Abstract: TiO2 thin films have been prepared by the sol-gel dipcoating
technique in order to elaborate antireflective thin films for
monocrystalline silicon (mono-Si). The titanium isopropoxyde was
chosen as a precursor with hydrochloric acid as a catalyser for
preparing a stable solution. The optical properties have been tailored
with varying the solution concentration, the withdrawn speed, and the
heat-treatment. We showed that using a TiO2 single layer with 64.5
nm in thickness, heat-treated at 450°C or 300°C reduces the mono-Si
reflection at a level lower than 3% over the broadband spectral
domains [669-834] nm and [786-1006] nm respectively. Those latter
performances are similar to the ones obtained with double layers of
low and high refractive index glasses respectively.
Abstract: In this work, neural networks methods MLP type were
applied to a database from an array of six sensors for the detection of
three toxic gases. The choice of the number of hidden layers and the
weight values are influential on the convergence of the learning
algorithm. We proposed, in this article, a mathematical formula to
determine the optimal number of hidden layers and good weight
values based on the method of back propagation of errors. The results
of this modeling have improved discrimination of these gases and
optimized the computation time. The model presented here has
proven to be an effective application for the fast identification of
toxic gases.
Abstract: The exact theoretical expression describing the
probability distribution of nonlinear sea-surface elevations derived
from the second-order narrowband model has a cumbersome form
that requires numerical computations, not well-disposed to theoretical
or practical applications. Here, the same narrowband model is reexamined
to develop a simpler closed-form approximation suitable
for theoretical and practical applications. The salient features of the
approximate form are explored, and its relative validity is verified
with comparisons to other readily available approximations, and
oceanic data.
Abstract: The ad hoc networks are the future of wireless
technology as everyone wants fast and accurate error free information
so keeping this in mind Bit Error Rate (BER) and power is optimized
in this research paper by using the Genetic Algorithm (GA). The
digital modulation techniques used for this paper are Binary Phase
Shift Keying (BPSK), M-ary Phase Shift Keying (M-ary PSK), and
Quadrature Amplitude Modulation (QAM). This work is
implemented on Wireless Ad Hoc Networks (WLAN). Then it is
analyze which modulation technique is performing well to optimize
the BER and power of WLAN.
Abstract: In this paper, we present a robust algorithm to recognize extracted text from grocery product images captured by mobile phone cameras. Recognition of such text is challenging since text in grocery product images varies in its size, orientation,
style, illumination, and can suffer from perspective distortion.
Pre-processing is performed to make the characters scale and
rotation invariant. Since text degradations can not be appropriately
defined using well-known geometric transformations such
as translation, rotation, affine transformation and shearing, we
use the whole character black pixels as our feature vector.
Classification is performed with minimum distance classifier
using the maximum likelihood criterion, which delivers very
promising Character Recognition Rate (CRR) of 89%. We
achieve considerably higher Word Recognition Rate (WRR) of
99% when using lower level linguistic knowledge about product
words during the recognition process.
Abstract: In recent years, the compression of date (Phoenix
dactylifera L.) fruit powders (DP) to obtain date tablets (DT) has
been suggested as a promising form of valorization of non
commercial valuable date fruit (DF) varieties. To further improve
and characterize DT, the present study aims to investigate the
influence of the DP particle size and compression force on some
physical properties of DT. The results show that independently of
particle size, the hardness (y) of tablets increases with the increase of
the compression force (x) following a logarithmic law (y = a ln (bx)
where a and b are the constants of model). Further, a full factorial
design (FFD) at two levels, applied to investigate the erosion %,
reveals that the effects of time and particle size are the same in
absolute value and they are beyond the effect of the compression.
Regarding the disintegration time, the obtained results also by means
of a FFD show that the effect of the compression force exceeds 4
times that of the DP particle size. As final stage, the color parameters
in the CIELab system of DT immediately after their obtaining are
differently influenced by the size of the initial powder.
Abstract: Taking the design tolerance into account, this paper
presents a novel efficient approach to generate iso-scallop tool path for
five-axis strip machining with a barrel cutter. The cutter location is
first determined on the scallop surface instead of the design surface,
and then the cutter is adjusted to locate the optimal tool position based
on the differential rotation of the tool axis and satisfies the design
tolerance simultaneously. The machining strip width and error are
calculated with the aid of the grazing curve of the cutter. Based on the
proposed tool positioning algorithm, the tool paths are generated by
keeping the scallop height formed by adjacent tool paths constant. An
example is conducted to confirm the validity of the proposed method.
Abstract: The use of eXtensible Markup Language (XML) in
web, business and scientific databases lead to the development of
methods, techniques and systems to manage and analyze XML data.
Semi-structured documents suffer due to its heterogeneity and
dimensionality. XML structure and content mining represent
convergence for research in semi-structured data and text mining. As
the information available on the internet grows drastically, extracting
knowledge from XML documents becomes a harder task. Certainly,
documents are often so large that the data set returned as answer to a
query may also be very big to convey the required information. To
improve the query answering, a Semantic Tree Based Association
Rule (STAR) mining method is proposed. This method provides
intentional information by considering the structure, content and the
semantics of the content. The method is applied on Reuter’s dataset
and the results show that the proposed method outperforms well.
Abstract: The IEEE 802.22 working group aims to drive the
Digital Video Broadcasting-Terrestrial (DVB-T) bands for data
communication to the rural area without interfering the TV broadcast.
In this paper, we arrive at a closed-form expression for average
detection probability of Fusion center (FC) with multiple antenna
over the κ − μ fading channel model. We consider a centralized
cooperative multiple antenna network for reporting. The DVB-T
samples forwarded by the secondary user (SU) were combined using
Maximum ratio combiner at FC, an energy detection is performed
to make the decision. The fading effects of the channel degrades
the detection probability of the FC, a generalized independent and
identically distributed (IID) κ − μ and an additive white Gaussian
noise (AWGN) channel is considered for reporting and sensing
respectively. The proposed system performance is verified through
simulation results.
Abstract: At present, the evaluation of voltage stability
assessment experiences sizeable anxiety in the safe operation of
power systems. This is due to the complications of a strain power
system. With the snowballing of power demand by the consumers
and also the restricted amount of power sources, therefore, the system
has to perform at its maximum proficiency. Consequently, the
noteworthy to discover the maximum ability boundary prior to
voltage collapse should be undertaken. A preliminary warning can be
perceived to evade the interruption of power system’s capacity. The
effectiveness of line voltage stability indices (LVSI) is differentiated
in this paper. The main purpose of the indices used is to predict the
proximity of voltage instability of the electric power system. On the
other hand, the indices are also able to decide the weakest load buses
which are close to voltage collapse in the power system. The line
stability indices are assessed using the IEEE 14 bus test system to
validate its practicability. Results demonstrated that the implemented
indices are practically relevant in predicting the manifestation of
voltage collapse in the system. Therefore, essential actions can be
taken to dodge the incident from arising.
Abstract: E-learning has become an efficient and widespread
means of education at all levels of human activities. Statistics is no
exception. Unfortunately the main focus in statistics teaching is
usually paid to the substitution in formulas. Suitable websites can
simplify and automate calculations and provide more attention and
time to the basic principles of statistics, mathematization of real-life
situations and following interpretation of results. We now introduce
our own web-site for hypothesis testing. Its didactic aspects, the
technical possibilities of the individual tools, the experience of use
and the advantages or disadvantages are discussed in this paper. This
web-site is not a substitute for common statistical software but should
significantly improve the teaching of statistics at universities.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: Real time image and video processing is a demand in
many computer vision applications, e.g. video surveillance, traffic
management and medical imaging. The processing of those video
applications requires high computational power. Thus, the optimal
solution is the collaboration of CPU and hardware accelerators. In
this paper, a Canny edge detection hardware accelerator is proposed.
Edge detection is one of the basic building blocks of video and image
processing applications. It is a common block in the pre-processing
phase of image and video processing pipeline. Our presented
approach targets offloading the Canny edge detection algorithm from
processing system (PS) to programmable logic (PL) taking the
advantage of High Level Synthesis (HLS) tool flow to accelerate the
implementation on Zynq platform. The resulting implementation
enables up to a 100x performance improvement through hardware
acceleration. The CPU utilization drops down and the frame rate
jumps to 60 fps of 1080p full HD input video stream.
Abstract: The tomato is a very important crop, whose
cultivation in the Mediterranean basin is severely affected by the
phytoparasitic weed Phelipanche ramosa. The semiarid regions of
the world are considered the main areas where this parasitic weed is
established causing heavy infestation as it is able to produce high
numbers of seeds (up to 500,000 per plant), which remain viable for
extended period (more than 20 years). In this paper the results
obtained from eleven treatments in order to control this parasitic
weed including chemical, agronomic, biological and biotechnological
methods compared with the untreated test under two plowing depths
(30 and 50 cm) are reported. The split-plot design with 3 replicates
was adopted. In 2014 a trial was performed in Foggia province
(southern Italy) on processing tomato (cv Docet) grown in the field
infested by Phelipanche ramosa. Tomato seedlings were transplant
on May 5, on a clay-loam soil. During the growing cycle of the
tomato crop, at 56-78 and 92 days after transplantation, the number
of parasitic shoots emerged in each plot was detected. At tomato
harvesting, on August 18, the major quantity-quality yield parameters
were determined (marketable yield, mean weight, dry matter, pH,
soluble solids and color of fruits). All data were subjected to analysis
of variance (ANOVA) and the means were compared by Tukey's test.
Each treatment studied did not provide complete control against
Phelipanche ramosa. However, among the different methods tested,
some of them which Fusarium, gliphosate, radicon biostimulant and
Red Setter tomato cv (improved genotypes obtained by Tilling
technology) under deeper plowing (50 cm depth) proved to mitigate
the virulence of the Phelipanche ramose attacks. It is assumed that
these effects can be improved combining some of these treatments
each other, especially for a gradual and continuing reduction of the
“seed bank” of the parasite in the soil.
Abstract: This paper presents nonlinear pulse propagation characteristics for different input optical pulse shapes with various input pulse energy levels in semiconductor optical amplifiers. For simulation of nonlinear pulse propagation, finite-difference beam propagation method is used to solve the nonlinear Schrödinger equation. In this equation, gain spectrum dynamics, gain saturation are taken into account which depends on carrier depletion, carrier heating, spectral-hole burning, group velocity dispersion, self-phase modulation and two photon absorption. From this analysis, we obtained the output waveforms and spectra for different input pulse shapes as well as for different input energies. It shows clearly that the peak position of the output waveforms are shifted toward the leading edge which due to the gain saturation of the SOA for higher input pulse energies. We also analyzed and compared the normalized difference of full-width at half maximum for different input pulse shapes in the SOA.
Abstract: Cloud computing has provided the impetus for change
in the demand, sourcing, and consumption of IT-enabled services.
The technology developed from an emerging trend towards a ‘musthave’.
Many organizations harnessed on the quick-wins of cloud
computing within the last five years but nowadays reach a plateau
when it comes to sustainable savings and performance. This study
aims to investigate what is needed from an organizational perspective
to make cloud computing a sustainable success. The study was
carried out in Germany among senior IT professionals, both in
management and delivery positions. Our research shows that IT
executives must be prepared to realign their IT workforce to sustain
the advantage of cloud computing for today and the near future.
While new roles will undoubtedly emerge, roles alone cannot ensure
the success of cloud deployments. What is needed is a change in the
IT workforce’s business behaviour, or put more simply, the ways in
which the IT personnel works. It gives clear guidance on which
dimensions of an employees’ working behaviour need to be adapted.
The practical implications are drawn from a series of semi-structured
interviews, resulting in a high-level workforce enablement plan.
Lastly, it elaborates on tools and gives clear guidance on which
pitfalls might arise along the proposed workforce enablement
process.
Abstract: The paper describes a Chinese shadow play animation
system based on Kinect. Users, without any professional training, can
personally manipulate the shadow characters to finish a shadow play
performance by their body actions and get a shadow play video
through giving the record command to our system if they want. In our
system, Kinect is responsible for capturing human movement and
voice commands data. Gesture recognition module is used to control
the change of the shadow play scenes. After packaging the data from
Kinect and the recognition result from gesture recognition module,
VRPN transmits them to the server-side. At last, the server-side uses
the information to control the motion of shadow characters and video
recording. This system not only achieves human-computer interaction,
but also realizes the interaction between people. It brings an
entertaining experience to users and easy to operate for all ages. Even
more important is that the application background of Chinese shadow
play embodies the protection of the art of shadow play animation.
Abstract: This paper presents a novel design of a microstrip
fractal antenna based on the use of Sierpinski triangle shape, it’s
designed and simulated by using FR4 substrate in the operating
frequency bands (GPS, WiMAX), the design is a fractal antenna with
a modified ground structure. The proposed antenna is simulated and
validated by using CST Microwave Studio Software, the simulated
results presents good performances in term of radiation pattern and
matching input impedance.
Abstract: Logistics distributors face the issue of having to
provide increasing service levels while being forced to reduce costs at
the same time. Same-day delivery, quick order processing and rapidly
growing ranges of articles are only some of the prevailing challenges.
One key aspect of the performance of an intra-logistics system is how
often and in which amplitude congestions and dysfunctions affect the
processing operations. By gaining knowledge of the so called
‘performance availability’ of such a system during the planning stage,
oversizing and wasting can be reduced whereas planning
transparency is increased. State of the art for the determination of this
KPI is simulation studies. However, their structure and therefore their
results may vary unforeseeably. This article proposes a concept for
the establishment of ‘certified’ and hence reliable and comparable
simulation models.
Abstract: Knowledge management is considered as an important
factor in improving health care services. KM facilitates the transfer of
existing knowledge and the development of new knowledge in
hospitals. This paper reviews practices adopted by doctors in Kuwait
for capturing, sharing, and generating knowledge. It also discusses
the perceived impact of KM practices on performance of hospitals.
Based on a survey of 277 doctors, the study found that KM practices
among doctors in the sampled hospitals were not very effective. Little
attention was paid to the main activities that support the transfer of
expertise among doctors in hospitals. However, as predicted by
previous studies, good km practices were perceived by doctors to
have a positive impact on performance of hospitals. It was concluded
that through effective KM practices hospitals could improve the
services they provide. Documentation of best practices and capturing
of lessons learnt for re-use of knowledge could help transform the
hospitals into learning organizations.