Abstract: Parallel Prefix addition is a technique for improving
the speed of binary addition. Due to continuing integrating intensity
and the growing needs of portable devices, low-power and highperformance
designs are of prime importance. The classical parallel
prefix adder structures presented in the literature over the years
optimize for logic depth, area, fan-out and interconnect count of logic
circuits. In this paper, a new architecture for performing 8-bit, 16-bit
and 32-bit Parallel Prefix addition is proposed. The proposed prefix
adder structures is compared with several classical adders of same
bit width in terms of power, delay and number of computational
nodes. The results reveal that the proposed structures have the least
power delay product when compared with its peer existing Prefix
adder structures. Tanner EDA tool was used for simulating the adder
designs in the TSMC 180 nm and TSMC 130 nm technologies.
Abstract: One of the most importance of intelligence in-car and
roadside systems is the cooperative vehicle-infrastructure system. In
Thailand, ITS technologies are rapidly growing and real-time vehicle
information is considerably needed for ITS applications; for example,
vehicle fleet tracking and control and road traffic monitoring
systems. This paper defines the communication protocols and
software design for middleware components of B-VIS (Burapha
Vehicle-Infrastructure System). The proposed B-VIS middleware architecture serves the needs of a distributed RFID sensor network and simplifies some intricate details of several communication standards.
Abstract: There has been gradual progress of late in construction projects, particularly in big-scale megaprojects. Due to the long-term construction period, however, with large-scale budget investment, lack of construction management technologies, and increase in the incomplete elements of project schedule management, a plan to conduct efficient operations and to ensure business safety is required. In particular, as the project management information system (PMIS) is meant for managing a single project centering on the construction phase, there is a limitation in the management of program-scale businesses like megaprojects. Thus, a program management information system (PgMIS) that includes program-level management technologies is needed to manage multiple projects. In this study, a support tool was developed for managing the cost and schedule information occurring in the construction phase, at the program level. In addition, a case study on the developed support tool was conducted to verify the usability of the system. With the use of the developed support tool program, construction managers can monitor the progress of the entire project and of the individual subprojects in real time.
Abstract: South Africa is facing a crisis with not being able to produce enough graduates in the scarce skills areas to sustain economic growth. The crisis is fuelled by a school system that does not produce enough potential students with Mathematics, Accounting and Science. Since the introduction of the new school curriculum in 2008, there is no longer an option to take pure maths on a standard grade level. Instead, only two mathematical subjects are offered: pure maths (which is on par with higher grade maths) and mathematical literacy. It is compulsory to take one or the other. As a result, lees student finishes Grade 12 with pure mathematics every year. This national problem needs urgent attention if South Africa is to make any headway in critical skills development as mathematics is a gateway to scarce skills professions. Higher education institutions initiated several initiatives in an attempt to address the above, including preparatory courses, bridging programmes and extended curricula with foundation provisions. In view of the above, and government policy directives to broaden access in the scarce skills areas to increase student throughput, foundation provision was introduced for Commerce and Information Technology programmes at the Vaal Triangle Campus (VTC) of North-West University (NWU) in 2010. Students enrolling for extended programmes do not comply with the minimum prerequisites for the normal programmes. The question then arises as to whether these programmes have the intended impact? This paper reports the results of a two year longitudinal study, tracking the first year academic achievement of the two cohorts of enrolments since 2010. The results provide valuable insight into the structuring of an extended programme and its potential impact.
Abstract: This paper describes the two stage control using a disturbance observer and a Kalman filter. The system feedback uses the estimated state when it controls the speed. After the change-over point, its feedback uses the controlled plant output when it controls the position. To change the system continually, a change-over point has to be determined pertinently, and the controlled plant input has to be adjusted by the addition of the appropriate value. The proposed method has noise-reduction effect. It changes the system continually, even if the controlled plant identification has the error. Although the conventional method needs a speed sensor, the proposed method does not need it. The proposed method has a superior robustness compared with the conventional two stage control.
Abstract: This paper presents the H-ARQ techniques comparison for OFDM systems with a new family of non-binary LDPC codes which has been developed within the EU FP7 DAVINCI project. The punctured NB-LDPC codes have been used in a simulated model of the transmission system. The link level performance has been evaluated in terms of spectral efficiency, codeword error rate and average number of retransmissions. The NB-LDPC codes can be easily and effective implemented with different methods of the retransmission needed if correct decoding of a codeword failed. Here the Optimal Symbol Selection method is proposed as a Chase Combining technique.
Abstract: Curriculum is one of the most important inputs in higher education system and for knowing the strong and weak spots of it we need evaluation. The main purpose of this study was to survey of the curriculum quality of Insurance Management field. Case: University of Allameh Taba Tabaee(according to view point of students,alumni,employer and faculty members).Descriptive statistics (mean, tables, percentages, frequency distribution) and inferential statistics (CHI SQUARE) were used to analyze the data. Six criterions considered for the Quality of curriculum: objectives, content, teaching and learning methods, space and facilities, Time, assessment of learning. objectives, teaching and learning methods criterions was desirable level, content criteria was undesirable level, space and facilities, time and assessment of learning were rather desirable level. The quality of curriculum of insurance management field was relatively desirable level.
Abstract: Multi-agent communication of Semantic Web
information cannot be realized without the need to reason with
ontology and agent locations. This is because for an agent to be able to
reason with an external semantic web ontology, it must know where
and how to access to that ontology. Similarly, for an agent to be able to
communicate with another agent, it must know where and how to send
a message to that agent. In this paper we propose a framework of an
agent which can reason with ontology and agent locations in order to
perform reasoning with multiple distributed ontologies and perform
communication with other agents on the semantic web. The agent
framework and its communication mechanism are formulated entirely
in meta-logic.
Abstract: The special constraints of sensor networks impose a
number of technical challenges for employing them. In this review,
we study the issues and existing protocols in three areas: coverage
and routing. We present two types of coverage problems: to
determine the minimum number of sensor nodes that need to perform
active sensing in order to monitor a certain area; and to decide the
quality of service that can be provided by a given sensor network.
While most routing protocols in sensor networks are data-centric,
there are other types of routing protocols as well, such as
hierarchical, location-based, and QoS-aware. We describe and
compare several protocols in each group. We present several multipath
routing protocols and single-path with local repair routing
protocols, which are proposed for recovering from sensor node
crashes. We also discuss some transport layer schemes for reliable
data transmission in lossy wireless channels.
Abstract: As one of the big government bank, Bank X is paying attention its performance, so that it can compete. One of them is the existence of organizational culture which recognized with term TIPEC (Trust, Integrity, Professionalism, Costumer Focus, and Excellence). In application of organizational culture, it is needed the existence of employee involvement (job involvement). It can be influenced by various factors, such as Locus of Control. Related to above mentioned, the problems are how employee tendency of Locus of Control, how job involvement, how organizational culture applied by employees and how influence of Locus of Control and job involvement to the organizational culture applied by employees. Researchers collected data with questioner spreading, and respondents number of 30 people. After that, the data were analyzed with SPSS software constructively. The influence of Locus of Control and job involvement to the application of organizational culture was strong, i.e. 58.3%.
Abstract: World has entered in 21st century. The technology of
computer graphics and digital cameras is prevalent. High resolution
display and printer are available. Therefore high resolution images
are needed in order to produce high quality display images and high
quality prints. However, since high resolution images are not usually
provided, there is a need to magnify the original images. One
common difficulty in the previous magnification techniques is that of
preserving details, i.e. edges and at the same time smoothing the data
for not introducing the spurious artefacts. A definitive solution to this
is still an open issue. In this paper an image magnification using
adaptive interpolation by pixel level data-dependent geometrical
shapes is proposed that tries to take into account information about
the edges (sharp luminance variations) and smoothness of the image.
It calculate threshold, classify interpolation region in the form of
geometrical shapes and then assign suitable values inside
interpolation region to the undefined pixels while preserving the
sharp luminance variations and smoothness at the same time.
The results of proposed technique has been compared qualitatively
and quantitatively with five other techniques. In which the qualitative
results show that the proposed method beats completely the Nearest
Neighbouring (NN), bilinear(BL) and bicubic(BC) interpolation. The
quantitative results are competitive and consistent with NN, BL, BC
and others.
Abstract: Recommender systems are usually regarded as an
important marketing tool in the e-commerce. They use important
information about users to facilitate accurate recommendation. The
information includes user context such as location, time and interest
for personalization of mobile users. We can easily collect information
about location and time because mobile devices communicate with the
base station of the service provider. However, information about user
interest can-t be easily collected because user interest can not be
captured automatically without user-s approval process. User interest
usually represented as a need. In this study, we classify needs into two
types according to prior research. This study investigates the
usefulness of data mining techniques for classifying user need type for
recommendation systems. We employ several data mining techniques
including artificial neural networks, decision trees, case-based
reasoning, and multivariate discriminant analysis. Experimental
results show that CHAID algorithm outperforms other models for
classifying user need type. This study performs McNemar test to
examine the statistical significance of the differences of classification
results. The results of McNemar test also show that CHAID performs
better than the other models with statistical significance.
Abstract: The most widely used semiconductor memory types
are the Dynamic Random Access Memory (DRAM) and Static
Random Access memory (SRAM). Competition among memory
manufacturers drives the need to decrease power consumption and
reduce the probability of read failure. A technology that is relatively
new and has not been explored is the FinFET technology. In this
paper, a single cell Schmitt Trigger Based Static RAM using FinFET
technology is proposed and analyzed. The accuracy of the result is
validated by means of HSPICE simulations with 32nm FinFET
technology and the results are then compared with 6T SRAM using
the same technology.
Abstract: As communications systems and technology become more advanced and complex, it will be increasingly important to focus on users- individual needs. Personalization and effective user profile management will be necessary to ensure the uptake and success of new services and devices and it is therefore important to focus on the users- requirements in this area and define solutions that meet these requirements. The work on personalization and user profiles emerged from earlier ETSI work on a Universal Communications Identifier (UCI) which is a unique identifier of the user rather than a range of identifiers of the many of communication devices or services (e.g. numbers of fixed phone at home/work, mobile phones, fax and email addresses). This paper describes work on personalization including standardized information and preferences and an architectural framework providing a description of how personalization can be integrated in Next Generation Networks, together with the UCI concept.
Abstract: These days we face with so many advertisements in
magazines, those mentioned coaching is pragmatic specialties which
help people make change in their lives. Up to know Specialty coaches
are not necessarily therapists, consultants or psychologist, thus they
may not know psychological theories. The International Coach
Federation identifies "facilitating learning and results" as one of its
four core coach competencies, without understanding learning
theories coaching practice hangs in theoretical abyss. Thus the aim of
this article is investigating learning theories within coaching process.
Therefore, I reviewed some cognitive and behavioral learning
theories and analyzed their contribution with coaching process which
has been introduced in mentor coaches and ICF certified coaches'
papers and books. The result demonstrated that coaching profession
is strongly grounded in learning theories, and it will be strengthened
by the validation of theories and evidence-based research as we move
forward. Thus, it needs more research in order to applying effective
theoretical frameworks.
Abstract: When designing information systems that deal with
large amount of domain knowledge, system designers need to consider
ambiguities of labeling termsin domain vocabulary for navigating
users in the information space. The goal of this study is to develop a
methodology for system designers to label navigation items, taking
account of ambiguities stems from synonyms or polysemes of labeling
terms. In this paper, we propose a method for concept labeling based
on mappings between domain ontology andthesaurus, and report
results of an empirical evaluation.
Abstract: Clustering techniques have been used by many intelligent software agents to group similar access patterns of the Web users into high level themes which express users intentions and interests. However, such techniques have been mostly focusing on one salient feature of the Web document visited by the user, namely the extracted keywords. The major aim of these techniques is to come up with an optimal threshold for the number of keywords needed to produce more focused themes. In this paper we focus on both keyword and similarity thresholds to generate themes with concentrated themes, and hence build a more sound model of the user behavior. The purpose of this paper is two fold: use distance based clustering methods to recognize overall themes from the Proxy log file, and suggest an efficient cut off levels for the keyword and similarity thresholds which tend to produce more optimal clusters with better focus and efficient size.
Abstract: WLAN Positioning has been presented by many
approaches in literatures using the characteristics of Received Signal
Strength (RSS), Time of Arrival (TOA) or Time Difference of
Arrival (TDOA), Angle of Arrival (AOA) and cell ID. Among these,
RSS approach is the simplest method to implement because there is
no need of modification on both access points and client devices
whereas its accuracy is terrible due to physical environments. For
TOA or TDOA approach, the accuracy is quite acceptable but most
researches have to modify either software or hardware on existing
WLAN infrastructure. The scales of modifications are made on only
access card up to the changes in protocol of WLAN. Hence, it is an
unattractive approach to use TOA or TDOA for positioning system.
In this paper, the new concept of merging both RSS and TOA
positioning techniques is proposed. In addition, the method to
achieve TOA characteristic for positioning WLAN user without any
extra modification necessarily appended in the existing system is
presented. The measurement results confirm that the proposed
technique using both RSS and TOA characteristics provides better
accuracy than using only either RSS or TOA approach.
Abstract: In recent years asymmetric cross section aluminum
alloy stock has been finding increasing use in various industrial manufacturing areas such as general structures and automotive
components. In these areas, components are generally required to have
complex curved configuration and, as such, a bending process is required during manufacture. Undesirable deformation in bending
processes such as flattening or wrinkling can easily occur when thin-walled sections are bent. Hence, a thorough understanding of the
bending behavior of such sections is needed to prevent these undesirable deformations. In this study, the bending behavior of
asymmetric channel section was examined using finite element analysis (FEA). Typical methods of preventing undesirable
deformation, such as asymmetric laminated elastic mandrels were included in FEA model of draw bending. Additionally, axial tension
was applied to prevent wrinkling. By utilizing the FE simulations effect of restriction dies and axial tension on undesirable deformation during the process was clarified.
Abstract: Aspect Oriented Programming promises many
advantages at programming level by incorporating the cross cutting
concerns into separate units, called aspects. Join Points are
distinguishing features of Aspect Oriented Programming as they
define the points where core requirements and crosscutting concerns
are (inter)connected. Currently, there is a problem of multiple
aspects- composition at the same join point, which introduces the
issues like ordering and controlling of these superimposed aspects.
Dynamic strategies are required to handle these issues as early as
possible. State chart is an effective modeling tool to capture dynamic
behavior at high level design. This paper provides methodology to
formulate the strategies for multiple aspect composition at high level,
which helps to better implement these strategies at coding level. It
also highlights the need of designing shared join point at high level,
by providing the solutions of these issues using state chart diagrams
in UML 2.0. High level design representation of shared join points
also helps to implement the designed strategy in systematic way.