Abstract: Defect prevention is the most vital but habitually
neglected facet of software quality assurance in any project. If
functional at all stages of software development, it can condense the
time, overheads and wherewithal entailed to engineer a high quality
product. The key challenge of an IT industry is to engineer a
software product with minimum post deployment defects.
This effort is an analysis based on data obtained for five selected
projects from leading software companies of varying software
production competence. The main aim of this paper is to provide
information on various methods and practices supporting defect
detection and prevention leading to thriving software generation. The
defect prevention technique unearths 99% of defects. Inspection is
found to be an essential technique in generating ideal software
generation in factories through enhanced methodologies of abetted
and unaided inspection schedules. On an average 13 % to 15% of
inspection and 25% - 30% of testing out of whole project effort time
is required for 99% - 99.75% of defect elimination.
A comparison of the end results for the five selected projects
between the companies is also brought about throwing light on the
possibility of a particular company to position itself with an
appropriate complementary ratio of inspection testing.
Abstract: Fine-grained data replication over the Internet allows duplication of frequently accessed data objects, as opposed to entire sites, to certain locations so as to improve the performance of largescale content distribution systems. In a distributed system, agents representing their sites try to maximize their own benefit since they are driven by different goals such as to minimize their communication costs, latency, etc. In this paper, we will use game theoretical techniques and in particular auctions to identify a bidding mechanism that encapsulates the selfishness of the agents, while having a controlling hand over them. In essence, the proposed game theory based mechanism is the study of what happens when independent agents act selfishly and how to control them to maximize the overall performance. A bidding mechanism asks how one can design systems so that agents- selfish behavior results in the desired system-wide goals. Experimental results reveal that this mechanism provides excellent solution quality, while maintaining fast execution time. The comparisons are recorded against some well known techniques such as greedy, branch and bound, game theoretical auctions and genetic algorithms.
Abstract: The purpose of suspension system in automobiles is to
improve the ride comfort and road handling. In this research the ride
and handling performance of a specific automobile with passive
suspension system is compared to a proposed fuzzy logic semi active
suspension system designed for that automobile. The bodysuspension-
wheel system is modeled as a two degree of freedom
quarter car model. MATLAB/SIMULINK [1] was used for
simulation and controller design. The fuzzy logic controller is based
on two inputs namely suspension velocity and body velocity. The
output of the fuzzy controller is the damping coefficient of the
variable damper. The result shows improvement over passive
suspension method.
Abstract: We investigate sonic cues for binaural sound localization within classrooms and present a structural model for the same. Two of the primary cues for localization, interaural time difference (ITD) and interaural level difference (ILD) created between the two ears by sounds from a particular point in space, are used. Although these cues do not lend any information about the elevation of a sound source, the torso, head, and outer ear carry out elevation dependent spectral filtering of sounds before they reach the inner ear. This effect is commonly captured in head related transfer function (HRTF) which aids in resolving the ambiguity from the ITDs and ILDs alone and helps localize sounds in free space. The proposed structural model of HRTF produces well controlled horizontal as well as vertical effects. The implemented HRTF is a signal processing model which tries to mimic the physical effects of the sounds interacting with different parts of the body. The effectiveness of the method is tested by synthesizing spatial audio, in MATLAB, for use in listening tests with human subjects and is found to yield satisfactory results in comparison with existing models.
Abstract: Design of experiments made for correlated the hormonal activity of steroids and their effect on the vaginal structure properties. Vaginal wall consists of distinct layers of cells which strongly differ regarding growth in answer to steroid hormones. The presence study carried out for functional evaluation and sustained replacement effect of the reproductive hormones on the vaginal morphometry in the rabbit. Rabbits were maintained control (Co) or ovariectomized (Ovz) and continuously treated with estradiol (Ovz E) and estradiol mixture with testosterone (Ovz ET). Relative to control rabbits with the distinct tissue distribution pattern, ovariectomized animals displayed declined epithelial thickness and atrophy of the muscularis layer that cause the vaginal wall thinning. Estradiol treatment of Orz rabbits inverted these changes to status of the preovariectomy. Histometric measurements in Ovz ET group completely including of thickness of the epithelial and muscular layers was greater in comparison to that of control animals.
Abstract: This paper describes the design of new method of
propagation delay measurement in micro and nanostructures during
characterization of ASIC standard library cell. Providing more
accuracy timing information about library cell to the design team we
can improve a quality of timing analysis inside of ASIC design flow
process. Also, this information could be very useful for semiconductor
foundry team to make correction in technology process. By
comparison of the propagation delay in the CMOS element and result
of analog SPICE simulation. It was implemented as digital IP core for
semiconductor manufacturing process. Specialized method helps to
observe the propagation time delay in one element of the standard-cell
library with up-to picoseconds accuracy and less. Thus, the special
useful solutions for VLSI schematic to parameters extraction, basic
cell layout verification, design simulation and verification are
announced.
Abstract: The Genetic Algorithm (GA) is one of the most important methods used to solve many combinatorial optimization problems. Therefore, many researchers have tried to improve the GA by using different methods and operations in order to find the optimal solution within reasonable time. This paper proposes an improved GA (IGA), where the new crossover operation, population reformulates operation, multi mutation operation, partial local optimal mutation operation, and rearrangement operation are used to solve the Traveling Salesman Problem. The proposed IGA was then compared with three GAs, which use different crossover operations and mutations. The results of this comparison show that the IGA can achieve better results for the solutions in a faster time.
Abstract: The goal of a network-based intrusion detection
system is to classify activities of network traffics into two major
categories: normal and attack (intrusive) activities. Nowadays, data
mining and machine learning plays an important role in many
sciences; including intrusion detection system (IDS) using both
supervised and unsupervised techniques. However, one of the
essential steps of data mining is feature selection that helps in
improving the efficiency, performance and prediction rate of
proposed approach. This paper applies unsupervised K-means
clustering algorithm with information gain (IG) for feature selection
and reduction to build a network intrusion detection system. For our
experimental analysis, we have used the new NSL-KDD dataset,
which is a modified dataset for KDDCup 1999 intrusion detection
benchmark dataset. With a split of 60.0% for the training set and the
remainder for the testing set, a 2 class classifications have been
implemented (Normal, Attack). Weka framework which is a java
based open source software consists of a collection of machine
learning algorithms for data mining tasks has been used in the testing
process. The experimental results show that the proposed approach is
very accurate with low false positive rate and high true positive rate
and it takes less learning time in comparison with using the full
features of the dataset with the same algorithm.
Abstract: A vertical SOI-based MOSFET with trench body
structure operated as 1T DRAM cell at various temperatures has been
studied and investigated. Different operation temperatures are
assigned for the device for its performance comparison, thus the
thermal stability is carefully evaluated for the future memory device
applications. Based on the simulation, the vertical SOI-based
MOSFET with trench body structure demonstrates the electrical
characteristics properly and possess conspicuous kink effect at
various operation temperatures. Transient characteristics were also
performed to prove that its programming window values and
retention time behaviors are acceptable when the new 1T DRAM cell
is operated at high operation temperature.
Abstract: The most important subtype of non-Hodgkin-s
lymphoma is the Diffuse Large B-Cell Lymphoma. Approximately
40% of the patients suffering from it respond well to therapy,
whereas the remainder needs a more aggressive treatment, in order to
better their chances of survival. Data Mining techniques have helped
to identify the class of the lymphoma in an efficient manner. Despite
that, thousands of genes should be processed to obtain the results.
This paper presents a comparison of the use of various attribute
selection methods aiming to reduce the number of genes to be
searched, looking for a more effective procedure as a whole.
Abstract: Automotive suspension system is important part of car
comfort and safety. In this article automotive active suspension with
linear motor as actuator is designed using H-infinity control. This
paper is focused on comparison of different controller designed for
quart, half or full-car model (and always used for “full" car). Special
attention is placed on energy demand of the whole system. Each
controller configuration is simulated and then verified on the
hydraulic quarter car test bed.
Abstract: Probiotic bacteria especially Lactobacillus spp. and Bifidobacterium exert suppressive effect on Helicobacter pylori. Cinnamon and licorice have been traditionally used for the treatment of gastric ulcer. The objectives of this study were to determine the effects of herbs on yogurt fermentation, the level of probiotic bacteria in yogurt during 28 days storage and the effect of herbal yogurt on the growth of H. pylori in vitro. Cinnamon or licorice was mixed with milk and the mixture was fermented with probiotic bacteria to form herbal-yogurt. Changes of pH and total titratable acids were monitored and the viability of probiotic bacteria was evaluated during and after refrigerated storage. The in vitro inhibition of H. pylori growth was determined using agar diffusion and minimum inhibitory concentration (MIC) method. The presence of herbs did not affect the probiotic population during storage. There were no significant differences in pH and TTA between herbal-yogurts and plain-yogurt during fermentation and storage. Water extract of cinnamon-yogurt showed the highest inhibition effect (13.5mm) on H. pylori growth in comparison with licorice-yogurt (11.2mm). The present findings indicate cinnamon and licorice has bioactive components to decrease the growth of H. pylori.
Abstract: The equilibrium process of plasma nitrogen species by
chemical kinetic reactions along various pressures is successfully
investigated. The equilibrium process is required in industrial
application to obtain the stable condition when heating up the
material for having homogenous reaction. Nitrogen species densities
is modeled by a continuity equation and extended Arrhenius form.
These equations are used to integrate the change of density over the
time. The integration is to acquire density and the reaction rate of
each reaction where temperature and time dependence are imposed.
A comparison is made with global model within pressure range of 1-
100mTorr and the temperature of electron is set to be higher than
other nitrogen species. The results shows that the chemical kinetic
model only agrees for high pressure because of no power imposed;
while the global model considers the external power along the
pressure range then the electron and nitrogen species give highly
quantity densities by factor of 3 to 5.
Abstract: A new algorithm called Character-Comparison to
Character-Access (CCCA) is developed to test the effect of both: 1)
converting character-comparison and number-comparison into
character-access and 2) the starting point of checking on the
performance of the checking operation in string searching. An
experiment is performed; the results are compared with five
algorithms, namely, Naive, BM, Inf_Suf_Pref, Raita, and Circle.
With the CCCA algorithm, the results suggest that the evaluation
criteria of the average number of comparisons are improved up to
74.0%. Furthermore, the results suggest that the clock time required
by the other algorithms is improved in range from 28% to 68% by the
new CCCA algorithm
Abstract: Current proposals for E-passport or ID-Card is similar to a regular passport with the addition of tiny contactless integrated circuit (computer chip) inserted in the back cover, which will act as a secure storage device of the same data visually displayed on the photo page of the passport. In addition, it will include a digital photograph that will enable biometric comparison, through the use of facial recognition technology at international borders. Moreover, the e-passport will have a new interface, incorporating additional antifraud and security features. However, its problems are reliability, security and privacy. Privacy is a serious issue since there is no encryption between the readers and the E-passport. However, security issues such as authentication, data protection and control techniques cannot be embedded in one process. In this paper, design and prototype implementation of an improved E-passport reader is presented. The passport holder is authenticated online by using GSM network. The GSM network is the main interface between identification center and the e-passport reader. The communication data is protected between server and e-passport reader by using AES to encrypt data for protection will transferring through GSM network. Performance measurements indicate a 19% improvement in encryption cycles versus previously reported results.
Abstract: With a rapid growth in 3D graphics technology over the last few years, people are desired to see more flexible reacting motions of a biped in animations. In particular, it is impossible to anticipate all reacting motions of a biped while facing a perturbation. In this paper, we propose a three-level tracking method for animating a 3D humanoid character. First, we take the laws of physics into account to attach physical attributes, such as mass, gravity, friction, collision, contact, and torque, to bones and joints of a character. The next step is to employ PD controller to follow a reference motion as closely as possible. Once the character cannot tolerate a strong perturbation to prevent itself from falling down, we are capable of tracking a desirable falling-down action to avoid any falling condition inaccuracy. From the experimental results, we demonstrate the effectiveness and flexibility of the proposed method in comparison with conventional data-driven approaches.
Abstract: Non-premixed turbulent combustion Computational Fluid Dynamics (CFD) has been carried out in a simplified methanefuelled coaxial jet combustor employing Large Eddy Simulation (LES). The objective of this study is to evaluate the performance of LES in modelling non-premixed combustion using a commercial software, FLUENT, and investigate the effects of the grid density and chemistry models employed on the accuracy of the simulation results. A comparison has also been made between LES and Reynolds Averaged Navier-Stokes (RANS) predictions. For LES grid sensitivity test, 2.3 and 6.2 million cell grids are employed with the equilibrium model. The chemistry model sensitivity analysis is achieved by comparing the simulation results from the equilibrium chemistry and steady flamelet models. The predictions of the mixture fraction, axial velocity, species mass fraction and temperature by LES are in good agreement with the experimental data. The LES results are similar for the two chemistry models but influenced considerably by the grid resolution in the inner flame and near-wall regions.
Abstract: Recently, the Field Programmable Gate Array (FPGA) technology offers the potential of designing high performance systems at low cost. The discrete wavelet transform has gained the reputation of being a very effective signal analysis tool for many practical applications. However, due to its computation-intensive nature, current implementation of the transform falls short of meeting real-time processing requirements of most application. The objectives of this paper are implement the Haar and Daubechies wavelets using FPGA technology. In addition, the Bit Error Rate (BER) between the input audio signal and the reconstructed output signal for each wavelet is calculated. From the BER, it is seen that the implementations execute the operation of the wavelet transform correctly and satisfying the perfect reconstruction conditions. The design procedure has been explained and designed using the stat-ofart Electronic Design Automation (EDA) tools for system design on FPGA. Simulation, synthesis and implementation on the FPGA target technology has been carried out.
Abstract: In this paper two different Antilock braking system (ABS) are simulated and compared. One is the ordinary hydraulic ABS system which we call it ABS and the other is Electromagnetic Antilock braking system which is called (EMABS) the basis of performance of an EMABS is based upon Electromagnetic force. In this system there is no need to use servo hydraulic booster which are used in ABS system. In EMABS to generate the desired force we have use a magnetic relay which works with an input voltage through an air gap (g). The generated force will be amplified by the relay arm, and is applied to the brake shoes and thus the braking torque is generated. The braking torque is proportional to the applied electrical voltage E. to adjust the braking torque it is only necessary to regulate the electrical voltage E which is very faster and has a much smaller time constant T than the ABS system. The simulations of these two different ABS systems are done with MATLAB/SIMULINK software and the superiority of the EMABS has been shown.
Abstract: In this paper, an magnetorheological (MR) mount with
fuzzy sliding mode controller (FSMC) is studied for vibration
suppression when the system is subject to base excitations. In recent
years, magnetorheological fluids are becoming a popular material in
the field of the semi-active control. However, the dynamic equation of
an MR mount is highly nonlinear and it is difficult to identify. FSMC
provides a simple method to achieve vibration attenuation of the
nonlinear system with uncertain disturbances. This method is capable
of handling the chattering problem of sliding mode control effectively
and the fuzzy control rules are obtained by using the Lyapunov
stability theory. The numerical simulations using one-dimension and
two-dimension FSMC show effectiveness of the proposed controller
for vibration suppression. Further, the well-known skyhook control
scheme and an adaptive sliding mode controller are also included in
the simulation for comparison with the proposed FSMC.