Abstract: The main aim of a communication system is to
achieve maximum performance. In Cognitive Radio any user or
transceiver has ability to sense best suitable channel, while channel is
not in use. It means an unlicensed user can share the spectrum of a
licensed user without any interference. Though, the spectrum sensing
consumes a large amount of energy and it can reduce by applying
various artificial intelligent methods for determining proper spectrum
holes. It also increases the efficiency of Cognitive Radio Network
(CRN). In this survey paper we discuss the use of different learning
models and implementation of Artificial Neural Network (ANN) to
increase the learning and decision making capacity of CRN without
affecting bandwidth, cost and signal rate.
Abstract: In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.
Abstract: Given a graph G. A cycle of G is a sequence of
vertices of G such that the first and the last vertices are the same.
A hamiltonian cycle of G is a cycle containing all vertices of G.
The graph G is k-ordered (resp. k-ordered hamiltonian) if for any
sequence of k distinct vertices of G, there exists a cycle (resp.
hamiltonian cycle) in G containing these k vertices in the specified
order. Obviously, any cycle in a graph is 1-ordered, 2-ordered and 3-
ordered. Thus the study of any graph being k-ordered (resp. k-ordered
hamiltonian) always starts with k = 4. Most studies about this topic
work on graphs with no real applications. To our knowledge, the
chordal ring families were the first one utilized as the underlying
topology in interconnection networks and shown to be 4-ordered.
Furthermore, based on our computer experimental results, it was
conjectured that some of them are 4-ordered hamiltonian. In this
paper, we intend to give some possible directions in proving the
conjecture.
Abstract: Cloud computing (CC) has already gained overall
appreciation in research and practice. Whereas the willingness to
integrate cloud services in various IT environments is still unbroken,
the previous CC procurement processes run mostly in an unorganized
and non-standardized way. In practice, a sufficiently specific, yet
applicable business process for the important acquisition phase is
often lacking. And research does not appropriately remedy this
deficiency yet. Therefore, this paper introduces a field-tested
approach for CC procurement. Based on an extensive literature
review and augmented by expert interviews, we designed a model
that is validated and further refined through an in-depth real-life case
study. For the detailed process description, we apply the event-driven
process chain notation (EPC). The gained valuable insights into the
case study may help CC research to shift to a more socio-technical
area. For practice, next to giving useful organizational instructions
we will provide extended checklists and lessons learned.
Abstract: This paper proposed a silicon controller rectifier (SCR)
based ESD protection device to protect low voltage ESD for integrated
circuit. The proposed ESD protection device has low trigger voltage
and high holding voltage compared with conventional SCR-based
ESD protection devices. The proposed ESD protection circuit is
verified and compared by TCAD simulation. This paper verified
effective low voltage ESD characteristics with low trigger voltage of
5.79V and high holding voltage of 3.5V through optimization
depending on design variables (D1, D2, D3 and D4).
Abstract: Locating Radio Controlled (RC) devices using their
unintended emissions has a great interest considering security
concerns. Weak nature of these emissions requires near field
localization approach since it is hard to detect these signals in far
field region of array. Instead of only angle estimation, near field
localization also requires range estimation of the source which makes
this method more complicated than far field models. Challenges of
locating such devices in a near field region and real time environment
are analyzed in this paper. An ESPRIT like near field localization
scheme is utilized for both angle and range estimation. 1-D search
with symmetric subarrays is provided. Two 7 element uniform linear
antenna arrays (ULA) are employed for locating RC source.
Experiment results of location estimation for one unintended emitting
walkie-talkie for different positions are given.
Abstract: In-memory database systems are becoming popular
due to the availability and affordability of sufficiently large RAM and
processors in modern high-end servers with the capacity to manage
large in-memory database transactions. While fast and reliable inmemory
systems are still being developed to overcome cache misses,
CPU/IO bottlenecks and distributed transaction costs, disk-based data
stores still serve as the primary persistence. In addition, with the
recent growth in multi-tenancy cloud applications and associated
security concerns, many organisations consider the trade-offs and
continue to require fast and reliable transaction processing of diskbased
database systems as an available choice. For these
organizations, the only way of increasing throughput is by improving
the performance of disk-based concurrency control. This warrants a
hybrid database system with the ability to selectively apply an
enhanced disk-based data management within the context of inmemory
systems that would help improve overall throughput.
The general view is that in-memory systems substantially
outperform disk-based systems. We question this assumption and
examine how a modified variation of access invariance that we call
enhanced memory access, (EMA) can be used to allow very high
levels of concurrency in the pre-fetching of data in disk-based
systems. We demonstrate how this prefetching in disk-based systems
can yield close to in-memory performance, which paves the way for
improved hybrid database systems. This paper proposes a novel EMA
technique and presents a comparative study between disk-based EMA
systems and in-memory systems running on hardware configurations
of equivalent power in terms of the number of processors and their
speeds. The results of the experiments conducted clearly substantiate
that when used in conjunction with all concurrency control
mechanisms, EMA can increase the throughput of disk-based systems
to levels quite close to those achieved by in-memory system. The
promising results of this work show that enhanced disk-based
systems facilitate in improving hybrid data management within the
broader context of in-memory systems.
Abstract: Proof of controlling crack width is a basic condition
for securing suitable performance in serviceability limit state. The
cracking in concrete can occur at any time from the casting of time to
the years after the concrete has been set in place. Most codes struggle
with offering procedure for crack width calculation. There is lack in
availability of design charts for designers to compute crack width
with ease. The focus of the study is to utilize design charts and
parametric equations in calculating crack width with minimum error.
The paper contains a simplified procedure to calculate crack width
for reinforced concrete (RC) sections subjected to bending with axial
tensile force following the guidelines of Euro code [DS EN-1992-1-1
& DS EN-1992-1-2]. Numerical examples demonstrate the
application of the suggested procedure. Comparison with parallel
analytical tools supports the validity of result and show the
percentage deviation of crack width in both the procedures. The
technique is simple, user friendly and ready to evolve for a greater
spectrum of section sizes and materials.
Abstract: In this study, we propose a novel technique for acoustic
echo suppression (AES) during speech recognition under barge-in
conditions. Conventional AES methods based on spectral subtraction
apply fixed weights to the estimated echo path transfer function
(EPTF) at the current signal segment and to the EPTF estimated until
the previous time interval. However, the effects of echo path changes
should be considered for eliminating the undesired echoes. We
describe a new approach that adaptively updates weight parameters in
response to abrupt changes in the acoustic environment due to
background noises or double-talk. Furthermore, we devised a voice
activity detector and an initial time-delay estimator for barge-in speech
recognition in communication networks. The initial time delay is
estimated using log-spectral distance measure, as well as
cross-correlation coefficients. The experimental results show that the
developed techniques can be successfully applied in barge-in speech
recognition systems.
Abstract: Food as perishable goods represents a specific and
sensitive part in the supply chain theory, since changing physical or
chemical characteristics considerably influence the approach to stock
management. The most delicate phase of this process is
transportation, where it becomes difficult to ensure the stable
conditions which limit deterioration, since the value of the
deterioration rate could be easily influenced by the mode of
transportation. The fuzzy definition of variables allows one to take
these variations into account. Furthermore, an appropriate choice of
the defuzzification method permits one to adapt results to real
conditions as far as possible. In this article those methods which take
into account the relationship between the deterioration rate of
perishable goods and transportation by ship will be applied with the
aim of (a) minimizing the total cost function, defined as the sum of
the ordering cost, holding cost, disposing cost and transportation
costs, and (b) improving the supply chain sustainability by reducing
environmental impact and waste disposal costs.
Abstract: Electric vehicles are one of the most complicated
electric devices to simulate due to the significant number of different
processes involved in electrical structure of it. There are concurrent
processes of energy consumption and generation with different
onboard systems, which make simulation tasks more complicated to
perform. More accurate simulation on energy consumption can
provide a better understanding of all energy management for electric
transport. As a result of all those processes, electric transport can
allow for a more sustainable future and become more convenient in
relation to the distance range and recharging time. This paper
discusses the problems of energy consumption simulations for
electric vehicles using different software packages to provide ideas
on how to make this process more precise, which can help engineers
create better energy management strategies for electric vehicles.
Abstract: The purpose of this study is to examine the possible
link between employee and customer satisfaction. The service
provided by employees, help to build a good relationship with
customers and can help at increasing their loyalty. Published data for
job satisfaction and indicators of customer services of banks were
gathered from relevant published works which included data from
five different countries. The scores of customers and employees
satisfaction of the different published works were transformed and
normalized to the scale of 1 to 100. The data were analyzed and a
regression analysis of the two parameters was used to describe the
link between employee’s satisfaction and customer’s satisfaction.
Assuming that employee satisfaction has a significant influence on
customer’s service and the resulting customer satisfaction, the
reviewed data indicate that employee’s satisfaction contributes
significantly on the level of customer satisfaction in the Banking
sector. There was a significant correlation between the two
parameters (Pearson correlation R2=0.52 P
Abstract: Cost of governance in Nigeria has become a challenge
to development and concern to practitioners and scholars alike in the
field of business and social science research. In the 2010 national
budget of NGN4.6 trillion or USD28.75billion for instance, only a
pantry sum of NGN1.8trillion or USD11.15billion was earmarked for
capital expenditure. Similarly, in 2013, out of a total national budget
of NGN4.92trillion or USD30.75billion, only the sum of
NGN1.50trllion or USD9.38billion was voted for capital expenditure.
Therefore, based on the data sourced from the Nigerian Office of
Statistics, Central bank of Nigeria Statistical Bulletin as well as from
the United Nations Development Programme, this study examined
the causes of high cost of governance in Nigeria. It found out that the
high cost of governance in the country is in the interest of the ruling
class, arising from their unethical behaviour – corrupt practices and
the poor management of public resources. As a result, the study
recommends the need to intensify the war against corruption and
mismanagement of public resources by government officials as
possible solution to overcome the high cost of governance in Nigeria.
This could be achieved by strengthening the constitutional powers of
the various anti-corruption agencies in the area of arrest, investigation
and prosecution of offenders without the interference of the executive
arm of government either at the local, state or federal level.
Abstract: Validity, integrity, and impacts of the IT systems of
the US federal courts have been studied as part of the Human Rights
Alert-NGO (HRA) submission for the 2015 Universal Periodic
Review (UPR) of human rights in the United States by the Human
Rights Council (HRC) of the United Nations (UN). The current
report includes overview of IT system analysis, data-mining and case
studies. System analysis and data-mining show: Development and
implementation with no lawful authority, servers of unverified
identity, invalidity in implementation of electronic signatures,
authentication instruments and procedures, authorities and
permissions; discrimination in access against the public and
unrepresented (pro se) parties and in favor of attorneys; widespread
publication of invalid judicial records and dockets, leading to their
false representation and false enforcement. A series of case studies
documents the impacts on individuals' human rights, on banking
regulation, and on international matters. Significance is discussed in
the context of various media and expert reports, which opine
unprecedented corruption of the US justice system today, and which
question, whether the US Constitution was in fact suspended. Similar
findings were previously reported in IT systems of the State of
California and the State of Israel, which were incorporated, subject to
professional HRC staff review, into the UN UPR reports (2010 and
2013). Solutions are proposed, based on the principles of publicity of
the law and the separation of power: Reliance on US IT and legal
experts under accountability to the legislative branch, enhancing
transparency, ongoing vigilance by human rights and internet
activists. IT experts should assume more prominent civic duties in the
safeguard of civil society in our era.
Abstract: There is decagram of strategic decisions of operations
and production/service management (POSM) within operational
research (OR) which must collate, namely: design, inventory, quality,
location, process and capacity, layout, scheduling, maintain ace, and
supply chain. This paper presents an architectural configuration
conceptual framework of a decagram of sets decisions in a form of
mathematical complete graph and abelian graph.
Mathematically, a complete graph is undirected (UDG), and
directed (DG) a relationship where every pair of vertices is
connected, collated, confluent, and holomorphic.
There has not been any study conducted which, however,
prioritizes the holomorphic sets which of POMS within OR field of
study. The study utilizes OR structured technique known as The
Analytic Hierarchy Process (AHP) analysis for organizing, sorting
and prioritizing(ranking) the sets within the decagram of POMS
according to their attribution (propensity), and provides an analysis
how the prioritization has real-world application within the 21st
century.
Abstract: In this study, the performance analyses of the twenty
five Coal-Fired Power Plants (CFPPs) used for electricity generation
are carried out through various Data Envelopment Analysis (DEA)
models. Three efficiency indices are defined and pursued. During the
calculation of the operational performance, energy and non-energy
variables are used as input, and net electricity produced is used as
desired output (Model-1). CO2 emitted to the environment is used as
the undesired output (Model-2) in the computation of the pure
environmental performance while in Model-3 CO2 emissions is
considered as detrimental input in the calculation of operational and
environmental performance. Empirical results show that most of the
plants are operating in increasing returns to scale region and Mettur
plant is efficient one with regards to energy use and environment.
The result also indicates that the undesirable output effect is
insignificant in the research sample. The present study will provide
clues to plant operators towards raising the operational and
environmental performance of CFPPs.
Abstract: Environmental impacts of six 3D printers using
various materials were compared to determine if material choice
drove sustainability, or if other factors such as machine type, machine
size, or machine utilization dominate. Cradle-to-grave life-cycle
assessments were performed, comparing a commercial-scale FDM
machine printing in ABS plastic, a desktop FDM machine printing in
ABS, a desktop FDM machine printing in PET and PLA plastics, a
polyjet machine printing in its proprietary polymer, an SLA machine
printing in its polymer, and an inkjet machine hacked to print in salt
and dextrose. All scenarios were scored using ReCiPe Endpoint H
methodology to combine multiple impact categories, comparing
environmental impacts per part made for several scenarios per
machine. Results showed that most printers’ ecological impacts were
dominated by electricity use, not materials, and the changes in
electricity use due to different plastics was not significant compared
to variation from one machine to another. Variation in machine idle
time determined impacts per part most strongly. However, material
impacts were quite important for the inkjet printer hacked to print in
salt: In its optimal scenario, it had up to 1/38th the impacts coreper
part as the worst-performing machine in the same scenario. If salt
parts were infused with epoxy to make them more physically robust,
then much of this advantage disappeared, and material impacts
actually dominated or equaled electricity use. Future studies should
also measure DMLS and SLS processes / materials.
Abstract: It is difficult to study the effect of various variables on
cycle fitting through actual experiment. To overcome such difficulty,
the forward dynamics of a musculoskeletal model was applied to cycle
fitting in this study. The measured EMG data weres compared with the
muscle activities of the musculoskeletal model through forward
dynamics. EMG data were measured from five cyclists who do not
have musculoskeletal diseases during three minutes pedaling with a
constant load (150 W) and cadence (90 RPM). The muscles used for
the analysis were the Vastus Lateralis (VL), Tibialis Anterior (TA),
Bicep Femoris (BF), and Gastrocnemius Medial (GM). Person’s
correlation coefficients of the muscle activity patterns, the peak timing
of the maximum muscle activities, and the total muscle activities were
calculated and compared. BIKE3D model of AnyBody (Anybodytech,
Denmark) was used for the musculoskeletal model simulation. The
comparisons of the actual experiments with the simulation results
showed significant correlations in the muscle activity patterns (VL:
0.789, TA: 0.503, BF: 0.468, GM: 0.670). The peak timings of the
maximum muscle activities were distributed at particular phases. The
total muscle activities were compared with the normalized muscle
activities, and the comparison showed about 10% difference in the VL
(+10%), TA (+9.7%), and BF (+10%), excluding the GM (+29.4%).
Thus, it can be concluded that muscle activities of model &
experiment showed similar results. The results of this study indicated
that it was possible to apply the simulation of further improved
musculoskeletal model to cycle fitting.
Abstract: The Simulation based VLSI Implementation of
FELICS (Fast Efficient Lossless Image Compression System)
Algorithm is proposed to provide the lossless image compression and
is implemented in simulation oriented VLSI (Very Large Scale
Integrated). To analysis the performance of Lossless image
compression and to reduce the image without losing image quality
and then implemented in VLSI based FELICS algorithm. In FELICS
algorithm, which consists of simplified adjusted binary code for
Image compression and these compression image is converted in
pixel and then implemented in VLSI domain. This parameter is used
to achieve high processing speed and minimize the area and power.
The simplified adjusted binary code reduces the number of arithmetic
operation and achieved high processing speed. The color difference
preprocessing is also proposed to improve coding efficiency with
simple arithmetic operation. Although VLSI based FELICS
Algorithm provides effective solution for hardware architecture
design for regular pipelining data flow parallelism with four stages.
With two level parallelisms, consecutive pixels can be classified into
even and odd samples and the individual hardware engine is
dedicated for each one. This method can be further enhanced by
multilevel parallelisms.
Abstract: This paper identifies limitations of existing two e-
Governance services viz. railway ticket booking and passport service
in India. The comparison has been made as to how in the past these
two citizen services were operating manually and how these services
are taken online via e-Governance. Different e-Governance projects,
investment aspects, and role of corporate are discussed. For Indian
Railway online ticketing a comparison has been made between state
run booking website and popular private firm run booking websites.
For passport service, observations through personal visit to passport
center is described. Suggestions are made to improve these services
further to improve citizen service experiences.