Abstract: One of the long standing challenging aspect in mobile robotics is the ability to navigate autonomously, avoiding modeled and unmodeled obstacles especially in crowded and unpredictably changing environment. A successful way of structuring the navigation task in order to deal with the problem is within behavior based navigation approaches. In this study, Issues of individual behavior design and action coordination of the behaviors will be addressed using fuzzy logic. A layered approach is employed in this work in which a supervision layer based on the context makes a decision as to which behavior(s) to process (activate) rather than processing all behavior(s) and then blending the appropriate ones, as a result time and computational resources are saved.
Abstract: IEEE 802.15.4a impulse radio-time hopping ultra wide
band (IR-TH UWB) physical layer, due to small duty cycle and very
short pulse widths is robust against multipath propagation. However,
scattering and reflections with the large number of obstacles in indoor
channel environments, give rise to dense multipath fading. It imposes
serious problem to optimum Rake receiver architectures, for which
very large number of fingers are needed. Presence of strong noise
also affects the reception of fine pulses having extremely low power
spectral density. A robust SRake receiver for IEEE 802.15.4a IRTH
UWB in dense multipath and additive white Gaussian noise
(AWGN) is proposed to efficiently recover the weak signals with
much reduced complexity. It adaptively increases the signal to noise
(SNR) by decreasing noise through a recursive least square (RLS)
algorithm. For simulation, dense multipath environment of IEEE
802.15.4a industrial non line of sight (NLOS) is employed. The power
delay profile (PDF) and the cumulative distribution function (CDF)
for the respective channel environment are found. Moreover, the error
performance of the proposed architecture is evaluated in comparison
with conventional SRake and AWGN correlation receivers. The
simulation results indicate a substantial performance improvement
with very less number of Rake fingers.
Abstract: In this paper a real-time trajectory generation algorithm for computing 2-D optimal paths for autonomous aerial vehicles has been discussed. A dynamic programming approach is adopted to compute k-best paths by minimizing a cost function. Collision detection is implemented to detect intersection of the paths with obstacles. Our contribution is a novel approach to the problem of trajectory generation that is computationally efficient and offers considerable gain over existing techniques.
Abstract: The six sigma method is a project-driven management approach to improve the organization-s products, services, and processes by continually reducing defects in the organization. Understanding the key features, obstacles, and shortcomings of the six sigma method allows organizations to better support their strategic directions, and increasing needs for coaching, mentoring, and training. It also provides opportunities to better implement six sigma projects. The purpose of this paper is the survey of six sigma process and its impact on the organizational productivity. So I have studied key concepts , problem solving process of six sigmaas well as the survey of important fields such as: DMAIC, six sigma and productivity applied programme, and other advantages of six sigma. In the end of this paper, present research conclusions. (direct and positive relation between six sigma and productivity)
Abstract: Amazing development of the information technology,
communications and internet expansion as well as the requirements
of the city managers to new ideas to run the city and higher
participation of the citizens encourage us to complete the electronic
city as soon as possible. The foundations of this electronic city are in
information technology. People-s participation in metropolitan
management is a crucial topic. Information technology does not
impede this matter. It can ameliorate populace-s participation and
better interactions between the citizens and the city managers.
Citizens can proffer their ideas, beliefs and votes through digital
mass media based upon the internet and computerization plexuses on
the topical matters to receive appropriate replies and services. They
can participate in urban projects by becoming cognizant of the city
views. The most significant challenges are as follows: information
and communicative management, altering citizens- views, as well as
legal and office documents
Electronic city obstacles have been identified in this research. The
required data were forgathered through questionnaires to identify the
barriers from a statistical community comprising specialists and
practitioners of the ministry of information technology and
communication, the municipality information technology
organization.
The conclusions demonstrate that the prioritized electronic city
application barriers in Iran are as follows:
The support quandaries (non-financial ones), behavioral, cultural
and educational plights, the security, legal and license predicaments,
the hardware, orismological and infrastructural curbs, the software
and fiscal problems.
Abstract: Swarm principles are increasingly being used to design controllers for the coordination of multi-robot systems or, in general, multi-agent systems. This paper proposes a two-dimensional Lagrangian swarm model that enables the planar agents, modeled as point masses, to swarm whilst effectively avoiding each other and obstacles in the environment. A novel method, based on an extended Lyapunov approach, is used to construct the model. Importantly, the Lyapunov method ensures a form of practical stability that guarantees an emergent behavior, namely, a cohesive and wellspaced swarm with a constant arrangement of individuals about the swarm centroid. Computer simulations illustrate this basic feature of collective behavior. As an application, we show how multiple planar mobile unicycle-like robots swarm to eventually form patterns in which their velocities and orientations stabilize.
Abstract: Wireless sensor network is formed with the combination of sensor nodes and sink nodes. Recently Wireless sensor network has attracted attention of the research community. The main application of wireless sensor network is security from different attacks both for mass public and military. However securing these networks, by itself is a critical issue due to many constraints like limited energy, computational power and lower memory. Researchers working in this area have proposed a number of security techniques for this purpose. Still, more work needs to be done.In this paper we provide a detailed discussion on security in wireless sensor networks. This paper will help to identify different obstacles and requirements for security of wireless sensor networks as well as highlight weaknesses of existing techniques.
Abstract: This paper presents a robust method to detect obstacles in stereo images using shadow removal technique and color information. Stereo vision based obstacle detection is an algorithm that aims to detect and compute obstacle depth using stereo matching and disparity map. The proposed advanced method is divided into three phases, the first phase is detecting obstacles and removing shadows, the second one is matching and the last phase is depth computing. We propose a robust method for detecting obstacles in stereo images using a shadow removal technique based on color information in HIS space, at the first phase. In this paper we use Normalized Cross Correlation (NCC) function matching with a 5 × 5 window and prepare an empty matching table τ and start growing disparity components by drawing a seed s from S which is computed using canny edge detector, and adding it to τ. In this way we achieve higher performance than the previous works [2,17]. A fast stereo matching algorithm is proposed that visits only a small fraction of disparity space in order to find a semi-dense disparity map. It works by growing from a small set of correspondence seeds. The obstacle identified in phase one which appears in the disparity map of phase two enters to the third phase of depth computing. Finally, experimental results are presented to show the effectiveness of the proposed method.
Abstract: This paper applies fuzzy set theory to evaluate the
service quality of online auction. Service quality is a composition of
various criteria. Among them many intangible attributes are difficult
to measure. This characteristic introduces the obstacles for respondent
in replying to the survey. So as to overcome this problem, we
invite fuzzy set theory into the measurement of performance. By
using AHP in obtaining criteria and TOPSIS in ranking, we found
the most concerned dimension of service quality is Transaction
Safety Mechanism and the least is Charge Item. Regarding to the
most concerned attributes are information security, accuracy and
information.
Abstract: Using activity theory, organisational theory and
didactics as theoretical foundations, a comprehensive model of the
organisational dimensions relevant for learning and knowledge
transfer will be developed. In a second step, a Learning Assessment
Guideline will be elaborated. This guideline will be designed to
permit a targeted analysis of organisations to identify the status quo
in those areas crucial to the implementation of learning and
knowledge transfer. In addition, this self-analysis tool will enable
learning managers to select adequate didactic models for e- and
blended learning. As part of the European Integrated Project
"Process-oriented Learning and Information Exchange" (PROLIX),
this model of organisational prerequisites for learning and knowledge
transfer will be empirically tested in four profit and non-profit
organisations in Great Britain, Germany and France (to be finalized
in autumn 2006). The findings concern not only the capability of the
model of organisational dimensions, but also the predominant
perceptions of and obstacles to learning in organisations.
Abstract: In this paper, we present a novel technique called Self-Learning Expert System (SLES). Unlike Expert System, where there is a need for an expert to impart experiences and knowledge to create the knowledge base, this technique tries to acquire the experience and knowledge automatically. To display this technique at work, a simulation of a mobile robot navigating through an environment with obstacles is employed using visual basic. The mobile robot will move through this area without colliding with any obstacle and save the path that it took. If the mobile robot has to go through a similar environment again, then it will apply this experience to help it move through quicker without having to check for collision.
Abstract: The remote diagnosis and remote medical smoked to
part. In China, in accordance with the requirements of different
applications of remote diagnosis and Relates to the technical
difference, which can be divided into special purpose remote diagnosis
and treatment system, the remote will Referral system, remote medical
consultation system, remote rehabilitation technology and remote
operation technology. In this article, will introduce China for the
special purpose of service remote diagnosis and treatment system and
technology, including: China disabled status and virtual reality
technology; China 's domestic family medical care system and China 's
current situation of the development of telemedicine.
Abstract: Implementing quality assurance in higher education establishments is the main focus of the reform process currently undertaken by the Ministry of Higher Education and Scientific Research in the Kurdistan Region of Iraq. The reform agenda has involved attempts to improve academic quality and management processes in universities, technical institutions and colleges. The central challenge for the reform process is to produce change in higher education in a region where administration is described as centralized and bureaucratic. To make these changes, there should be a well-designed plans and follow up processes in order to monitor progress and develop responses to obstacles. Lack of skills, resources, political dilemmas, poor motivation, and readiness to face the consequences of change are factors which will determine the success of the reform process.
Abstract: E-government projects have potential for greater efficiency and effectiveness of government operations. For this reason, many developing countries governments have invested heavily in this agenda and an increasing number of e-government projects are being implemented. However, there is a lack of clear case material, which describes the potentialities and consequence experienced by organizations trying to manage with this change. The Ministry of State for Administrative Development (MSAD) is the organization responsible for the e-Government program in Egypt since early 2004. This paper presents a case study of the process of admission to public universities and institutions in Egypt which is led by MSAD. Underlining the key benefits resulting from the initiative, explaining the strategies and the development steps used to implement it, and highlighting the main obstacles encountered and how they were overcome will help repeat the experience in other useful e-government projects.
Abstract: Supplier selection is a multi criteria decision-making process that comprises tangible and intangible factors. The majority of previous supplier selection techniques do not consider strategic perspective. Besides, uncertainty is one of the most important obstacles in supplier selection. For the first, time in this paper, the idea of the algorithm " Knapsack " is used to select suppliers Moreover, an attempt has to be made to take the advantage of a simple numerical method for solving model .This is an innovation to resolve any ambiguity in choosing suppliers. This model has been tried in the suppliers selected in a competitive environment and according to all desired standards of quality and quantity to show the efficiency of the model, an industry sample has been uses.
Abstract: Facility location problem involves locating a facility
to optimize some performance measures. Location of a public facility
to serve the community, such as a fire station, significantly affects its
service quality. Main objective in locating a fire station is to
minimize the response time, which is the time duration between
receiving a call and reaching the place of incident. In metropolitan
areas, fire vehicles need to cross highways and other traffic obstacles
through some obstacle-overcoming points which delay the response
time. In this paper, fire station location problem is analyzed.
Simulation models are developed for the location problems which
involve obstacles. Particular case problems are analyzed and the
results are presented.
Abstract: This study aims at investigating factors in research
and development (R&D) growth and exploring the role of R&D
management in enhancing social innovation and productivity
improvement in Iran-s industrial sector. It basically explores the
common types of R&D activities and the industries which benefited
the most from active R&D units in Iran. The researchers generated
qualitative analyses obtained from primary and secondary data.
The primary data have been retrieved through interviews with five
key players (Managing Director, Internal Manager, General Manager,
Executive Manager, and Project Manager) in the industrial sector.
The secondary data acquired from an investigation on Mazandaran, a
province of northern Iran. The findings highlight Iran-s focuses of R
& D on cost reduction and upgrading productivity. Industries that
have benefited the most from active R&D units are metallic,
machinery and equipment design, and automotive.
We rank order the primary effects of R&D on productivity
improvement as follows, industry improvement, economic growth,
using professional human resources, generating productivity and
creativity culture, creating a competitive and innovative environment,
and increasing people-s knowledge.
Generally, low budget dedication and insufficient supply of highly
skilled scientists and engineers are two important obstacles for R&D
in Iran. Whereas, R&D has resulted in improvement in Iranian
society, transfer of contemporary knowledge into the international
market is still lacking.
Abstract: In this paper, we propose the pre-processor based on
the Evidence Supporting Measure of Similarity (ESMS) filter and also
propose the unified fusion approach (UFA) based on the general
fusion machine coupled with ESMS filter, which improve the
correctness and precision of information fusion in any fields of
application. Here we mainly apply the new approach to Simultaneous
Localization And Mapping (SLAM) of Pioneer II mobile robots. A
simulation experiment was performed, where an autonomous virtual
mobile robot with sonar sensors evolves in a virtual world map with
obstacles. By comparing the result of building map according to the
general fusion machine (here DSmT-based fusing machine and
PCR5-based conflict redistributor considereded) coupling with ESMS
filter and without ESMS filter, it shows the benefit of the selection of
the sources as a prerequisite for improvement of the information
fusion, and also testifies the superiority of the UFA in dealing with
SLAM.
Abstract: This paper explores gender related barriers to interagency collaboration in statutory children safeguard partnerships against a theoretical framework that considers individuals, professions and organisations interacting as part of a complex adaptive system. We argue that gender-framed obstacles to effective communication between culturally discrepant agencies can ultimately impact on the effectiveness of policy delivery,. We focused our research on three partnership structures in Sefton Metropolitan Borough in order to observe how interactions occur, whether the agencies involved perceive their occupational environment as being gender affected and whether they believe this can hinder effective collaboration with other biased organisations. Our principal empirical findings indicate that there is a general awareness amongst professionals of the role that gender plays in each of the agencies reviewed, that gender may well constitute a barrier to effective communication, but there is a sense in which there is little scope for change in the short term. We aim to signal here, however, the need to change against the risk of service failure.
Abstract: This paper simulates the ad-hoc mesh network in rural areas, where such networks receive great attention due to their cost, since installing the infrastructure for regular networks in these areas is not possible due to the high cost. The distance between the communicating nodes is the most obstacles that the ad-hoc mesh network will face. For example, in Terranet technology, two nodes can communicate if they are only one kilometer far from each other. However, if the distance between them is more than one kilometer, then each node in the ad-hoc mesh networks has to act as a router that forwards the data it receives to other nodes. In this paper, we try to find the critical number of nodes which makes the network fully connected in a particular area, and then propose a method to enhance the intermediate node to accept to be a router to forward the data from the sender to the receiver. Much work was done on technological changes on peer to peer networks, but the focus of this paper will be on another feature which is to find the minimum number of nodes needed for a particular area to be fully connected and then to enhance the users to switch on their phones and accept to work as a router for other nodes. Our method raises the successful calls to 81.5% out of 100% attempt calls.