Abstract: One of the most growing areas in the embedded community is multimedia devices. Multimedia devices incorporate a number of complicated functions for their operation, like motion estimation. A multitude of different implementations have been proposed to reduce motion estimation complexity, such as spiral search. We have studied the implementations of spiral search and identified areas of improvement. We propose a modified spiral search algorithm, with lower computational complexity compared to the original spiral search. We have implemented our algorithm on an embedded ARM based architecture, with custom memory hierarchy. The resulting system yields energy consumption reduction up to 64% and performance increase up to 77%, with a small penalty of 2.3 dB, in average, of video quality compared with the original spiral search algorithm.
Abstract: This paper compares the recent transformerless ACDC
power converter architectures and provides an assessment of
each. A prototype of one of the transformerless AC-DC converter
architecture is also presented depicting the feasibility of a small form
factor, power supply design. In this paper component selection
guidelines to achieve high efficiency AC-DC power conversion are
also discussed.
Abstract: In a chirp spread spectrum (CSS) system, the overlap
technique is used for increasing bit rate. More overlaps can offer
higher data throughput; however, they may cause more intersymbol
interference (ISI) at the same time, resulting in serious bit error
rate (BER) performance degradation. In this paper, we perform the
BER analysis and derive a closed form BER expression for the
overlap-based CSS system. The derived BER expression includes
the number of overlaps as a parameter, and thus, would be very
useful in determining the number of overlaps for a specified BER.
The numerical results demonstrate that the BER derived in a closed
form closely agrees with the simulated BER.
Abstract: The charnockitic and associated granitic rocks of Akure area were studied for their field and petrographic relationship's. The outcrops locations were plotted in Surfer 8. The granitic rock exhibits a porphyritic texture and outcrops in the north-eastern side of the study area while the charnockitics outcrop in the central/western part. An essentially dark coloured and fine grained intrusive exhibiting xenoliths and xenocrysts (plagioclase phenocrysts) of the granite outcrops between the granitic and charnockitic rocks. Mineralogically, the central rock combines the content of the other two indicating that it is most likely a product of their hybridization. The charnockitic magma is believed to have intruded and assimilated the granite substantially thereby contaminating itself and consequently emplacing the hybrid. The presented model of emplacement elucidates the hybridization proposal. Conclusively, the charnockitics are believed to be (a) younger than the granite, (b) of Pan-African age and (c) of igneous origin.
Abstract: A submerged horizontal plate type breakwater is
pointed out as an efficient wave protection device for cage culture in
marine fishery. In order to reveal the wave elimination principle of this
type breakwater, boundary element method is utilized to investigate
this problem. The flow field and the trajectory of water particles are
studied carefully. The flow field analysis shows that: the interaction of
incident wave and adverse current above the plate disturbs the water
domain drastically. This can slow down the horizontal velocity and
vertical velocity of the water particles.
Abstract: Neoclassical and functionalist explanations of self
organization in multiagent systems have been criticized on several accounts including unrealistic explication of overadapted agents and
failure to resolve problems of externality. The paper outlines a more
elaborate and dynamic model that is capable of resolving these dilemmas. An illustrative example where behavioral diversity is
cobred in a repeated nonzero sum task via evolutionary computing is
presented.
Abstract: A study of the H-beam's nanosize structure phase
states after thermomechanical strengthening was carried out by TEM.
The following processes were analyzed. 1. The dispersing of the
cementite plates by cutting them by moving dislocations. 2. The
dissolution of cementite plates and repeated precipitation of the
cementite particles on the dislocations, the boundaries, subgrains and
grains. 3. The decay of solid solution of carbon in the α-iron after
"self-tempering" of martensite. 4. The final transformation of the
retained austenite in beinite with α-iron particles and cementite
formation. 5. The implementation of the diffusion mechanism of γ ⇒
α transformation.
Abstract: This research focuses on micro-enterprise of
Malaysian Malays that are involved in very small-scaled business
activities. Among them include food stall and burger stall operators,
night market hawkers, grocery store operators as well as construction
and small service activities works. The study seeks to explore why
some micro-entrepreneurs still lag in entrepreneurship and what
needs to be rectified. This quantitative study is conducted on 173
Malay micro-enterprise owners (MEOs) and 58 Malay failed microenterprise
owners (FMEOs) involved in all range of businesses
throughout the state of Perak, Malaysia. The main aims are to
identify the gaps between the failed micro-enterprise owners
(FMEOs) and existing micro-enterprise owners (MEOs) and the
problems faced among FMEOs. The results reveal that the MEOs had
strong motivations and better marketing approaches as compared to
FMEOs. Furthermore, the FMEOs failed in the business ventures
mainly due to lack of management, sales and marketing skills and
poor competitive abilities to keep up with rivals.
Abstract: The cellular network is one of the emerging areas of
communication, in which the mobile nodes act as member for one
base station. The cluster based communication is now an emerging
area of wireless cellular multimedia networks. The cluster renders
fast communication and also a convenient way to work with
connectivity. In our scheme we have proposed an optimization
technique for the fuzzy cluster nodes, by categorizing the group
members into three categories like long refreshable member, medium
refreshable member and short refreshable member. By considering
long refreshable nodes as static nodes, we compute the new
membership values for the other nodes in the cluster. We compare
their previous and present membership value with the threshold value
to categorize them into three different members. By which, we
optimize the nodes in the fuzzy clusters. The simulation results show
that there is reduction in the cluster computational time and
iterational time after optimization.
Abstract: In multi hop wireless systems, such as ad hoc and
sensor networks, mobile ad hoc network applications are deployed,
security emerges as a central requirement. A particularly devastating
attack is known as the wormhole attack, where two or more malicious
colluding nodes create a higher level virtual tunnel in the network,
which is employed to transport packets between the tunnel end points.
These tunnels emulate shorter links in the network. In which
adversary records transmitted packets at one location in the network,
tunnels them to another location, and retransmits them into the
network. The wormhole attack is possible even if the attacker has not
compromised any hosts and even if all communication provides
authenticity and confidentiality. In this paper, we analyze wormhole
attack nature in ad hoc and sensor networks and existing methods of
the defending mechanism to detect wormhole attacks without require
any specialized hardware. This analysis able to provide in
establishing a method to reduce the rate of refresh time and the
response time to become more faster.
Abstract: With the demand of mobility by users, wireless
technologies have become the hotspot developing arena. Internet
Engineering Task Force (IETF) working group has developed Mobile
IP to support node mobility. The concept of node mobility indicates
that in spite of the movement of the node, it is still connected to the
internet and all the data transactions are preserved. It provides
location-independent access to Internet. After the incorporation of
host mobility, network mobility has undergone intense research.
There are several intricacies faced in the real world implementation
of network mobility significantly the problem of nested networks and
their consequences. This article is concerned regarding a problem of
nested network called pinball route problem and proposes a solution
to eliminate the above problem. The proposed mechanism is
implemented using NS2 simulation tool and it is found that the
proposed mechanism efficiently reduces the overload caused by the
pinball route problem.
Abstract: In the meat processing industry the substitution of
meat with non-meat ingredients is considered an important strategy
for reducing overall production costs. The main purpose of the
current research was to evaluate differences in physical-chemical
composition of cooked sausage with different legumes additions.
Peas (Pisum sativum), beans (Phaseolus vulgaris) and lentil (Lens
culinaris) were used in preparation of sausages. The legumes at
proportion of 20% of the total weight of meat were added in
sausages. The whole ingredients were mixed, filled into casing,
compressed, cooked and cooled. After storage the samples were
sensory evaluated. The sensory evaluation was carried out using the
nine point hedonic scale and line scale. Sausages without legumes
flour was used as control sample. The main conclusion of the current
research the legumes flour can be successfully used for cooked
sausages production.
Abstract: An application framework provides a reusable design
and implementation for a family of software systems. Application
developers extend the framework to build their particular
applications using hooks. Hooks are the places identified to show
how to use and customize the framework. Hooks define the
Framework Interface Classes (FICs) and their possible specifications,
which helps in building reusable test cases for the implementations of
these classes. This paper introduces a novel technique called all
paths-state to generate state-based test cases to test the FICs at class
level. The technique is experimentally evaluated. The empirical
evaluation shows that all paths-state technique produces test cases
with a high degree of coverage for the specifications of the
implemented FICs comparing to test cases generated using round-trip
path and all-transition techniques.
Abstract: The effect of a time delay on the transmission on
dengue fever is studied. The time delay is due to the presence of an
incubation period for the dengue virus to develop in the mosquito
before the mosquito becomes infectious. The conditions for the
existence of a Hopf bifurcation to limit cycle behavior are
established. The conditions are different from the usual one and they
are based on whether a particular third degree polynomial has
positive real roots. A theorem for determining whether for a given
set of parameter values, a critical delay time exist is given. It is
found that for a set of realistic values of the parameters in the model,
a Hopf bifurcation can not occur. For a set of unrealistic values of
some of the parameters, it is shown that a Hopf bifurcation can occur.
Numerical solutions using this last set show the trajectory of two of
the variables making a transition from a spiraling orbit to a limit
cycle orbit.
Abstract: Medical services are usually provided in hospitals; however, in developing country, some rural residences have fewer opportunities to access in healthcare services due to the limitation of transportation communication. Therefore, in Thailand, there are charitable organizations operating to provide medical treatments to these people by shifting the medical services to operation sites; this is commonly known as mobile medical service. Operation routing is important for the organization to reduce its transportation cost in order to focus more on other important activities; for instance, the development of medical apparatus. VRP is applied to solve the problem of high transportation cost of the studied organization with the searching techniques of saving algorithm to find the minimum total distance of operation route and satisfy available time constraints of voluntary medical staffs.
Abstract: The important issue considered in the widespread deployment of Wireless Sensor Networks (WSNs) is an efficiency of the energy consumption. In this paper, we present a study of the optimal relay station planning problems using Binary Integer Linear Programming (BILP) model to minimize the energy consumption in WSNs. Our key contribution is that the proposed model not only ensures the required network lifetime but also guarantees the radio connectivity at high level of communication quality. Specially, we take into account effects of noise, signal quality limitation and bit error rate characteristics. Numerical experiments were conducted in various network scenarios. We analyzed the effects of different sensor node densities and distribution on the energy consumption.
Abstract: This paper proposes the method combining artificial neural network with particle swarm optimization (PSO) to implement the maximum power point tracking (MPPT) by controlling the rotor speed of the wind generator. With the measurements of wind speed, rotor speed of wind generator and output power, the artificial neural network can be trained and the wind speed can be estimated. The proposed control system in this paper provides a manner for searching the maximum output power of wind generator even under the conditions of varying wind speed and load impedance.
Abstract: A Decision Support System/Expert System for stock
portfolio selection presented where at first step, both technical and
fundamental data used to estimate technical and fundamental return
and risk (1st phase); Then, the estimated values are aggregated with
the investor preferences (2nd phase) to produce convenient stock
portfolio.
In the 1st phase, there are two expert systems, each of which is
responsible for technical or fundamental estimation. In the technical
expert system, for each stock, twenty seven candidates are identified
and with using rough sets-based clustering method (RC) the effective
variables have been selected. Next, for each stock two fuzzy rulebases
are developed with fuzzy C-Mean method and Takai-Sugeno-
Kang (TSK) approach; one for return estimation and the other for
risk. Thereafter, the parameters of the rule-bases are tuned with backpropagation
method. In parallel, for fundamental expert systems,
fuzzy rule-bases have been identified in the form of “IF-THEN" rules
through brainstorming with the stock market experts and the input
data have been derived from financial statements; as a result two
fuzzy rule-bases have been generated for all the stocks, one for return
and the other for risk.
In the 2nd phase, user preferences represented by four criteria and
are obtained by questionnaire. Using an expert system, four estimated
values of return and risk have been aggregated with the respective
values of user preference. At last, a fuzzy rule base having four rules,
treats these values and produce a ranking score for each stock which
will lead to a satisfactory portfolio for the user.
The stocks of six manufacturing companies and the period of
2003-2006 selected for data gathering.
Abstract: Packing problems arise in a wide variety of application
areas. The basic problem is that of determining an efficient arrangement
of different objects in a region without any overlap and
with minimal wasted gap between shapes. This paper presents a
novel population based approach for optimizing arrangement of irregular
shapes. In this approach, each shape is coded as an agent and
the agents' reproductions and grouping policies results in arrangements
of the objects in positions with least wasted area between
them. The approach is implemented in an application for cutting
sheets and test results on several problems from literature are presented.
Abstract: Liquid-liquid extraction is a process using two immiscible
liquids to extract compounds from one phase without high
temperature requirement. Mostly, the technical implementation of
this process is carried out in mixer-settlers or extraction columns. In
real chemical processes, chemicals may have high viscosity and
contain impurities. These impurities may change the settling behavior
of the process without measurably changing the physical properties
of the phases. In the current study, the settling behavior and the affected
parameters in a high-viscosity system were observed. Batchsettling
experiments were performed to experimentally quantify the
settling behavior and the mixer-settler model of Henschke [1] was
used to evaluate the behavior of the toluene + water system. The
viscosity of the system was increased by adding polyethylene glycol
4000 to the aqueous phase. NaCl and Na2SO4 were used to study the
influence of electrolytes. The results from this study show that increasing
the viscosity of water has a higher influence on the settling
behavior in comparison to the effects of the electrolytes. It can be
seen from the experiments that at high salt concentrations, there was
no effect on the settling behavior.