administered on sample of 500 household heads, from sampling frame of 5000 housing units.
The study reveals that majority of the respondents are poor and employed in informal sector. The paper suggests urban renewal and slum upgrading programs as methods in dealing with the situation and an improvement in the socio-economic circumstances of the inhabitants.
Abstract: Methods for organizing web data into groups in order
to analyze web-based hypertext data and facilitate data availability
are very important in terms of the number of documents available
online. Thereby, the task of clustering web-based document structures
has many applications, e.g., improving information retrieval on the
web, better understanding of user navigation behavior, improving web
users requests servicing, and increasing web information accessibility.
In this paper we investigate a new approach for clustering web-based
hypertexts on the basis of their graph structures. The hypertexts will
be represented as so called generalized trees which are more general
than usual directed rooted trees, e.g., DOM-Trees. As a important
preprocessing step we measure the structural similarity between the
generalized trees on the basis of a similarity measure d. Then,
we apply agglomerative clustering to the obtained similarity matrix
in order to create clusters of hypertext graph patterns representing
navigation structures. In the present paper we will run our approach
on a data set of hypertext structures and obtain good results in
Web Structure Mining. Furthermore we outline the application of
our approach in Web Usage Mining as future work.
Abstract: Ethnicity identification of face images is of interest in
many areas of application, but existing methods are few and limited.
This paper presents a fusion scheme that uses block-based uniform
local binary patterns and Haar wavelet transform to combine local
and global features. In particular, the LL subband coefficients of the
whole face are fused with the histograms of uniform local binary
patterns from block partitions of the face. We applied the principal
component analysis on the fused features and managed to reduce the
dimensionality of the feature space from 536 down to around 15
without sacrificing too much accuracy. We have conducted a number
of preliminary experiments using a collection of 746 subject face
images. The test results show good accuracy and demonstrate the
potential of fusing global and local features. The fusion approach is
robust, making it easy to further improve the identification at both
feature and score levels.
Abstract: Geopolymer cement was evaluated as wellbore sealing material for carbon dioxide geosequestration application. Curing of cement system in saline water and strength testing in triaxial stress state condition under lateral confinement is relevant to primary cementing in CO2 geosequestration wellbore in saline aquifer. Geopolymer cement was cured in saline water (both at ambient conditions for 28 days and heated (60°C) conditions for 12 hours) and tested for triaxial strength at different levels of lateral confinement. Normal water and few other curing techniques were also studied both for geopolymer and API ‘G’ cement. Results reported were compared to evaluate the suitability of saline water for curing of geopolymer cement. Unconfined compression test results showed higher strength for curing in saline water than normal water. Besides, testing strength under lateral confinement demonstrated the material failure behavior from brittle to plastic.
Abstract: As known that efficiency of photovoltaic cells is not
high as desired level. Efficiency of PVs could be improved by
selecting convenient locations that have high solar irradiation,
sunshine duration, mild temperature, low level air pollution and dust
concentration. Additionally, some environmental parameters called
derating factors effect to decrease PV efficiencies such as cloud, high
temperature, aerosol optical depth, high dust concentration, shadow,
snow, humidity etc. In this paper, all parameters that effect PV
efficiency are considered in detail under climatic conditions of
Istanbul. A 750 Wp PV system with measurement devices is
constructed in Maslak campus of Istanbul Technical University.
Abstract: A prototype of an anomaly detection system was
developed to automate process of recognizing an anomaly of
roentgen image by utilizing fuzzy histogram hyperbolization image
enhancement and back propagation artificial neural network.
The system consists of image acquisition, pre-processor, feature
extractor, response selector and output. Fuzzy Histogram
Hyperbolization is chosen to improve the quality of the roentgen
image. The fuzzy histogram hyperbolization steps consist of
fuzzyfication, modification of values of membership functions and
defuzzyfication. Image features are extracted after the the quality of
the image is improved. The extracted image features are input to the
artificial neural network for detecting anomaly. The number of nodes
in the proposed ANN layers was made small.
Experimental results indicate that the fuzzy histogram
hyperbolization method can be used to improve the quality of the
image. The system is capable to detect the anomaly in the roentgen
image.
Abstract: Most standard software development methodologies
are often not applied to software projects in many developing
countries of the world. The approach generally practice is close to
what eXtreme Programming (XP) is likely promoting, just keep
coding and testing as the requirement evolves. XP is an agile
software process development methodology that has inherent
capability for improving efficiency of Business Software
Development (BSD). XP can facilitate Business-to-Development
(B2D) relationship due to its customer-oriented advocate. From
practitioner point of view, we applied XP to BSD and result shows
that customer involvement has positive impact on productivity, but
can as well frustrate the success of the project. In an effort to
promote software engineering practice in developing countries of
Africa, we present the experiment performed, lessons learned,
problems encountered and solution adopted in applying XP
methodology to BSD.
Abstract: Trust and Energy consumption is the most challenging
issue in routing protocol design for Mobile ad hoc networks
(MANETs), since mobile nodes are battery powered and nodes
behaviour are unpredictable. Furthermore replacing and recharging
batteries and making nodes co-operative is often impossible in
critical environments like military applications. In this paper, we
propose a trust based energy aware routing model in MANET.
During route discovery, node with more trust and maximum energy
capacity is selected as a router based on a parameter called
'Reliability'. Route request from the source is accepted by a node
only if its reliability is high. Otherwise, the route request is
discarded. This approach forms a reliable route from source to
destination thus increasing network life time, improving energy
utilization and decreasing number of packet loss during transmission.
Abstract: The authors present optimization parameters of rotary
positioner controller in hard disk drive servo track writing process
using coefficient diagram method; CDM. Due to estimation
parameters in PI Positioning Control System by expected ratio
method cannot meet the required specification of response
effectively, we suggest coefficient diagram method for defining
controller parameters under the requirement of the system. Finally,
the simulation results show that our proposed method can improve
the problem in tuning parameter of rotary positioner controller. It is
satisfied specification of performance of control system. Furthermore,
it is very convenient as a fast adjustment damping ratio as well as a
high speed response.
Abstract: In this paper, the deformation modes of a compact impact absorption member subjected to axial compression are investigated using finite element method and experiments. A multiple combination compact impact absorption member, referred to as a 'compress-expand member', is proposed to substitute the conventional thin-walled circular tube. This study found that the proposed compact impact absorption member has stable load increase characteristics and a wider range of high load efficiency (Pave/Pmax) than the thin-walled circular tube. Moreover, the proposed compact impact absorption member can absorb larger loads in a smaller radius than the thin-walled cylindrical tube, as it can maintain its stable deformation in increased wall thicknesses.
Abstract: Pattern recognition is the research area of Artificial
Intelligence that studies the operation and design of systems that
recognize patterns in the data. Important application areas are image
analysis, character recognition, fingerprint classification, speech
analysis, DNA sequence identification, man and machine
diagnostics, person identification and industrial inspection. The
interest in improving the classification systems of data analysis is
independent from the context of applications. In fact, in many
studies it is often the case to have to recognize and to distinguish
groups of various objects, which requires the need for valid
instruments capable to perform this task. The objective of this article
is to show several methodologies of Artificial Intelligence for data
classification applied to biomedical patterns. In particular, this work
deals with the realization of a Computer-Aided Detection system
(CADe) that is able to assist the radiologist in identifying types of
mammary tumor lesions. As an additional biomedical application of
the classification systems, we present a study conducted on blood
samples which shows how these methods may help to distinguish
between carriers of Thalassemia (or Mediterranean Anaemia) and
healthy subjects.
Abstract: Resource Discovery in Grids is critical for efficient
resource allocation and management. Heterogeneous nature and
dynamic availability of resources make resource discovery a
challenging task. As numbers of nodes are increasing from tens to
thousands, scalability is essentially desired. Peer-to-Peer (P2P)
techniques, on the other hand, provide effective implementation of
scalable services and applications. In this paper we propose a model
for resource discovery in Condor Middleware by using the four axis
framework defined in P2P approach. The proposed model enhances
Condor to incorporate functionality of a P2P system, thus aim to
make Condor more scalable, flexible, reliable and robust.
Abstract: Due to memory leaks, often-valuable system memory
gets wasted and denied for other processes thereby affecting the
computational performance. If an application-s memory usage
exceeds virtual memory size, it can leads to system crash. Current
memory leak detection techniques for clusters are reactive and
display the memory leak information after the execution of the
process (they detect memory leak only after it occur).
This paper presents a Dynamic Memory Monitoring Agent
(DMMA) technique. DMMA framework is a dynamic memory leak
detection, that detects the memory leak while application is in
execution phase, when memory leak in any process in the cluster is
identified by DMMA it gives information to the end users to enable
them to take corrective actions and also DMMA submit the affected
process to healthy node in the system. Thus provides reliable service
to the user. DMMA maintains information about memory
consumption of executing processes and based on this information
and critical states, DMMA can improve reliability and
efficaciousness of cluster computing.
Abstract: This paper describes the application of a model predictive controller to the problem of batch reactor temperature control. Although a great deal of work has been done to improve reactor throughput using batch sequence control, the control of the actual reactor temperature remains a difficult problem for many operators of these processes. Temperature control is important as many chemical reactions are sensitive to temperature for formation of desired products. This controller consist of two part (1) a nonlinear control method GLC (Global Linearizing Control) to create a linear model of system and (2) a Model predictive controller used to obtain optimal input control sequence. The temperature of reactor is tuned to track a predetermined temperature trajectory that applied to the batch reactor. To do so two input signals, electrical powers and the flow of coolant in the coil are used. Simulation results show that the proposed controller has a remarkable performance for tracking reference trajectory while at the same time it is robust against noise imposed to system output.