Abstract: Devices in a pervasive computing system (PCS) are characterized by their context-awareness. It permits them to provide proactively adapted services to the user and applications. To do so, context must be well understood and modeled in an appropriate form which enhance its sharing between devices and provide a high level of abstraction. The most interesting methods for modeling context are those based on ontology however the majority of the proposed methods fail in proposing a generic ontology for context which limit their usability and keep them specific to a particular domain. The adaptation task must be done automatically and without an explicit intervention of the user. Devices of a PCS must acquire some intelligence which permits them to sense the current context and trigger the appropriate service or provide a service in a better suitable form. In this paper we will propose a generic service ontology for context modeling and a context-aware service adaptation based on a service oriented definition of context.
Abstract: Brushless DC motor with high torque density and slim
topology for easy loading for robot system is proposed and
manufactured. Electromagnetic design is executed by equivalent
magnetic circuit model and numerical analysis. Manufactured motor is
tested and verified characteristics comparing with conventional BLDC
motor.
Abstract: This study presents design of a carbon silicon electrode
for iontophorsis treatment towards alopecia. The alopecia is a medical
description means loss of hair from the body. For solving this problem,
the drug need to be delivered into the scalp, therefore, the
iontophoresis was chosen to use in this treatment. However, almost
common electrodes of iontophoresis device are made with metal
material, the electrodes could give patients hurt when they using it, and
it is hard to avoid the hair for attaching the hair. For this reason, an
electrode is made with silicon material to decrease the hurt from the
electrodes, and the carbon material is mixed in it for increasing
conductance. The several cones with stainless material on the
electrode make the electrode is able to void hair to attach the affected
part. According to the results of a vivo-experiment, the carbon silicon
electrode showed a good performance and in treatment comfortably.
Abstract: This paper presents results of an experimental study performed to investigate effect of incorporating silica fume on physico-mechanical properties and durability of resulting fly ash geopolymers. Geopolymer specimens were prepared by activating fly ash incorporated with additional silica fume in the range of 2.5% to 5%, with a mixture of sodium hydroxide and sodium silicate solution having Na2O content of 8%. For studying durability, 10% magnesium sulphate solution was used to immerse the specimens up to a period of 15 weeks during which visual observation, weight changes and strength changes were monitored regularly. Addition of silica fume lowers performance of geopolymer pastes. However, in mortars, addition of silica fume significantly enhanced physico-mechanical properties and durability.
Abstract: A packet analyzer is a tool for debugging sensor
network systems and is convenient for developers. In this paper, we
introduce a new packet analyzer based on an embedded system. The
proposed packet analyzer is compatible with IEEE 802.15.4, which is
suitable for the wireless communication standard for sensor networks,
and is available for remote control by adopting a server-client scheme
based on the Ethernet interface. To confirm the operations of the
packet analyzer, we have developed two types of sensor nodes based
on PIC4620 and ATmega128L microprocessors and tested the
functions of the proposed packet analyzer by obtaining the packets
from the sensor nodes.
Abstract: In this paper we propose a simple adaptive algorithm
iteratively solving the unit-norm constrained optimization problem.
Instead of conventional parameter norm based normalization,
the proposed algorithm incorporates scalar normalization which is
computationally much simpler. The analysis of stationary point is
presented to show that the proposed algorithm indeed solves the
constrained optimization problem. The simulation results illustrate
that the proposed algorithm performs as good as conventional ones
while being computationally simpler.
Abstract: With a rapid growth in 3D graphics technology over the last few years, people are desired to see more flexible reacting motions of a biped in animations. In particular, it is impossible to anticipate all reacting motions of a biped while facing a perturbation. In this paper, we propose a three-level tracking method for animating a 3D humanoid character. First, we take the laws of physics into account to attach physical attributes, such as mass, gravity, friction, collision, contact, and torque, to bones and joints of a character. The next step is to employ PD controller to follow a reference motion as closely as possible. Once the character cannot tolerate a strong perturbation to prevent itself from falling down, we are capable of tracking a desirable falling-down action to avoid any falling condition inaccuracy. From the experimental results, we demonstrate the effectiveness and flexibility of the proposed method in comparison with conventional data-driven approaches.
Abstract: This paper examines the available experiment data for a copper bromide vapor laser (CuBr laser), emitting at two wavelengths - 510.6 and 578.2nm. Laser output power is estimated based on 10 independent input physical parameters. A classification and regression tree (CART) model is obtained which describes 97% of data. The resulting binary CART tree specifies which input parameters influence considerably each of the classification groups. This allows for a technical assessment that indicates which of these are the most significant for the manufacture and operation of the type of laser under consideration. The predicted values of the laser output power are also obtained depending on classification. This aids the design and development processes considerably.
Abstract: This paper presents a comparative study on dry and wet grinding through experimental investigation in the grinding of CSM glass fibre reinforced polymer laminates using a pink aluminium oxide wheel. Different sets of experiments were performed to study the effects of the independent grinding parameters such as grinding wheel speed, feed and depth of cut on dependent performance criteria such as cutting forces and surface finish. Experimental conditions were laid out using design of experiment central composite design. An effective coolant was sought in this study to minimise cutting forces and surface roughness for GFRP laminates grinding. Test results showed that the use of coolants reduces surface roughness, although not necessarily the cutting forces. These research findings provide useful economic machining solution in terms of optimized grinding conditions for grinding CSM GFRP.
Abstract: Finding suitable non-supersingular elliptic curves for
pairing-based cryptosystems becomes an important issue for the
modern public-key cryptography after the proposition of id-based
encryption scheme and short signature scheme. In previous work
different algorithms have been proposed for finding such elliptic
curves when embedding degree k ∈ {3, 4, 6} and cofactor h ∈ {1, 2, 3,
4, 5}. In this paper a new method is presented to find more
non-supersingular elliptic curves for pairing-based cryptosystems with
general embedding degree k and large values of cofactor h. In
addition, some effective parameters of these non-supersingular elliptic
curves are provided in this paper.
Abstract: Integrins are a large family of multidomain α/β cell
signaling receptors. Some integrins contain an additional inserted I
domain, whose earliest expression appears to be with the chordates,
since they are observed in the urochordates Ciona intestinalis (vase
tunicate) and Halocynthia roretzi (sea pineapple), but not in integrins
of earlier diverging species. The domain-s presence is viewed as a
hallmark of integrins of higher metazoans, however in vertebrates,
there are clearly three structurally-different classes: integrins without
I domains, and two groups of integrins with I domains but separable
by the presence or absence of an additional αC helix. For example,
the αI domains in collagen-binding integrins from Osteichthyes
(bony fish) and all higher vertebrates contain the specific αC helix,
whereas the αI domains in non-collagen binding integrins from
vertebrates and the αI domains from earlier diverging urochordate
integrins, i.e. tunicates, do not. Unfortunately, within the early
chordates, there is an evolutionary gap due to extinctions between the
tunicates and cartilaginous fish. This, coupled with a knowledge gap
due to the lack of complete genomic data from surviving species,
means that the origin of collagen-binding αC-containing αI domains
remains unknown. Here, we analyzed two available genomes from
Callorhinchus milii (ghost shark/elephant shark; Chondrichthyes –
cartilaginous fish) and Petromyzon marinus (sea lamprey;
Agnathostomata), and several available Expression Sequence Tags
from two Chondrichthyes species: Raja erinacea (little skate) and
Squalus acanthias (dogfish shark); and Eptatretus burgeri (inshore
hagfish; Agnathostomata), which evolutionary reside between the
urochordates and osteichthyes. In P. marinus, we observed several
fragments coding for the αC-containing αI domain, allowing us to
shed more light on the evolution of the collagen-binding integrins.
Abstract: This paper proposed classification models that would
be used as a proxy for hard disk drive (HDD) functional test equitant
which required approximately more than two weeks to perform the
HDD status classification in either “Pass" or “Fail". These models
were constructed by using committee network which consisted of a
number of single neural networks. This paper also included the
method to solve the problem of sparseness data in failed part, which
was called “enforce learning method". Our results reveal that the
constructed classification models with the proposed method could
perform well in the sparse data conditions and thus the models,
which used a few seconds for HDD classification, could be used to
substitute the HDD functional tests.
Abstract: Diesel Engines emit complex mixtures of inorganic
and organic compounds in the form of both solid and vapour phase
particles. Most of the particulates released are ultrafine nanoparticles
which are detrimental to human health and can easily enter the body
by respiration. The emissions standards on particulate matter release
from diesel engines are constantly upgraded within the European
Union and with future regulations based on the particles numbers
released instead of merely mass, the need for effective aftertreatment
devices will increase. Standard particulate filters in the form of wall
flow filters can have problems with high soot accumulation,
producing a large exhaust backpressure. A potential solution would
be to combine the standard filter with a flow through filter to reduce
the load on the wall flow filter. In this paper soot particle trapping has
been simulated in different continuous flow filters of monolithic
structure including the use of promoters, at laminar flow conditions.
An Euler Lagrange model, the discrete phase model in Ansys used
with user defined functions for forces acting on particles. A method
to quickly screen trapping of 5 nm and 10 nm particles in different
catalysts designs with tracers was also developed.
Simulations of square duct monoliths with promoters show that the
strength of the vortices produced are not enough to give a high
amount of particle deposition on the catalyst walls. The smallest
particles in the simulations, 5 and 10 nm particles were trapped to a
higher extent, than larger particles up to 1000 nm, in all studied
geometries with the predominant deposition mechanism being
Brownian diffusion. The comparison of the different filters designed
with a wall flow filter does show that the options for altering a design
of a flow through filter, without imposing a too large pressure drop
penalty are good.
Abstract: An experiment was performed in the south of
Morocco in order to evaluate the effect of deficit irrigation by treated
wastewater on chickpea production. We applied six irrigation
treatments on a local variety of chickpea by supplying alternatively
50 or 100% of ETm in a completely randomized design.
We found a highly significant difference between treatments in
terms of biomass production. Drought stress during the vegetative
period showed highest yield with 6.5 t/ha which was more than the
yield obtained for the control (4.9 t/ha). The optimal crop stage in
which deficit irrigation can be applied is the vegetative growth stage,
as the crop has a chance to develop its root system, to be able to
cover the plant needs for water and nutrient supply during the rest of
cycle, and non stress conditions during the flowering and seed filling
stages allow the plant to optimize its photosynthesis and carbon
translocation, therefore increase its productivity.
Abstract: There are multiple ways to implement a decimator
filter. This paper addresses usage of CIC (cascaded-integrator-comb)
filter and HB (half band) filter as the decimator filter to reduce the
frequency sample rate by factor of 64 and detail of the
implementation step to realize this design in hardware. Low power
design approach for CIC filter and half band filter will be discussed.
The filter design is implemented through MATLAB system
modeling, ASIC (application specific integrated circuit) design flow
and verified using a FPGA (field programmable gate array) board
and MATLAB analysis.
Abstract: At present, dictionary attack has been the basic tool for
recovering key passwords. In order to avoid dictionary attack, users
purposely choose another character strings as passwords. According to
statistics, about 14% of users choose keys on a keyboard (Kkey, for
short) as passwords. This paper develops a framework system to attack
the password chosen from Kkeys and analyzes its efficiency. Within
this system, we build up keyboard rules using the adjacent and parallel
relationship among Kkeys and then use these Kkey rules to generate
password databases by depth-first search method. According to the
experiment results, we find the key space of databases derived from
these Kkey rules that could be far smaller than the password databases
generated within brute-force attack, thus effectively narrowing down
the scope of attack research. Taking one general Kkey rule, the
combinations in all printable characters (94 types) with Kkey adjacent
and parallel relationship, as an example, the derived key space is about
240 smaller than those in brute-force attack. In addition, we
demonstrate the method's practicality and value by successfully
cracking the access password to UNIX and PC using the password
databases created
Abstract: Reducing energy consumption of embedded systems requires careful memory management. It has been shown that Scratch- Pad Memories (SPMs) are low size, low cost, efficient (i.e. energy saving) data structures directly managed at the software level. In this paper, the focus is on heuristic methods for SPMs management. A method is efficient if the number of accesses to SPM is as large as possible and if all available space (i.e. bits) is used. A Tabu Search (TS) approach for memory management is proposed which is, to the best of our knowledge, a new original alternative to the best known existing heuristic (BEH). In fact, experimentations performed on benchmarks show that the Tabu Search method is as efficient as BEH (in terms of energy consumption) but BEH requires a sorting which can be computationally expensive for a large amount of data. TS is easy to implement and since no sorting is necessary, unlike BEH, the corresponding sorting time is saved. In addition to that, in a dynamic perspective where the maximum capacity of the SPM is not known in advance, the TS heuristic will perform better than BEH.
Abstract: In this study, we developed an algorithm for detecting
seam cracks in a steel plate. Seam cracks are generated in the edge
region of a steel plate. We used the Gabor filter and an adaptive double
threshold method to detect them. To reduce the number of pseudo
defects, features based on the shape of seam cracks were used. To
evaluate the performance of the proposed algorithm, we tested 989
images with seam cracks and 9470 defect-free images. Experimental
results show that the proposed algorithm is suitable for detecting seam
cracks. However, it should be improved to increase the true positive
rate.
Abstract: The Internet and the ever growing applications enable
communities to share and collaborate through common platforms.
However, this growing pattern is not witnessed yet even for elearning.
This paper is based on a doctoral research which aimed at
researching the ways students interact in an online campus and the
supports that they look for and require. Content analysis, based on the
Panchoo/Jaillet methodology, was done on four synchronous
meetings between a tutor and his ten students. The UNIV-Rct ecampus,
analogical to a physical campus, was found to be user
friendly and the students enrolled in a master-s course faced no
difficulties in using it. In addition to the environmental aspects, the
pedagogical implementation of the course has driven the students to
interact and collaborate significantly and this has contributed to
overcome the problems faced by the distance learners. This
completely online model was found to be fruitful in helping distant
learners fight their loneliness and brave their difficulties in a socioconstructivism
approach.
Abstract: In recent years, it has been proposed security
architecture for sensor network.[2][4]. One of these, TinySec by Chris
Kalof, Naveen Sastry, David Wagner had proposed Link layer security
architecture, considering some problems of sensor network. (i.e :
energy, bandwidth, computation capability,etc). The TinySec employs
CBC_mode of encryption and CBC-MAC for authentication based on
SkipJack Block Cipher. Currently, This TinySec is incorporated in the
TinyOS for sensor network security.
This paper introduces TinyHash based on general hash algorithm.
TinyHash is the module in order to replace parts of authentication and
integrity in the TinySec. it implies that apply hash algorithm on
TinySec architecture. For compatibility about TinySec, Components
in TinyHash is constructed as similar structure of TinySec. And
TinyHash implements the HMAC component for authentication and
the Digest component for integrity of messages. Additionally, we
define the some interfaces for service associated with hash algorithm.