Abstract: Quality of Service (QoS) Routing aims to find path between source and destination satisfying the QoS requirements which efficiently using the network resources and underlying routing algorithm and to fmd low-cost paths that satisfy given QoS constraints. One of the key issues in providing end-to-end QoS guarantees in packet networks is determining feasible path that satisfies a number of QoS constraints. We present a Optimized Multi- Constrained Routing (OMCR) algorithm for the computation of constrained paths for QoS routing in computer networks. OMCR applies distance vector to construct a shortest path for each destination with reference to a given optimization metric, from which a set of feasible paths are derived at each node. OMCR is able to fmd feasible paths as well as optimize the utilization of network resources. OMCR operates with the hop-by-hop, connectionless routing model in IP Internet and does not create any loops while fmding the feasible paths. Nodes running OMCR not necessarily maintaining global view of network state such as topology, resource information and routing updates are sent only to neighboring nodes whereas its counterpart link-state routing method depend on complete network state for constrained path computation and that incurs excessive communication overhead.
Abstract: As the enormous amount of on-line text grows on the
World-Wide Web, the development of methods for automatically
summarizing this text becomes more important. The primary goal of
this research is to create an efficient tool that is able to summarize
large documents automatically. We propose an Evolving
connectionist System that is adaptive, incremental learning and
knowledge representation system that evolves its structure and
functionality. In this paper, we propose a novel approach for Part of
Speech disambiguation using a recurrent neural network, a paradigm
capable of dealing with sequential data. We observed that
connectionist approach to text summarization has a natural way of
learning grammatical structures through experience. Experimental
results show that our approach achieves acceptable performance.
Abstract: Ontology is widely being used as a tool for organizing
information, creating the relation between the subjects within the
defined knowledge domain area. Various fields such as Civil,
Biology, and Management have successful integrated ontology in
decision support systems for managing domain knowledge and to
assist their decision makers. Gross pollutant traps (GPT) are devices
used in trapping and preventing large items or hazardous particles in
polluting and entering our waterways. However choosing and
determining GPT is a challenge in Malaysia as there are inadequate
GPT data repositories being captured and shared. Hence ontology is
needed to capture, organize and represent this knowledge into
meaningful information which can be contributed to the efficiency of
GPT selection in Malaysia urbanization. A GPT Ontology framework
is therefore built as the first step to capture GPT knowledge which
will then be integrated into the decision support system. This paper
will provide several examples of the GPT ontology, and explain how
it is constructed by using the Protégé tool.
Abstract: XML has become a popular standard for information exchange via web. Each XML document can be presented as a rooted, ordered, labeled tree. The Node label shows the exact position of a node in the original document. Region and Dewey encoding are two famous methods of labeling trees. In this paper, we propose a new insert friendly labeling method named IFDewey based on recently proposed scheme, called Extended Dewey. In Extended Dewey many labels must be modified when a new node is inserted into the XML tree. Our method eliminates this problem by reserving even numbers for future insertion. Numbers generated by Extended Dewey may be even or odd. IFDewey modifies Extended Dewey so that only odd numbers are generated and even numbers can then be used for a much easier insertion of nodes.
Abstract: We present a simplified equalization technique for a
π/4 differential quadrature phase shift keying ( π/4 -DQPSK) modulated
signal in a multipath fading environment. The proposed equalizer is
realized as a fractionally spaced adaptive decision feedback equalizer
(FS-ADFE), employing exponential step-size least mean square
(LMS) algorithm as the adaptation technique. The main advantage of
the scheme stems from the usage of exponential step-size LMS algorithm
in the equalizer, which achieves similar convergence behavior
as that of a recursive least squares (RLS) algorithm with significantly
reduced computational complexity. To investigate the finite-precision
performance of the proposed equalizer along with the π/4 -DQPSK
modem, the entire system is evaluated on a 16-bit fixed point digital
signal processor (DSP) environment. The proposed scheme is found
to be attractive even for those cases where equalization is to be
performed within a restricted number of training samples.
Abstract: Nowadays, the plant location selection has a critical
impact on the performance of numerous companies. In this paper, a
methodology is presented to solve this problem. The three decision
making methods, namely Delphi, AHP and improved VIKOR, are
hybridized in order to make the best use of information available
based on the decision makers or experts. In this respect, the aim of
using Delphi is to select the most influential criteria by a few decision
makers. The AHP is utilized to give weights of the selected criteria.
Finally, the improved VIKOR method is applied to rank alternatives.
At the end of paper, an application example demonstrates the
applicability of the proposed methodology.
Abstract: This paper examines the implementation of RC5 block cipher for digital images along with its detailed security analysis. A complete specification for the method of application of the RC5 block cipher to digital images is given. The security analysis of RC5 block cipher for digital images against entropy attack, bruteforce, statistical, and differential attacks is explored from strict cryptographic viewpoint. Experiments and results verify and prove that RC5 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC5 block cipher algorithm.
Abstract: A new technique to quantify the differential mode
delay (DMD) in multimode fiber (MMF) is been presented. The
technique measures DMD based on angular launch and
measurements of the difference in modal delay using variable
apertures at the fiber face. The result of the angular spatial filtering
revealed less excitation of higher order modes when the laser beam is
filtered at higher angles. This result would indicate that DMD
profiles would experience a data pattern dependency.
Abstract: The use of externally bonded Carbon Fiber
Reinforced Polymer (CFRP) reinforcement has proven to be an
effective technique to strengthen steel structures. An experimental
study on CFRP bonded steel plate with double strap joint has been
conducted and specimens are tested under tensile loadings. An
empirical model has been developed using stress-based approach to
predict ultimate capacity of the CFRP bonded steel structure. The
results from the model are comparable with the experimental result
with a reasonable accuracy.
Abstract: It is necessary to incorporate technological advances
achieved in the field of engineering into dentistry in order to enhance
the process of diagnosis, treatment planning and enable the doctors to
render better treatment to their patients. To achieve this ultimate goal
long distance collaborations are often necessary. This paper discusses
the various collaborative tools and their applications to solve a few
burning problems confronted by the dentists. Customization is often
the solution to most of the problems. But rapid designing,
development and cost effective manufacturing is a difficult task to
achieve. This problem can be solved using the technique of digital
manufacturing. Cases from 6 major branches of dentistry have been
discussed and possible solutions with the help of state of art
technology using rapid digital manufacturing have been proposed in
the present paper. The paper also entails the usage of existing tools in
collaborative and digital manufacturing area.
Abstract: The purpose of this paper is to describe the process of
setting up a learning community within an elementary school in
Ontario, Canada. The description is provided through reflection and
examination of field notes taken during the yearlong training and
implementation process. Specifically the impact of teachers- capacity
on the creation of a learning community was of interest. This paper is
intended to inform and add to the debate around the tensions that
exist in implementing a bottom-up professional development model
like the learning community in a top-down organizational structure.
My reflections of the process illustrate that implementation of the
learning community professional development model may be
difficult and yet transformative in the professional lives of the
teachers, students, and administration involved in the change process.
I conclude by suggesting the need for a new model of professional
development that requires a transformative shift in power dynamics
and a shift in the view of what constitutes effective professional
learning.
Abstract: Using plug flow model in conjunction with
experimental solute concentration profiles, overall volumetric mass
transfer coefficient based on continuous phase (Koca), in a packed
liquid-liquid extraction column has been optimized. Number of 12
experiments has been done using standard system of water/acid
acetic/toluene in a 6 cm diameter, 120 cm height column. Thorough
consideration of influencing parameters we intended to correlate
dimensionless parameters in term of overall Sherwood number which
has an acceptable average error of about 15.8%.
Abstract: For the characterization of the weld defect region in the radiographic image, looking for features which are invariant regarding the geometrical transformations (rotation, translation and scaling) proves to be necessary because the same defect can be seen from several angles according to the orientation and the distance from the welded framework to the radiation source. Thus, panoply of geometrical attributes satisfying the above conditions is proposed and which result from the calculation of the geometrical parameters (surface, perimeter, etc.) on the one hand and the calculation of the different order moments, on the other hand. Because the large range in values of the raw features and taking into account other considerations imposed by some classifiers, the scaling of these values to lie between 0 and 1 is indispensable. The principal component analysis technique is used in order to reduce the number of the attribute variables in the aim to give better performance to the further defect classification.
Abstract: A computationally simple approach of model order
reduction for single input single output (SISO) and linear timeinvariant
discrete systems modeled in frequency domain is proposed
in this paper. Denominator of the reduced order model is determined
using fuzzy C-means clustering while the numerator parameters are
found by matching time moments and Markov parameters of high
order system.
Abstract: The security of computer networks plays a strategic
role in modern computer systems. Intrusion Detection Systems (IDS)
act as the 'second line of defense' placed inside a protected
network, looking for known or potential threats in network traffic
and/or audit data recorded by hosts. We developed an Intrusion
Detection System using LAMSTAR neural network to learn patterns
of normal and intrusive activities, to classify observed system
activities and compared the performance of LAMSTAR IDS with
other classification techniques using 5 classes of KDDCup99 data.
LAMSAR IDS gives better performance at the cost of high
Computational complexity, Training time and Testing time, when
compared to other classification techniques (Binary Tree classifier,
RBF classifier, Gaussian Mixture classifier). we further reduced the
Computational Complexity of LAMSTAR IDS by reducing the
dimension of the data using principal component analysis which in
turn reduces the training and testing time with almost the same
performance.
Abstract: Many recent electrophysiological studies have
revealed the importance of investigating meditation state in order to
achieve an increased understanding of autonomous control of
cardiovascular functions. In this paper, we characterize heart rate
variability (HRV) time series acquired during meditation using
nonlinear dynamical parameters. We have computed minimum
embedding dimension (MED), correlation dimension (CD), largest
Lyapunov exponent (LLE), and nonlinearity scores (NLS) from HRV
time series of eight Chi and four Kundalini meditation practitioners.
The pre-meditation state has been used as a baseline (control) state to
compare the estimated parameters. The chaotic nature of HRV during
both pre-meditation and meditation is confirmed by MED. The
meditation state showed a significant decrease in the value of CD and
increase in the value of LLE of HRV, in comparison with premeditation
state, indicating a less complex and less predictable nature
of HRV. In addition, it was shown that the HRV of meditation state
is having highest NLS than pre-meditation state. The study indicated
highly nonlinear dynamic nature of cardiac states as revealed by
HRV during meditation state, rather considering it as a quiescent
state.
Abstract: The theoretical investigation is carried out to describe
the effect of increase of pressure waves amplitude in clean and bubbly liquid. The goal of the work is to capture the regime of multiple magnification of acoustic and shock waves in the liquid,
which enables to get appropriate conditions to enlarge collapses of
micro-bubbles. The influence of boundary conditions and frequency
of the governing acoustic field is studied for the case of the
cylindrical acoustic resonator. It has been observed the formation of
standing waves with large amplitude at resonant frequencies. The
interaction of the compression wave with gas and vapor bubbles is
investigated for the convergent channel. It is shown theoretically that
the chemical reactions, which occur inside gas bubbles, provide additional impulse to the wave, that affect strongly on the collapses
of the vapor bubbles
Abstract: High strength concrete (HSC) provides high strength
but lower ductility than normal strength concrete. This low ductility
limits the benefit of using HSC in building safe structures. On the
other hand, when designing reinforced concrete beams, designers
have to limit the amount of tensile reinforcement to prevent the
brittle failure of concrete. Therefore the full potential of the use of
steel reinforcement can not be achieved. This paper presents the idea
of confining concrete in the compression zone so that the HSC will
be in a state of triaxial compression, which leads to improvements in
strength and ductility. Five beams made of HSC were cast and tested.
The cross section of the beams was 200×300 mm, with a length of 4
m and a clear span of 3.6 m subjected to four-point loading, with
emphasis placed on the midspan deflection. The first beam served as
a reference beam. The remaining beams had different tensile
reinforcement and the confinement shapes were changed to gauge
their effectiveness in improving the strength and ductility of the
beams. The compressive strength of the concrete was 85 MPa and the
tensile strength of the steel was 500 MPa and for the stirrups and
helixes was 250 MPa. Results of testing the five beams proved that
placing helixes with different diameters as a variable parameter in the
compression zone of reinforced concrete beams improve their
strength and ductility.
Abstract: Digital watermarking is a way to provide the facility of secure multimedia data communication besides its copyright protection approach. The Spread Spectrum modulation principle is widely used in digital watermarking to satisfy the robustness of multimedia signals against various signal-processing operations. Several SS watermarking algorithms have been proposed for multimedia signals but very few works have discussed on the issues responsible for secure data communication and its robustness improvement. The current paper has critically analyzed few such factors namely properties of spreading codes, proper signal decomposition suitable for data embedding, security provided by the key, successive bit cancellation method applied at decoder which have greater impact on the detection reliability, secure communication of significant signal under camouflage of insignificant signals etc. Based on the analysis, robust SS watermarking scheme for secure data communication is proposed in wavelet domain and improvement in secure communication and robustness performance is reported through experimental results. The reported result also shows improvement in visual and statistical invisibility of the hidden data.
Abstract: The performance of mortar subjected to high
temperature and cooled in normal ambient temperature was examined
in the laboratory to comply with the situation of burning & cooling of
a structure. Four series of cubical (5 X 5 X 5 cm) mortar specimens
were made from OPC, and partial replacement (10, 15, 20, 25 &
30%) of OPC by Rice Husk Ash (RHA) produced in the uncontrolled
environment. These specimens were heated in electric furnace to 200,
300, 400, 500 and 7000C. The specimens were kept in normal room
temperature for cooling. They were then tested for mechanical
properties and the results shows that particular 20% RHA mixed
mortar shows better fire performance.