Abstract: Unified Modeling language (UML) is one of the
important modeling languages used for the visual representation of
the research problem. In the present paper, UML model is designed
for the Instruction pipeline which is used for the evaluation of the
instructions of software programs. The class and sequence diagrams
are designed & performance is evaluated for instructions of a sample
program through a case study.
Abstract: Fundamental sensor-motor couplings form the backbone
of most mobile robot control tasks, and often need to be implemented
fast, efficiently and nevertheless reliably. Machine learning
techniques are therefore often used to obtain the desired sensor-motor
competences.
In this paper we present an alternative to established machine
learning methods such as artificial neural networks, that is very fast,
easy to implement, and has the distinct advantage that it generates
transparent, analysable sensor-motor couplings: system identification
through nonlinear polynomial mapping.
This work, which is part of the RobotMODIC project at the
universities of Essex and Sheffield, aims to develop a theoretical understanding
of the interaction between the robot and its environment.
One of the purposes of this research is to enable the principled design
of robot control programs.
As a first step towards this aim we model the behaviour of the
robot, as this emerges from its interaction with the environment, with
the NARMAX modelling method (Nonlinear, Auto-Regressive, Moving
Average models with eXogenous inputs). This method produces
explicit polynomial functions that can be subsequently analysed using
established mathematical methods.
In this paper we demonstrate the fidelity of the obtained NARMAX
models in the challenging task of robot route learning; we present a
set of experiments in which a Magellan Pro mobile robot was taught
to follow four different routes, always using the same mechanism to
obtain the required control law.
Abstract: Knowledge bases are basic components of expert
systems or intelligent computational programs. Knowledge bases
provide knowledge, events that serve deduction activity,
computation and control. Therefore, researching and developing of
models for knowledge representation play an important role in
computer science, especially in Artificial Intelligence Science and
intelligent educational software. In this paper, the extensive
deduction computational model is proposed to design knowledge
bases whose attributes are able to be real values or functional values.
The system can also solve problems based on knowledge bases.
Moreover, the models and algorithms are applied to produce the
educational software for solving alternating current problems or
solving set of equations automatically.
Abstract: Negation is useful in the majority of the real world applications. However, its introduction leads to semantic and canonical problems. We propose in this paper an approach based on stratification to deal with negation problems. This approach is based on an extension of predicates nets. It is characterized with two main contributions. The first concerns the management of the whole class of stratified programs. The second contribution is related to usual operations optimizations on stratified programs (maximal stratification, incremental updates ...).
Abstract: This paper describes the design and results of FROID,
an outbound intrusion detection system built with agent technology
and supported by an attacker-centric ontology. The prototype
features a misuse-based detection mechanism that identifies remote
attack tools in execution. Misuse signatures composed of attributes
selected through entropy analysis of outgoing traffic streams and
process runtime data are derived from execution variants of attack
programs. The core of the architecture is a mesh of self-contained
detection cells organized non-hierarchically that group agents in a
functional fashion. The experiments show performance gains when
the ontology is enabled as well as an increase in accuracy achieved
when correlation cells combine detection evidence received from
independent detection cells.
Abstract: The Knowledge Management (KM) Criteria is an
essential foundation to evaluate KM outcomes. Different sets of
criteria were developed and tailored by many researchers to
determine the results of KM initiatives. However, literature review
has emphasized on incomplete set of criteria for evaluating KM
outcomes. Hence, this paper tried to address the problem of
determining the criteria for measuring knowledge management
outcomes among different types of Malaysian organizations.
Successively, this paper was assumed to develop widely accepted
criteria to measure success of knowledge management efforts for
Malaysian organizations. Our analysis approach was based on the
ANOVA procedure to compare a set of criteria among different types
of organizations. This set of criteria was exploited from literature
review. It is hoped that this study provides a better picture for
different types of Malaysian organizations to establish a
comprehensive set of criteria due to measure results of KM programs.
Abstract: OpenMP is an API for parallel programming model of shared memory multiprocessors. Novice OpenMP programmers often produce the code that compiler cannot find human errors. It was investigated how compiler coped with the common mistakes that can occur in OpenMP code. The latest version(4.4.3) of GCC is used for this research. It was found that GCC compiled the codes without any errors or warnings. In this paper the programming aid tool is presented for OpenMP programs. It can check 12 common mistakes that novice programmer can commit during the programming of OpenMP. It was demonstrated that the programming aid tool can detect the various common mistakes that GCC failed to detect.
Abstract: The nonlinear chaotic non-autonomous fourth order
system is algebraically simple but can generate complex chaotic
attractors. In this paper, non-autonomous fourth order chaotic
oscillator circuits were designed and simulated. Also chaotic nonautonomous
Attractor is addressed suitable for chaotic masking
communication circuits using Matlab® and MultiSIM® programs.
We have demonstrated in simulations that chaos can be synchronized
and applied to signal masking communications. We suggest that this
phenomenon of chaos synchronism may serve as the basis for little
known chaotic non-autonomous Attractor to achieve signal masking
communication applications. Simulation results are used to visualize
and illustrate the effectiveness of non-autonomous chaotic system in
signal masking. All simulations results performed on nonautonomous
chaotic system are verify the applicable of secure
communication.
Abstract: In general, small-scale vegetables farmers experience
problems in improving the safety and quality of vegetables supplied
to high-class consumers in modern retailers. They also lack of
information to access market. The farmers group and/or cooperative
(FGC) should be able to assist its members by providing training in
handling and packing vegetables and enhancing marketing
capabilities to sell commodities to the modern retailers. This study
proposes an agri-food supply chain (ASC) model that involves the
corporate social responsibility (CSR) activities to cultivate the
capabilities of farmers to access market. Multi period ASC model is
formulated as Weighted Goal Programming (WGP) to analyze the
impacts of CSR programs to empower the FGCs in managing the
small-scale vegetables farmers. The results show that the proposed
model can be used to determine the priority of programs in order to
maximize the four goals to be achieved in the CSR programs.
Abstract: A physically based, spatially-distributed water quality model is being developed to simulate spatial and temporal distributions of material transport in the Great Lakes Watersheds of the U.S. Multiple databases of meteorology, land use, topography, hydrography, soils, agricultural statistics, and water quality were used to estimate nonpoint source loading potential in the study watersheds. Animal manure production was computed from tabulations of animals by zip code area for the census years of 1987, 1992, 1997, and 2002. Relative chemical loadings for agricultural land use were calculated from fertilizer and pesticide estimates by crop for the same periods. Comparison of these estimates to the monitored total phosphorous load indicates that both point and nonpoint sources are major contributors to the total nutrient loads in the study watersheds, with nonpoint sources being the largest contributor, particularly in the rural watersheds. These estimates are used as the input to the distributed water quality model for simulating pollutant transport through surface and subsurface processes to Great Lakes waters. Visualization and GIS interfaces are developed to visualize the spatial and temporal distribution of the pollutant transport in support of water management programs.
Abstract: Among many agro- based cottage industries in India
sericulture has been promoted as an agro-based, labor intensive, rural
oriented cottage industry, providing gainful employment mainly to
the weaker and marginalized section of the society specially tribal.
Sericulture occupies the place of pride in the rural economy can be
practiced even with very low land holding, low gestation, high
returns make sericulture an ideal program, requiring little capital
investment. In 2010-2011 the employment in sericulture sector was
72.5 lakh persons. The involvement of landless rural people in tasar
sericulture is because they understood its potential for rural and tribal
upliftment. This article demonstrates that certain developmental
initiatives have been playing an important role in the socio-economic
progress of tribal masses in Raigarh district and explains the
increased returns from sericulture as a result of development
programs. The study concludes with some suggestions to improve the
long term feasibility of sericulture.
Abstract: In this study, how affects the narrative of Positive
Psychothreapy which is named “The Three Small Gold Statues "the
adloescent-s perception is investigated The sample included 90
adolescents who were high school students. Firstly the narrative was
read. Then three questions which were about the narrative were
asked. The questions were: What kind of things did you recall what
kind of results did you conculde, and also how could you use this
narrative in your real life problems. Responds were analyzed by
content analysis method. According to research findings the narrative
had a great effect for adolescent perceptions, and also the tale could
be used at school counselling programs.
Abstract: A learning management system (commonly
abbreviated as LMS) is a software application for the administration,
documentation, tracking, and reporting of training programs,
classroom and online events, e-learning programs, and training
content (Ellis 2009). (Hall 2003) defines an LMS as \"software that
automates the administration of training events. All Learning
Management Systems manage the log-in of registered users, manage
course catalogs, record data from learners, and provide reports to
management\". Evidence of the worldwide spread of e-learning in
recent years is easy to obtain. In April 2003, no fewer than 66,000
fully online courses and 1,200 complete online programs were listed
on the TeleCampus portal from TeleEducation (Paulsen 2003). In the
report \" The US market in the Self-paced eLearning Products and
Services:2010-2015 Forecast and Analysis\" The number of student
taken classes exclusively online will be nearly equal (1% less) to the
number taken classes exclusively in physical campuses. Number of
student taken online course will increase from 1.37 million in 2010 to
3.86 million in 2015 in USA. In another report by The Sloan
Consortium three-quarters of institutions report that the economic
downturn has increased demand for online courses and programs.
Abstract: The symmetric solution set Σ sym is the set of all solutions to the linear systems Ax = b, where A is symmetric and lies between some given bounds A and A, and b lies between b and b. We present a contractor for Σ sym, which is an iterative method that starts with some initial enclosure of Σ sym (by means of a cartesian product of intervals) and sequentially makes the enclosure tighter. Our contractor is based on polyhedral approximation and solving a series of linear programs. Even though it does not converge to the optimal bounds in general, it may significantly reduce the overestimation. The efficiency is discussed by a number of numerical experiments.
Abstract: Negation is useful in the majority of the real world applications. However, its introduction leads to semantic and canonical problems. SEPN nets are well adapted extension of predicate nets for the definition and manipulation of stratified programs. This formalism is characterized by two main contributions. The first concerns the management of the whole class of stratified programs. The second contribution is related to usual operations optimization (maximal stratification, incremental updates ...). We propose, in this paper, useful algorithms for manipulating stratified programs using SEPN. These algorithms were implemented and validated with STRPRO tool.
Abstract: In recent years, there has been an increasing interest
toward the use of bovine genotyped embryos for commercial embryo
transfer programs. Biopsy of a few cells in morulla stage is essential
for preimplantation genetic diagnosis (PGD). Low amount of DNA
have limited performing the several molecular analyses within PGD
analyses. Whole genome amplification (WGA) promises to eliminate
this problem. We evaluated the possibility and performance of an
improved primer extension preamplification (I-PEP) method with a
range of starting bovine genomic DNA from 1-8 cells into the WGA
reaction. We optimized a short and simple I-PEP (ssI-PEP) procedure
(~3h). This optimized WGA method was assessed by 6 loci specific
polymerase chain reactions (PCRs), included restriction fragments
length polymorphism (RFLP). Optimized WGA procedure possesses
enough sensitivity for molecular genetic analyses through the few
input cells. This is a new era for generating characterized bovine
embryos in preimplantation stage.
Abstract: This article concerns the presentation of an integrated
method for detection of steganographic content embedded by new
unknown programs. The method is based on data mining and
aggregated hypothesis testing. The article contains the theoretical
basics used to deploy the proposed detection system and the
description of improvement proposed for the basic system idea.
Further main results of experiments and implementation details are
collected and described. Finally example results of the tests are
presented.
Abstract: Productivity has been one of the major concerns with the increasingly high cost of software development. Choosing the right development language with high productivity is one approach to reduce development costs. Working on the large database with 4106 projects ever developed, we found the factors significant to productivity. After the removal of the effects of other factors on productivity, we compare the productivity differences of the ten general development programs. The study supports the fact that fourth-generation languages are more productive than thirdgeneration languages.
Abstract: One major difficulty that faces developers of
concurrent and distributed software is analysis for concurrency based
faults like deadlocks. Petri nets are used extensively in the
verification of correctness of concurrent programs. ECATNets are a
category of algebraic Petri nets based on a sound combination of
algebraic abstract types and high-level Petri nets. ECATNets have
'sound' and 'complete' semantics because of their integration in
rewriting logic and its programming language Maude. Rewriting
logic is considered as one of very powerful logics in terms of
description, verification and programming of concurrent systems We
proposed previously a method for translating Ada-95 tasking
programs to ECATNets formalism (Ada-ECATNet) and we showed
that ECATNets formalism provides a more compact translation for
Ada programs compared to the other approaches based on simple
Petri nets or Colored Petri nets. We showed also previously how the
ECATNet formalism offers to Ada many validation and verification
tools like simulation, Model Checking, accessibility analysis and
static analysis. In this paper, we describe the implementation of our
translation of the Ada programs into ECATNets.
Abstract: There are some existing Java benchmarks, application benchmarks as well as micro benchmarks or mixture both of them,such as: Java Grande, Spec98, CaffeMark, HBech, etc. But none of them deal with behaviors of multi tasks operating systems. As a result, the achieved outputs are not satisfied for performance evaluation engineers. Behaviors of multi tasks operating systems are based on a schedule management which is employed in these systems. Different processes can have different priority to share the same resources. The time is measured by estimating from applications started to it is finished does not reflect the real time value which the system need for running those programs. New approach to this problem should be done. Having said that, in this paper we present a new Java benchmark, named FHOJ benchmark, which directly deals with multi tasks behaviors of a system. Our study shows that in some cases, results from FHOJ benchmark are far more reliable in comparison with some existing Java benchmarks.