Abstract: Wireless Sensor Networks (WSN) are emerging
because of the developments in wireless communication technology and miniaturization of the hardware. WSN consists of a large number of low-cost, low-power, multifunctional sensor nodes to monitor physical conditions, such as temperature, sound, vibration, pressure,
motion, etc. The MAC protocol to be used in the sensor networks must be energy efficient and this should aim at conserving the energy during its operation. In this paper, with the focus of analyzing the
MAC protocols used in wireless Adhoc networks to WSN, simulation
experiments were conducted in Global Mobile Simulator
(GloMoSim) software. Number of packets sent by regular nodes, and received by sink node in different deployment strategies, total energy
spent, and the network life time have been chosen as the metric for comparison. From the results of simulation, it is evident that the IEEE 802.11 protocol performs better compared to CSMA and MACA protocols.
Abstract: The aeration process via injectors is used to combat
the lack of oxygen in lakes due to eutrophication. A 3D numerical
simulation of the resulting flow using a simplified model is presented.
In order to generate the best dynamic in the fluid with respect to
the aeration purpose, the optimization of the injectors location is
considered. We propose to adapt to this problem the topological
sensitivity analysis method which gives the variation of a criterion
with respect to the creation of a small hole in the domain. The main
idea is to derive the topological sensitivity analysis of the physical
model with respect to the insertion of an injector in the fluid flow
domain. We propose in this work a topological optimization algorithm
based on the studied asymptotic expansion. Finally we present some
numerical results, showing the efficiency of our approach
Abstract: This work focuses on the remediation of polycyclic
aromatic hydrocarbons (PAHs)-contaminated soil via Fenton
treatment coupled with novel chelating agent (CA). The feasibility of
chelated modified Fenton (MF) treatment to promote PAH oxidation
in artificially contaminated soils was investigated in laboratory scale
batch experiments at natural pH. The effects of adding inorganic and
organic CA are discussed. Experiments using different iron catalyst
to CA ratios were conducted, resulting in hydrogen peroxide: soil:
iron: CA weight ratios that varied from 0.049: 1: 0.072: 0.008 to
0.049: 1: 0.072: 0.067. The results revealed that (1) inorganic CA
could provide much higher PAH removal efficiency and (2) most of
the proposed CAs were more efficient than commonly utilised CAs
even at mild ratio. This work highlights the potential of novel
chelating agents in maintaining a suitable environment throughout
the Fenton treatment, particularly in soils with high buffer capacity.
Abstract: The Goursat partial differential equation arises in
linear and non linear partial differential equations with mixed
derivatives. This equation is a second order hyperbolic partial
differential equation which occurs in various fields of study such as
in engineering, physics, and applied mathematics. There are many
approaches that have been suggested to approximate the solution of
the Goursat partial differential equation. However, all of the
suggested methods traditionally focused on numerical differentiation
approaches including forward and central differences in deriving the
scheme. An innovation has been done in deriving the Goursat partial
differential equation scheme which involves numerical integration
techniques. In this paper we have developed a new scheme to solve
the Goursat partial differential equation based on the Adomian
decomposition (ADM) and associated with Boole-s integration rule to
approximate the integration terms. The new scheme can easily be
applied to many linear and non linear Goursat partial differential
equations and is capable to reduce the size of computational work.
The accuracy of the results reveals the advantage of this new scheme
over existing numerical method.
Abstract: This paper proposes new hybrid approaches for face
recognition. Gabor wavelets representation of face images is an
effective approach for both facial action recognition and face
identification. Perform dimensionality reduction and linear
discriminate analysis on the down sampled Gabor wavelet faces can
increase the discriminate ability. Nearest feature space is extended to
various similarity measures. In our experiments, proposed Gabor
wavelet faces combined with extended neural net feature space
classifier shows very good performance, which can achieve 93 %
maximum correct recognition rate on ORL data set without any preprocessing
step.
Abstract: In this paper the neural network-based controller is
designed for motion control of a mobile robot. This paper treats the
problems of trajectory following and posture stabilization of the
mobile robot with nonholonomic constraints. For this purpose the
recurrent neural network with one hidden layer is used. It learns
relationship between linear velocities and error positions of the
mobile robot. This neural network is trained on-line using the
backpropagation optimization algorithm with an adaptive learning
rate. The optimization algorithm is performed at each sample time to
compute the optimal control inputs. The performance of the proposed
system is investigated using a kinematic model of the mobile robot.
Abstract: Wireless Mesh Networking is a promising proposal
for broadband data transmission in a large area with low cost and
acceptable QoS. These features- trade offs in WMNs is a hot research
field nowadays. In this paper a mathematical optimization framework
has been developed to maximize throughput according to upper
bound delay constraints. IEEE 802.11 based infrastructure
backhauling mode of WMNs has been considered to formulate the
MINLP optimization problem. Proposed method gives the full
routing and scheduling procedure in WMN in order to obtain
mentioned goals.
Abstract: The numerical analytic continuation of a function f(z) = f(x + iy) on a strip is discussed in this paper. The data are only given approximately on the real axis. The periodicity of given data is assumed. A truncated Fourier spectral method has been introduced to deal with the ill-posedness of the problem. The theoretic results show that the discrepancy principle can work well for this problem. Some numerical results are also given to show the efficiency of the method.
Abstract: Nowadays there are more than thirty maturity models
in different knowledge areas. Maturity model is an area of interest
that contributes organizations to find out where they are in a specific
knowledge area and how to improve it. As Information Resource
Management (IRM) is the concept that information is a major
corporate resource and must be managed using the same basic
principles used to manage other assets, assessment of the current
IRM status and reveal the improvement points can play a critical role
in developing an appropriate information structure in organizations.
In this paper we proposed a framework for information resource
management maturity model (IRM3) that includes ten best practices
for the maturity assessment of the organizations' IRM.
Abstract: This paper presents an algorithm which extends the rapidly-exploring random tree (RRT) framework to deal with change of the task environments. This algorithm called the Retrieval RRT Strategy (RRS) combines a support vector machine (SVM) and RRT and plans the robot motion in the presence of the change of the surrounding environment. This algorithm consists of two levels. At the first level, the SVM is built and selects a proper path from the bank of RRTs for a given environment. At the second level, a real path is planned by the RRT planners for the given environment. The suggested method is applied to the control of KUKA™,, a commercial 6 DOF robot manipulator, and its feasibility and efficiency are demonstrated via the cosimulatation of MatLab™, and RecurDyn™,.
Abstract: Computed tomography and laminography are heavily investigated in a compressive sensing based image reconstruction framework to reduce the dose to the patients as well as to the radiosensitive devices such as multilayer microelectronic circuit boards. Nowadays researchers are actively working on optimizing the compressive sensing based iterative image reconstruction algorithm to obtain better quality images. However, the effects of the sampled data’s properties on reconstructed the image’s quality, particularly in an insufficient sampled data conditions have not been explored in computed laminography. In this paper, we investigated the effects of two data properties i.e. sampling density and data incoherence on the reconstructed image obtained by conventional computed laminography and a recently proposed method called spherical sinusoidal scanning scheme. We have found that in a compressive sensing based image reconstruction framework, the image quality mainly depends upon the data incoherence when the data is uniformly sampled.
Abstract: Tanzania is a developing country, which significantly lags behind the rest of the world in information communications technology (ICT), especially for the Internet. Internet connectivity to the rest of the world is via expensive satellite links, thus leaving the majority of the population unable to access the Internet due to the high cost. This paper introduces the concept of an optical WDM network for Internet infrastructure in Tanzania, so as to reduce Internet connection costs, and provide Internet access to the majority of people who live in both urban and rural areas. We also present a proposed optical WDM network, which mitigates the effects of system impairments, and provide simulation results to show that the data is successfully transmitted over a longer distance using a WDM network.
Abstract: A great deal of research works in the field information
systems security has been based on a positivist paradigm. Applying
the reductionism concept of the positivist paradigm for information
security means missing the bigger picture and thus, the lack of holism
which could be one of the reasons why security is still overlooked,
comes as an afterthought or perceived from a purely technical
dimension. We need to reshape our thinking and attitudes towards
security especially in a complex and dynamic environment such as e-
Business to develop a holistic understanding of e-Business security in
relation to its context as well as considering all the stakeholders in
the problem area. In this paper we argue the suitability and need for
more inductive interpretive approach and qualitative research method
to investigate e-Business security. Our discussion is based on a
holistic framework of enquiry, nature of the research problem, the
underling theoretical lens and the complexity of e-Business
environment. At the end we present a research strategy for
developing a holistic framework for understanding of e-Business
security problems in the context of developing countries based on an
interdisciplinary inquiry which considers their needs and
requirements.
Abstract: How to efficiently assign system resource to route the
Client demand by Gateway servers is a tricky predicament. In this
paper, we tender an enhanced proposal for autonomous recital of
Gateway servers under highly vibrant traffic loads. We devise a
methodology to calculate Queue Length and Waiting Time utilizing
Gateway Server information to reduce response time variance in
presence of bursty traffic.
The most widespread contemplation is performance, because
Gateway Servers must offer cost-effective and high-availability
services in the elongated period, thus they have to be scaled to meet
the expected load. Performance measurements can be the base for
performance modeling and prediction. With the help of performance
models, the performance metrics (like buffer estimation, waiting
time) can be determined at the development process.
This paper describes the possible queue models those can be
applied in the estimation of queue length to estimate the final value
of the memory size. Both simulation and experimental studies using
synthesized workloads and analysis of real-world Gateway Servers
demonstrate the effectiveness of the proposed system.
Abstract: The objective of this research is parameters optimized
of the stair shape workpiece which is cut by CNC Wire-Cut EDM
(WEDW). The experiment material is SKD-11 steel of stair-shaped
with variable height workpiece 10, 20, 30 and 40 mm. with the same
10 mm. thickness are cut by Sodick's CNC Wire-Cut EDM model
AD325L.
The experiments are designed by 3k full factorial experimental
design at 3 level 2 factors and 9 experiments with 2 replicate. The
selected two factor are servo voltage (SV) and servo feed rate (SF)
and the response is cutting thickness error. The experiment is divided
in two experiments. The first experiment determines the significant
effective factor at confidential interval 95%. The SV factor is the
significant effective factor from first result. In order to result smallest
cutting thickness error of workpieces is 17 micron with the SV value
is 46 volt. Also show that the lower SV value, the smaller different
thickness error of workpiece. Then the second experiment is done to
reduce different cutting thickness error of workpiece as small as
possible by lower SV. The second experiment result show the
significant effective factor at confidential interval 95% is the SV
factor and the smallest cutting thickness error of workpieces reduce
to 11 micron with the experiment SV value is 36 volt.
Abstract: In this paper, we propose a morphing method by which face color images can be freely transformed. The main focus of this work is the transformation of one face image to another. This method is fully automatic in that it can morph two face images by automatically detecting all the control points necessary to perform the morph. A face detection neural network, edge detection and medium filters are employed to detect the face position and features. Five control points, for both the source and target images, are then extracted based on the facial features. Triangulation method is then used to match and warp the source image to the target image using the control points. Finally color interpolation is done using a color Gaussian model that calculates the color for each particular frame depending on the number of frames used. A real coded Genetic algorithm is used in both the image warping and color blending steps to assist in step size decisions and speed up the morphing. This method results in ''very smooth'' morphs and is fast to process.
Abstract: The study aims to develop a framework of social
network management to enhance customer relationship. Social
network management of this research is derived from social network
site management, individual and organization social network usage
motivation. The survey was conducted with organization employees
who have used social network to interact with customers. The results
reveal that content, link, privacy and security, page design and
interactivity are the major issues of social network site management.
Content, link, privacy and security, individual and organization
motivation have major impacts on encouraging business knowledge
sharing among employees. Moreover, Page design and interactivity,
content, organization motivation and knowledge sharing can improve
customer relationships.
Abstract: This paper provides a new approach to solve the motion planning problems of flying robots in uncertain 3D dynamic environments. The robots controlled by this method can adaptively choose the fast way to avoid collision without information about the shapes and trajectories of obstacles. Based on sphere coordinates the new method accomplishes collision avoidance of flying robots without any other auxiliary positioning systems. The Self-protection System gives robots self-protection abilities to work in uncertain 3D dynamic environments. Simulations illustrate the validity of the proposed method.
Abstract: The study investigates the relationship between
education level, workplace learning behaviors, psychological
empowerment and burnout in a sample of 191 teachers. We
hypothesized that education level will positively affect psychological
state of increased empowerment and decreased burnout, and we
purposed that these effects will be mediated by workplace learning
behaviors. We used multiple regression analyses to test the model
that included also the 6 following control variables: The teachers'
age, gender, and teaching tenure; the schools' religious level, the
pupils' needs: regular/ special needs, and the class level: elementary/
high school. The results support the purposed mediating model.
Abstract: The great majority of the electric installations belong
to the first and second category. In order to ensure a high level of
reliability of their electric system feeder, two power supply sources
are envisaged, one principal, the other of reserve, generally a cold
reserve (electric diesel group).
The principal source being under operation, its control can be ideal
and sure, however for the reserve source being in stop, a preventive
maintenance-s which proceeds on time intervals (periodicity) and
for well defined lengths of time are envisaged, so that this source will
always available in case of the principal source failure.
The choice of the periodicity of preventive maintenance of the
source of reserve influences directly the reliability of the electric
feeder system. On the basis of the semi-markovians processes, the
influence of the periodicity of the preventive maintenance of the
source of reserve is studied and is given the optimal periodicity.