Abstract: This paper introduces two decoders for binary linear
codes based on Metaheuristics. The first one uses a genetic algorithm
and the second is based on a combination genetic algorithm with
a feed forward neural network. The decoder based on the genetic
algorithms (DAG) applied to BCH and convolutional codes give good
performances compared to Chase-2 and Viterbi algorithm respectively
and reach the performances of the OSD-3 for some Residue
Quadratic (RQ) codes. This algorithm is less complex for linear
block codes of large block length; furthermore their performances
can be improved by tuning the decoder-s parameters, in particular the
number of individuals by population and the number of generations.
In the second algorithm, the search space, in contrast to DAG which
was limited to the code word space, now covers the whole binary
vector space. It tries to elude a great number of coding operations
by using a neural network. This reduces greatly the complexity of
the decoder while maintaining comparable performances.
Abstract: It has often been said that the strength of any country
resides in the strength of its industrial sector, and Progress in
industrial society has been accomplished by the creation of new
technologies. Developments have been facilitated by the increasing
availability of advanced manufacturing technology (AMT), in
addition the implementation of advanced manufacturing technology
(AMT) requires careful planning at all levels of the organization to
ensure that the implementation will achieve the intended goals.
Justification and implementation of advanced manufacturing
technology (AMT) involves decisions that are crucial for the
practitioners regarding the survival of business in the present days of
uncertain manufacturing world. This paper assists the industrial
managers to consider all the important criteria for success AMT
implementation, when purchasing new technology. Concurrently,
this paper classifies the tangible benefits of a technology that are
evaluated by addressing both cost and time dimensions, and the
intangible benefits are evaluated by addressing technological,
strategic, social and human issues to identify and create awareness of
the essential elements in the AMT implementation process and
identify the necessary actions before implementing AMT.
Abstract: Large metal and concrete structures suffer by various kinds of deterioration, and accurate prediction of the remaining life is important. This paper informs about two methods for its assessment. One method, suitable for steel bridges and other constructions exposed to fatigue, monitors the loads and damage accumulation using information systems for the operation and the finite element model of the construction. In addition to the operation load, the dead weight of the construction and thermal stresses can be included into the model. The second method is suitable for concrete bridges and other structures, which suffer by carbonatation and other degradation processes, driven by diffusion. The diffusion constant, important for the prediction of future development, can be determined from the depth-profile of pH, obtained by pH measurement at various depths. Comparison with measurements on real objects illustrates the suitability of both methods.
Abstract: The success of IT-projects concerning the
implementation of business application Software is strongly
depending upon the application of an efficient requirements
management, to understand the business requirements and to realize
them in the IT. But in fact, the Potentials of the requirements
management are not fully exhausted by small and medium sized
enterprises (SME) of the IT sector. To work out recommendations for
action and furthermore a possible solution, allowing a better exhaust
of potentials, it shall be examined in a scientific research project,
which problems occur out of which causes. In the same place, the
storage of knowledge from the requirements management, and its
later reuse are important, to achieve sustainable improvements of the
competitive of the IT-SMEs. Requirements Engineering is one of the
most important topics in Product Management for Software to
achieve the goal of optimizing the success of the software product.
Abstract: This paper is a review on the aspects and approaches of design an image cryptosystem. First a general introduction given for cryptography and images encryption and followed by different techniques in image encryption and related works for each technique surveyed. Finally, general security analysis methods for encrypted images are mentioned.
Abstract: In this paper, we show that the association of the PI
regulators for the speed and stator currents with a control strategy
using the linearization by state feedback for an induction machine
without speed sensor, and with an adaptation of the rotor resistance.
The rotor speed is estimated by using the model reference adaptive
system approach (MRAS). This method consists of using two
models: The first is the reference model and the second is an
adjustable one in which two components of the stator flux, obtained
from the measurement of the currents and stator voltages are
estimated. The estimated rotor speed is then obtained by canceling
the difference between stator-flux of the reference model and those
of the adjustable one. Satisfactory results of simulation are obtained
and discussed in this paper to highlight the proposed approach.
Abstract: The intrusion detection problem has been frequently studied, but intrusion detection methods are often based on a single point of view, which always limits the results. In this paper, we introduce a new intrusion detection model based on the combination of different current methods. First we use a notion of distance to unify the different methods. Second we combine these methods using the Pearson correlation coefficients, which measure the relationship between two methods, and we obtain a combined distance. If the combined distance is greater than a predetermined threshold, an intrusion is detected. We have implemented and tested the combination model with two different public data sets: the data set of masquerade detection collected by Schonlau & al., and the data set of program behaviors from the University of New Mexico. The results of the experiments prove that the combination model has better performances.
Abstract: In this paper, fully developed flow and heat transfer of
viscoelastic materials in curved ducts with square cross section under
constant heat flux have been investigated. Here, staggered mesh is
used as computational grids and flow and heat transfer parameters
have been allocated in this mesh with marker and cell method.
Numerical solution of governing equations has being performed with
FTCS finite difference method. Furthermore, Criminale-Eriksen-
Filbey (CEF) constitutive equation has being used as viscoelastic
model. CEF constitutive equation is a suitable model for studying
steady shear flow of viscoelastic materials which is able to model
both effects of the first and second normal stress differences. Here, it
is shown that the first and second normal stresses differences have
noticeable and inverse effect on secondary flows intensity and mean
Nusselt number which is the main novelty of current research.
Abstract: Network security attacks are the violation of
information security policy that received much attention to the
computational intelligence society in the last decades. Data mining
has become a very useful technique for detecting network intrusions
by extracting useful knowledge from large number of network data
or logs. Naïve Bayesian classifier is one of the most popular data
mining algorithm for classification, which provides an optimal way
to predict the class of an unknown example. It has been tested that
one set of probability derived from data is not good enough to have
good classification rate. In this paper, we proposed a new learning
algorithm for mining network logs to detect network intrusions
through naïve Bayesian classifier, which first clusters the network
logs into several groups based on similarity of logs, and then
calculates the prior and conditional probabilities for each group of
logs. For classifying a new log, the algorithm checks in which cluster
the log belongs and then use that cluster-s probability set to classify
the new log. We tested the performance of our proposed algorithm by
employing KDD99 benchmark network intrusion detection dataset,
and the experimental results proved that it improves detection rates
as well as reduces false positives for different types of network
intrusions.
Abstract: In this paper, we propose a novel algorithm for
delineating the endocardial wall from a human heart ultrasound scan.
We assume that the gray levels in the ultrasound images are
independent and identically distributed random variables with
different Rician Inverse Gaussian (RiIG) distributions. Both synthetic
and real clinical data will be used for testing the algorithm. Algorithm
performance will be evaluated using the expert radiologist evaluation
of a soft copy of an ultrasound scan during the scanning process and
secondly, doctor’s conclusion after going through a printed copy of
the same scan. Successful implementation of this algorithm should
make it possible to differentiate normal from abnormal soft tissue and
help disease identification, what stage the disease is in and how best
to treat the patient. We hope that an automated system that uses this
algorithm will be useful in public hospitals especially in Third World
countries where problems such as shortage of skilled radiologists and
shortage of ultrasound machines are common. These public hospitals
are usually the first and last stop for most patients in these countries.
Abstract: We present a dual-band (Cellular & PCS) dual-path
zero-IF receiver for CDMA2000 diversity, monitoring and
simultaneous-GPS. The secondary path is a SAW-less diversity
CDMA receiver which can be also used for advanced features like
monitoring when supported with an additional external VCO. A GPS
receiver is integrated with its dedicated VCO allowing simultaneous
positioning during a cellular call. The circuit is implemented in a
0.25μm 40GHz-fT BiCMOS process and uses a HVQFN 56-pin
package. It consumes a maximum 300mW from a 2.8V supply in
dual-modes. The chip area is 12.8mm2.
Abstract: This paper demonstrates a model of an e-Learning
system based on nowadays learning theory and distant education
practice. The relationships in the model are designed to be simple
and functional and do not necessarily represent any particular e-
Learning environments. It is meant to be a generic e-Learning
system model with implications for any distant education course
instructional design. It allows online instructors to move away from
the discrepancy between the courses and body of knowledge. The
interrelationships of four primary sectors that are at the e-Learning
system are presented in this paper. This integrated model includes
[1] pedagogy, [2] technology, [3] teaching, and [4] learning. There
are interactions within each of these sectors depicted by system loop
map.
Abstract: Public bus service plays a significant role in our
society as people movers and to facilitate travels within towns and districts. The quality of service of public bus is always being
regarded as poor, or rather, underestimated as second class means of transportation. Reliability of service, or the ability to deliver service as planned, is one key element in perceiving the quality of bus service and the punctuality index is one of the performance parameters in determining the service reliability. This study
concentrates on evaluating the reliability performance of bus operation using punctuality index assessment. A week data for each
of six city bus routes is recorded using the on-board methodology to calculate the punctuality index for city bus service in Kota Bharu. The results revealed that the punctuality index for the whole city bus network is 94.25% (LOS B).
Abstract: The objective of this manuscript is to find area under the plasma concentration- time curve (AUC) for multiple doses of salbutamol sulphate sustained release tablets (Ventolin® oral tablets SR 8 mg, GSK, Pakistan) in the group of 18 healthy adults by using computational mathematics techniques. Following the administration of 4 doses of Ventolin® tablets 12 hourly to 24 healthy human subjects and bioanalysis of obtained plasma samples, plasma drug concentration-time profile was constructed. AUC, an important pharmacokinetic parameter, was measured using integrated equation of multiple oral dose regimens. The approximated AUC was also calculated by using computational mathematics techniques such as repeated rectangular, repeated trapezium and repeated Simpson's rule and compared with exact value of AUC calculated by using integrated equation of multiple oral dose regimens to find best computational mathematics method that gives AUC values closest to exact. The exact values of AUC for four consecutive doses of Ventolin® oral tablets were 150.5819473, 157.8131756, 164.4178231 and 162.78 ng.h/ml while the closest values approximated AUC values were 149.245962, 157.336171, 164.2585768 and 162.289224 ng.h/ml, respectively as found by repeated rectangular rule. The errors in the approximated values of AUC were negligible. It is concluded that all computational tools approximated values of AUC accurately but the repeated rectangular rule gives slightly better approximated values of AUC as compared to repeated trapezium and repeated Simpson's rules.
Abstract: terrorism and extremism are among the most
dangerous and difficult to forecast the phenomena of our time, which
are becoming more diverse forms and rampant. Terrorist attacks often
produce mass casualties, involve the destruction of material and
spiritual values, beyond the recovery times, sow hatred among
nations, provoke war, mistrust and hatred between the social and
national groups, which sometimes can not be overcome within a
generation. Currently, the countries of Central Asia are a topical issue
– the threat of terrorism and religious extremism, which grow not
only in our area, but throughout the world. Of course, in each of the
terrorist threat is assessed differently. In our country the problem of
terrorism should not be acutely. Thus, after independence and
sovereignty of Kazakhstan has chosen the path of democracy,
progress and free economy. With the policy of the President of
Kazakhstan Nursultan Nazarbayev and well-organized political and
economic reforms, there has been economic growth and rising living
standards, socio-political stability, ensured civil peace and accord in
society [1].
Abstract: Ultra-wide band (UWB) communication is one of
the most promising technologies for high data rate wireless networks
for short range applications. This paper proposes a blind channel
estimation method namely IMM (Interactive Multiple Model) Based
Kalman algorithm for UWB OFDM systems. IMM based Kalman
filter is proposed to estimate frequency selective time varying
channel. In the proposed method, two Kalman filters are concurrently
estimate the channel parameters. The first Kalman filter namely
Static Model Filter (SMF) gives accurate result when the user is static
while the second Kalman filter namely the Dynamic Model Filter
(DMF) gives accurate result when the receiver is in moving state. The
static transition matrix in SMF is assumed as an Identity matrix
where as in DMF, it is computed using Yule-Walker equations. The
resultant filter estimate is computed as a weighted sum of individual
filter estimates. The proposed method is compared with other existing
channel estimation methods.
Abstract: Swedish truck industry is investigating the possibility
for implementing the use of Compacted Graphite Iron (CGI) in their
heavy duty diesel engines. Compared to the alloyed gray iron used
today, CGI has superior mechanical properties but not as good
machinability. Another issue that needs to be addressed when
implementing CGI is the inhomogeneous microstructure when the
cast component has different section thicknesses, as in cylinder
blocks. Thinner sections results in finer pearlite, in the material, with
higher strength. Therefore an investigation on its influence on
machinability was needed. This paper focuses on the effect that
interlamellar distance in pearlite has on CGI machinability and
material physical properties. The effect of pearlite content and
nodularity is also examined. The results showed that interlamellar
distance in pearlite did not have as large effect on the material
physical properties or machinability as pearlite content. The paper
also shows the difficulties of obtaining a homogeneous
microstructure in inhomogeneous workpieces.
Abstract: This paper presents a robust vehicle detection approach using Haar-like feature. It is possible to get a strong edge feature from this Haar-like feature. Therefore it is very effective to remove the shadow of a vehicle on the road. And we can detect the boundary of vehicles accurately. In the paper, the vehicle detection algorithm can be divided into two main steps. One is hypothesis generation, and the other is hypothesis verification. In the first step, it determines vehicle candidates using features such as a shadow, intensity, and vertical edge. And in the second step, it determines whether the candidate is a vehicle or not by using the symmetry of vehicle edge features. In this research, we can get the detection rate over 15 frames per second on our embedded system.
Abstract: The pulp and paper mill effluent is one of the high
polluting effluent amongst the effluents obtained from polluting
industries. All the available methods for treatment of pulp and paper
mill effluent have certain drawbacks. The coagulation is one of the
cheapest process for treatment of various organic effluents. Thus, the
removal of chemical oxygen demand (COD) and colour of paper mill
effluent is studied using coagulation process. The batch coagulation
process was performed using various coagulants like: aluminium
chloride, poly aluminium chloride and copper sulphate. The initial
pH of the effluent (Coagulation pH) has tremendous effect on COD
and colour removal. Poly aluminium chloride (PAC) as coagulant
reduced COD to 84 % and 92 % of colour was removed at an
optimum pH 5 and coagulant dose of 8 ml l-1. With aluminium
chloride at an optimum pH = 4 and coagulant dose of 5 g l-1, 74 %
COD and 86 % colour removal were observed. The results using
copper sulphate as coagulant (a less commercial coagulant) were
encouraging. At an optimum pH 6 and mass loading of 5 g l-1, 76 %
COD reduction and 78 % colour reduction were obtained. It was also
observed that after addition of coagulant, the pH of the effluent
decreases. The decrease in pH was highest for AlCl3, which was
followed by PAC and CuSO4. Significant amount of COD reductions
was obtained by coagulation process. Since the coagulation process
is the first stage for treatment of effluent and some of the coagulant
cations usually remain in the treated effluents. Thus, cation like
copper may be one of the good catalyst for second stage of treatment
process like wet oxidation. The copper has been found to be good
oxidation catalyst then iron and aluminum.
Abstract: Studies revealing the positive relationship between
trade and income are often criticized with the argument that
“development should mean more than rising incomes". Taking this
argument as a base and utilizing panel data, Davies and Quinlivan [1]
have demonstrated that increases in trade are positively associated
with future increases in social welfare as measured by the Human
Development Index (HDI). The purpose of this study is twofold:
Firstly, utilizing an income based country classification; it is aimed
to investigate whether the positive association between foreign trade
and HDI is valid within all country groups. Secondly, keeping the
same categorization as a base; it is aimed to reveal whether the
positive link between trade and HDI still exists when the income
components of the index are excluded. Employing a panel data
framework of 106 countries, this study reveals that the positive link
between trade and human development is valid only for high and
medium income countries. Moreover, the positive link between trade
and human development diminishes in lower-medium income
countries when only non-income components of the index are taken
into consideration.