Abstract: We investigate an asymmetric connections model with a
dynamic network formation process, using an agent based simulation.
We permit heterogeneity of agents- value. Valuable persons seem
to have many links on real social networks. We focus on this
point of view, and examine whether valuable agents change the
structures of the terminal networks. Simulation reveals that valuable
agents diversify the terminal networks. We can not find evidence that
valuable agents increase the possibility that star networks survive the
dynamic process. We find that valuable agents disperse the degrees
of agents in each terminal network on an average.
Abstract: A new blind gray-level watermarking scheme is described. In the proposed method, the host image is first divided into 4*4 non-overlapping blocks. For each block, two first AC coefficients of its Hadamard transform are then estimated using DC coefficients of its neighbor blocks. A gray-level watermark is then added into estimated values. Since embedding watermark does not change the DC coefficients, watermark extracting could be done by estimating AC coefficients and comparing them with their actual values. Several experiments are made and results suggest the robustness of the proposed algorithm.
Abstract: The mobile users with Laptops need to have an
efficient access to i.e. their home personal data or to the Internet from
any place in the world, regardless of their location or point of
attachment, especially while roaming outside the home subnet. An
efficient interpretation of packet losses problem that is encountered
from this roaming is to the centric of all aspects in this work, to be
over-highlighted. The main previous works, such as BER-systems,
Amigos, and ns-2 implementation that are considered to be in
conjunction with that problem under study are reviewed and
discussed. Their drawbacks and limitations, of stopping only at
monitoring, and not to provide an actual solution for eliminating or
even restricting these losses, are mentioned. Besides that, the
framework around which we built a Triple-R sequence as a costeffective
solution to eliminate the packet losses and bridge the gap
between subnets, an area that until now has been largely neglected, is
presented. The results show that, in addition to the high bit error rate
of wireless mobile networks, mainly the low efficiency of mobile-IP
registration procedure is a direct cause of these packet losses.
Furthermore, the output of packet losses interpretation resulted an
illustrated triangle of the registration process. This triangle should be
further researched and analyzed in our future work.
Abstract: The effect of the blade tip geometry of a high pressure
gas turbine is studied experimentally and computationally for high
speed leakage flows. For this purpose two simplified models are
constructed, one models a flat tip of the blade and the second models
a cavity tip of the blade. Experimental results are obtained from a
transonic wind tunnel to show the static pressure distribution along
the tip wall and provide flow visualization. RANS computations
were carried to provide further insight into the mean flow behavior
and to calculate the discharge coefficient which is a measure of the
flow leaking over the tip. It is shown that in both geometries of tip
the flow separates over the tip to form a separation bubble. The
bubble is higher for the cavity tip while a complete shock wave
system of oblique waves ending with a normal wave can be seen for
the flat tip. The discharge coefficient for the flat tip shows less
dependence on the pressure ratio over the blade tip than the cavity
tip. However, the discharge coefficient for the cavity tip is lower than
that of the flat tip, showing a better ability to reduce the leakage flow
and thus increase the turbine efficiency.
Abstract: The objective of this paper is to a design of pattern
classification model based on the back-propagation (BP) algorithm for
decision support system. Standard BP model has done full connection
of each node in the layers from input to output layers. Therefore, it
takes a lot of computing time and iteration computing for good
performance and less accepted error rate when we are doing some
pattern generation or training the network.
However, this model is using exclusive connection in between
hidden layer nodes and output nodes. The advantage of this model is
less number of iteration and better performance compare with standard
back-propagation model. We simulated some cases of classification
data and different setting of network factors (e.g. hidden layer number
and nodes, number of classification and iteration). During our
simulation, we found that most of simulations cases were satisfied by
BP based using exclusive connection network model compared to
standard BP. We expect that this algorithm can be available to
identification of user face, analysis of data, mapping data in between
environment data and information.
Abstract: A number of competing methodologies have been developed
to identify genes and classify DNA sequences into coding
and non-coding sequences. This classification process is fundamental
in gene finding and gene annotation tools and is one of the most
challenging tasks in bioinformatics and computational biology. An
information theory measure based on mutual information has shown
good accuracy in classifying DNA sequences into coding and noncoding.
In this paper we describe a species independent iterative
approach that distinguishes coding from non-coding sequences using
the mutual information measure (MIM). A set of sixty prokaryotes is
used to extract universal training data. To facilitate comparisons with
the published results of other researchers, a test set of 51 bacterial
and archaeal genomes was used to evaluate MIM. These results
demonstrate that MIM produces superior results while remaining
species independent.
Abstract: Optical character recognition of cursive scripts
presents a number of challenging problems in both segmentation and
recognition processes in different languages, including Persian. In
order to overcome these problems, we use a newly developed Persian
word segmentation method and a recognition-based segmentation
technique to overcome its segmentation problems. This method is
robust as well as flexible. It also increases the system-s tolerances to
font variations. The implementation results of this method on a
comprehensive database show a high degree of accuracy which meets
the requirements for commercial use. Extended with a suitable pre
and post-processing, the method offers a simple and fast framework
to develop a full OCR system.
Abstract: In this paper we present a photo mosaic smartphone
application in client-server based large-scale image databases. Photo
mosaic is not a new concept, but there are very few smartphone
applications especially for a huge number of images in the
client-server environment. To support large-scale image databases,
we first propose an overall framework working as a client-server
model. We then present a concept of image-PAA features to efficiently
handle a huge number of images and discuss its lower bounding
property. We also present a best-match algorithm that exploits the
lower bounding property of image-PAA. We finally implement an
efficient Android-based application and demonstrate its feasibility.
Abstract: Tourism industries are rapidly increased for the last
few years especially in Malaysia. In order to attract more tourists,
Malaysian Governance encourages any effort to increase Malaysian
tourism industry. One of the efforts in attracting more tourists in
Malacca, Malaysia is a duck tour. Duck tour is an amphibious
sightseeing tour that works in two types of engines, hence, it required
a huge cost to operate and maintain the vehicle. To other country, it is
not so new but in Malaysia, it is just introduced, thus it does not have
any systematic routing yet. Therefore, this paper proposed an
optimization technique to formulate and schedule this tour to
minimize the operating costs by considering it into Travelling
Salesman Problem (TSP). The problem is then can be solved by one
of the optimization technique especially meta-heuristics approach
such as Tabu Search (TS) and Reactive Tabu Search (RTS).
Abstract: Next generation wireless/mobile networks will be IP based cellular networks integrating the internet with cellular networks. In this paper, we propose a new architecture for a high speed transport system and a mobile management protocol for mobile internet users in a transport system. Existing mobility management protocols (MIPv6, HMIPv6) do not consider real world fast moving wireless hosts (e.g. passengers in a train). For this reason, we define a virtual organization (VO) and proposed the VO architecture for the transport system. We also classify mobility as VO mobility (intra VO) and macro mobility (inter VO). Handoffs in VO are locally managed and transparent to the CH while macro mobility is managed with Mobile IPv6. And, from the features of the transport system, such as fixed route and steady speed, we deduce the movement route and the handoff disruption time of each handoff. To reduce packet loss during handoff disruption time, we propose pre-registration scheme using pre-registration. Moreover, the proposed protocol can eliminate unnecessary binding updates resulting from sequence movement at high speed. The performance evaluations demonstrate our proposed protocol has a good performance at transport system environment. Our proposed protocol can be applied to the usage of wireless internet on the train, subway, and high speed train.
Abstract: With the approaching of digital era, various interactive
service platforms and systems support human beings- needs in lives by
different contents and measures. Design strategies have gradually
turned from function-based to user-oriented, and are often customized.
In other words, how designers include users- value reaction in creation
becomes the goal. Creative design service of interior design requires
positive interaction and communication to allow users to obtain full
design information, recognize the style and process of personal needs,
develop creative service design, lower communication time and cost
and satisfy users- sense of achievement. Thus, by constructing a
co-design method, based on the communication between interior
designers and users, this study recognizes users- real needs and
provides the measure of co-design for designers and users.
Abstract: Cutting tools are widely used in manufacturing processes and drilling is the most commonly used machining process. Although drill-bits used in drilling may not be expensive, their breakage can cause damage to expensive work piece being drilled and at the same time has major impact on productivity. Predicting drill-bit breakage, therefore, is important in reducing cost and improving productivity. This study uses twenty features extracted from two degradation signals viz., thrust force and torque. The methodology used involves developing and comparing decision tree, random forest, and multinomial logistic regression models for classifying and predicting drill-bit breakage using degradation signals.
Abstract: Selecting the data modeling technique for an
information system is determined by the objective of the resultant
data model. Dimensional modeling is the preferred modeling
technique for data destined for data warehouses and data mining,
presenting data models that ease analysis and queries which are in
contrast with entity relationship modeling. The establishment of data
warehouses as components of information system landscapes in
many organizations has subsequently led to the development of
dimensional modeling. This has been significantly more developed
and reported for the commercial database management systems as
compared to the open sources thereby making it less affordable for
those in resource constrained settings. This paper presents
dimensional modeling of HIV patient information using open source
modeling tools. It aims to take advantage of the fact that the most
affected regions by the HIV virus are also heavily resource
constrained (sub-Saharan Africa) whereas having large quantities of
HIV data. Two HIV data source systems were studied to identify
appropriate dimensions and facts these were then modeled using two
open source dimensional modeling tools. Use of open source would
reduce the software costs for dimensional modeling and in turn make
data warehousing and data mining more feasible even for those in
resource constrained settings but with data available.
Abstract: Scarcity of water resources and huge costs of
establishing new hydraulic installations necessitate optimal
exploitation from existing reservoirs. Sustainable management and
efficient exploitation from existing finite water resources are
important factors in water resource management, particularly in the
periods of water insufficiency and in dry regions, and on account of
competitive allocations in the view of exploitation management. This
study aims to minimize reservoir water release from a determined
rate of demand. A numerical model for water optimal exploitation
has been developed using GAMS introduced by the World Bank and
applied to the case of Meijaran dam, northern Iran. The results
indicate that this model can optimize the function of reservoir
exploitation while required water for lower parts of the region will be
supplied. Further, allocating optimal water from reservoir, the
optimal rate of water allocated to any group of the users were
specified to increase benefits in curve dam exploitation.
Abstract: Energy and exergy study of air-water combined solar collector which is called dual purpose solar collector (DPSC) is investigated. The method of ε - NTU is used. Analysis is performed for triangle channels. Parameters like the air flow rate and water inlet temperature are studied. Results are shown that DPSC has better energy and exergy efficiency than single collector. In addition, the triangle passage with water inlet temperature of 60O C has shown better exergy and energy efficiency.
Abstract: It is important to provide possibility of so called
“handover" for the mobile subscriber from GSM network to Wi-Fi
network and back. To solve specified problem it is necessary to
estimate connection time between base station and wireless access
point. Difficulty to estimate this parameter is that it doesn-t described
in specifications of the standard and, hence, no recommended value
is given.
In this paper, the analytical model is presented that allows the
estimating connection time between base station and IEEE 802.11
access point.
Abstract: A simultaneous study on indoor and outdoor particulate matter concentrations was done in five elementary schools in central parts of Tehran, Iran. Three sizes of particles including PM10, PM2.5 and PM1.0 were measured in 13 classrooms within this schools during winter (January, February and March) 2009. A laserbased portable aerosol spectrometer Model Grimm-1.108, was used for the continuous measurement of particles. The average indoor concentration of PM10, PM2.5 and PM1.0 in studied schools were 274 μg/m3, 42 μg/m3 and 19 μg/m3 respectively; and average outdoor concentrations of PM10, PM2.5 and PM1.0 were evaluated to be 22 μg/m3, 38 μg/m3 and 140 μg/m3 respectively.
Abstract: Fatigue behaviors of Lead Zirconate Titanate (PZT)
ceramics under different amplitude of bipolar electrical loads have
been investigated. Fatigue behavior is represented by the change of
hysteresis loops and remnant polarization. Three levels of electrical
load amplitudes (1.00, 1.25 and 1.50 kV /mm) were applied in this
experimental. It was found that the remnant polarization decreased
significantly with the number of loading cycles. The degree of fatigue
degradation depends on the amplitude of electric field. The higher
amplitude exhibits the greater fatigue degradation.
Abstract: This paper presents an alternative strategy of queuing
handover called Pseudo Last Useful Instant PLUI scheme for Low
Earth Orbit Mobile Satellite Systems LEO MSSs. The PLUI scheme
uses the same approach as the Last Useful Instant LUI scheme
previously proposed in literature, with less complex implementation.
Simulation tests were carried out using Dynamic Channel Allocation
DCA in order to evaluate the performance of this scheme and also an
analytical approach has been presented to allow the performance
evaluation of Fixed Channel Allocation FCA, with different
handover queuing disciplines. The results show that performances
achieved by the proposed strategy are close to those achieved using
the LUI scheme.
Abstract: The mobile systems are powered by batteries.
Reducing the system power consumption is a key to increase its
autonomy. It is known that mostly the systems are dealing with time
varying signals. Thus, we aim to achieve power efficiency by smartly
adapting the system processing activity in accordance with the input
signal local characteristics. It is done by completely rethinking the
processing chain, by adopting signal driven sampling and processing.
In this context, a signal driven filtering technique, based on the level
crossing sampling is devised. It adapts the sampling frequency and
the filter order by analysing the input signal local variations. Thus, it
correlates the processing activity with the signal variations. It leads
towards a drastic computational gain of the proposed technique
compared to the classical one.