Abstract: The success of an electronic system in a System-on- Chip is highly dependent on the efficiency of its interconnection network, which is constructed from routers and channels (the routers move data across the channels between nodes). Since neither classical bus based nor point to point architectures can provide scalable solutions and satisfy the tight power and performance requirements of future applications, the Network-on-Chip (NoC) approach has recently been proposed as a promising solution. Indeed, in contrast to the traditional solutions, the NoC approach can provide large bandwidth with moderate area overhead. The selected topology of the components interconnects plays prime rule in the performance of NoC architecture as well as routing and switching techniques that can be used. In this paper, we present two generic NoC architectures that can be customized to the specific communication needs of an application in order to reduce the area with minimal degradation of the latency of the system. An experimental study is performed to compare these structures with basic NoC topologies represented by 2D mesh, Butterfly-Fat Tree (BFT) and SPIN. It is shown that Cluster mesh (CMesh) and MinRoot schemes achieves significant improvements in network latency and energy consumption with only negligible area overhead and complexity over existing architectures. In fact, in the case of basic NoC topologies, CMesh and MinRoot schemes provides substantial savings in area as well, because they requires fewer routers. The simulation results show that CMesh and MinRoot networks outperforms MESH, BFT and SPIN in main performance metrics.
Abstract: Visual information is very important in human perception
of surrounding world. Video is one of the most common ways to
capture visual information. The video capability has many benefits
and can be used in various applications. For the most part, the
video information is used to bring entertainment and help to relax,
moreover, it can improve the quality of life of deaf people. Visual
information is crucial for hearing impaired people, it allows them to
communicate personally, using the sign language; some parts of the
person being spoken to, are more important than others (e.g. hands,
face). Therefore, the information about visually relevant parts of the
image, allows us to design objective metric for this specific case. In
this paper, we present an example of an objective metric based on
human visual attention and detection of salient object in the observed
scene.
Abstract: Quantum cryptography offers a way of key agreement,
which is unbreakable by any external adversary. Authentication is
of crucial importance, as perfect secrecy is worthless if the identity
of the addressee cannot be ensured before sending important information.
Message authentication has been studied thoroughly, but no
approach seems to be able to explicitly counter meet-in-the-middle
impersonation attacks. The goal of this paper is the development of
an authentication scheme being resistant against active adversaries
controlling the communication channel. The scheme is built on top
of a key-establishment protocol and is unconditionally secure if built
upon quantum cryptographic key exchange. In general, the security
is the same as for the key-agreement protocol lying underneath.
Abstract: Fingerprint based identification system; one of a well
known biometric system in the area of pattern recognition and has
always been under study through its important role in forensic
science that could help government criminal justice community. In
this paper, we proposed an identification framework of individuals by
means of fingerprint. Different from the most conventional
fingerprint identification frameworks the extracted Geometrical
element features (GEFs) will go through a Discretization process.
The intention of Discretization in this study is to attain individual
unique features that could reflect the individual varianceness in order
to discriminate one person from another. Previously, Discretization
has been shown a particularly efficient identification on English
handwriting with accuracy of 99.9% and on discrimination of twins-
handwriting with accuracy of 98%. Due to its high discriminative
power, this method is adopted into this framework as an independent
based method to seek for the accuracy of fingerprint identification.
Finally the experimental result shows that the accuracy rate of
identification of the proposed system using Discretization is 100%
for FVC2000, 93% for FVC2002 and 89.7% for FVC2004 which is
much better than the conventional or the existing fingerprint
identification system (72% for FVC2000, 26% for FVC2002 and
32.8% for FVC2004). The result indicates that Discretization
approach manages to boost up the classification effectively, and
therefore prove to be suitable for other biometric features besides
handwriting and fingerprint.
Abstract: This paper provides an introduction into the
evolution of information and communication technology and illustrates its usage in the work domain. The paper is sub-divided into two parts. The first part gives an overview over the different
phases of information processing in the work domain. It starts by
charting the past and present usage of computers in work
environments and shows current technological trends, which are likely to influence future business applications. The second part
starts by briefly describing, how the usage of computers changed business processes in the past, and presents first Ambient
Intelligence applications based on identification and localization
information, which are already used in the production and retail sector. Based on current systems and prototype applications, the
paper gives an outlook of how Ambient Intelligence technologies could change business processes in the future.
Abstract: Grid environments consist of the volatile integration
of discrete heterogeneous resources. The notion of the Grid is to
unite different users and organisations and pool their resources into
one large computing platform where they can harness, inter-operate,
collaborate and interact. If the Grid Community is to achieve this
objective, then participants (Users and Organisations) need to be
willing to donate or share their resources and permit other
participants to use their resources. Resources do not have to be
shared at all times, since it may result in users not having access to
their own resource. The idea of reward-based computing was
developed to address the sharing problem in a pragmatic manner.
Participants are offered a reward to donate their resources to the
Grid. A reward may include monetary recompense or a pro rata share
of available resources when constrained. This latter point may imply
a quality of service, which in turn may require some globally agreed
reservation mechanism. This paper presents a platform for economybased
computing using the WebCom Grid middleware. Using this
middleware, participants can configure their resources at times and
priority levels to suit their local usage policy. The WebCom system
accounts for processing done on individual participants- resources
and rewards them accordingly.
Abstract: WikID is a wiki for industrial design engineers. An
important aspect for the viability of a wiki is the loyalty of the user
community to share their information and knowledge by adding this
knowledge to the wiki. For the initiators of a wiki it is therefore
important to use every aspect to stimulate the user community to
actively participate. In this study the focus is on the styling of the
website. The central question is: How could the WikID website be
visually designed to achieve a user experience which will incite the
user to actively participate in the WikID community? After a
literature study on the influencing factors of a website, a new
interface has been designed by applying the rules found, in order to
expand this website-s active user community. An online
questionnaire regarding the old or the new website gave insights in
the opinions of users. As expected, the new website was rated more
positively than the old website. However, the differences are limited.
Abstract: In this paper, we propose a routing scheme that guarantees
the residual lifetime of wireless sensor networks where each
sensor node operates with a limited budget of battery energy. The
scheme maximizes the communications QoS while sustaining the
residual battery lifetime of the network for a specified duration.
Communication paths of wireless nodes are translated into a directed
acyclic graph(DAG) and the maximum-flow algorithm is applied to
the graph. The found maximum flow are assigned to sender nodes, so
as to maximize their communication QoS. Based on assigned flows,
the scheme determines the routing path and the transmission rate of
data packet so that any sensor node on the path would not exhaust
its battery energy before a specified duration.
Abstract: Today-s healthcare industries had become more
patient-centric than profession-centric, from which the issues of quality of healthcare and the patient safety are the major concerns in the modern healthcare facilities. An unplanned extubation (UE) may
be detrimental to the patient-s life, and thus is one of the major indexes
of patient safety and healthcare quality. A high UE rate not only
defeated the healthcare quality as well as the patient safety policy but
also the nurses- morality, and job satisfaction. The UE problem in a psychiatric hospital is unique and may be a tough challenge for the
healthcare professionals for the patients were mostly lacking communication capabilities. We reported with this essay a particular
project that was organized to reduce the UE rate from the current 2.3%
to a lower and satisfactory level in the long-term care units of a psychiatric hospital. The project was conducted between March 1st,
2011 and August 31st, 2011. Based on the error information gathered
from varied units of the hospital, the team analyzed the root causes
with possible solutions proposed to the meetings. Four solutions were
then concluded with consensus and launched to the units in question.
The UE rate was now reduced to a level of 0.17%. Experience from
this project, the procedure and the tools adopted would be good reference to other hospitals.
Abstract: Optimum communication and performance in
Wireless Sensor Networks, constitute multi-facet challenges due to
the specific networking characteristics as well as the scarce resource
availability. Furthermore, it is becoming increasingly apparent that
isolated layer based approaches often do not meet the demands posed
by WSNs applications due to omission of critical inter-layer
interactions and dependencies. As a counterpart, cross-layer is
receiving high interest aiming to exploit these interactions and
increase network performance. However, in order to clearly identify
existing dependencies, comprehensive performance studies are
required evaluating the effect of different critical network parameters
on system level performance and behavior.This paper-s main
objective is to address the need for multi-parametric performance
evaluations considering critical network parameters using a well
known network simulator, offering useful and practical conclusions
and guidelines. The results reveal strong dependencies among
considered parameters which can be utilized by and drive future
research efforts, towards designing and implementing highly efficient
protocols and architectures.
Abstract: Artificial Immune System (AIS) is relatively naive paradigm for intelligent computations. The inspiration for AIS is derived from natural Immune System (IS). Classically it is believed that IS strives to discriminate between self and non-self. Most of the existing AIS research is based on this approach. Danger Theory (DT) argues this approach and proposes that IS fights against danger producing elements and tolerates others. We, the computational researchers, are not concerned with the arguments among immunologists but try to extract from it novel abstractions for intelligent computation. This paper aims to follow DT inspiration for intelligent data processing. The approach may introduce new avenue in intelligent processing. The data used is system calls data that is potentially significant in intrusion detection applications.
Abstract: The hybridization of artificial immune system with
cellular automata (CA-AIS) is a novel method. In this hybrid model,
the cellular automaton within each cell deploys the artificial immune
system algorithm under optimization context in order to increase its
fitness by using its neighbor-s efforts. The hybrid model CA-AIS is
introduced to fix the standard artificial immune system-s weaknesses.
The credibility of the proposed approach is evaluated by simulations
and it shows that the proposed approach achieves better results
compared to standard artificial immune system.
Abstract: Encryption protects communication partners from
disclosure of their secret messages but cannot prevent traffic analysis
and the leakage of information about “who communicates with
whom". In the presence of collaborating adversaries, this linkability
of actions can danger anonymity. However, reliably providing
anonymity is crucial in many applications. Especially in contextaware
mobile business, where mobile users equipped with PDAs
request and receive services from service providers, providing
anonymous communication is mission-critical and challenging at the
same time. Firstly, the limited performance of mobile devices does
not allow for heavy use of expensive public-key operations which are
commonly used in anonymity protocols. Moreover, the demands for
security depend on the application (e.g., mobile dating vs. pizza
delivery service), but different users (e.g., a celebrity vs. a normal
person) may even require different security levels for the same
application. Considering both hardware limitations of mobile devices
and different sensitivity of users, we propose an anonymity
framework that is dynamically configurable according to user and
application preferences. Our framework is based on Chaum-s mixnet.
We explain the proposed framework, its configuration
parameters for the dynamic behavior and the algorithm to enforce
dynamic anonymity.
Abstract: Within the last years, several technologies have been developed to help building e-learning portals. Most of them follow approaches that deliver a vast amount of functionalities, suitable for class-like learning. The SuGI project, as part of the D-Grid (funded by the BMBF), targets on delivering a highly scalable and sustainable learning solution to provide materials (e.g. learning modules, training systems, webcasts, tutorials, etc.) containing knowledge about Grid computing to the D-Grid community. In this article, the process of the development of an e-learning portal focused on the requirements of this special user group is described. Furthermore, it deals with the conceptual and technical design of an e-learning portal, addressing the special needs of heterogeneous target groups. The main focus lies on the quality management of the software development process, Web templates for uploading new contents, the rich search and filter functionalities which will be described from a conceptual as well as a technical point of view. Specifically, it points out best practices as well as concepts to provide a sustainable solution to a relatively unknown and highly heterogeneous community.
Abstract: A major challenge in biomaterials research is the
regulation of protein adsorption which is a key factor for controlling
the subsequent cell adhesion at implant surfaces. The aim of the
present study was to control the adsorption of fibronectin (FN) and
the attachment of MG-63 osteoblasts with an electronic
nanostructure. Shallow doping line lattices with a period of 260 nm
were produced for this purpose by implantation of phosphorous in
silicon wafers. Protein coverage was determined after incubating the
substrate with FN by means of an immunostaining procedure and the
measurement of the fluorescence intensity with a TECAN analyzer.
We observed an increased amount of adsorbed FN on the
nanostructure compared to control substrates. MG-63 osteoblasts
were cultivated for 24h on FN-incubated substrates and their
morphology was assessed by SEM. Preferred orientation and
elongation of the cells in direction of the doping lattice lines was
observed on FN-coated nanostructures.
Abstract: Frequently a group of people jointly decide and authorize
a specific person as a representative in some business/poitical
occasions, e.g., the board of a company authorizes the chief executive
officer to close a multi-billion acquisition deal. In this paper, an
integrated proxy multi-signature scheme that allows anonymously
vetoable delegation is proposed. This protocol integrates mechanisms
of private veto, distributed proxy key generation, secure transmission
of proxy key, and existentially unforgeable proxy multi-signature
scheme. First, a provably secure Guillou-Quisquater proxy signature
scheme is presented, then the “zero-sharing" protocol is extended
over a composite modulus multiplicative group, and finally the above
two are combined to realize the GQ proxy multi-signature with
anonymously vetoable delegation. As a proxy signature scheme, this
protocol protects both the original signers and the proxy signer.
The modular design allows simplified implementation with less
communication overheads and better computation performance than
a general secure multi-party protocol.
Abstract: The paper attempts to contribute to the largely
neglected social and anthropological discussion of technology development on the one hand, and to redirecting the emphasis in
anthropology from primitive and exotic societies to problems of high
relevance in contemporary era and how technology is used in
everyday life. It draws upon multidimensional models of intelligence
and ideal type formation. It is argued that the predominance of
computational and cognitive cosmovisions have led to technology alienation. Injection of communicative competence in artificially
intelligent systems and identity technologies in the coming
information society are analyzed
Abstract: Methods of contemporary mathematical physics such
as chaos theory are useful for analyzing and understanding the
behavior of complex biological and physiological systems. The three
dimensional model of HIV/AIDS is the basis of active research since
it provides a complete characterization of disease dynamics and the
interaction of HIV-1 with the immune system. In this work, the
behavior of the HIV system is analyzed using the three dimensional
HIV model and a chaotic measure known as the Hurst exponent.
Results demonstrate that Hurst exponents of CD4, CD8 cells and
viral load vary nonlinearly with respect to variations in system
parameters. Further, it was observed that the three dimensional HIV
model can accommodate both persistent (H>0.5) and anti-persistent
(H
Abstract: The possibility of intrinsic electromagnetic fields
within living cells and their resonant self-interaction and interaction
with ambient electromagnetic fields is suggested on the basis of a
theoretical and experimental study. It is reported that intrinsic
electromagnetic fields are produced in the form of radio-frequency
and infra-red photons within atoms (which may be coupled or
uncoupled) in cellular structures, such as the cell cytoskeleton and
plasma membrane. A model is presented for the interaction of these
photons among themselves or with atoms under a dipole-dipole
coupling, induced by single-photon or two-photon processes. This
resonance is manifested by conspicuous field amplification and it is
argued that it is possible for these resonant photons to undergo
tunnelling in the form of evanescent waves to a short range (of a few
nanometers to micrometres). This effect, suggested as a resonant
photon tunnelling mechanism in this report, may enable these fields
to act as intracellular signal communication devices and as bridges
between macromolecules or cellular structures in the cell
cytoskeleton, organelles or membrane. A brief overview of an
experimental technique and a review of some preliminary results are
presented, in the detection of these fields produced in living cell
membranes under physiological conditions.
Abstract: Control of commutation of switched reluctance (SR)
motor has been an area of interest for researchers for sometime now
with mixed successes in addressing the inherent challenges. New
technologies, processing schemes and methods have been adopted to
make sensorless SR drive a reality. There are a number of
conceptual, offline, analytical and online solutions in literature that
have varying complexities and achieved equally varying degree of
robustness and accuracies depending on the method used to address
the challenges and the SR drive application. Magnetic coupling is
one such challenge when using active probing techniques to
determine rotor position of a SR motor from stator winding. This
paper studies the effect of back-of-core saturation on the detected
rotor position and presents results on measurement made on a 4-
phase SR motor. The results shows that even for a four phase motor
which is excited one phase at a time and using the electrically
opposite phase for active position probing, the back-of-core
saturation effects should not be ignored.