Abstract: Recent research result has shown that two multidelay
feedback systems can synchronize each other under different
schemes, i.e. lag, projective-lag, anticipating, or projectiveanticipating
synchronization. There, the driving signal is significantly
complex due that it is constituted by multiple nonlinear transformations
of delayed state variable. In this paper, a secure communication
model is proposed based on synchronization of coupled multidelay
feedback systems, in which the plain signal is mixed with a complex
signal at the transmitter side and it is precisely retrieved at the receiver
side. The effectiveness of the proposed model is demonstrated and
verified in the specific example, where the message signal is masked
directly by the complex signal and security is examined under the
breaking method of power spectrum analysis.
Abstract: Recently, with the appearance of smart cards, many
user authentication protocols using smart card have been proposed to
mitigate the vulnerabilities in user authentication process. In 2004,
Das et al. proposed a ID-based user authentication protocol that is
secure against ID-theft and replay attack using smart card. In 2009,
Wang et al. showed that Das et al.-s protocol is not secure to randomly
chosen password attack and impersonation attack, and proposed an
improved protocol. Their protocol provided mutual authentication and
efficient password management. In this paper, we analyze the security
weaknesses and point out the vulnerabilities of Wang et al.-s protocol.
Abstract: To increase the maximum span of cable-stayed
bridges, Uwe Starossek has developed a modified statical system.
The basic idea of this new concept is the use of pairs of inclined
pylon legs that spread out longitudinally from the foundation base or
from the girder level.
Spread-pylon cable-stayed bridge has distinct advantage like
reduction of sag of cables and oscillation of cable during earthquake
over traditional cable-stayed bridges. Spread-pylon also improves
seismic performance of deck during strong ground motion.
Abstract: Recently, content delivery services have grown rapidly
over the Internet. For ASPs (Application Service Provider) providing
content delivery services, P2P architecture is beneficial to reduce
outgoing traffic from content servers. On the other hand, ISPs are
suffering from the increase in P2P traffic. The P2P traffic is
unnecessarily redundant because the same content or the same
fractions of content are transferred through an inter-ISP link several
times. Subscriber ISPs have to pay a transit fee to upstream ISPs based
on the volume of inter-ISP traffic. In order to solve such problems,
several works have been done for the purpose of P2P traffic reduction.
However, these existing works cannot control the traffic volume of a
certain link. In order to solve such an ISP-s operational requirement,
we propose a method to control traffic volume for a link within a
preconfigured upper bound value. We evaluated that the proposed
method works well by conducting a simulation on a 1,000-user scale.
We confirm that the traffic volume could be controlled at a lower level
than the upper bound for all evaluated conditions. Moreover, our
method could control the traffic volume at 98.95% link usage against
the target value.
Abstract: This paper presents a new type of mechanism and trajectory planning strategy for bipedal walking robot. The newly designed mechanism is able to improve the performance of bipedal walking robot in terms of energy efficiency and weight reduction by utilizing minimum number of actuators. The usage of parallelogram mechanism eliminates the needs of having an extra actuator at the knee joint. This mechanism works together with the joint space trajectory planning in order to realize straight legged walking which cannot be achieved by conventional inverse kinematics trajectory planning due to the singularity. The effectiveness of the proposed strategy is confirmed by computer simulation results.
Abstract: The paper presents a comparative performance of the
models developed to predict 28 days compressive strengths using
neural network techniques for data taken from literature (ANN-I) and
data developed experimentally for SCC containing bottom ash as
partial replacement of fine aggregates (ANN-II). The data used in the
models are arranged in the format of six and eight input parameters
that cover the contents of cement, sand, coarse aggregate, fly ash as
partial replacement of cement, bottom ash as partial replacement of
sand, water and water/powder ratio, superplasticizer dosage and an
output parameter that is 28-days compressive strength and
compressive strengths at 7 days, 28 days, 90 days and 365 days,
respectively for ANN-I and ANN-II. The importance of different
input parameters is also given for predicting the strengths at various
ages using neural network. The model developed from literature data
could be easily extended to the experimental data, with bottom ash as
partial replacement of sand with some modifications.
Abstract: Most of the collision warning systems currently
available in the automotive market are mainly designed to warn
against imminent rear-end and lane-changing collisions. No collision
warning system is commercially available to warn against imminent
turning collisions at intersections, especially for left-turn collisions
when a driver attempts to make a left-turn at either a signalized or
non-signalized intersection, conflicting with the path of other
approaching vehicles traveling on the opposite-direction traffic
stream. One of the major factors that lead to left-turn collisions is the
human error and misjudgment of the driver of the turning vehicle
when perceiving the speed and acceleration of other vehicles
traveling on the opposite-direction traffic stream; therefore, using a
properly-designed collision warning system will likely reduce, or
even eliminate, this type of collisions by reducing human error. This
paper introduces perceptual framework for a proposed collision
warning system that can detect imminent left-turn collisions at
intersections. The system utilizes a commercially-available detection
sensor (either a radar sensor or a laser detector) to detect approaching
vehicles traveling on the opposite-direction traffic stream and
calculate their speeds and acceleration rates to estimate the time-tocollision
and compare that time to the time required for the turning
vehicle to clear the intersection. When calculating the time required
for the turning vehicle to clear the intersection, consideration is given
to the perception-reaction time of the driver of the turning vehicle,
which is the time required by the driver to perceive the message
given by the warning system and react to it by engaging the throttle.
A regression model was developed to estimate perception-reaction
time based on age and gender of the driver of the host vehicle.
Desired acceleration rate selected by the driver of the turning vehicle,
when making the left-turn movement, is another human factor that is
considered by the system. Another regression model was developed
to estimate the acceleration rate selected by the driver of the turning
vehicle based on driver-s age and gender as well as on the location
and speed of the nearest approaching vehicle along with the
maximum acceleration rate provided by the mechanical
characteristics of the turning vehicle. By comparing time-to-collision
with the time required for the turning vehicle to clear the intersection,
the system displays a message to the driver of the turning vehicle
when departure is safe. An application example is provided to
illustrate the logic algorithm of the proposed system.
Abstract: In the modern manufacturing systems, the use of
thermal cutting techniques using oxyfuel, plasma and laser have
become indispensable for the shape forming of high quality complex
components; however, the conventional chip removal production
techniques still have its widespread space in the manufacturing
industry. Both these types of machining operations require the
positioning of end effector tool at the edge where the cutting process
commences. This repositioning of the cutting tool in every machining
operation is repeated several times and is termed as non-productive
time or airtime motion. Minimization of this non-productive
machining time plays an important role in mass production with high
speed machining. As, the tool moves from one region to the other by
rapid movement and visits a meticulous region once in the whole
operation, hence the non-productive time can be minimized by
synchronizing the tool movements. In this work, this problem is
being formulated as a general travelling salesman problem (TSP) and
a genetic algorithm approach has been applied to solve the same. For
improving the efficiency of the algorithm, the GA has been
hybridized with a noble special heuristic and simulating annealing
(SA). In the present work a novel heuristic in the combination of GA
has been developed for synchronization of toolpath movements
during repositioning of the tool. A comparative analysis of new Meta
heuristic techniques with simple genetic algorithm has been
performed. The proposed metaheuristic approach shows better
performance than simple genetic algorithm for minimization of nonproductive
toolpath length. Also, the results obtained with the help of
hybrid simulated annealing genetic algorithm (HSAGA) are also
found better than the results using simple genetic algorithm only.
Abstract: This study systemizes processes and methods in
wooden furniture design that contains uniqueness in function and
aesthetics. The study was done by research and analysis for
designer-s consideration factors that affect function and production.
Therefore, the study result indicates that such factors are design
process (planning for design, product specifications, concept design,
product architecture, industrial design, production), design evaluation
as well as wooden furniture design dependent factors i.e. art (art
style; furniture history, form), functionality (the strength and
durability, area place, using), material (appropriate to function, wood
mechanical properties), joints, cost, safety, and social responsibility.
Specifically, all aforementioned factors affect good design. Resulting
from direct experience gained through user-s usage, the designer
must design the wooden furniture systemically and effectively. As a
result, this study selected dinning armchair as a case study with all
involving factors and all design process stated in this study.
Abstract: Computation of facility location problem for every
location in the country is not easy simultaneously. Solving the
problem is described by using cluster computing. A technique is to
design parallel algorithm by using local search with single swap
method in order to solve that problem on clusters. Parallel
implementation is done by the use of portable parallel programming,
Message Passing Interface (MPI), on Microsoft Windows Compute
Cluster. In this paper, it presents the algorithm that used local search
with single swap method and implementation of the system of a
facility to be opened by using MPI on cluster. If large datasets are
considered, the process of calculating a reasonable cost for a facility
becomes time consuming. The result shows parallel computation of
facility location problem on cluster speedups and scales well as
problem size increases.
Abstract: Dust acoustic solitary waves are studied in warm
dusty plasma containing negatively charged dusts, nonthermal ions
and Boltzmann distributed electrons. Sagdeev pseudopotential
method is used in order to investigate solitary wave solutions in the
plasmas. The existence of compressive and rarefractive solitons is
studied.
Abstract: The ever-growing usage of aspect-oriented
development methodology in the field of software engineering
requires tool support for both research environments and industry. So
far, tool support for many activities in aspect-oriented software
development has been proposed, to automate and facilitate their
development. For instance, the AJaTS provides a transformation
system to support aspect-oriented development and refactoring. In
particular, it is well established that the abstract interpretation of
programs, in any paradigm, pursued in static analysis is best served
by a high-level programs representation, such as Control Flow Graph
(CFG). This is why such analysis can more easily locate common
programmatic idioms for which helpful transformation are already
known as well as, association between the input program and
intermediate representation can be more closely maintained.
However, although the current researches define the good concepts
and foundations, to some extent, for control flow analysis of aspectoriented
programs but they do not provide a concrete tool that can
solely construct the CFG of these programs. Furthermore, most of
these works focus on addressing the other issues regarding Aspect-
Oriented Software Development (AOSD) such as testing or data flow
analysis rather than CFG itself. Therefore, this study is dedicated to
build an aspect-oriented control flow graph construction tool called
AJcFgraph Builder. The given tool can be applied in many software
engineering tasks in the context of AOSD such as, software testing,
software metrics, and so forth.
Abstract: The present work was conducted for Arsenic (III)
removal, which one of the most poisonous groundwater pollutants, by
synthetic nano size zerovalent iron (nZVI). Batch experiments were
performed to investigate the influence of As (III), nZVI
concentration, pH of solution and contact time on the efficiency of As
(III) removal. nZVI was synthesized by reduction of ferric chloride
by sodium borohydrid. SEM and XRD were used to determine
particle size and characterization of produced nanoparticles. Up to
99.9% removal efficiency for arsenic (III) was obtained by nZVI
dosage of 1 g/L at time equal to 10 min. and pH=7. It could be
concluded that the removal efficiency were enhanced with increasing
of ZVI dosage and reaction time, but decreased with increasing of
arsenic concentration and pH for nano sized ZVI. nZVI presented an
outstanding ability to remove As (III) due to not only a high surface
area and low particle size but also to high inherent activity.
Abstract: This paper attempts to establish the fact that Multi
State Network Classification is essential for performance
enhancement of Transport protocols over Satellite based Networks. A
model to classify Multi State network condition taking into
consideration both congestion and channel error is evolved. In order
to arrive at such a model an analysis of the impact of congestion and
channel error on RTT values has been carried out using ns2. The
analysis results are also reported in the paper. The inference drawn
from this analysis is used to develop a novel statistical RTT based
model for multi state network classification.
An Adaptive Multi State Proactive Transport Protocol consisting
of Proactive Slow Start, State based Error Recovery, Timeout Action
and Proactive Reduction is proposed which uses the multi state
network state classification model. This paper also confirms through
detail simulation and analysis that a prior knowledge about the
overall characteristics of the network helps in enhancing the
performance of the protocol over satellite channel which is
significantly affected due to channel noise and congestion.
The necessary augmentation of ns2 simulator is done for
simulating the multi state network classification logic. This
simulation has been used in detail evaluation of the protocol under
varied levels of congestion and channel noise. The performance
enhancement of this protocol with reference to established protocols
namely TCP SACK and Vegas has been discussed. The results as
discussed in this paper clearly reveal that the proposed protocol
always outperforms its peers and show a significant improvement in
very high error conditions as envisaged in the design of the protocol.
Abstract: We developed a non-contact method for the in-situ
monitoring of the thermal forming of glass and Si foils to optimize
the manufacture of mirrors for high-resolution space x-ray
telescopes. Their construction requires precise and light-weight
segmented optics with angular resolution better than 5 arcsec. We
used 75x25 mm Desag D263 glass foils 0.75 mm thick and 0.6 mm
thick Si foils. The glass foils were shaped by free slumping on a
frame at viscosities in the range of 109.3-1012 dPa·s, the Si foils by
forced slumping above 1000°C. Using a Nikon D80 digital camera,
we took snapshots of a foil-s shape every 5 min during its isothermal
heat treatment. The obtained results we can use for computer
simulations. By comparing the measured and simulated data, we can
more precisely define material properties of the foils and optimize
the forming technology.
Abstract: This paper presents a simple and sensitive kinetic
spectrophotometric method for the determination of ramipril in
commercial dosage forms. The method is based on the reaction of the
drug with 1-chloro-2,4-dinitrobenzene (CDNB) in dimethylsulfoxide
(DMSO) at 100 ± 1ºC. The reaction is followed
spectrophotometrically by measuring the rate of change of the
absorbance at 420 nm. Fixed-time (ΔA) and equilibrium methods are
adopted for constructing the calibration curves. Both the calibration
curves were found to be linear over the concentration ranges 20 - 220
μg/ml. The regression analysis of calibration data yielded the linear
equations: Δ A = 6.30 × 10-4 + 1.54 × 10-3 C and A = 3.62 × 10-4 +
6.35 × 10-3 C for fixed time (Δ A) and equilibrium methods,
respectively. The limits of detection (LOD) for fixed time and
equilibrium methods are 1.47 and 1.05 μg/ml, respectively. The
method has been successfully applied to the determination of ramipril
in commercial dosage forms. Statistical comparison of the results
shows that there is no significant difference between the proposed
methods and Abdellatef-s spectrophotometric method.
Abstract: Cryptographic protocols are widely used in various
applications to provide secure communications. They are usually
represented as communicating agents that send and receive messages.
These agents use their knowledge to exchange information and
communicate with other agents involved in the protocol. An agent
knowledge can be partitioned into explicit knowledge and procedural
knowledge. The explicit knowledge refers to the set of information
which is either proper to the agent or directly obtained from other
agents through communication. The procedural knowledge relates to
the set of mechanisms used to get new information from what is
already available to the agent.
In this paper, we propose a mathematical framework which specifies
the explicit knowledge of an agent involved in a cryptographic
protocol. Modelling this knowledge is crucial for the specification,
analysis, and implementation of cryptographic protocols. We also,
report on a prototype tool that allows the representation and the
manipulation of the explicit knowledge.
Abstract: Currently, web usage make a huge data from a lot of
user attention. In general, proxy server is a system to support web
usage from user and can manage system by using hit rates. This
research tries to improve hit rates in proxy system by applying data
mining technique. The data set are collected from proxy servers in the
university and are investigated relationship based on several features.
The model is used to predict the future access websites. Association
rule technique is applied to get the relation among Date, Time, Main
Group web, Sub Group web, and Domain name for created model.
The results showed that this technique can predict web content for the
next day, moreover the future accesses of websites increased from
38.15% to 85.57 %.
This model can predict web page access which tends to increase
the efficient of proxy servers as a result. In additional, the
performance of internet access will be improved and help to reduce
traffic in networks.
Abstract: Cameron Highlands is a mountainous area subjected
to torrential tropical showers. It extracts 5.8 million liters of water
per day for drinking supply from its rivers at several intake points.
The water quality of rivers in Cameron Highlands, however, has
deteriorated significantly due to land clearing for agriculture,
excessive usage of pesticides and fertilizers as well as construction
activities in rapidly developing urban areas. On the other hand, these
pollution sources known as non-point pollution sources are diverse
and hard to identify and therefore they are difficult to estimate.
Hence, Geographical Information Systems (GIS) was used to provide
an extensive approach to evaluate landuse and other mapping
characteristics to explain the spatial distribution of non-point sources
of contamination in Cameron Highlands. The method to assess
pollution sources has been developed by using Cameron Highlands
Master Plan (2006-2010) for integrating GIS, databases, as well as
pollution loads in the area of study. The results show highest annual
runoff is created by forest, 3.56 × 108 m3/yr followed by urban
development, 1.46 × 108 m3/yr. Furthermore, urban development
causes highest BOD load (1.31 × 106 kgBOD/yr) while agricultural
activities and forest contribute the highest annual loads for
phosphorus (6.91 × 104 kgP/yr) and nitrogen (2.50 × 105 kgN/yr),
respectively. Therefore, best management practices (BMPs) are
suggested to be applied to reduce pollution level in the area.
Abstract: Border Gateway Protocol (BGP) is the standard routing protocol between various autonomous systems (AS) in the internet. In the event of failure, a considerable delay in the BGP convergence has been shown by empirical measurements. During the convergence time the BGP will repeatedly advertise new routes to some destination and withdraw old ones until it reach a stable state. It has been found that the KEEPALIVE message timer and the HOLD time are tow parameters affecting the convergence speed. This paper aims to find the optimum value for the KEEPALIVE timer and the HOLD time that maximally reduces the convergence time without increasing the traffic. The KEEPALIVE message timer optimal value founded by this paper is 30 second instead of 60 seconds, and the optimal value for the HOLD time is 90 seconds instead of 180 seconds.