Abstract: Mobile Ad hoc network consists of a set of mobile
nodes. It is a dynamic network which does not have fixed topology.
This network does not have any infrastructure or central
administration, hence it is called infrastructure-less network. The
change in topology makes the route from source to destination as
dynamic fixed and changes with respect to time. The nature of
network requires the algorithm to perform route discovery, maintain
route and detect failure along the path between two nodes [1]. This
paper presents the enhancements of ARA [2] to improve the
performance of routing algorithm. ARA [2] finds route between
nodes in mobile ad-hoc network. The algorithm is on-demand source
initiated routing algorithm. This is based on the principles of swarm
intelligence. The algorithm is adaptive, scalable and favors load
balancing. The improvements suggested in this paper are handling of
loss ants and resource reservation.
Abstract: In unsupervised segmentation context, we propose a bi-dimensional hidden Markov chain model (X,Y) that we adapt to the image segmentation problem. The bi-dimensional observed process Y = (Y 1, Y 2) is such that Y 1 represents the noisy image and Y 2 represents a noisy supplementary information on the image, for example a noisy proportion of pixels of the same type in a neighborhood of the current pixel. The proposed model can be seen as a competitive alternative to the Hilbert-Peano scan. We propose a bayesian algorithm to estimate parameters of the considered model. The performance of this algorithm is globally favorable, compared to the bi-dimensional EM algorithm through numerical and visual data.
Abstract: We discuss a theoretical conceptual framework to help
understand how the new business analytics technologies have
diffused in firms. We draw on three theoretical perspectives for this
purpose. They are innovation diffusion theory, IT Business Value
and the technology-organization-environment theory. We develop a
conceptual framework that helps understand the interlinkages among
factors affecting diffusion of business analytics and its impact on
performance.
Abstract: This paper proposes a synchronized random switching frequency pulse width modulation (SRSFPWM). In this technique, the clock signal is used to control the random noise frequency which is produced by the feedback voltage of a hysteresis circuit. These make the triangular carrier frequency equaling to the random noise frequency in each switching period with the symmetrical positive and negative slopes of triangular carrier. Therefore, there is no error voltage in PWM signal. The PSpice simulated results shown the proposed technique improved the performance in case of low frequency harmonics of PWM signal comparing with conventional random switching frequency PWM.
Abstract: This paper discusses coordinated reactive power -
voltage (Q-V) control in a multi machine steam power plant. The
drawbacks of manual Q-V control are briefly listed, and the design
requirements for coordinated Q-V controller are specified.
Theoretical background and mathematical model of the new
controller are presented next followed by validation of developed
Matlab/Simulink model through comparison with recorded
responses in real steam power plant and description of practical
realisation of the controller. Finally, the performance of
commissioned controller is illustrated on several examples of
coordinated Q-V control in real steam power plant and compared
with manual control.
Abstract: There are multiple reasons to expect that detecting the
word order errors in a text will be a difficult problem, and detection
rates reported in the literature are in fact low. Although grammatical
rules constructed by computer linguists improve the performance of
grammar checker in word order diagnosis, the repairing task is still
very difficult. This paper presents an approach for repairing word
order errors in English text by reordering words in a sentence and
choosing the version that maximizes the number of trigram hits
according to a language model. The novelty of this method concerns
the use of an efficient confusion matrix technique for reordering the
words. The comparative advantage of this method is that works with
a large set of words, and avoids the laborious and costly process of
collecting word order errors for creating error patterns.
Abstract: In open settings, the participants in virtual
organization are autonomous and there is no central authority to
ensure the felicity of their interactions. When agents interact in such
settings, each relies upon being able to model the trustworthiness of
the agents with whom it interacts. Fundamentally, such models must
consider the past behavior of the other parties in order to predict their
future behavior. Further, it is sensible for the agents to share
information via referrals to trustworthy agents. In this article, trust is
a bet on the future contingent actions of others" and enumerates six
major factors supporting it: (1) reputation, (2) performance, (3)
appearance, (4) accountability, (5) precommitment, and (6)
contextual facilitation.
Abstract: During the past decade, pond aeration systems have
been developed which will sustain large quantities of fish and
invertebrate biomass. Dissolved Oxygen (DO) is considered to be
among the most important water quality parameters in fish culture.
Fishponds in aquaculture farms are usually located in remote areas
where grid lines are at far distance. Aeration of ponds is required to
prevent mortality and to intensify production, especially when
feeding is practical, and in warm regions. To increase pond
production it is necessary to control dissolved oxygen. Artificial
intelligence (AI) techniques are becoming useful as alternate
approaches to conventional techniques or as components of
integrated systems. They have been used to solve complicated
practical problems in various areas and are becoming more and more
popular nowadays. This paper presents a new design of diffused
aeration system using fuel cell as a power source. Also fuzzy logic
control Technique (FLC) is used for controlling the speed of air flow
rate from the blower to air piping connected to the pond by adjusting
blower speed. MATLAB SIMULINK results show high performance
of fuzzy logic control (FLC).
Abstract: This work deals with the initial applications and formulation of an anisotropic plastic-damage constitutive model proposed for non-linear analysis of reinforced concrete structures submitted to a loading with change of the sign. The original constitutive model is based on the fundamental hypothesis of energy equivalence between real and continuous medium following the concepts of the Continuum Damage Mechanics. The concrete is assumed as an initial elastic isotropic medium presenting anisotropy, permanent strains and bimodularity (distinct elastic responses whether traction or compression stress states prevail) induced by damage evolution. In order to take into account the bimodularity, two damage tensors governing the rigidity in tension or compression regimes are introduced. Then, some conditions are introduced in the original version of the model in order to simulate the damage unilateral effect. The three-dimensional version of the proposed model is analyzed in order to validate its formulation when compared to micromechanical theory. The one-dimensional version of the model is applied in the analyses of a reinforced concrete beam submitted to a loading with change of the sign. Despite the parametric identification problems, the initial applications show the good performance of the model.
Abstract: This article is investigating Boria which is a kind of common performance in Malaysia. Boria has been known as Boria and Borea and both are correct, but Boria is more common. Boria is a folk performance unique to Penang. This theatre style reached Penang in the mid-19th century and is believed to be derived from the Shia Islamic Passion play performed during the Muslim month of Muharram to commemorate the martyrs of Kerbela. These days in Malaysia (especially Penang) Boria mentions to a choral street performance performed annually by a number of groups composed mostly of Sunni Malaysian. Boria are performed for entertainment and often include an annual singing competition. The size, membership, themes and movements of each Boria troupe may vary from year to year. Similarly, the themes and contents of the Boria performed by the different troupes also changes each year and can have a comical, political or satirical notion. It is common to most groups during the first ten days of Muharram Boria generally is done.
Abstract: For the characterization of the weld defect region in the radiographic image, looking for features which are invariant regarding the geometrical transformations (rotation, translation and scaling) proves to be necessary because the same defect can be seen from several angles according to the orientation and the distance from the welded framework to the radiation source. Thus, panoply of geometrical attributes satisfying the above conditions is proposed and which result from the calculation of the geometrical parameters (surface, perimeter, etc.) on the one hand and the calculation of the different order moments, on the other hand. Because the large range in values of the raw features and taking into account other considerations imposed by some classifiers, the scaling of these values to lie between 0 and 1 is indispensable. The principal component analysis technique is used in order to reduce the number of the attribute variables in the aim to give better performance to the further defect classification.
Abstract: Dual motor drives fed by single inverter is
purposely designed to reduced size and cost with respect to
single motor drives fed by single inverter. Previous researches
on dual motor drives only focus on the modulation and the
averaging techniques. Only a few of them, study the
performance of the drives based on different speed controller
other than Proportional and Integrator (PI) controller. This
paper presents a detailed comparative study on fuzzy rule-base
in Fuzzy Logic speed Controller (FLC) for Dual Permanent
Magnet Synchronous Motor (PMSM) drives. Two fuzzy speed
controllers which are standard and simplified fuzzy speed
controllers are designed and the results are compared and
evaluated. The standard fuzzy controller consists of 49 rules
while the proposed controller consists of 9 rules determined by
selecting the most dominant rules only. Both designs are
compared for wide range of speed and the robustness of both
controllers over load disturbance changes is tested to
demonstrate the effectiveness of the simplified/reduced rulebase.
Abstract: In the present work, we have developed a symmetric electrochemical capacitor based on the nanostructured iron oxide (Fe3O4)-activated carbon (AC) nanocomposite materials. The physical properties of the nanocomposites were characterized by Scanning Electron Microscopy (SEM) and Brunauer-Emmett-Teller (BET) analysis. The electrochemical performances of the composite electrode in 1.0 M Na2SO3 and 1.0 M Na2SO4 aqueous solutions were evaluated using cyclic voltammetry (CV) and electrochemical impedance spectroscopy (EIS). The composite electrode with 4 wt% of iron oxide nanomaterials exhibits the highest capacitance of 86 F/g. The experimental results clearly indicate that the incorporation of iron oxide nanomaterials at low concentration to the composite can improve the capacitive performance, mainly attributed to the contribution of the pseudocapacitance charge storage mechanism and the enhancement on the effective surface area of the electrode. Nevertheless, there is an optimum threshold on the amount of iron oxide that needs to be incorporated into the composite system. When this optimum threshold is exceeded, the capacitive performance of the electrode starts to deteriorate, as a result of the undesired particle aggregation, which is clearly indicated in the SEM analysis. The electrochemical performance of the composite electrode is found to be superior when Na2SO3 is used as the electrolyte, if compared to the Na2SO4 solution. It is believed that Fe3O4 nanoparticles can provide favourable surface adsorption sites for sulphite (SO3 2-) anions which act as catalysts for subsequent redox and intercalation reactions.
Abstract: UML is a collection of notations for capturing a software system specification. These notations have a specific syntax defined by the Object Management Group (OMG), but many of their constructs only present informal semantics. They are primarily graphical, with textual annotation. The inadequacies of standard UML as a vehicle for complete specification and implementation of real-time embedded systems has led to a variety of competing and complementary proposals. The Real-time UML profile (UML-RT), developed and standardized by OMG, defines a unified framework to express the time, scheduling and performance aspects of a system. We present in this paper a framework approach aimed at deriving a complete specification of a real-time system. Therefore, we combine two methods, a semiformal one, UML-RT, which allows the visual modeling of a realtime system and a formal one, CSP+T, which is a design language including the specification of real-time requirements. As to show the applicability of the approach, a correct design of a real-time system with hard real time constraints by applying a set of mapping rules is obtained.
Abstract: Main goal of preventive healthcare problems are at
decreasing the likelihood and severity of potentially life-threatening
illnesses by protection and early detection. The levels of
establishment and staffing costs along with summation of the travel
and waiting time that clients spent are considered as objectives
functions of the proposed nonlinear integer programming model. In
this paper, we have proposed a bi-objective mathematical model for
designing a network of preventive healthcare facilities so as to
minimize aforementioned objectives, simultaneously. Moreover, each
facility acts as M/M/1 queuing system. The number of facilities to be
established, the location of each facility, and the level of technology
for each facility to be chosen are provided as the main determinants
of a healthcare facility network. Finally, to demonstrate performance
of the proposed model, four multi-objective decision making
techniques are presented to solve the model.
Abstract: The security of computer networks plays a strategic
role in modern computer systems. Intrusion Detection Systems (IDS)
act as the 'second line of defense' placed inside a protected
network, looking for known or potential threats in network traffic
and/or audit data recorded by hosts. We developed an Intrusion
Detection System using LAMSTAR neural network to learn patterns
of normal and intrusive activities, to classify observed system
activities and compared the performance of LAMSTAR IDS with
other classification techniques using 5 classes of KDDCup99 data.
LAMSAR IDS gives better performance at the cost of high
Computational complexity, Training time and Testing time, when
compared to other classification techniques (Binary Tree classifier,
RBF classifier, Gaussian Mixture classifier). we further reduced the
Computational Complexity of LAMSTAR IDS by reducing the
dimension of the data using principal component analysis which in
turn reduces the training and testing time with almost the same
performance.
Abstract: This paper in essence presents comparative
experimental data on the mechanical performance of steel and
synthetic fibre-reinforced concrete under compression, tensile split
and flexure. URW1050 steel fibre and HPP45 synthetic fibre, both
with the same concrete design mix, have been used to make cube
specimens for a compression test, cylinders for a tensile split test and
beam specimens for a flexural test. The experimental data
demonstrated steel fibre reinforced concrete to be stronger in flexure
at early stages, whilst both fibre reinforced concrete types displayed
comparatively the same performance in compression, tensile splitting
and 28-day flexural strength. In terms of post-crack controlHPP45
was preferable.
Abstract: As many scientific applications require large data processing, the importance of parallel I/O has been increasingly recognized. Collective I/O is one of the considerable features of parallel I/O and enables application programmers to easily handle their large data volume. In this paper we measured and analyzed the performance of original collective I/O and the subgroup method, the way of using collective I/O of MPI effectively. From the experimental results, we found that the subgroup method showed good performance with small data size.
Abstract: In this experiment, we investigated the performance of
two types of heat sink, swaged- and extruded-type, used in the inverter
of industrial electricity generator. The swaged-type heat sink has 62
fins, and the extruded-type has 38 fins having the same dimension as
that of the swaged-type. But the extruded-type heat sink maintains the
same heat transfer area by the laterally waved surface which has 1 mm
in radius. As a result, the swaged- and extruded-type heat sinks
released 71% and 64% of the heat incoming to the heat sink,
respectively. The other incoming heat were naturally convected and
radiated to the ambient. In spite of 40% decrease in number of fins, the
heat release performance of the extruded-type heat sink was lowered
only 7% than that of the swaged-type. We believe that, this shows the
increment of effective heat transfer area by the laterally waved surface
of fins and the better heat transfer property of the extruded-type heat
sink.
Abstract: Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia signals but very few works have discussed on the issues responsible for secure data communication and its robustness improvement. The current paper has critically analyzed few such factors namely properties of spreading codes, proper signal decomposition suitable for data embedding, security provided by the key, successive bit cancellation method applied at decoder which have greater impact on the detection reliability, secure communication of significant signal under camouflage of insignificant signals etc. Based on the analysis, robust SS watermarking scheme for secure data communication is proposed in wavelet domain and improvement in secure communication and robustness performance is reported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data.