Abstract: A new code synchronization algorithm is proposed in
this paper for the secondary cell-search stage in wideband CDMA
systems. Rather than using the Cyclically Permutable (CP) code in the
Secondary Synchronization Channel (S-SCH) to simultaneously
determine the frame boundary and scrambling code group, the new
synchronization algorithm implements the same function with less
system complexity and less Mean Acquisition Time (MAT). The
Secondary Synchronization Code (SSC) is redesigned by splitting into
two sub-sequences. We treat the information of scrambling code group
as data bits and use simple time diversity BCH coding for further
reliability. It avoids involved and time-costly Reed-Solomon (RS)
code computations and comparisons. Analysis and simulation results
show that the Synchronization Error Rate (SER) yielded by the new
algorithm in Rayleigh fading channels is close to that of the
conventional algorithm in the standard. This new synchronization
algorithm reduces system complexities, shortens the average
cell-search time and can be implemented in the slot-based cell-search
pipeline. By taking antenna diversity and pipelining correlation
processes, the new algorithm also shows its flexible application in
multiple antenna systems.
Abstract: In the multi objective optimization, in the case when generated set of Pareto optimal solutions is large, occurs the problem to select of the best solution from this set. In this paper, is suggested a method to order of Pareto set. Ordering the Pareto optimal set carried out in conformity with the introduced distance function between each solution and selected reference point, where the reference point may be adjusted to represent the preferences of a decision making agent. Preference information about objective weights from a decision maker may be expressed imprecisely. The developed elicitation procedure provides an opportunity to obtain surrogate numerical weights for the objectives, and thus, to manage impreciseness of preference. The proposed method is a scalable to many objectives and can be used independently or as complementary to the various visualization techniques in the multidimensional case.
Abstract: The Internet has become an indispensable part of our lives. Witnessing recent web-based mass collaboration, e.g. Wikipedia, people are questioning whether the Internet has made fundamental changes to the society or whether it is merely a hyperbolic fad. It has long been assumed that collective action for a certain goal yields the problem of free-riding, due to its non-exclusive and non-rival characteristics. Then, thanks to recent technological advances, the on-line space experienced the following changes that enabled it to produce public goods: 1) decrease in the cost of production or coordination 2) externality from networked structure 3) production function which integrates both self-interest and altruism. However, this research doubts the homogeneity of on-line mass collaboration and argues that a more sophisticated and systematical approach is required. The alternative that we suggest is to connect the characteristics of the goal to the motivation. Despite various approaches, previous literature fails to recognize that motivation can be structurally restricted by the characteristic of the goal. First we draw a typology of on-line mass collaboration with 'the extent of expected beneficiary' and 'the existence of externality', and then we examine each combination of motivation using Benkler-s framework. Finally, we explore and connect such typology with its possible dominant participating motivation.
Abstract: The study of the variability of the postural strategies
in low back pain patients, as a criterion in evaluation of the
adaptability of this system to the environmental demands is the
purpose of this study. A cross-sectional case-control study was
performed on 21 recurrent non-specific low back pain patients and 21
healthy volunteers. The electromyography activity of Deltoid,
External Oblique (EO), Transverse Abdominis/Internal Oblique
(TrA/IO) and Erector Spine (ES) muscles of each person was
recorded in 75 rapid arm flexion with maximum acceleration.
Standard deviation of trunk muscles onset relative to deltoid muscle
onset were statistically analyzed by MANOVA . The results show
that chronic low back pain patients exhibit less variability in their
anticipatory postural adjustments (APAs) in comparison with the
control group. There is a decrease in variability of postural control
system of recurrent non-specific low back pain patients that can
result in the persistence of pain and chronicity by decreasing the
adaptability to environmental demands.
Abstract: The paper proposes a novel technique for iris
recognition using texture and phase features. Texture features are
extracted on the normalized iris strip using Haar Wavelet while phase
features are obtained using LOG Gabor Wavelet. The matching
scores generated from individual modules are combined using sum of
score technique. The system is tested on database obtained from Bath
University and Indian Institute of Technology Kanpur and is giving
an accuracy of 95.62% and 97.66% respectively. The FAR and FRR
of the combined system is also reduced comparatively.
Abstract: This paper presents a new sufficient condition for the
existence, uniqueness and global asymptotic stability of the equilibrium point for Cohen-Grossberg neural networks with multiple time delays. The results establish a relationship between the network parameters
of the neural system independently of the delay parameters. The results are also compared with the previously reported results in
the literature.
Abstract: Multi-loop (De-centralized) Proportional-Integral-
Derivative (PID) controllers have been used extensively in process
industries due to their simple structure for control of multivariable
processes. The objective of this work is to design multiple-model
adaptive multi-loop PID strategy (Multiple Model Adaptive-PID)
and neural network based multi-loop PID strategy (Neural Net
Adaptive-PID) for the control of multivariable system. The first
method combines the output of multiple linear PID controllers,
each describing process dynamics at a specific level of operation.
The global output is an interpolation of the individual multi-loop
PID controller outputs weighted based on the current value of the
measured process variable. In the second method, neural network
is used to calculate the PID controller parameters based on the
scheduling variable that corresponds to major shift in the process
dynamics. The proposed control schemes are simple in structure with
less computational complexity. The effectiveness of the proposed
control schemes have been demonstrated on the CSTR process,
which exhibits dynamic non-linearity.
Abstract: TiO2/MgO composite films were prepared by coating
the magnesium acetate solution in the pores of mesoporous TiO2
films using a dip coating method. Concentrations of magnesium
acetate solution were varied in a range of 1x10-4 – 1x10-1 M. The
TiO2/MgO composite films were characterized by scanning electron
microscopy (SEM), transmission electron microscropy (TEM),
electrochemical impedance spectroscopy(EIS) , transient voltage
decay and I-V test. The TiO2 films and TiO2/MgO composite films
were immersed in a 0.3 mM N719 dye solution. The Dye-sensitized
solar cells with the TiO2/MgO/N719 structure showed an optimal
concentration of magnesium acetate solution of 1x10-3 M resulting in
the MgO film estimated thickness of 0.0963 nm and giving the
maximum efficiency of 4.85%. The improved efficiency of dyesensitized
solar cell was due to the magnesium oxide film as the wide
band gap coating decays the electron back transfer to the triiodide
electrolyte and reduce charge recombination.
Abstract: As emails communications have no consistent
authentication procedure to ensure the authenticity, we present an
investigation analysis approach for detecting forged emails based on
Random Forests and Naïve Bays classifiers. Instead of investigating
the email headers, we use the body content to extract a unique writing
style for all the possible suspects. Our approach consists of four main
steps: (1) The cybercrime investigator extract different effective
features including structural, lexical, linguistic, and syntactic
evidence from previous emails for all the possible suspects, (2) The
extracted features vectors are normalized to increase the accuracy
rate. (3) The normalized features are then used to train the learning
engine, (4) upon receiving the anonymous email (M); we apply the
feature extraction process to produce a feature vector. Finally, using
the machine learning classifiers the email is assigned to one of the
suspects- whose writing style closely matches M. Experimental
results on real data sets show the improved performance of the
proposed method and the ability of identifying the authors with a
very limited number of features.
Abstract: The objective of this research was to find the
relationship between auspicious meaning in eastern wisdom and the
interpretation as a guideline for the design and development of
community souvenirs. The sample group included 400 customers in
Bangkok who used to buy community souvenir products. The
information was applied to design the souvenirs which were
considered for the appropriateness by 5 design specialists. The data
were analyzed to find frequency, percentage, and SD with the results
as follows. 1) The best factor referring to the auspicious meaning is
color. The application of auspicious meaning can make the value
added to the product and bring the fortune to the receivers. 2) The
effectiveness of the auspicious meaning integration on the design of
community souvenir product was in high level. When considering in
each aspect, it was found that the interpretation aspect was in high
level, the congruency of the auspicious meaning and the utility of the
product was in high level. The attractiveness and the good design
were in very high level while the potential of the value added in the
product design was in high level. The suitable application to the
design of community souvenir product was in high level.
Abstract: Stability of functionally graded beams with piezoelectric layers subjected to axial compressive load that is simply supported at both ends is studied in this paper. The displacement field of beam is assumed based on first order shear deformation beam theory. Applying the Hamilton's principle, the governing equation is established. The influences of applied voltage, dimensionless geometrical parameter, functionally graded index and piezoelectric thickness on the critical buckling load of beam are presented. To investigate the accuracy of the present analysis, a compression study is carried out with a known data.
Abstract: Information theory and Statistics play an important role in Biological Sciences when we use information measures for the study of diversity and equitability. In this communication, we develop the link among the three disciplines and prove that sampling distributions can be used to develop new information measures. Our study will be an interdisciplinary and will find its applications in Biological systems.
Abstract: Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.
Abstract: In the 21. century it comes true, that competitiveness of the firm is - to a considerable level - influenced by its participation in the chain of suppliers, customers and partners and by the way how the subject cooperates in the chain. This is valid also for new forms of enterprise such as virtual organization or virtual firm. In the first part of the paper there are determined the differences between these forms of enterprise. Another part will bring methodological framework for analysis of the factors, that influence the competitiveness of the virtual organization from spontaneity and order point of view.
Abstract: This paper describes a novel monitoring scheme to
minimize total active power in digital circuits depend on the demand
frequency, by adjusting automatically both supply voltage and
threshold voltages based on circuit operating conditions such as
temperature, process variations, and desirable frequency. The delay
monitoring results, will be control and apply so as to be maintained at
the minimum value at which the chip is able to operate for a given
clock frequency. Design details of power monitor are examined using
simulation framework in 32nm BTPM model CMOS process.
Experimental results show the overhead of proposed circuit in terms
of its power consumption is about 40 μW for 32nm technology;
moreover the results show that our proposed circuit design is not far
sensitive to the temperature variations and also process variations.
Besides, uses the simple blocks which offer good sensitivity, high
speed, the continuously feedback loop. This design provides up to
40% reduction in power consumption in active mode.
Abstract: The mountain road slope failures triggered by
earthquake activities and torrential rain namely to create the disaster.
Province Road No. 24 is a main route to the Wutai Township. The area
of the study is located at the mileages between 46K and 47K along the
road. However, the road has been suffered frequent damages as a result
of landslide and slope failures during typhoon seasons. An
understanding of the sliding behaviors in the area appears to be
necessary. Slope failures triggered by earthquake activities and heavy
rainfalls occur frequently. The study is to understand the mechanism
of slope failures and to look for the way to deal with the situation. In
order to achieve these objectives, this paper is based on theoretical and
structural geology data interpretation program to assess the potential
slope sliding behavior. The study showed an intimate relationship
between the landslide behavior of the slopes and the stratum materials,
based on structural geology analysis method to analysis slope stability
and finds the slope safety coefficient to predict the sites of destroyed
layer. According to the case study and parameter analyses results, the
slope mainly slips direction compared to the site located in the
southeast area. Find rainfall to result in the rise of groundwater level is
main reason of the landslide mechanism. Future need to set up
effective horizontal drain at corrective location, that can effective
restrain mountain road slope failures and increase stability of slope.
Abstract: Authentication of multimedia contents has gained much attention in recent times. In this paper, we propose a secure semi-fragile watermarking, with a choice of two watermarks to be embedded. This technique operates in integer wavelet domain and makes use of semi fragile watermarks for achieving better robustness. A self-recovering algorithm is employed, that hides the image digest into some Wavelet subbands to detect possible malevolent object manipulation undergone by the image (object replacing and/or deletion). The Semi-fragility makes the scheme tolerant for JPEG lossy compression as low as quality of 70%, and locate the tempered area accurately. In addition, the system ensures more security because the embedded watermarks are protected with private keys. The computational complexity is reduced using parameterized integer wavelet transform. Experimental results show that the proposed scheme guarantees the safety of watermark, image recovery and location of the tempered area accurately.
Abstract: Open urban public spaces comprise an important
element for the development of social, cultural and economic
activities of the population in the modern cities. These spaces are also
considered regulators of the region-s climate conditions, providing
better thermal, visual and auditory conditions which can be optimized
by the application of appropriate strategies of bioclimatic design. The
paper focuses on the analysis and evaluation of the recent unification
of the open spaces in the centre of Xanthi, a medium – size city in
northern Greece, from a bioclimatic perspective, as well as in the
creation of suitable methodology. It is based both on qualitative
observation of the interventions by fieldwork research and
assessment and on quantitative analysis and modeling of the research
area.
Abstract: Orthogonal frequency division multiplexing (OFDM)
has developed into a popular scheme for wideband digital
communications used in consumer applications such as digital broadcasting, wireless networking and broadband internet access. In
the OFDM system, carrier frequency offset (CFO) causes intercarrier
interference (ICI) which significantly degrades the system error performance. In this paper we provide an exact evaluation method for error performance analysis of arbitrary 2-D modulation OFDM systems with CFO, and analyze the effect of CFO on error performance.
Abstract: The evolution in project management was triggered by
the changes in management philosophy and practices in order to
maintain competitive advantage and continuous success in the field.
The purpose of this paper is to highlight the practicality of cognitive
style and unlearning approach in influencing the achievement of
project success by project managers. It introduces the concept of
planning, knowing and creating style from cognitive style field in the
light of achieving time, cost, quality and stakeholders appreciation in
project success context. Further it takes up a discussion of the
unlearning approach as a moderator in enhancing the relationship
between cognitive style and project success. The paper bases itself on
literature review from established disciplines like psychology,
sociology and philosophy regarding cognitive style, unlearning and
project success in general. The analysis and synthesis of literature in
the subject area a conceptual paper is utilized as the basis of future
research to form a comprehensive framework for project managers in
enhancing the project management competency.