Abstract: The importance of low power consumption is widely
acknowledged due to the increasing use of portable devices, which
require minimizing the consumption of energy. Energy dissipation is
heavily dependent on the software used in the system. Applying
design patterns in object-oriented designs is a common practice
nowadays. In this paper we analyze six design patterns and explore
the effect of them on energy consumption and performance.
Abstract: The utility of expert system generators has been
widely recognized in many applications. Several generators based on
concept of the paradigm object, have been recently proposed. The
generator of oriented object expert system (GSEOO) offers
languages that are often complex and difficult to use. We propose in
this paper an extension of the expert system generator, JESS, which
permits a friendly use of this expert system. The new tool, called
VISUAL JESS, bring two main improvements to JESS. The first
improvement concerns the easiness of its utilization while giving
back transparency to the syntax and semantic aspects of the JESS
programming language. The second improvement permits an easy
access and modification of the JESS knowledge basis. The
implementation of VISUAL JESS is made so that it is extensible and
portable.
Abstract: This paper presents a system for tracking the movement of laparoscopic instruments which is based on an orthogonal system of webcams and video image processing. The movements are captured with two webcams placed orthogonally inside of the physical trainer. On the image, the instruments were detected by using color markers placed on the distal tip of each instrument. The 3D position of the tip of the instrument within the work space was obtained by linear triangulation method. Preliminary results showed linearity and repeatability in the motion tracking with a resolution of 0.616 mm in each axis; the accuracy of the system showed a 3D instrument positioning error of 1.009 ± 0.101 mm. This tool is a portable and low-cost alternative to traditional tracking devices and a trustable method for the objective evaluation of the surgeon’s surgical skills.
Abstract: In this paper we develop and analyze the model for
the spread of Leptospirosis by age group in Thailand, between 1997
and 2010 by using mathematical modeling and computer simulation.
Leptospirosis is caused by pathogenic spirochetes of the genus
Leptospira. It is a zoonotic disease of global importance and an
emerging health problem in Thailand. In Thailand, leptospirosis is a
reportable disease, the top three age groups are 23.31% in 35-44
years olds group, 22.76% in 25-34 year olds group, 17.60% in 45-54
year olds group from reported leptospirosis between 1997 and 2010,
with a peak in 35-44 year olds group. Our paper, the Leptosipirosis
transmission by age group in Thailand is studied on the mathematical
model. Some analytical and simulation results are presented.
Abstract: A portable sensor for the analysis of phosphate in
aqueous samples has been developed. The sensor incorporates
microfluidic technology, colorimetric detection, and wireless
communications into a compact and rugged portable device. The
detection method used is the molybdenum yellow method, in which a
phosphate-containing sample is mixed with a reagent containing
ammonium metavanadate and ammonium molybdate in an acidic
medium. A yellow-coloured compound is generated and the
absorption of this compound is measured using a light emitting diode
(LED) light source and a photodiode detector. The absorption is
directly proportional to the phosphate concentration in the original
sample. In this paper we describe the application of this phosphate
sensor to the analysis of wastewater at a municipal wastewater
treatment plant in Co. Kildare, Ireland.
Abstract: Nowadays, the rapid development of multimedia
and internet allows for wide distribution of digital media data.
It becomes much easier to edit, modify and duplicate digital
information Besides that, digital documents are also easy to
copy and distribute, therefore it will be faced by many
threatens. It-s a big security and privacy issue with the large
flood of information and the development of the digital
format, it become necessary to find appropriate protection
because of the significance, accuracy and sensitivity of the
information. Nowadays protection system classified with more
specific as hiding information, encryption information, and
combination between hiding and encryption to increase information
security, the strength of the information hiding science is due to the
non-existence of standard algorithms to be used in hiding secret
messages. Also there is randomness in hiding methods such as
combining several media (covers) with different methods to pass a
secret message. In addition, there are no formal methods to be
followed to discover the hidden data. For this reason, the task of this
research becomes difficult. In this paper, a new system of information
hiding is presented. The proposed system aim to hidden information
(data file) in any execution file (EXE) and to detect the hidden file
and we will see implementation of steganography system which
embeds information in an execution file. (EXE) files have been
investigated. The system tries to find a solution to the size of the
cover file and making it undetectable by anti-virus software. The
system includes two main functions; first is the hiding of the
information in a Portable Executable File (EXE), through the
execution of four process (specify the cover file, specify the
information file, encryption of the information, and hiding the
information) and the second function is the extraction of the hiding
information through three process (specify the steno file, extract the
information, and decryption of the information). The system has
achieved the main goals, such as make the relation of the size of the
cover file and the size of information independent and the result file
does not make any conflict with anti-virus software.
Abstract: IETF RFC 2002 originally introduced the wireless
Mobile-IP protocol to support portable IP addresses for mobile
devices that often change their network access points to the Internet.
The inefficiency of this protocol mainly within the handoff
management produces large end-to-end packet delays, during
registration process, and further degrades the system efficiency due to
packet losses between subnets. The criterion to initiate a simple and
fast full-duplex connection between the home agent and foreign
agent, to reduce the roaming duration, is a very important issue to be
considered by a work in this paper. State-transition Petri-Nets of the
modeling scenario-based CIA: communication inter-agents procedure
as an extension to the basic Mobile-IP registration process was
designed and manipulated. The heuristic of configuration file during
practical Setup session for registration parameters, on Cisco platform
Router-1760 using IOS 12.3 (15)T is created. Finally, stand-alone
performance simulations results from Simulink Matlab, within each
subnet and also between subnets, are illustrated for reporting better
end-to-end packet delays. Results verified the effectiveness of our
Mathcad analytical manipulation and experimental implementation. It
showed lower values of end-to-end packet delay for Mobile-IP using
CIA procedure. Furthermore, it reported packets flow between
subnets to improve packet losses between subnets.
Abstract: Computation of facility location problem for every
location in the country is not easy simultaneously. Solving the
problem is described by using cluster computing. A technique is to
design parallel algorithm by using local search with single swap
method in order to solve that problem on clusters. Parallel
implementation is done by the use of portable parallel programming,
Message Passing Interface (MPI), on Microsoft Windows Compute
Cluster. In this paper, it presents the algorithm that used local search
with single swap method and implementation of the system of a
facility to be opened by using MPI on cluster. If large datasets are
considered, the process of calculating a reasonable cost for a facility
becomes time consuming. The result shows parallel computation of
facility location problem on cluster speedups and scales well as
problem size increases.
Abstract: Computers are being integrated in the various aspects
of human every day life in different shapes and abilities. This fact
has intensified a requirement for the software development
technologies which is ability to be: 1) portable, 2) adaptable, and 3)
simple to develop. This problem is also known as the Pervasive
Computing Problem (PCP) which can be implemented in different
ways, each has its own pros and cons and Context Oriented
Programming (COP) is one of the methods to address the PCP.
In this paper a design for a COP framework, a context aware
framework, is presented which has eliminated weak points of a
previous design based on interpreter languages, while introducing the
compiler languages power in implementing these frameworks.
The key point of this improvement is combining COP and
Dependency Injection (DI) techniques. Both old and new frameworks
are analyzed to show advantages and disadvantages. Finally a
simulation of both designs is proposed to indicating that the practical
results agree with the theoretical analysis while the new design runs
almost 8 times faster.