Abstract: Content-based image retrieval (CBIR) uses the
contents of images to characterize and contact the images. This paper
focus on retrieving the image by separating images into its three color
mechanism R, G and B and for that Discrete Wavelet Transformation
is applied. Then Wavelet based Generalized Gaussian Density (GGD)
is practical which is used for modeling the coefficients from the
wavelet transforms. After that it is agreed to Histogram of Oriented
Gradient (HOG) for extracting its characteristic vectors with Relevant
Feedback technique is used. The performance of this approach is
calculated by exactness and it confirms that this method is wellorganized
for image retrieval.
Abstract: Composite materials, due to their unique properties
such as high strength to weight ratio, corrosion resistance, and impact
resistance have huge potential as structural materials in automotive,
construction and transportation applications. However, these
properties often come at higher cost owing to complex design
methods, difficult manufacturing processes and raw material cost.
Traditionally, tapered laminated composite structures are
manufactured using autoclave manufacturing process by ply drop off
technique. Autoclave manufacturing though very powerful suffers
from high capital investment and higher energy consumption. As per
the current trends in composite manufacturing, Out of Autoclave
(OoA) processes are looked as emerging technologies for
manufacturing the structural composite components for aerospace
and defense applications. However, there is a need for improvement
among these processes to make them reliable and consistent. In this
paper, feasibility of using out of autoclave process to manufacture the
variable thickness cantilever beam is discussed. The minimum weight
design for the composite beam is obtained using constant stress beam
concept by tailoring the thickness of the beam. Ply drop off
techniques was used to fabricate the variable thickness beam from
glass/epoxy prepregs. Experiments were conducted to measure
bending stresses along the span of the cantilever beam at different
intervals by applying the concentrated load at the free end.
Experimental results showed that the stresses in the bean at different
intervals were constant. This proves the ability of OoA process to
manufacture the constant stress beam. Finite element model for the
constant stress beam was developed using commercial finite element
simulation software. It was observed that the simulation results
agreed very well with the experimental results and thus validated
design and manufacturing approach used.
Abstract: It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
Abstract: Batteries of electric vehicles (BEV) are becoming
more attractive with the advancement of new battery technologies
and promotion of electric vehicles. BEV batteries are recharged on
board vehicles using either the grid (G2V for Grid to Vehicle) or
renewable energies in a stand-alone application (H2V for Home to
Vehicle). This paper deals with the modeling, sizing and control of a
photovoltaic stand-alone application that can charge the BEV at
home. The modeling approach and developed mathematical models
describing the system components are detailed. Simulation and
experimental results are presented and commented.
Abstract: Vertical Handover(VHO) among different
communication technologies ensuring uninterruption and service
continuity is one of the most important performance parameter in
Heterogenous networks environment. In an integrated Universal
Mobile Telecommunicatin System(UMTS) and Wireless Local
Area Network(WLAN), WLAN is given an inherent priority over
UMTS because of its high data rates with low cost. Therefore
mobile users want to be associated with WLAN maximum of the
time while roaming, to enjoy best possible services with low cost.
That encourages reduction of number of VHO. In this work the
reduction of number of VHO with respect to varying number of
WLAN Access Points(APs) in an integrated UMTS and WLAN
network is investigated through simulation to provide best possible
cost effective service to the users. The simulation has been carried
out for an area (7800 × 9006)m2 where COST-231 Hata model
and 3GPP (TR 101 112 V 3.1.0) specified models are used for
WLAN and UMTS path loss models respectively. The handover
decision is triggered based on the received signal level as compared
to the fade margin. Fade margin gives a probabilistic measure of
the reliability of the communication link. A relationship between
number of WLAN APs and the number of VHO is also established
in this work.
Abstract: We present a solution to the Maxmin u/E parameters
estimation problem of possibility distributions in m-dimensional
case. Our method is based on geometrical approach, where minimal
area enclosing ellipsoid is constructed around the sample. Also we
demonstrate that one can improve results of well-known algorithms
in fuzzy model identification task using Maxmin u/E parameters
estimation.
Abstract: Wireless mesh networking is rapidly gaining in
popularity with a variety of users: from municipalities to enterprises,
from telecom service providers to public safety and military
organizations. This increasing popularity is based on two basic facts:
ease of deployment and increase in network capacity expressed in
bandwidth per footage; WMNs do not rely on any fixed
infrastructure. Many efforts have been used to maximizing
throughput of the network in a multi-channel multi-radio wireless
mesh network. Current approaches are purely based on either static or
dynamic channel allocation approaches. In this paper, we use a
hybrid multichannel multi radio wireless mesh networking
architecture, where static and dynamic interfaces are built in the
nodes. Dynamic Adaptive Channel Allocation protocol (DACA), it
considers optimization for both throughput and delay in the channel
allocation. The assignment of the channel has been allocated to be codependent
with the routing problem in the wireless mesh network and
that should be based on passage flow on every link. Temporal and
spatial relationship rises to re compute the channel assignment every
time when the pattern changes in mesh network, channel assignment
algorithms assign channels in network. In this paper a computing
path which captures the available path bandwidth is the proposed
information and the proficient routing protocol based on the new path
which provides both static and dynamic links. The consistency
property guarantees that each node makes an appropriate packet
forwarding decision and balancing the control usage of the network,
so that a data packet will traverse through the right path.
Abstract: Worldwide, most PILC MV underground cables in use
are approaching the end of their design life; hence, failures are likely
to increase. This paper studies the electric field and potential
distributions within the PILC insulted cable containing common
void-defect. The finite element model of the performance of the
belted PILC MV underground cable is presented. The variation of the
electric field stress within the cable using the Finite Element Method
(FEM) is concentrated. The effects of the void-defect within the
insulation are given. Outcomes will lead to deeper understanding of
the modeling of Paper Insulated Lead Covered (PILC) and electric
field response of belted PILC insulted cable containing void defect.
Abstract: Karst term is the determiner of a variety of areas or
landforms and unique perspectives that have been formed in result of
the of the ingredients dissolution of rocks constituter by natural
waters. Shiraz area with an area of 5322km2 is located in the simple
folded belt in the southern part of Zagros Mountain of Fars, and is
surrounded with Limestone Mountains (Asmari formation). Shiraz
area is located in Calcareous areas. The infrastructure of this city is
lime and absorbing wells that the city can influence the Limestone
dissolution and those accelerate its rate and increase the cavitation
below the surface. Dasht-e Arjan is a graben, which has been created
as the result of activity of two normal faults in its east and west sides.
It is a complete sample of Karst plains (Polje) which has been created
with the help of tectonic forces (fault) and dissolution process of
water in Asmari limestone formation. It is located 60km. off south
west of Shiraz (on Kazeroon-Shiraz road). In 1971, UNESCO has
recognized this plain as a reserve of biosphere. It is considered as one
of the world’s most beautiful geological phenomena, so that most of
the world’s geologists are interested in visiting this place. The
purpose of this paper is to identify and introduce landscapes of Karst
features shiraz city and Dasht-e Arjan including Karst dissolution
features (Lapiez, Karst springs, dolines, caves, underground caves,
ponors, and Karst valleys), anticlines and synclines, and Arjan Lake.
Abstract: This paper presents the scaling laws that provide the
criteria of geometry and dynamic similitude between the full-size
rotor-shaft system and its scale model, and can be used to predict the
torsional vibration characteristics of the full-size rotor-shaft system by
manipulating the corresponding data of its scale model. The scaling
factors, which play fundamental roles in predicting the geometry and
dynamic relationships between the full-size rotor-shaft system and its
scale model, for torsional free vibration problems between scale and
full-size rotor-shaft systems are firstly obtained from the equation of
motion of torsional free vibration. Then, the scaling factor of external
force (i.e., torque) required for the torsional forced vibration problems
is determined based on the Newton’s second law. Numerical results
show that the torsional free and forced vibration characteristics of a
full-size rotor-shaft system can be accurately predicted from those of
its scale models by using the foregoing scaling factors. For this reason,
it is believed that the presented approach will be significant for
investigating the relevant phenomenon in the scale model tests.
Abstract: Cloud computing (CC) has already gained overall
appreciation in research and practice. Whereas the willingness to
integrate cloud services in various IT environments is still unbroken,
the previous CC procurement processes run mostly in an unorganized
and non-standardized way. In practice, a sufficiently specific, yet
applicable business process for the important acquisition phase is
often lacking. And research does not appropriately remedy this
deficiency yet. Therefore, this paper introduces a field-tested
approach for CC procurement. Based on an extensive literature
review and augmented by expert interviews, we designed a model
that is validated and further refined through an in-depth real-life case
study. For the detailed process description, we apply the event-driven
process chain notation (EPC). The gained valuable insights into the
case study may help CC research to shift to a more socio-technical
area. For practice, next to giving useful organizational instructions
we will provide extended checklists and lessons learned.
Abstract: Locating Radio Controlled (RC) devices using their
unintended emissions has a great interest considering security
concerns. Weak nature of these emissions requires near field
localization approach since it is hard to detect these signals in far
field region of array. Instead of only angle estimation, near field
localization also requires range estimation of the source which makes
this method more complicated than far field models. Challenges of
locating such devices in a near field region and real time environment
are analyzed in this paper. An ESPRIT like near field localization
scheme is utilized for both angle and range estimation. 1-D search
with symmetric subarrays is provided. Two 7 element uniform linear
antenna arrays (ULA) are employed for locating RC source.
Experiment results of location estimation for one unintended emitting
walkie-talkie for different positions are given.
Abstract: Testing the first year students of Informatics at the
University of Debrecen revealed that students start their tertiary
studies in programming with a low level of programming knowledge
and algorithmic skills. The possible reasons which lead the students
to this very unfortunate result were examined. The results of the test
were compared to the students’ results in the school leaving exams
and to their self-assessment values. It was found that there is only a
slight connection between the students’ results in the test and in the
school leaving exams, especially at intermediate level. Beyond this,
the school leaving exams do not seem to enable students to evaluate
their own abilities.
Abstract: In-memory database systems are becoming popular
due to the availability and affordability of sufficiently large RAM and
processors in modern high-end servers with the capacity to manage
large in-memory database transactions. While fast and reliable inmemory
systems are still being developed to overcome cache misses,
CPU/IO bottlenecks and distributed transaction costs, disk-based data
stores still serve as the primary persistence. In addition, with the
recent growth in multi-tenancy cloud applications and associated
security concerns, many organisations consider the trade-offs and
continue to require fast and reliable transaction processing of diskbased
database systems as an available choice. For these
organizations, the only way of increasing throughput is by improving
the performance of disk-based concurrency control. This warrants a
hybrid database system with the ability to selectively apply an
enhanced disk-based data management within the context of inmemory
systems that would help improve overall throughput.
The general view is that in-memory systems substantially
outperform disk-based systems. We question this assumption and
examine how a modified variation of access invariance that we call
enhanced memory access, (EMA) can be used to allow very high
levels of concurrency in the pre-fetching of data in disk-based
systems. We demonstrate how this prefetching in disk-based systems
can yield close to in-memory performance, which paves the way for
improved hybrid database systems. This paper proposes a novel EMA
technique and presents a comparative study between disk-based EMA
systems and in-memory systems running on hardware configurations
of equivalent power in terms of the number of processors and their
speeds. The results of the experiments conducted clearly substantiate
that when used in conjunction with all concurrency control
mechanisms, EMA can increase the throughput of disk-based systems
to levels quite close to those achieved by in-memory system. The
promising results of this work show that enhanced disk-based
systems facilitate in improving hybrid data management within the
broader context of in-memory systems.
Abstract: In this study, we propose a novel technique for acoustic
echo suppression (AES) during speech recognition under barge-in
conditions. Conventional AES methods based on spectral subtraction
apply fixed weights to the estimated echo path transfer function
(EPTF) at the current signal segment and to the EPTF estimated until
the previous time interval. However, the effects of echo path changes
should be considered for eliminating the undesired echoes. We
describe a new approach that adaptively updates weight parameters in
response to abrupt changes in the acoustic environment due to
background noises or double-talk. Furthermore, we devised a voice
activity detector and an initial time-delay estimator for barge-in speech
recognition in communication networks. The initial time delay is
estimated using log-spectral distance measure, as well as
cross-correlation coefficients. The experimental results show that the
developed techniques can be successfully applied in barge-in speech
recognition systems.
Abstract: Food as perishable goods represents a specific and
sensitive part in the supply chain theory, since changing physical or
chemical characteristics considerably influence the approach to stock
management. The most delicate phase of this process is
transportation, where it becomes difficult to ensure the stable
conditions which limit deterioration, since the value of the
deterioration rate could be easily influenced by the mode of
transportation. The fuzzy definition of variables allows one to take
these variations into account. Furthermore, an appropriate choice of
the defuzzification method permits one to adapt results to real
conditions as far as possible. In this article those methods which take
into account the relationship between the deterioration rate of
perishable goods and transportation by ship will be applied with the
aim of (a) minimizing the total cost function, defined as the sum of
the ordering cost, holding cost, disposing cost and transportation
costs, and (b) improving the supply chain sustainability by reducing
environmental impact and waste disposal costs.
Abstract: Web-based Cognitive Writing Instruction (WeCWI)’s
contribution towards language development can be divided into
linguistic and non-linguistic perspectives. In linguistic perspective,
WeCWI focuses on the literacy and language discoveries, while the
cognitive and psychological discoveries are the hubs in non-linguistic
perspective. In linguistic perspective, WeCWI draws attention to free
reading and enterprises, which are supported by the language
acquisition theories. Besides, the adoption of process genre approach
as a hybrid guided writing approach fosters literacy development.
Literacy and language developments are interconnected in the
communication process; hence, WeCWI encourages meaningful
discussion based on the interactionist theory that involves input,
negotiation, output, and interactional feedback. Rooted in the elearning
interaction-based model, WeCWI promotes online
discussion via synchronous and asynchronous communications,
which allows interactions happened among the learners, instructor,
and digital content. In non-linguistic perspective, WeCWI highlights
on the contribution of reading, discussion, and writing towards
cognitive development. Based on the inquiry models, learners’
critical thinking is fostered during information exploration process
through interaction and questioning. Lastly, to lower writing anxiety,
WeCWI develops the instructional tool with supportive features to
facilitate the writing process. To bring a positive user experience to
the learner, WeCWI aims to create the instructional tool with
different interface designs based on two different types of perceptual
learning style.
Abstract: This paper presents optimization of makespan for ‘n’
jobs and ‘m’ machines flexible job shop scheduling problem with
sequence dependent setup time using genetic algorithm (GA)
approach. A restart scheme has also been applied to prevent the
premature convergence. Two case studies are taken into
consideration. Results are obtained by considering crossover
probability (pc = 0.85) and mutation probability (pm = 0.15). Five
simulation runs for each case study are taken and minimum value
among them is taken as optimal makespan. Results indicate that
optimal makespan can be achieved with more than one sequence of
jobs in a production order.
Abstract: Given the importance of ports as links in the global
supply chains and because they are key elements to induce
competitiveness in their hinterlands, the number of studies devoted to
port governance, management and operations has increased in the last
decades. Some of these studies address the port governance model as
an element to improve coordination among the actors of the portlogistics
chain and to generate a better port performance. In this
context, the present study analyzes the governance of Port of Santos
through individual interviews with port managers, based on a
conceptual model that considers the key dimensions associated with
port governance. The results reinforce the usefulness of the applied
model and highlight some existing improvement opportunities in the
port studied.
Abstract: Operations research science (OR) deals with good
success in developing and applying scientific methods for problem
solving and decision-making. However, by using OR techniques, we
can enhance the use of computer decision support systems to achieve
optimal management for institutions. OR applies comprehensive
analysis including all factors that effect on it and builds mathematical
modeling to solve business or organizational problems. In addition, it
improves decision-making and uses available resources efficiently.
The adoption of OR by universities would definitely contributes to
the development and enhancement of the performance of OR
techniques. This paper provides an understanding of the structures,
approaches and models of OR in problem solving and decisionmaking.