Abstract: With the rapid popularization of internet services, it is apparent that the next generation terrestrial communication systems must be capable of supporting various applications like voice, video, and data. This paper presents the performance evaluation of turbo- coded mobile terrestrial communication systems, which are capable of providing high quality services for delay sensitive (voice or video) and delay tolerant (text transmission) multimedia applications in urban and suburban areas. Different types of multimedia information require different service qualities, which are generally expressed in terms of a maximum acceptable bit-error-rate (BER) and maximum tolerable latency. The breakthrough discovery of turbo codes allows us to significantly reduce the probability of bit errors with feasible latency. In a turbo-coded system, a trade-off between latency and BER results from the choice of convolutional component codes, interleaver type and size, decoding algorithm, and the number of decoding iterations. This trade-off can be exploited for multimedia applications by using optimal and suboptimal performance parameter amalgamations to achieve different service qualities. The results are therefore proposing an adaptive framework for turbo-coded wireless multimedia communications which incorporate a set of performance parameters that achieve an appropriate set of service qualities, depending on the application's requirements.
Abstract: High Voltage (HV) transmission lines are widely
spread around residential places. They take all forms of shapes:
concrete, steel, and timber poles. Earth grid always form part of the
HV transmission structure, whereat soil resistivity value is one of the
main inputs when it comes to determining the earth grid
requirements. In this paper, the soil structure and its implication on
the electrode resistance of HV transmission poles will be explored. In
Addition, this paper will present simulation for various soil structures
using IEEE and Australian standards to verify the computation with
CDEGS software. Furthermore, the split factor behavior under
different soil resistivity structure will be presented using CDEGS
simulations.
Abstract: Today, computer systems are more and more complex and support growing security risks. The security managers need to find effective security risk assessment methodologies that allow modeling well the increasing complexity of current computer systems but also maintaining low the complexity of the assessment procedure. This paper provides a brief analysis of common security risk assessment methodologies leading to the selection of a proper methodology to fulfill these requirements. Then, a detailed analysis of the most effective methodology is accomplished, presenting numerical examples to demonstrate how easy it is to use.
Abstract: Logistics is part of the supply chain processes that
plans, implements, and controls the efficient and effective forward
and reverse flow and storage of goods, services, and related
information between the point of origin and the point of consumption
in order to meet customer requirements. This research aims to
investigate the current status and future direction of the use of
Information Technology (IT) for logistics, focusing on Supply Chain
Management (SCM) and E-Commerce adoption in Malaysia.
Therefore, this research stresses on the type of technology being
adopted, factors, benefits and barriers affecting the innovation in
SCM and E-Commerce technology adoption among Logistics
Service Providers (LSP). A mailed questionnaire survey was
conducted to collect data from 265 logistics companies in Johor. The
research revealed a high level of SCM technology adoption among
LSP as they had adopted SCM technology in various business
processes while they perceived a high level of benefits from SCM
adoption.
Abstract: IEEE 802.11e is the enhanced version of the IEEE
802.11 MAC dedicated to provide Quality of Service of wireless
network. It supports QoS by the service differentiation and
prioritization mechanism. Data traffic receives different priority
based on QoS requirements. Fundamentally, applications are divided
into four Access Categories (AC). Each AC has its own buffer queue
and behaves as an independent backoff entity. Every frame with a
specific priority of data traffic is assigned to one of these access
categories. IEEE 802.11e EDCA (Enhanced Distributed Channel
Access) is designed to enhance the IEEE 802.11 DCF (Distributed
Coordination Function) mechanisms by providing a distributed
access method that can support service differentiation among
different classes of traffic. Performance of IEEE 802.11e MAC layer
with different ACs is evaluated to understand the actual benefits
deriving from the MAC enhancements.
Abstract: Sensors have been used in various kinds of academic
fields and applications. In this article, we propose the idea of
modularized sensors that combine multiple sensor modules into a
unique sensor. We divide a sensor into several units according to
functionalities. Each unit has different sensor modules, which share
the same type of connectors and can be serially and arbitrarily
connected each other. A user can combine different sensor modules
into a sensor platform according to requirements. Compared with
current modularized sensors, the proposed sensor platform is highly
flexible and reusable. We have implemented the prototype of the
proposed sensor platform, and the experimental results show the
proposed platform can work correctly.
Abstract: Clustering algorithms are attractive for the task of class identification in spatial databases. However, the application to large spatial databases rises the following requirements for clustering algorithms: minimal requirements of domain knowledge to determine the input parameters, discovery of clusters with arbitrary shape and good efficiency on large databases. The well-known clustering algorithms offer no solution to the combination of these requirements. In this paper, a density based clustering algorithm (DCBRD) is presented, relying on a knowledge acquired from the data by dividing the data space into overlapped regions. The proposed algorithm discovers arbitrary shaped clusters, requires no input parameters and uses the same definitions of DBSCAN algorithm. We performed an experimental evaluation of the effectiveness and efficiency of it, and compared this results with that of DBSCAN. The results of our experiments demonstrate that the proposed algorithm is significantly efficient in discovering clusters of arbitrary shape and size.
Abstract: The software system goes through a number of stages
during its life and a software process model gives a standard format
for planning, organizing and running a project. The article presents a
new software development process model named as “Divide and
Conquer Process Model", based on the idea first it divides the things
to make them simple and then gathered them to get the whole work
done. The article begins with the backgrounds of different software
process models and problems in these models. This is followed by a
new divide and conquer process model, explanation of its different
stages and at the end edge over other models is shown.
Abstract: This article presents a resistorless current-mode firstorder allpass filter based on second generation current controlled current conveyors (CCCIIs). The features of the circuit are that: the pole frequency can be electronically controlled via the input bias current: the circuit description is very simple, consisting of 2 CCCIIs and single grounded capacitor, without any external resistors and component matching requirements. Consequently, the proposed circuit is very appropriate to further develop into an integrated circuit. Low input and high output impedances of the proposed configuration enable the circuit to be cascaded in current-mode without additional current buffers. The PSpice simulation results are depicted. The given results agree well with the theoretical anticipation. The application example as a current-mode quadrature oscillator is included.
Abstract: In this work a new platform for mobile-health systems is
presented. System target application is providing decision support to
rescue corps or military medical personnel in combat areas. Software
architecture relies on a distributed client-server system that manages a
wireless ad-hoc networks hierarchy in which several different types of
client operate. Each client is characterized for different hardware and
software requirements. Lower hierarchy levels rely in a network of
completely custom devices that store clinical information and patient
status and are designed to form an ad-hoc network operating in the
2.4 GHz ISM band and complying with the IEEE 802.15.4 standard
(ZigBee). Medical personnel may interact with such devices, that are
called MICs (Medical Information Carriers), by means of a PDA
(Personal Digital Assistant) or a MDA (Medical Digital Assistant),
and transmit the information stored in their local databases as well as
issue a service request to the upper hierarchy levels by using IEEE
802.11 a/b/g standard (WiFi). The server acts as a repository that
stores both medical evacuation forms and associated events (e.g., a
teleconsulting request). All the actors participating in the diagnostic
or evacuation process may access asynchronously to such repository
and update its content or generate new events. The designed system
pretends to optimise and improve information spreading and flow
among all the system components with the aim of improving both
diagnostic quality and evacuation process.
Abstract: The term interactive education indicates the meaning
related with multidisciplinary aspects of distance education following
contemporary means around a common basis with different
functional requirements. The aim of this paper is to reflect the new
techniques in education with the new methods and inventions. These
methods are better supplied by interactivity. The integration of
interactive facilities in the discipline of education with distance
learning is not a new concept but in addition the usage of these
methods on design issue is newly being adapted to design education.
In this paper the general approach of this method and after the
analysis of different samples, the advantages and disadvantages of
these approaches are being identified. The method of this paper is to
evaluate the related samples and then analyzing the main hypothesis.
The main focus is to mention the formation processes of this
education. Technological developments in education should be
filtered around the necessities of the design education and the
structure of the system could then be formed or renewed. The
conclusion indicates that interactive methods of education in design
issue is a meaning capturing not only technical and computational
intelligence aspects but also aesthetical and artistic approaches
coming together around the same purpose.
Abstract: With the advent of social web initiatives, some argued
that these new emerging tools might be useful in tacit knowledge
sharing through providing interactive and collaborative technologies.
However, there is still a poverty of literature to understand how and
what might be the contributions of social media in facilitating tacit
knowledge sharing. Therefore, this paper is intended to theoretically
investigate and map social media concepts and characteristics with
tacit knowledge creation and sharing requirements. By conducting a
systematic literature review, five major requirements found that need
to be present in an environment that involves tacit knowledge
sharing. These requirements have been analyzed against social media
concepts and characteristics to see how they map together. The
results showed that social media have abilities to comply some of the
main requirements of tacit knowledge sharing. The relationships have
been illustrated in a conceptual framework, suggesting further
empirical studies to acknowledge findings of this study.
Abstract: A laboratory set-up was designed to survey the
effectiveness of UV/O3 advanced oxidation process (AOP) for the
removal of Carbaryl from polluted water in batch reactor. The study
was carried out by UV/O3 process for water samples containing 1 to
20 mg/L of Carbaryl in distilled water. Also the range of drinking
water resources adjusted in synthetic water and effects of contact
time, pH and Carbaryl concentration were studied. The residual
pesticide concentration was determined by applying high
performance liquid chromatography (HPLC). The results indicated
that increasing of retention time and pH, enhances pesticide removal
efficiency. The removal efficiency has been affected by pesticide
initial concentration. Samples with low pesticide concentration
showed a remarkable removal efficiency compared to the samples
with high pesticide concentration. AOP method showed the removal
efficiencies of 80% to 100%. Although process showed high
performance for removal of pesticide from water samples, this
process has different disadvantages including complication,
intolerability, difficulty of maintenance and equipmental and
structural requirements.
Abstract: As communications systems and technology become more advanced and complex, it will be increasingly important to focus on users- individual needs. Personalization and effective user profile management will be necessary to ensure the uptake and success of new services and devices and it is therefore important to focus on the users- requirements in this area and define solutions that meet these requirements. The work on personalization and user profiles emerged from earlier ETSI work on a Universal Communications Identifier (UCI) which is a unique identifier of the user rather than a range of identifiers of the many of communication devices or services (e.g. numbers of fixed phone at home/work, mobile phones, fax and email addresses). This paper describes work on personalization including standardized information and preferences and an architectural framework providing a description of how personalization can be integrated in Next Generation Networks, together with the UCI concept.
Abstract: Image data holds a large amount of different context
information. However, as of today, these resources remain largely
untouched. It is thus the aim of this paper to present a basic technical
framework which allows for a quick and easy exploitation of context
information from image data especially by non-expert users.
Furthermore, the proposed framework is discussed in detail
concerning important social and ethical issues which demand special
requirements in system design. Finally, a first sensor prototype is
presented which meets the identified requirements. Additionally,
necessary implications for the software and hardware design of the
system are discussed, rendering a sensor system which could be
regarded as a good, acceptable and justifiable technical and thereby
enabling the extraction of context information from image data.
Abstract: The increasing complexity of software development based on peer to peer networks makes necessary the creation of new frameworks in order to simplify the developer-s task. Additionally, some applications, e.g. fire detection or security alarms may require real-time constraints and the high level definition of these features eases the application development. In this paper, a service model based on a component model with real-time features is proposed. The high-level model will abstract developers from implementation tasks, such as discovery, communication, security or real-time requirements. The model is oriented to deploy services on small mobile devices, such as sensors, mobile phones and PDAs, where the computation is light-weight. Services can be composed among them by means of the port concept to form complex ad-hoc systems and their implementation is carried out using a component language called UM-RTCOM. In order to apply our proposals a fire detection application is described.
Abstract: High speed networks provide realtime variable bit rate
service with diversified traffic flow characteristics and quality
requirements. The variable bit rate traffic has stringent delay and
packet loss requirements. The burstiness of the correlated traffic
makes dynamic buffer management highly desirable to satisfy the
Quality of Service (QoS) requirements. This paper presents an
algorithm for optimization of adaptive buffer allocation scheme for
traffic based on loss of consecutive packets in data-stream and buffer
occupancy level. Buffer is designed to allow the input traffic to be
partitioned into different priority classes and based on the input
traffic behavior it controls the threshold dynamically. This algorithm
allows input packets to enter into buffer if its occupancy level is less
than the threshold value for priority of that packet. The threshold is
dynamically varied in runtime based on packet loss behavior. The
simulation is run for two priority classes of the input traffic –
realtime and non-realtime classes. The simulation results show that
Adaptive Partial Buffer Sharing (ADPBS) has better performance
than Static Partial Buffer Sharing (SPBS) and First In First Out
(FIFO) queue under the same traffic conditions.
Abstract: Generally, administrative systems in an academic
environment are disjoint and support independent queries. The
objective in this work is to semantically connect these independent
systems to provide support to queries run on the integrated platform.
The proposed framework, by enriching educational material in the
legacy systems, provides a value-added semantics layer where
activities such as annotation, query and reasoning can be carried out
to support management requirements. We discuss the development of
this ontology framework with a case study of UAE University
program administration to show how semantic web technologies can
be used by administration to develop student profiles for better
academic program management.
Abstract: With the increasing complexity of engineering
problems, the traditional, single-objective and deterministic
optimization method can not meet people-s requirements. A
multi-objective fuzzy optimization model of resource input is built for
M chlor-alkali chemical eco-industrial park in this paper. First, the
model is changed into the form that can be solved by genetic algorithm
using fuzzy theory. And then, a fitness function is constructed for
genetic algorithm. Finally, a numerical example is presented to show
that the method compared with traditional single-objective
optimization method is more practical and efficient.
Abstract: The current study describes a multi-objective optimization technique for positioning of houses in a residential neighborhood. The main task is the placement of residential houses in a favorable configuration satisfying a number of objectives. Solving the house layout problem is a challenging task. It requires an iterative approach to satisfy design requirements (e.g. energy efficiency, skyview, daylight, roads network, visual privacy, and clear access to favorite views). These design requirements vary from one project to another based on location and client preferences. In the Gulf region, the most important socio-cultural factor is the visual privacy in indoor space. Hence, most of the residential houses in this region are surrounded by high fences to provide privacy, which has a direct impact on other requirements (e.g. daylight and direction to favorite views). This investigation introduces a novel technique to optimally locate and orient residential buildings to satisfy a set of design requirements. The developed technique explores the search space for possible solutions. This study considers two dimensional house planning problems. However, it can be extended to solve three dimensional cases.