Abstract: In the current decade, wireless sensor networks are
emerging as a peculiar multi-disciplinary research area. By this
way, energy efficiency is one of the fundamental research themes
in the design of Medium Access Control (MAC) protocols for
wireless sensor networks. Thus, in order to optimize the energy
consumption in these networks, a variety of MAC protocols are
available in the literature. These schemes were commonly evaluated
under simple network density and a few results are published on
their robustness in realistic network-s size. We, in this paper, provide
an analytical study aiming to highlight the energy waste sources in
wireless sensor networks. Then, we experiment three energy efficient
hybrid CSMA/CA based MAC protocols optimized for wireless
sensor networks: Sensor-MAC (SMAC), Time-out MAC (TMAC)
and Traffic aware Energy Efficient MAC (TEEM). We investigate
these protocols with different network densities in order to discuss
the end-to-end performances of these schemes (i.e. in terms of energy
efficiency, delay and throughput). Through Network Simulator (NS-
2) implementations, we explore the behaviors of these protocols with
respect to the network density. In fact, this study may help the multihops
sensor networks designers to design or select the MAC layer
which matches better their applications aims.
Abstract: Banyan networks are really attractive for serving as
the optical switching architectures due to their unique properties of
small depth and absolute signal loss uniformity. The fact has been
established that the limitations of blocking nature and the nonavailability
of proper connections due to non-rearrangeable property
can be easily ruled out using electro-optic MZI switches as basic
switching elements. Combination of the horizontal expansion and
vertical stacking of optical banyan networks is an appropriate scheme
for constructing non-blocking banyan-based optical switching
networks. The interconnected banyan switching fabrics (IBSF) have
been considered and analyzed to best serve the purpose of optical
switching with electro-optic MZI basic elements. The cross/bar state
interchange for the switches has been facilitated by appropriate
voltage switching or the by the switching of operating wavelength.
The paper is dedicated to the modification of the basic switching
element being used as well as the architecture of the switching
network.
Abstract: In many ways, biomedical analysis is analogous to possibilistic reasoning. In spite of that, there are hardly any applications of possibility theory in biology or medicine. The aim of this work is to demonstrate the use of possibility theory in an epidemiological study. In the paper, we build the possibility distribution for the controlled bloodstream concentrations of any physiologically active substance through few approximate considerations. This possibility distribution is tested later against the empirical histograms obtained from the panel study of the eight different physiologically active substances in 417 individuals.
Abstract: The most common forensic activity is searching a hard
disk for string of data. Nowadays, investigators and analysts are
increasingly experiencing large, even terabyte sized data sets when
conducting digital investigations. Therefore consecutive searching can
take weeks to complete successfully. There are two primary search
methods: index-based search and bitwise search. Index-based
searching is very fast after the initial indexing but initial indexing
takes a long time. In this paper, we discuss a high speed bitwise search
model for large-scale digital forensic investigations. We used pattern
matching board, which is generally used for network security, to
search for string and complex regular expressions. Our results indicate
that in many cases, the use of pattern matching board can substantially
increase the performance of digital forensic search tools.
Abstract: The success of an electronic system in a System-on- Chip is highly dependent on the efficiency of its interconnection network, which is constructed from routers and channels (the routers move data across the channels between nodes). Since neither classical bus based nor point to point architectures can provide scalable solutions and satisfy the tight power and performance requirements of future applications, the Network-on-Chip (NoC) approach has recently been proposed as a promising solution. Indeed, in contrast to the traditional solutions, the NoC approach can provide large bandwidth with moderate area overhead. The selected topology of the components interconnects plays prime rule in the performance of NoC architecture as well as routing and switching techniques that can be used. In this paper, we present two generic NoC architectures that can be customized to the specific communication needs of an application in order to reduce the area with minimal degradation of the latency of the system. An experimental study is performed to compare these structures with basic NoC topologies represented by 2D mesh, Butterfly-Fat Tree (BFT) and SPIN. It is shown that Cluster mesh (CMesh) and MinRoot schemes achieves significant improvements in network latency and energy consumption with only negligible area overhead and complexity over existing architectures. In fact, in the case of basic NoC topologies, CMesh and MinRoot schemes provides substantial savings in area as well, because they requires fewer routers. The simulation results show that CMesh and MinRoot networks outperforms MESH, BFT and SPIN in main performance metrics.
Abstract: Internet addiction has become a critical problem on
adolescents in Taiwan, and its negative effects on various dimensions
of adolescent development caught the attention of educational and
psychological experts. This study examined the correlation between
cognitive (locus of control) and emotion (emotion venting strategies)
factors on internet addiction of adolescents in Taiwan. Using the
Compulsive Internet Use (CIU) and the Emotion Venting Strategy
scales, a survey was conducted and 215 effective samples (students
ranging from12 to14 years old) returned. Quantitative analysis
methods such as descriptive statistics, t-test, ANOVA, Pearson
correlations and multiple regression were adopted. The results were as
follows: 1. Severity of Internet addiction has significant gender
differences; boys were at a higher risk than girls in becoming addicted
to the Internet. 2. Emotion venting, locus of control and internet
addiction have been shown to be positive correlated with one another.
3. Setting the locus of control as the control variable, emotion venting
strategy has positive and significant contribution to internet addiction.
The results of this study suggest that coaching deconstructive emotion
strategies and cognitive believes are encouraged to integrate with
actual field work.
Abstract: A Simultaneous Multithreading (SMT) Processor is
capable of executing instructions from multiple threads in the same
cycle. SMT in fact was introduced as a powerful architecture to
superscalar to increase the throughput of the processor.
Simultaneous Multithreading is a technique that permits multiple
instructions from multiple independent applications or threads to
compete limited resources each cycle. While the fetch unit has been
identified as one of the major bottlenecks of SMT architecture, several
fetch schemes were proposed by prior works to enhance the fetching
efficiency and overall performance.
In this paper, we propose a novel fetch policy called queue situation
identifier (QSI) which counts some kind of long latency instructions of
each thread each cycle then properly selects which threads to fetch
next cycle. Simulation results show that in best case our fetch policy
can achieve 30% on speedup and also can reduce the data cache level 1
miss rate.
Abstract: The back-propagation algorithm calculates the weight
changes of an artificial neural network, and a two-term algorithm
with a dynamically optimal learning rate and a momentum factor
is commonly used. Recently the addition of an extra term, called a
proportional factor (PF), to the two-term BP algorithm was proposed.
The third term increases the speed of the BP algorithm. However,
the PF term also reduces the convergence of the BP algorithm, and
optimization approaches for evaluating the learning parameters are
required to facilitate the application of the three terms BP algorithm.
This paper considers the optimization of the new back-propagation
algorithm by using derivative information. A family of approaches
exploiting the derivatives with respect to the learning rate, momentum
factor and proportional factor is presented. These autonomously
compute the derivatives in the weight space, by using information
gathered from the forward and backward procedures. The three-term
BP algorithm and the optimization approaches are evaluated using
the benchmark XOR problem.
Abstract: A simple network model is developed in OPNET to
study the performance of the Wi-Fi protocol. The model is simulated
in OPNET and performance factors such as load, throughput and delay
are analysed from the model. Four applications such as oracle, http, ftp
and voice are applied over the Wireless LAN network to determine the
throughput. The voice application utilises a considerable amount of
bandwidth of up to 5Mbps, as a result the 802.11g standard of the
Wi-Fi protocol was chosen which can support a data rate of up to
54Mbps. Results indicate that when the load in the Wi-Fi network is
increased the queuing delay on the point-to-point links in the Wi-Fi
network significantly reduces until it is comparable to that of WiMAX.
In conclusion, the queuing delay of the Wi-Fi protocol for the network
model simulated was about 0.00001secs comparable to WiMAX
network values.
Abstract: This paper presents the hardware design of a unified
architecture to compute the 4x4, 8x8 and 16x16 efficient twodimensional
(2-D) transform for the HEVC standard. This
architecture is based on fast integer transform algorithms. It is
designed only with adders and shifts in order to reduce the hardware
cost significantly. The goal is to ensure the maximum circuit reuse
during the computing while saving 40% for the number of operations.
The architecture is developed using FIFOs to compute the second
dimension. The proposed hardware was implemented in VHDL. The
VHDL RTL code works at 240 MHZ in an Altera Stratix III FPGA.
The number of cycles in this architecture varies from 33 in 4-point-
2D-DCT to 172 when the 16-point-2D-DCT is computed. Results
show frequency improvements reaching 96% when compared to an
architecture described as the direct transcription of the algorithm.
Abstract: Currently, a large number of license activities (Early
Site Permits, Combined Operating License, reactor certifications,
etc.), are pending for review before the United States Nuclear
Regulatory Commission (US NRC). Much of the senior staff at the
NRC is now committed to these review and licensing actions. To
address this additional workload, the NRC has recruited a large
number of new Regulatory Staff for dealing with these and other
regulatory actions such as the US Fleet of Research and Test Reactors
(RTRs). These reactors pose unusual demands on Regulatory Staff
since the US Fleet of RTRs, although few (32 Licensed RTRs as of
2010), they represent a broad range of reactor types, operations, and
research and training aspects that nuclear reactor power plants (such
as the 104 LWRs) do not pose. The NRC must inspect and regulate
all these facilities. This paper addresses selected training topics and
regulatory activities providedNRC Inspectors for RTRs.
Abstract: Working memory (WM) can be defined as the system
which actively holds information in the mind to do tasks in spite of
the distraction. Contrary, short-term memory (STM) is a system that
represents the capacity for the active storing of information without
distraction. There has been accumulating evidence that these types of
memory are related to higher cognition (HC). The aim of this study
was to verify the relationship between HC and memory (visual STM
and WM, auditory STM and WM). 59 primary school children were
tested by intelligence test, mathematical tasks (HC) and memory
subtests. We have shown that visual but not auditory memory is a
significant predictor of higher cognition. The relevance of these
results are discussed.
Abstract: In this paper we describes the authentication for DHCP
(Dynamic Host Configuration Protocol) message which provides the
efficient key management and reduces the danger replay attack without
an additional packet for a replay attack. And the authentication for
DHCP message supports mutual authentication and provides both
entity authentication and message authentication. We applied the
authentication for DHCP message to the home network environments
and tested through a home gateway.
Abstract: Quantum cryptography offers a way of key agreement,
which is unbreakable by any external adversary. Authentication is
of crucial importance, as perfect secrecy is worthless if the identity
of the addressee cannot be ensured before sending important information.
Message authentication has been studied thoroughly, but no
approach seems to be able to explicitly counter meet-in-the-middle
impersonation attacks. The goal of this paper is the development of
an authentication scheme being resistant against active adversaries
controlling the communication channel. The scheme is built on top
of a key-establishment protocol and is unconditionally secure if built
upon quantum cryptographic key exchange. In general, the security
is the same as for the key-agreement protocol lying underneath.
Abstract: Currently, most of distance learning courses can only
deliver standard material to students. Students receive course content
passively which leads to the neglect of the goal of education – “to suit
the teaching to the ability of students". Providing appropriate course
content according to students- ability is the main goal of this paper.
Except offering a series of conventional learning services, abundant
information available, and instant message delivery, a complete online
learning environment should be able to distinguish between students-
ability and provide learning courses that best suit their ability.
However, if a distance learning site contains well-designed course
content and design but fails to provide adaptive courses, students will
gradually loss their interests and confidence in learning and result in
ineffective learning or discontinued learning. In this paper, an
intelligent tutoring system is proposed and it consists of several
modules working cooperatively in order to build an adaptive learning
environment for distance education. The operation of the system is
based on the result of Self-Organizing Map (SOM) to divide students
into different groups according to their learning ability and learning
interests and then provide them with suitable course content.
Accordingly, the problem of information overload and internet traffic
problem can be solved because the amount of traffic accessing the
same content is reduced.
Abstract: Motion detection is a basic operation in the selection of significant segments of the video signals. For an effective Human Computer Intelligent Interaction, the computer needs to recognize the motion and track the moving object. Here an efficient neural network system is proposed for motion detection from the static background. This method mainly consists of four parts like Frame Separation, Rough Motion Detection, Network Formation and Training, Object Tracking. This paper can be used to verify real time detections in such a way that it can be used in defense applications, bio-medical applications and robotics. This can also be used for obtaining detection information related to the size, location and direction of motion of moving objects for assessment purposes. The time taken for video tracking by this Neural Network is only few seconds.
Abstract: In this paper, an intelligent algorithm for optimal
document archiving is presented. It is kown that electronic archives
are very important for information system management. Minimizing
the size of the stored data in electronic archive is a main issue to
reduce the physical storage area. Here, the effect of different types of
Arabic fonts on electronic archives size is discussed. Simulation
results show that PDF is the best file format for storage of the Arabic
documents in electronic archive. Furthermore, fast information
detection in a given PDF file is introduced. Such approach uses fast
neural networks (FNNs) implemented in the frequency domain. The
operation of these networks relies on performing cross correlation in
the frequency domain rather than spatial one. It is proved
mathematically and practically that the number of computation steps
required for the presented FNNs is less than that needed by
conventional neural networks (CNNs). Simulation results using
MATLAB confirm the theoretical computations.
Abstract: The paper describes ergonomics problems trend of
student at B5101 classroom building 2, Suranaree University of
Technology. The objective to survey ergonomics problems and effect
from use chairs for sitting in class room. The result from survey
method 100 student they use lecture chair for sitting in classroom
more than 2 hours/ day by RULA[1]. and Body discomfort survey[2].
The result from Body discomfort survey contribute fatigue problems
at neck, lower back, upper back and right shoulder 2.93, 2.91, 2.33,
1.75 respectively and result from RULA contribute fatigue problems
at neck, body and right upper arm 4.00, 3.75 and 3.00 respectively
are consistent. After that the researcher provide improvement plan
for design new chair support student fatigue reduction by prepare
data of sample anthropometry and design ergonomics chair prototype
3 unit. Then sample 100 student trial to use new chair and evaluate
again by RULA, Body discomfort and satisfaction. The result from
trial new chair after improvement by RULA present fatigue reduction
average of head and neck from 4.00 to 2.25 , body and trunk from
3.75 to 2.00 and arm force from 1.00 to 0.25 respectively. The result
from trial new chair after improvement by Body discomfort present
fatigue reduction average of lower back from 2.91 to 0.87, neck from
2.93 to 1.24, upper back 2.33 to 0.84 and right upper arm from 1.75
to 0.74. That statistical of RULA and Body discomfort survey
present fatigue reduction after improvement significance with a
confidence level of 95% (p-value 0.05). When analyzing the
relationship of fatigue as part of the body by Chi – square test during
RULA and Body discomfort that before and after improvements were
consistent with the significant level of confidence 95% (p-value 0.05)
. Moreover the students satisfaction result from trial with a new chair
for 30 minutes [3]. 72 percent very satisfied of the folding of the
secondary writing simple 66% the width of the writing plate, 64% the
suitability of the writing plate, 62% of soft seat cushion and 61%
easy to seat the chair.
Abstract: Fingerprint based identification system; one of a well
known biometric system in the area of pattern recognition and has
always been under study through its important role in forensic
science that could help government criminal justice community. In
this paper, we proposed an identification framework of individuals by
means of fingerprint. Different from the most conventional
fingerprint identification frameworks the extracted Geometrical
element features (GEFs) will go through a Discretization process.
The intention of Discretization in this study is to attain individual
unique features that could reflect the individual varianceness in order
to discriminate one person from another. Previously, Discretization
has been shown a particularly efficient identification on English
handwriting with accuracy of 99.9% and on discrimination of twins-
handwriting with accuracy of 98%. Due to its high discriminative
power, this method is adopted into this framework as an independent
based method to seek for the accuracy of fingerprint identification.
Finally the experimental result shows that the accuracy rate of
identification of the proposed system using Discretization is 100%
for FVC2000, 93% for FVC2002 and 89.7% for FVC2004 which is
much better than the conventional or the existing fingerprint
identification system (72% for FVC2000, 26% for FVC2002 and
32.8% for FVC2004). The result indicates that Discretization
approach manages to boost up the classification effectively, and
therefore prove to be suitable for other biometric features besides
handwriting and fingerprint.
Abstract: This work presents a comparison between the Annual
Energy Output (AEO) of two commercial vertical-axis wind turbines
(VAWTs) for a low-wind urban site: both a drag-driven and a liftdriven
concepts are examined in order to be installed on top of the
new Via dei Giustinelli building, Trieste (Italy). The power-curves,
taken from the product specification sheets, have been matched to the
wind characteristics of the selected installation site. The influence of
rotor swept area and rated power on the performance of the two
proposed wind turbines have been examined in detail, achieving a
correlation between rotor swept area, electrical generator size and
wind distribution, to be used as a guideline for the calculation of the
AEO.