Abstract: In this paper test generation methods and appropriate fault models for testing and analysis of embedded systems described as (extended) finite state machines ((E)FSMs) are presented. Compared to simple FSMs, EFSMs specify not only the control flow but also the data flow. Thus, we define a two-level fault model to cover both aspects. The goal of this paper is to reuse well-known FSM-based test generation methods for automation of embedded system testing. These methods have been widely used in testing and validation of protocols and communicating systems. In particular, (E)FSMs-based specification and testing is more advantageous because (E)FSMs support the formal semantic of already standardised formal description techniques (FDTs) despite of their popularity in the design of hardware and software systems.
Abstract: This work presents the design of an expert system that aims in the procurement of patient medial background and in the search for suitable skin test selections. Skin testing is the tool used most widely to diagnose allergies. The language of expert systems CLIPS is used as a tool of designing. Finally, we present the evaluation of the proposed expert system which was achieved with the import of certain medical cases and the system produced with suitable successful skin tests.
Abstract: With advances in computer vision, non-contact gaze tracking systems are heading towards being much easier to operate and more comfortable for use, the technique proposed in this paper is specially designed for achieving these goals. For the convenience in operation, the proposal aims at the system with simple configuration which is composed of a fixed wide angle camera and dual infrared illuminators. Then in order to enhance the usability of the system based on single camera, a self-adjusting method which is called Real-time gaze Tracking Algorithm with head movement Compensation (RTAC) is developed for estimating the gaze direction under natural head movement and simplifying the calibration procedure at the same time. According to the actual evaluations, the average accuracy of about 1° is achieved over a field of 20×15×15 cm3.
Abstract: Functioning of a biometric system in large part
depends on the performance of the similarity measure function.
Frequently a generalized similarity distance measure function such as
Euclidian distance or Mahalanobis distance is applied to the task of
matching biometric feature vectors. However, often accuracy of a
biometric system can be greatly improved by designing a customized
matching algorithm optimized for a particular biometric application.
In this paper we propose a tailored similarity measure function for
behavioral biometric systems based on the expert knowledge of the
feature level data in the domain. We compare performance of a
proposed matching algorithm to that of other well known similarity
distance functions and demonstrate its superiority with respect to the
chosen domain.
Abstract: In this paper, the problem of asymptotical stability of neutral systems with nonlinear perturbations is investigated. Based on a class of novel augment Lyapunov functionals which contain freeweighting matrices, some new delay-dependent asymptotical stability criteria are formulated in terms of linear matrix inequalities (LMIs) by using new inequality analysis technique. Numerical examples are given to demonstrate the derived condition are much less conservative than those given in the literature.
Abstract: The urban transformation processes in its framework
and its general significance became a fundamental and vital subject
of consideration for both the developed and the developing societies.
It has become important to regulate the architectural systems adopted
by the city, to sustain the present development on one hand, and on
the other hand, to facilitate its future growth.
Thus, the study dealt with the phenomenon of urban
transformation of the Mediterranean cities, and the city of Alexandria
in particular, because of its significant historical and cultural legacy,
its historical architecture and its contemporary urbanization.
This article investigates the entirety of cities in the Mediterranean
region through the analysis of the relationship between inflation and
growth of these cities and the extent of the complexity of the city
barriers. We hope to analyze not only the internal transformations,
but the external relationships (both imperial and post-colonial) that
have shaped Alexandria city growth from the nineteenth century until
today.
Abstract: Organic farmers across Saskatchewan face soil
phosphorus (P) shortages. Due to the restriction on inputs in organic
systems, farmers rely on crop rotation and naturally-occurring
arbuscular mycorrhizal fungi (AMF) for plant P supply. Crop rotation
is important for disease, pest, and weed management. Crops that are
not colonized by AMF (non-mycorrhizal) can decrease colonization
of a following crop. An experiment was performed to quantify soil P
cycling in four cropping sequences under organic management and
determine if mustard (non-mycorrhizal) was delaying the
colonization of subsequent wheat. Soils from the four cropping
sequences were measured for inorganic soil P (Pi), AMF spore
density (SD), phospholipid fatty acid analysis (PLFA, for AMF
biomarker counts), and alkaline phosphatase activity (ALPase,
related to AMF metabolic activity). Plants were measured for AMF
colonization and P content and uptake of above-ground biomass. A
lack of difference in AMF activity indicated that mustard was not
depressing colonization. Instead, AMF colonization was largely
determined by crop type and crop rotation.
Abstract: Power System Security is a major concern in real time
operation. Conventional method of security evaluation consists of
performing continuous load flow and transient stability studies by
simulation program. This is highly time consuming and infeasible
for on-line application. Pattern Recognition (PR) is a promising
tool for on-line security evaluation. This paper proposes a Support
Vector Machine (SVM) based binary classification for static and
transient security evaluation. The proposed SVM based PR approach
is implemented on New England 39 Bus and IEEE 57 Bus systems.
The simulation results of SVM classifier is compared with the other
classifier algorithms like Method of Least Squares (MLS), Multi-
Layer Perceptron (MLP) and Linear Discriminant Analysis (LDA)
classifiers.
Abstract: A new hybrid method to realise high-precision
distortion determination for optical ultra-precision 3D measurement
systems based on stereo cameras using active light projection is
introduced. It consists of two phases: the basic distortion
determination and the refinement. The refinement phase of the
procedure uses a plane surface and projected fringe patterns as
calibration tools to determine simultaneously the distortion of both
cameras within an iterative procedure. The new technique may be
performed in the state of the device “ready for measurement" which
avoids errors by a later adjustment. A considerable reduction of
distortion errors is achieved and leads to considerable improvements
of the accuracy of 3D measurements, especially in the precise
measurement of smooth surfaces.
Abstract: To create a solution for a specific problem in machine
learning, the solution is constructed from the data or by use a search
method. Genetic algorithms are a model of machine learning that can
be used to find nearest optimal solution. While the great advantage of
genetic algorithms is the fact that they find a solution through
evolution, this is also the biggest disadvantage. Evolution is inductive,
in nature life does not evolve towards a good solution but it evolves
away from bad circumstances. This can cause a species to evolve into
an evolutionary dead end. In order to reduce the effect of this
disadvantage we propose a new a learning tool (criteria) which can be
included into the genetic algorithms generations to compare the
previous population and the current population and then decide
whether is effective to continue with the previous population or the
current population, the proposed learning tool is called as Keeping
Efficient Population (KEP). We applied a GA based on KEP to the
production line layout problem, as a result KEP keep the evaluation
direction increases and stops any deviation in the evaluation.
Abstract: Precast concrete has been widely adopted in public
housing construction of Hong Kong since the mid-1980s. While
pre-casting is considered an environmental friendly solution, there is
lack of study to investigate the life cycle performance of precast
concrete units. This study aims to bridge the knowledge gap by
providing a comprehensive life cycle assessment (LCA) study for two
precast elements namely façade and bathroom. The results show that
raw material is the most significant contributor of environmental
impact accounting for about 90% to the total impact. Furthermore,
human health is more affected by the production of precast concrete
than the ecosystems.
Abstract: Gas turbine systems with wet compression have a
potential for future power generation, since they can offer a high
efficiency and a high specific power with a relatively low cost. In this
study influence of ambient condition on the performance of the wet
compression process is investigated with a non-equilibrium analytical
modeling based on droplet evaporation. Transient behaviors of droplet
diameter and temperature of mixed air are investigated for various
ambient temperatures. Special attention is paid for the effects of
ambient temperature, pressure ratio, and water injection ratios on the
important wet compression variables including compressor outlet
temperature and compression work. Parametric studies show that
downing of the ambient temperature leads to lower compressor outlet
temperature and consequently lower consumption of compression
work even in wet compression processes.
Abstract: This paper deals with an adaptive multiuser detector for direct sequence code division multiple-access (DS-CDMA) systems. A modified receiver, precombinig LMMSE is considered under time varying channel environment. Detector updating is performed with two criterions, mean square estimation (MSE) and MOE optimization technique. The adaptive implementation issues of these two schemes are quite different. MSE criterion updates the filter weights by minimizing error between data vector and adaptive vector. MOE criterion together with canonical representation of the detector results in a constrained optimization problem. Even though the canonical representation is very complicated under time varying channels, it is analyzed with assumption of average power profile of multipath replicas of user of interest. The performance of both schemes is studied for practical SNR conditions. Results show that for poor SNR, MSE precombining LMMSE is better than the blind precombining LMMSE but for greater SNR, MOE scheme outperforms with better result.
Abstract: The development of distributed systems has been affected by the need to accommodate an increasing degree of flexibility, adaptability, and autonomy. The Mobile Agent technology is emerging as an alternative to build a smart generation of highly distributed systems. In this work, we investigate the performance aspect of agent-based technologies for information retrieval. We present a comparative performance evaluation model of Mobile Agents versus Remote Method Invocation by means of an analytical approach. We demonstrate the effectiveness of mobile agents for dynamic code deployment and remote data processing by reducing total latency and at the same time producing minimum network traffic. We argue that exploiting agent-based technologies significantly enhances the performance of distributed systems in the domain of information retrieval.
Abstract: The purpose of this paper is to analyze determinants of
information security affecting adoption of the Web-based integrated
information systems (IIS). We introduced Web-based information
systems which are designed to formulate strategic plans for Peruvian
government. Theoretical model is proposed to test impact of
organizational factors (deterrent efforts and severity; preventive
efforts) and individual factors (information security threat; security
awareness) on intentions to proactively use the Web-based IIS .Our
empirical study results highlight that deterrent efforts and deterrent
severity have no significant influence on the proactive use intentions
of IIS, whereas, preventive efforts play an important role in proactive
use intentions of IIS. Thus, we suggest that organizations need to do
preventive efforts by introducing various information security
solutions, and try to improve information security awareness while
reducing the perceived information security threats.
Abstract: One of the most attractive and important field of chaos theory is control of chaos. In this paper, we try to present a simple framework for chaotic motion control using the feedback linearization method. Using this approach, we derive a strategy, which can be easily applied to the other chaotic systems. This task presents two novel results: the desired periodic orbit need not be a solution of the original dynamics and the other is the robustness of response against parameter variations. The illustrated simulations show the ability of these. In addition, by a comparison between a conventional state feedback and our proposed method it is demonstrated that the introduced technique is more efficient.
Abstract: As various mobile sensing technologies, remote
control and ubiquitous infrastructure are developing and expectations
on quality of life are increasing, a lot of researches and developments
on home network technologies and services are actively on going,
Until now, we have focused on how to provide users with high-level
home network services, while not many researches on home network
security for guaranteeing safety are progressing. So, in this paper, we
propose an access control model specific to home network that
provides various kinds of users with home network services up one-s
characteristics and features, and protects home network systems from
illegal/unnecessary accesses or intrusions.
Abstract: The advent of modern technology shadows its impetus repercussions on successful Legacy systems making them obsolete with time. These systems have evolved the large organizations in major problems in terms of new business requirements, response time, financial depreciation and maintenance. Major difficulty is due to constant system evolution and incomplete, inconsistent and obsolete documents which a legacy system tends to have. The myriad dimensions of these systems can only be explored by incorporating reverse engineering, in this context, is the best method to extract useful artifacts and by exploring these artifacts for reengineering existing legacy systems to meet new requirements of organizations. A case study is conducted on six different type of software systems having source code in different programming languages using the architectural recovery framework.
Abstract: We present here the results for a comparative study of
some techniques, available in the literature, related to the relevance
feedback mechanism in the case of a short-term learning. Only one
method among those considered here is belonging to the data mining
field which is the K-nearest neighbors algorithm (KNN) while the
rest of the methods is related purely to the information retrieval field
and they fall under the purview of the following three major axes:
Shifting query, Feature Weighting and the optimization of the
parameters of similarity metric. As a contribution, and in addition to
the comparative purpose, we propose a new version of the KNN
algorithm referred to as an incremental KNN which is distinct from
the original version in the sense that besides the influence of the
seeds, the rate of the actual target image is influenced also by the
images already rated. The results presented here have been obtained
after experiments conducted on the Wang database for one iteration
and utilizing color moments on the RGB space. This compact
descriptor, Color Moments, is adequate for the efficiency purposes
needed in the case of interactive systems. The results obtained allow
us to claim that the proposed algorithm proves good results; it even
outperforms a wide range of techniques available in the literature.
Abstract: In this contribution an innovative platform is being
presented that integrates intelligent agents in legacy e-learning environments. It introduces the design and development of a scalable
and interoperable integration platform supporting various assessment agents for e-learning environments. The agents are implemented in
order to provide intelligent assessment services to computational intelligent techniques such as Bayesian Networks and Genetic
Algorithms. The utilization of new and emerging technologies like web services allows integrating the provided services to any web
based legacy e-learning environment.