Abstract: In this paper, we propose a side-peak cancellation
scheme for code acquisition of composite binary offset carrier
(CBOC) signals. We first model the family of CBOC signals in a
generic form, and then, propose a side-peak cancellation scheme
by combining correlation functions between the divided sub-carrier
and received signals. From numerical results, it is shown that the
proposed scheme removes the side-peak completely, and moreover,
the resulting correlation function demonstrates the better power ratio
performance than the CBOC autocorrelation.
Abstract: In this paper we propose a robust adaptive fuzzy
controller for a class of nonlinear system with unknown dynamic.
The method is based on type-2 fuzzy logic system to approximate
unknown non-linear function. The design of the on-line adaptive
scheme of the proposed controller is based on Lyapunov technique.
Simulation results are given to illustrate the effectiveness of the
proposed approach.
Abstract: This paper proposes a novel approach that combines statistical models and support vector machines. A hybrid scheme which appropriately incorporates the advantages of both the generative and discriminant model paradigms is described and evaluated. Support vector machines (SVMs) are trained to divide the whole speakers' space into small subsets of speakers within a hierarchical tree structure. During testing a speech token is assigned to its corresponding group and evaluation using gaussian mixture models (GMMs) is then processed. Experimental results show that the proposed method can significantly improve the performance of text independent speaker identification task. We report improvements of up to 50% reduction in identification error rate compared to the baseline statistical model.
Abstract: This paper proposes a dual tree complex wavelet transform (DT-CWT) based directional interpolation scheme for noisy images. The problems of denoising and interpolation are modelled as to estimate the noiseless and missing samples under the same framework of optimal estimation. Initially, DT-CWT is used to decompose an input low-resolution noisy image into low and high frequency subbands. The high-frequency subband images are interpolated by linear minimum mean square estimation (LMMSE) based interpolation, which preserves the edges of the interpolated images. For each noisy LR image sample, we compute multiple estimates of it along different directions and then fuse those directional estimates for a more accurate denoised LR image. The estimation parameters calculated in the denoising processing can be readily used to interpolate the missing samples. The inverse DT-CWT is applied on the denoised input and interpolated high frequency subband images to obtain the high resolution image. Compared with the conventional schemes that perform denoising and interpolation in tandem, the proposed DT-CWT based noisy image interpolation method can reduce many noise-caused interpolation artifacts and preserve well the image edge structures. The visual and quantitative results show that the proposed technique outperforms many of the existing denoising and interpolation methods.
Abstract: This work concerns the measurements of a Bulk
Acoustic Waves (BAW) emission filter S parameters and compare
with prototypes simulated types. Thanks to HP-ADS, a co-simulation
of filters- characteristics in a digital radio-communication chain is
performed. Four cases of modulation schemes are studied in order to
illustrate the impact of the spectral occupation of the modulated
signal. Results of simulations and co-simulation are given in terms of
Error Vector Measurements to be useful for a general sensibility
analysis of 4th/3rd Generation (G.) emitters (wideband QAM and
OFDM signals)
Abstract: This paper covers various aspects of film piracy over the Internet. In order to successfully deal with this matter, it is needed to recognize motivational factors related to film piracy. Thus, this study discusses group factors that could motivate individuals to engage in pirate activities. Furthermore, the paper discusses the theoretical effect on box office revenues and explains it on a proposed scheme of solutions for decreasing revenues. The article also maps the scheme of incentive motivational anti-piracy campaigns. Moreover, the paper proposes the preliminary scheme for system dynamic modeling of the Internet film piracy. Scheme is developed as a model of behaviors, influences and relations among the elements pertaining to the Internet film piracy.
Abstract: This paper proposes an efficient finite precision block floating point (BFP) treatment to the fixed coefficient finite impulse response (FIR) digital filter. The treatment includes effective implementation of all the three forms of the conventional FIR filters, namely, direct form, cascaded and par- allel, and a roundoff error analysis of them in the BFP format. An effective block formatting algorithm together with an adaptive scaling factor is pro- posed to make the realizations more simple from hardware view point. To this end, a generic relation between the tap weight vector length and the input block length is deduced. The implementation scheme also emphasises on a simple block exponent update technique to prevent overflow even during the block to block transition phase. The roundoff noise is also investigated along the analogous lines, taking into consideration these implementational issues. The simulation results show that the BFP roundoff errors depend on the sig- nal level almost in the same way as floating point roundoff noise, resulting in approximately constant signal to noise ratio over a relatively large dynamic range.
Abstract: Cellular automata have been used for design of cryptosystems. Recently some secret sharing schemes based on linear memory cellular automata have been introduced which are used for both text and image. In this paper, we illustrate that these secret sharing schemes are vulnerable to dishonest participants- collusion. We propose a cheating model for the secret sharing schemes based on linear memory cellular automata. For this purpose we present a novel uniform model for representation of all secret sharing schemes based on cellular automata. Participants can cheat by means of sending bogus shares or bogus transition rules. Cheaters can cooperate to corrupt a shared secret and compute a cheating value added to it. Honest participants are not aware of cheating and suppose the incorrect secret as the valid one. We prove that cheaters can recover valid secret by removing the cheating value form the corrupted secret. We provide methods of calculating the cheating value.
Abstract: In this paper, we present the 2006 survey study origin destination and price that we carried out during 2006 fall in the area in the Moroccan region of Rabat-Salé-Zemmour-Zaer. The survey concerns the people-s characteristics, their displacements behavior and the price that they will be able to pay for a tramway ticket. The main objective is to study a set of relative features to the households and to their displacement's habits and to their choices among public and privet transport modes. A comparison between this survey results and that of the 1996's is made. A pricing scheme is also given according to the tram capacity. (The Rabat-Salé tramway is under construction right now and it will be operational beginning 2010).
Abstract: For collecting data from all sensor nodes, some
changes in Dynamic Source Routing (DSR) protocol is proposed. At
each hop level, route-ranking technique is used for distributing
packets to different selected routes dynamically. For calculating rank
of a route, different parameters like: delay, residual energy and
probability of packet loss are used. A hybrid topology of
DMPR(Disjoint Multi Path Routing) and MMPR(Meshed Multi Path
Routing) is formed, where braided topology is used in different
faulty zones of network. For reducing energy consumption, variant
transmission ranges is used instead of fixed transmission range. For
reducing number of packet drop, a fuzzy logic inference scheme is
used to insert different types of delays dynamically. A rule based
system infers membership function strength which is used to
calculate the final delay amount to be inserted into each of the node
at different clusters.
In braided path, a proposed 'Dual Line ACK Link'scheme is
proposed for sending ACK signal from a damaged node or link to a
parent node to ensure that any error in link or any node-failure
message may not be lost anyway. This paper tries to design the
theoretical aspects of a model which may be applied for collecting
data from any large hanging iron structure with the help of wireless
sensor network. But analyzing these data is the subject of material
science and civil structural construction technology, that part is out
of scope of this paper.
Abstract: The scroll pump belongs to the category of positive
displacement pump can be used for continuous pumping of gases at
low pressure apart from general vacuum application. The shape of
volume occupied by the gas moves and deforms continuously as the
spiral orbits. To capture flow features in such domain where mesh
deformation varies with time in a complicated manner, mesh less
solver was found to be very useful. Least Squares Kinetic Upwind
Method (LSKUM) is a kinetic theory based mesh free Euler solver
working on arbitrary distribution of points. Here upwind is enforced
in molecular level based on kinetic flux vector splitting scheme
(KFVS). In the present study we extended the LSKUM to moving
node viscous flow application. This new code LSKUM-NS-MN for
moving node viscous flow is validated for standard airfoil pitching
test case. Simulation performed for flow through scroll pump using
LSKUM-NS-MN code agrees well with the experimental pumping
speed data.
Abstract: We consider here the subsonic impinging jet
representing the flow field of a vertical take-off aircraft or the initial
stage of rocket launching. Implicit Large-Eddy Simulation (ILES) is
used to calculate the time-dependent flow field and the radiate sound
pressure associated with jet impinging. With proper boundary
treatments and high-order numerical scheme, the near field sound
pressure is successfully obtained. Results are presented for both a
rectangular as well a circular jet.
Abstract: In this paper a special kind of buffer management policy is studied where the packet are preempted even when sufficient space is available in the buffer for incoming packets. This is done to congestion for future incoming packets to improve QoS for certain type of packets. This type of study has been done in past for ATM type of scenario. We extend the same for heterogeneous traffic where data rate and size of the packets are very versatile in nature. Typical example of this scenario is the buffer management in Differentiated Service Router. There are two aspects that are of interest. First is the packet size: whether all packets have same or different sizes. Second aspect is the value or space priority of the packets, do all packets have the same space priority or different packets have different space priorities. We present two types of policies to achieve QoS goals for packets with different priorities: the push out scheme and the expelling scheme. For this work the scenario of packets of variable length is considered with two space priorities and main goal is to minimize the total weighted packet loss. Simulation and analytical studies show that, expelling policies can outperform the push out policies when it comes to offering variable QoS for packets of two different priorities and expelling policies also help improve the amount of admissible load. Some other comparisons of push out and expelling policies are also presented using simulations.
Abstract: Active network was developed to solve the problem of
the current sharing-based network–difficulty in applying new
technology, service or standard, and duplicated operation at several
protocol layers. Active network can transport the packet loaded with
the executable codes, which enables to change the state of the network
node. However, if the network node is placed in the sharing-based
network, security and safety issues should be resolved. To satisfy this
requirement, various security aspects are required such as
authentication, authorization, confidentiality and integrity. Among
these security components, the core factor is the encryption key. As a
result, this study is designed to propose the scheme that manages the
encryption key, which is used to provide security of the
comprehensive active directory, based on the domain.
Abstract: power-line networks are promise infrastructure for
broadband services provision to end users. However, the network
performance is affected by stochastic channel changing which is due
to load impedances, number of branches and branched line lengths. It
has been proposed that multi-carrier modulations techniques such as
orthogonal frequency division multiplexing (OFDM), Multi-Carrier
Spread Spectrum (MC-SS), wavelet OFDM can be used in such
environment. This paper investigates the performance of different
indoor topologies of power-line networks that uses MC-SS
modulation scheme.It is observed that when a branch is added in the
link between sending and receiving end of an indoor channel an
average of 2.5dB power loss is found. In additional, when the branch
is added at a node an average of 1dB power loss is found.
Additionally when the terminal impedances of the branch change
from line characteristic impedance to impedance either higher or
lower values the channel performances were tremendously improved.
For example changing terminal load from characteristic impedance
(85 .) to 5 . the signal to noise ratio (SNR) required to attain the
same performances were decreased from 37dB to 24dB respectively.
Also, changing the terminal load from channel characteristic
impedance (85 .) to very higher impedance (1600 .) the SNR
required to maintain the same performances were decreased from
37dB to 23dB. The result concludes that MC-SS performs better
compared with OFDM techniques in all aspects and especially when
the channel is terminated in either higher or lower impedances.
Abstract: We propose an integral tracking control method for a piezoelectric actuator system. The proposed method achieves the output tracking without requiring any hysteresis observer or schemes to compensate the hysteresis effect. With the proposed control law, the system is converted into the standard singularly perturbed model. Using Tikhonov-s theorem, we guarantee that the tracking error can be reduced to arbitrarily small bound. A numerical example is given to illustrate the effectiveness of our proposed method.
Abstract: Sinc-collocation scheme is one of the new techniques
used in solving numerical problems involving integral equations. This
method has been shown to be a powerful numerical tool for finding
fast and accurate solutions. So, in this paper, some properties of the
Sinc-collocation method required for our subsequent development
are given and are utilized to reduce integral equation of the first
kind to some algebraic equations. Then convergence with exponential
rate is proved by a theorem to guarantee applicability of numerical
technique. Finally, numerical examples are included to demonstrate
the validity and applicability of the technique.
Abstract: In this paper, the effect of transmission codes on the
performance of coherent square M-ary quadrature amplitude
modulation (CSMQAM) under hybrid selection/maximal-ratio
combining (H-S/MRC) diversity is analysed. The fading channels are
modeled as frequency non-selective slow independent and identically
distributed Rayleigh fading channels corrupted by additive white
Gaussian noise (AWGN). The results for coded MQAM are
computed numerically for the case of (24,12) extended Golay code
and compared with uncoded MQAM under H-S/MRC diversity by
plotting error probabilities versus average signal to noise ratio (SNR)
for various values L and N in order to examine the improvement in
the performance of the digital communications system as the number
of selected diversity branches is increased. The results for no
diversity, conventional SC and Lth order MRC schemes are also
plotted for comparison. Closed form analytical results derived in this
paper are sufficiently simple and therefore can be computed
numerically without any approximations. The analytical results
presented in this paper are expected to provide useful information
needed for design and analysis of digital communication systems
over wireless fading channels.
Abstract: The purpose of this study is to derive optimal shapes of
a body located in viscous flows by the finite element method using the
acoustic velocity and the four-step explicit scheme. The formulation
is based on an optimal control theory in which a performance function
of the fluid force is introduced. The performance function should be
minimized satisfying the state equation. This problem can be transformed
into the minimization problem without constraint conditions
by using the adjoint equation with adjoint variables corresponding to
the state equation. The performance function is defined by the drag
and lift forces acting on the body. The weighted gradient method
is applied as a minimization technique, the Galerkin finite element
method is used as a spatial discretization and the four-step explicit
scheme is used as a temporal discretization to solve the state equation
and the adjoint equation. As the interpolation, the orthogonal basis
bubble function for velocity and the linear function for pressure
are employed. In case that the orthogonal basis bubble function is
used, the mass matrix can be diagonalized without any artificial
centralization. The shape optimization is performed by the presented
method.
Abstract: In this article the influence of higher frequency effects
in addition to a special damper design on the electrical behavior of a
synchronous generator main exciter machine is investigated. On the
one hand these machines are often highly stressed by harmonics from
the bridge rectifier thus facing additional eddy current losses. On the
other hand the switching may cause the excitation of dangerous
voltage peaks in resonant circuits formed by the diodes of the
rectifier and the commutation reactance of the machine. Therefore
modern rotating exciters are treated like synchronous generators
usually modeled with a second order equivalent circuit. Hence the
well known Standstill Frequency Response Test (SSFR) method is
applied to a test machine in order to determine parameters for the
simulation. With these results it is clearly shown that higher
frequencies have a strong impact on the conventional equivalent
circuit model. Because of increasing field displacement effects in the
stranded armature winding the sub-transient reactance is even smaller
than the armature leakage at high frequencies. As a matter of fact this
prevents the algorithm to find an equivalent scheme. This issue is
finally solved using Laplace transfer functions fully describing the
transient behavior at the model ports.