Abstract: A synchronous network-on-chip using wormhole packet switching
and supporting guaranteed-completion best-effort with low-priority (LP)
and high-priority (HP) wormhole packet delivery service is presented in
this paper. Both our proposed LP and HP message services deliver a good
quality of service in term of lossless packet completion and in-order message
data delivery. However, the LP message service does not guarantee minimal
completion bound. The HP packets will absolutely use 100% bandwidth of
their reserved links if the HP packets are injected from the source node with
maximum injection. Hence, the service are suitable for small size messages
(less than hundred bytes). Otherwise the other HP and LP messages, which
require also the links, will experience relatively high latency depending on the
size of the HP message. The LP packets are routed using a minimal adaptive
routing, while the HP packets are routed using a non-minimal adaptive routing
algorithm. Therefore, an additional 3-bit field, identifying the packet type,
is introduced in their packet headers to classify and to determine the type
of service committed to the packet. Our NoC prototypes have been also
synthesized using a 180-nm CMOS standard-cell technology to evaluate the
cost of implementing the combination of both services.
Abstract: Cloud Computing has recently emerged as a
compelling paradigm for managing and delivering services over the
internet. The rise of Cloud Computing is rapidly changing the
landscape of information technology, and ultimately turning the longheld
promise of utility computing into a reality. As the development
of Cloud Computing paradigm is speedily progressing, concepts, and
terminologies are becoming imprecise and ambiguous, as well as
different technologies are interfering. Thus, it becomes crucial to
clarify the key concepts and definitions. In this paper, we present the
anatomy of Cloud Computing, covering its essential concepts,
prominent characteristics, its affects, architectural design and key
technologies. We differentiate various service and deployment
models. Also, significant challenges and risks need are tackled in
order to guarantee the long-term success of Cloud Computing. The
aim of this paper is to provide a better understanding of the anatomy
of Cloud Computing and pave the way for further research in this
area.
Abstract: The line sleeves on power transmission line connects
two conductors while the transmission line is constructing. However,
the line sleeves sometimes cause transmission line break down,
because the line sleeves are deteriorated and decayed by acid rain.
When the transmission line is broken, the economical loss is huge.
Therefore the line sleeves on power transmission lines should be
inspected periodically to prevent power failure. In this paper, Korea
Electric Power Research Institute reviewed several robots to inspect
line status and proposes a robot to inspect line sleeve by measuring
magnetic field on line sleeve. The developed inspection tool can
reliable to move along transmission line and overcome several
obstacles on transmission line. The developed system is also applied
on power transmission line and verified the efficiency of the robot.
Abstract: Microarrays have become the effective, broadly used tools in biological and medical research to address a wide range of problems, including classification of disease subtypes and tumors. Many statistical methods are available for analyzing and systematizing these complex data into meaningful information, and one of the main goals in analyzing gene expression data is the detection of samples or genes with similar expression patterns. In this paper, we express and compare the performance of several clustering methods based on data preprocessing including strategies of normalization or noise clearness. We also evaluate each of these clustering methods with validation measures for both simulated data and real gene expression data. Consequently, clustering methods which are common used in microarray data analysis are affected by normalization and degree of noise and clearness for datasets.
Abstract: In this paper, a two-dimensional (2D) numerical
model for the tidal currents simulation in Persian Gulf is presented.
The model is based on the depth averaged equations of shallow water
which consider hydrostatic pressure distribution. The continuity
equation and two momentum equations including the effects of bed
friction, the Coriolis effects and wind stress have been solved. To
integrate the 2D equations, the Alternative Direction Implicit (ADI)
technique has been used. The base of equations discritization was
finite volume method applied on rectangular mesh. To evaluate the
model validation, a dam break case study including analytical
solution is selected and the comparison is done. After that, the
capability of the model in simulation of tidal current in a real field is
represented by modeling the current behavior in Persian Gulf. The
tidal fluctuations in Hormuz Strait have caused the tidal currents in
the area of study. Therefore, the water surface oscillations data at
Hengam Island on Hormoz Strait are used as the model input data.
The check point of the model is measured water surface elevations at
Assaluye port. The comparison between the results and the
acceptable agreement of them showed the model ability for modeling
marine hydrodynamic.
Abstract: As a part of evaluation system for R&D program, the
Korean government has applied feasibility analysis since 2008.
Various professionals put forth a great effort in order to catch up the
high degree of freedom of R&D programs, and make contributions to
evolving the feasibility analysis. We analyze diverse R&D programs
from various viewpoints, such as technology, policy, and Economics,
integrate the separate analysis, and finally arrive at a definite result;
whether a program is feasible or unfeasible. This paper describes the
concept and method of the feasibility analysis as a decision making
tool. The analysis unit and content of each criterion, which are key
elements in a comprehensive decision making structure, are examined
Abstract: Data mining, which is the exploration of
knowledge from the large set of data, generated as a result of
the various data processing activities. Frequent Pattern Mining
is a very important task in data mining. The previous
approaches applied to generate frequent set generally adopt
candidate generation and pruning techniques for the
satisfaction of the desired objective. This paper shows how
the different approaches achieve the objective of frequent
mining along with the complexities required to perform the
job. This paper will also look for hardware approach of cache
coherence to improve efficiency of the above process. The
process of data mining is helpful in generation of support
systems that can help in Management, Bioinformatics,
Biotechnology, Medical Science, Statistics, Mathematics,
Banking, Networking and other Computer related
applications. This paper proposes the use of both upward and
downward closure property for the extraction of frequent item
sets which reduces the total number of scans required for the
generation of Candidate Sets.
Abstract: We propose a method for discrimination and
classification of ovarian with benign, malignant and normal tissue
using independent component analysis and neural networks. The
method was tested for a proteomic patters set from A database, and
radial basis functions neural networks. The best performance was
obtained with probabilistic neural networks, resulting I 99% success
rate, with 98% of specificity e 100% of sensitivity.
Abstract: In this paper, we propose an effective relay
communication for layered video transmission as an alternative to
make the most of limited resources in a wireless communication
network where loss often occurs. Relaying brings stable multimedia
services to end clients, compared to multiple description coding
(MDC). Also, retransmission of only parity data about one or more
video layer using channel coder to the end client of the relay device is
paramount to the robustness of the loss situation. Using these
methods in resource-constrained environments, such as real-time user
created content (UCC) with layered video transmission, can provide
high-quality services even in a poor communication environment.
Minimal services are also possible. The mathematical analysis shows
that the proposed method reduced the probability of GOP loss rate
compared to MDC and raptor code without relay. The GOP loss rate
is about zero, while MDC and raptor code without relay have a GOP
loss rate of 36% and 70% in case of 10% frame loss rate.
Abstract: One of the mayor problems of programming a cruise
circuit is to decide which destinations to include and which don-t.
Thus a decision problem emerges, that might be solved using a linear
and goal programming approach. The problem becomes more
complex if several boats in the fleet must be programmed in a limited
schedule, trying their capacity matches best a seasonal demand and
also attempting to minimize the operation costs. Moreover, the
programmer of the company should consider the time of the
passenger as a limited asset, and would like to maximize its usage.
The aim of this work is to design a method in which, using linear and
goal programming techniques, a model to design circuits for the
cruise company decision maker can achieve an optimal solution
within the fleet schedule.
Abstract: In this era of globalization, the role of the State in all aspects of development is widely debated. Some scholars contend the 'demise' and diminishing role of the State whilst others claim that the State is still “de facto developmental". Clearly, it is vital to ascertain which of these two contentions are reflective of the role of the State as nations ascend their development trajectories. Based on the findings of this paper, the perception that the Malaysian State plays an active and committed role towards distributing equitable educational opportunities and enhancing employability of Malaysian PWDs is actually a myth and not reality. Thus, in order to fulfill the promise of Vision 2020 to transform Malaysia into a caring and socially-inclusive society; this paper calls for a more interventionist and committed role by the Malaysian State to translate the universal rights of education and employment opportunities for PWDs from mere policy rhetoric into inclusive realities.
Abstract: A simple approach is demonstrated for growing large
scale, nearly vertically aligned ZnO nanowire arrays by thermal
oxidation method. To reveal effect of temperature on growth and
physical properties of the ZnO nanowires, gold coated zinc substrates
were annealed at 300 °C and 400 °C for 4 hours duration in air. Xray
diffraction patterns of annealed samples indicated a set of well
defined diffraction peaks, indexed to the wurtzite hexagonal phase of
ZnO. The scanning electron microscopy studies show formation of
ZnO nanowires having length of several microns and average of
diameter less than 500 nm. It is found that the areal density of wires
is relatively higher, when the annealing is carried out at higher
temperature i.e. at 400°C. From the field emission studies, the values
of the turn-on and threshold field, required to draw emission current
density of 10 μA/cm2 and 100 μA/cm2 are observed to be 1.2 V/μm
and 1.7 V/μm for the samples annealed at 300 °C and 2.9 V/μm and
3.7 V/μm for that annealed at 400 °C, respectively. The field
emission current stability, investigated over duration of more than 2
hours at the preset value of 1 μA, is found to be fairly good in both
cases. The simplicity of the synthesis route coupled with the
promising field emission properties offer unprecedented advantage
for the use of ZnO field emitters for high current density
applications.
Abstract: Medical applications are among the most impactful
areas of microrobotics. The ultimate goal of medical microrobots is
to reach currently inaccessible areas of the human body and carry out
a host of complex operations such as minimally invasive surgery
(MIS), highly localized drug delivery, and screening for diseases at
their very early stages. Miniature, safe and efficient propulsion
systems hold the key to maturing this technology but they pose
significant challenges. A new type of propulsion developed recently,
uses multi-flagella architecture inspired by the motility mechanism of
prokaryotic microorganisms. There is a lack of efficient methods for
designing this type of propulsion system. The goal of this paper is to
overcome the lack and this way, a numerical strategy is proposed to
design multi-flagella propulsion systems. The strategy is based on the
implementation of the regularized stokeslet and rotlet theory, RFT
theory and new approach of “local corrected velocity". The effects of
shape parameters and angular velocities of each flagellum on overall
flow field and on the robot net forces and moments are considered.
Then a multi-layer perceptron artificial neural network is designed
and employed to adjust the angular velocities of the motors for
propulsion control. The proposed method applied successfully on a
sample configuration and useful demonstrative results is obtained.
Abstract: Fault tree analysis is a well-known method for
reliability and safety assessment of engineering systems. In the last 3
decades, a number of methods have been introduced, in the literature,
for automatic construction of fault trees. The main difference between these methods is the starting model from which the tree is constructed. This paper presents a new methodology for the construction of static and dynamic fault trees from a system Simulink
model. The method is introduced and explained in detail, and its correctness and completeness is experimentally validated by using an example, taken from literature. Advantages of the method are also mentioned.
Abstract: Speeded-Up Robust Feature (SURF) is commonly used for feature matching in stereovision because of their robustness towards scale changes and rotational changes. However, SURF feature cannot cope with large viewpoint changes or skew distortion. This paper introduces a method which can help to improve the wide baseline-s matching performance in term of accuracy by rectifying the image using two vanishing points. Simplified orientation correction was used to remove the false matching..
Abstract: Cylindrical concrete reservoirs are appropriate choice
for storing liquids as water, oil and etc. By using of the pre-cast
concrete reservoirs instead of the in-situ constructed reservoirs, the
speed and precision of the construction would considerably increase.
In this construction method, wall and roof panels would make in
factory with high quality materials and precise controlling. Then,
pre-cast wall and roof panels would carry out to the construction site
for assembling. This method has a few faults such as: the existing
weeks in connection of wall panels together and wall panels to
foundation. Therefore, these have to be resisted under applied loads
such as seismic load. One of the innovative methods which was
successfully applied for seismic retrofitting of numerous pre-cast
cylindrical water reservoirs in New Zealand, using of the high tensile
cables around the reservoirs and post-tensioning them. In this paper,
analytical modeling of wall and roof panels and post-tensioned
cables are carried out with finite element method and the effect of
height to diameter ratio, post-tensioning force value, liquid level in
reservoir, installing position of tendons on seismic response of
reservoirs are investigated.
Abstract: Probability-based identity disclosure risk
measurement may give the same overall risk for different
anonymization strategy of the same dataset. Some entities in the
anonymous dataset may have higher identification risks than the
others. Individuals are more concerned about higher risks than the
average and are more interested to know if they have a possibility of
being under higher risk. A notation of overall risk in the above
measurement method doesn-t indicate whether some of the involved
entities have higher identity disclosure risk than the others. In this
paper, we have introduced an identity disclosure risk measurement
method that not only implies overall risk, but also indicates whether
some of the members have higher risk than the others. The proposed
method quantifies the overall risk based on the individual risk values,
the percentage of the records that have a risk value higher than the
average and how larger the higher risk values are compared to the
average. We have analyzed the disclosure risks for different
disclosure control techniques applied to original microdata and
present the results.
Abstract: In this research, the flow pattern influence on
performance of a micro PEMFC was investigated
experimentally. The investigation focused on the impacts of
bend angels and rib/channel dimensions of serpentine flow
channel pattern on the performance and investigated how they
improve the performance. The fuel cell employed for these
experiments was a micro single PEMFC with a membrane of
1.44 cm2 Nafion NRE-212. The results show that 60° and 120°
bend angles can provide the better performances at 20 and 40
sccm inlet flow rates comparing to that the conventional design.
Additionally, wider channel with narrower rib spacing gives
better performance. These results may be applied to develop
universal heuristics for the design of flow pattern of micro
PEMFC.
Abstract: This paper proposes an easy-to-use instruction hiding
method to protect software from malicious reverse engineering
attacks. Given a source program (original) to be protected, the
proposed method (1) takes its modified version (fake) as an input,
(2) differences in assembly code instructions between original and
fake are analyzed, and, (3) self-modification routines are introduced
so that fake instructions become correct (i.e., original instructions)
before they are executed and that they go back to fake ones after
they are executed. The proposed method can add a certain amount
of security to a program since the fake instructions in the resultant
program confuse attackers and it requires significant effort to discover
and remove all the fake instructions and self-modification routines.
Also, this method is easy to use (with little effort) because all a user
(who uses the proposed method) has to do is to prepare a fake source
code by modifying the original source code.
Abstract: Axisymmetric vibration of an infinite Pyrocomposite
circular hollow cylinder made of inner and outer pyroelectric layer of
6mm-class bonded together by a Linear Elastic Material with Voids
(LEMV) layer is studied. The exact frequency equation is obtained
for the traction free surfaces with continuity condition at the
interfaces. Numerical results in the form of data and dispersion
curves for the first and second mode of the axisymmetric vibration of
the cylinder BaTio3 / Adhesive / BaTio3 by taking the Adhesive layer
as an existing Carbon Fibre Reinforced Polymer (CFRP) are
compared with a hypothetical LEMV layer with and without voids
and as well with a pyroelectric hollow cylinder. The damping is
analyzed through the imaginary parts of the complex frequencies.