Abstract: Some Chromium (III) complexes were synthesized
with three amino acids: L Glutamic Acid, Glycine, and L-cysteine as
the ligands, in order to provide a new supplement containing Cr(III)
for patients with type 2 diabetes mellitus. The complexes have been
prepared by refluxing a mixture of Chromium(III) chloride in
aqueous solution with L-glutamic acid, Glycine, and L-cysteine after
pH adjustment by sodium hydroxide. These complexes were
characterized by Infrared and Uv-Vis spectrophotometer and
Elemental analyzer. The product yields of four products were 87.50
and 56.76% for Cr-Glu complexes, 46.70% for Cr-Gly complex and
40.08% for Cr-Cys complex respectively. The predicted structure of
the complexes are [Cr(glu)2(H2O)2].xH2O, Cr(gly)3..xH2O and
Cr(cys)3.xH2O., respectively.
Abstract: In this paper, we present a cost-effective wireless
distributed load shedding system for non-emergency scenarios. In
power transformer locations where SCADA system cannot be used,
the proposed solution provides a reasonable alternative that combines
the use of microcontrollers and existing GSM infrastructure to send
early warning SMS messages to users advising them to proactively
reduce their power consumption before system capacity is reached
and systematic power shutdown takes place.
A novel communication protocol and message set have been
devised to handle the messaging between the transformer sites, where
the microcontrollers are located and where the measurements take
place, and the central processing site where the database server is
hosted. Moreover, the system sends warning messages to the endusers
mobile devices that are used as communication terminals. The
system has been implemented and tested via different experimental
results.
Abstract: Because of the great advance in multimedia
technology, digital multimedia is vulnerable to malicious
manipulations. In this paper, a public key self-recovery block-based
video authentication technique is proposed which can not only
precisely localize the alteration detection but also recover the missing
data with high reliability. In the proposed block-based technique,
multiple description coding MDC is used to generate two codes (two
descriptions) for each block. Although one block code (one
description) is enough to rebuild the altered block, the altered block
is rebuilt with better quality by the two block descriptions. So using
MDC increases the ratability of recovering data. A block signature is
computed using a cryptographic hash function and a doubly linked
chain is utilized to embed the block signature copies and the block
descriptions into the LSBs of distant blocks and the block itself. The
doubly linked chain scheme gives the proposed technique the
capability to thwart vector quantization attacks. In our proposed
technique , anyone can check the authenticity of a given video using
the public key. The experimental results show that the proposed
technique is reliable for detecting, localizing and recovering the
alterations.
Abstract: Flash floods are considered natural disasters that can
cause casualties and demolishing of infra structures. The problem is
that flash floods, particularly in arid and semi arid zones, take place
in very short time. So, it is important to forecast flash floods earlier to
its events with a lead time up to 48 hours to give early warning alert
to avoid or minimize disasters. The flash flood took place over Wadi
Watier - Sinai Peninsula, in October 24th, 2008, has been simulated,
investigated and analyzed using the state of the art regional weather
model. The Weather Research and Forecast (WRF) model, which is a
reliable short term forecasting tool for precipitation events, has been
utilized over the study area. The model results have been calibrated
with the real data, for the same date and time, of the rainfall
measurements recorded at Sorah gauging station. The WRF model
forecasted total rainfall of 11.6 mm while the real measured one was
10.8 mm. The calibration shows significant consistency between
WRF model and real measurements results.
Abstract: Business process automation is an important task in an
enterprise business environment software development. The
requirements of processing acceleration and automation level of
enterprises are inherently different from one organization to another.
We present a methodology and system for automation of business
process management system architecture by multi-agent collaboration
based on SOA. Design layer processes are modeled in semantic
markup language for web services application. At the core of our
system is considering certain types of human tasks to their further
automation across over multiple platform environments. An
improved abnormality processing with model for automation of
BPMS architecture by multi-agent collaboration based on SOA is
introduced. Validating system for efficiency of process automation,
an application for educational knowledge base instance would also be
described.
Abstract: This paper investigates the application of Particle Swarm Optimization (PSO) technique for coordinated design of a Power System Stabilizer (PSS) and a Thyristor Controlled Series Compensator (TCSC)-based controller to enhance the power system stability. The design problem of PSS and TCSC-based controllers is formulated as a time domain based optimization problem. PSO algorithm is employed to search for optimal controller parameters. By minimizing the time-domain based objective function, in which the deviation in the oscillatory rotor speed of the generator is involved; stability performance of the system is improved. To compare the capability of PSS and TCSC-based controller, both are designed independently first and then in a coordinated manner for individual and coordinated application. The proposed controllers are tested on a weakly connected power system. The eigenvalue analysis and non-linear simulation results are presented to show the effectiveness of the coordinated design approach over individual design. The simulation results show that the proposed controllers are effective in damping low frequency oscillations resulting from various small disturbances like change in mechanical power input and reference voltage setting.
Abstract: Malay Folk Literature in early childhood education
served as an important agent in child development that involved
emotional, thinking and language aspects. Up to this moment not
much research has been carried out in Malaysia particularly in the
teaching and learning aspects nor has there been an effort to publish
“big books." Hence this article will discuss the stance taken by
university undergraduate students, teachers and parents in evaluating
Malay Folk Literature in early childhood education to be used as big
books. The data collated and analyzed were taken from 646
respondents comprising 347 undergraduates and 299 teachers. Results
of the study indicated that Malay Folk Literature can be absorbed into
teaching and learning for early childhood with a mean of 4.25 while it
can be in big books with a mean of 4.14. Meanwhile the highest mean
value required for placing Malay Folk Literature genre as big books in
early childhood education rests on exemplary stories for
undergraduates with mean of 4.47; animal fables for teachers with a
mean of 4.38. The lowest mean value of 3.57 is given to lipurlara
stories. The most popular Malay Folk Literature found suitable for
early children is Sang Kancil and the Crocodile, followed by Bawang
Putih Bawang Merah. Pak Padir, Legends of Mahsuri, Origin of
Malacca, and Origin of Rainbow are among the popular stories as
well. Overall the undergraduates show a positive attitude toward all
the items compared to teachers. The t-test analysis has revealed a non
significant relationship between the undergraduate students and
teachers with all the items for the teaching and learning of Malay Folk
Literature.
Abstract: Avionic software architecture has transit from a
federated avionics architecture to an integrated modular avionics
(IMA) .ARINC 653 (Avionics Application Standard Software Interface) is a software specification for space and time partitioning in
Safety-critical avionics Real-time operating systems. Methods to transform the abstract avionics application logic function to the
executable model have been brought up, however with less
consideration about the code generating input and output model specific for ARINC 653 platform and inner-task synchronous dynamic
interaction order sequence. In this paper, we proposed an
AADL-based model-driven design methodology to fulfill the purpose
to automatically generating Cµ executable model on ARINC 653 platform from the ARINC653 architecture which defined as AADL653 in order to facilitate the development of the avionics software constructed on ARINC653 OS. This paper presents the
mapping rules between the AADL653 elements and the elements in
Cµ language, and define the code generating rules , designs an automatic C µ code generator .Then, we use a case to illustrate our
approach. Finally, we give the related work and future research directions.
Abstract: Several studies have been carried out, using various techniques, including neural networks, to discriminate vigilance states in humans from electroencephalographic (EEG) signals, but we are still far from results satisfactorily useable results. The work presented in this paper aims at improving this status with regards to 2 aspects. Firstly, we introduce an original procedure made of the association of two neural networks, a self organizing map (SOM) and a learning vector quantization (LVQ), that allows to automatically detect artefacted states and to separate the different levels of vigilance which is a major breakthrough in the field of vigilance. Lastly and more importantly, our study has been oriented toward real-worked situation and the resulting model can be easily implemented as a wearable device. It benefits from restricted computational and memory requirements and data access is very limited in time. Furthermore, some ongoing works demonstrate that this work should shortly results in the design and conception of a non invasive electronic wearable device.
Abstract: This paper describes the evolution of strategies to
evaluate ePortfolios in an online Master-s of Education (M.Ed.)
degree in Instructional Technology. The ePortfolios are required as a
culminating activity for students in the program. By using Web 2.0
tools to develop the ePortfolios, students are able to showcase their
technical skills, integrate national standards, demonstrate their
professional understandings, and reflect on their individual learning.
Faculty have created assessment strategies to evaluate student
achievement of these skills. To further develop ePortfolios as a tool
promoting authentic learning, faculty are moving toward integrating
transparency as part of the evaluation process.
Abstract: The exact gain shape profile of erbium doped fiber
amplifiers (EDFA`s) are depends on fiber length and Er3 ion
densities. This paper optimized several of erbium doped fiber
parameters to obtain high performance characteristic at pump
wavelengths of λp= 980 nm and λs= 1550 nm for three different
pump powers. The maximum gain obtained for pump powers (10, 30
and 50mw) is nearly (19, 30 and 33 dB) at optimizations. The
required numerical aperture NA to obtain maximum gain becomes
less when pump power increased. The amplifier gain is increase
when Er+3doped near the center of the fiber core. The simulation has
been done by using optisystem 5.0 software (CAD for Photonics, a
license product of a Canadian based company) at 2.5 Gbps.
Abstract: In this paper, we propose a Connect6 solver which
adopts a hybrid approach based on a tree-search algorithm and image
processing techniques. The solver must deal with the complicated
computation and provide high performance in order to make real-time
decisions. The proposed approach enables the solver to be
implemented on a single Spartan-6 XC6SLX45 FPGA produced by
XILINX without using any external devices. The compact
implementation is achieved through image processing techniques to
optimize a tree-search algorithm of the Connect6 game. The tree
search is widely used in computer games and the optimal search brings
the best move in every turn of a computer game. Thus, many
tree-search algorithms such as Minimax algorithm and artificial
intelligence approaches have been widely proposed in this field.
However, there is one fundamental problem in this area; the
computation time increases rapidly in response to the growth of the
game tree. It means the larger the game tree is, the bigger the circuit
size is because of their highly parallel computation characteristics.
Here, this paper aims to reduce the size of a Connect6 game tree using
image processing techniques and its position symmetric property. The
proposed solver is composed of four computational modules: a
two-dimensional checkmate strategy checker, a template matching
module, a skilful-line predictor, and a next-move selector. These
modules work well together in selecting next moves from some
candidates and the total amount of their circuits is small. The details of
the hardware design for an FPGA implementation are described and
the performance of this design is also shown in this paper.
Abstract: Traditional Javanese classic dance is a valuable
inheritance in Java Indonesia. Nowadays, this treasure of culture is
no longer belonging to Javanese people only. Many art departments
from universities around the world already put this as a subject in
their curriculum. Nonetheless, dance is a practical skill. It needs to be
practices so often while accompanied by an instructor to get the right
technique. An interactive Computer Aided Instruction (iCAI) that can
interactively assist the student to practice is developed. By using this
software students can conduct a self practice in studio and get some
feedbacks from the software. This CAI is not intended to replace the
instructor, but to assist them in increasing the student fly-time in
practice.
Abstract: Requirements management is critical to software
delivery success and project lifecycle. Requirements management
and their traceability provide assistance for many software
engineering activities like impact analysis, coverage analysis,
requirements validation and regression testing. In addition
requirements traceability is the recognized component of many
software process improvement initiatives. Requirements traceability
also helps to control and manage evolution of a software system.
This paper aims to provide an evaluation of current requirements
management and traceability tools. Management and test managers
require an appropriate tool for the software under test. We hope,
evaluation identified here will help to select the efficient and
effective tool.
Abstract: In this paper a new fast simplification method is
presented. Such method realizes Karnough map with large
number of variables. In order to accelerate the operation of the
proposed method, a new approach for fast detection of group
of ones is presented. Such approach implemented in the
frequency domain. The search operation relies on performing
cross correlation in the frequency domain rather than time one.
It is proved mathematically and practically that the number of
computation steps required for the presented method is less
than that needed by conventional cross correlation. Simulation
results using MATLAB confirm the theoretical computations.
Furthermore, a powerful solution for realization of complex
functions is given. The simplified functions are implemented
by using a new desigen for neural networks. Neural networks
are used because they are fault tolerance and as a result they
can recognize signals even with noise or distortion. This is
very useful for logic functions used in data and computer
communications. Moreover, the implemented functions are
realized with minimum amount of components. This is done
by using modular neural nets (MNNs) that divide the input
space into several homogenous regions. Such approach is
applied to implement XOR function, 16 logic functions on one
bit level, and 2-bit digital multiplier. Compared to previous
non- modular designs, a clear reduction in the order of
computations and hardware requirements is achieved.
Abstract: In this paper a functional interpretation of quantum
theory (QT) with emphasis on quantum field theory (QFT) is proposed.
Besides the usual statements on relations between a functions
initial state and final state, a functional interpretation also contains
a description of the dynamic evolution of the function. That is, it
describes how things function. The proposed functional interpretation
of QT/QFT has been developed in the context of the author-s work
towards a computer model of QT with the goal of supporting
the largest possible scope of QT concepts. In the course of this
work, the author encountered a number of problems inherent in the
translation of quantum physics into a computer program. He came
to the conclusion that the goal of supporting the major QT concepts
can only be satisfied, if the present model of QT is supplemented
by a "functional interpretation" of QT/QFT. The paper describes a
proposal for that
Abstract: Rounding of coefficients is a common practice in
hardware implementation of digital filters. Where some coefficients
are very close to zero or one, as assumed in this paper, this rounding
action also leads to some computation reduction. Furthermore, if the
discarded coefficient is of high order, a reduced order filter is
obtained, otherwise the order does not change but computation is
reduced. In this paper, the Least Squares approximation to rounded
(or discarded) coefficient FIR filter is investigated. The result also
succinctly extended to general type of FIR filters.
Abstract: Neural networks are well known for their ability to
model non linear functions, but as statistical methods usually does,
they use a no parametric approach thus, a priori knowledge is not
obvious to be taken into account no more than the a posteriori
knowledge. In order to deal with these problematics, an original way
to encode the knowledge inside the architecture is proposed. This
method is applied to the problem of the evapotranspiration inside
karstic aquifer which is a problem of huge utility in order to deal
with water resource.
Abstract: This work presents a new approach of securing a
wireless network. The configuration is focused on securing &
Protecting wireless network traffic for a small network such as a
home or dorm room. The security Mechanism provided both
authentication, allowing only known authorized users access to the
wireless network, and encryption, preventing anyone from reading
the wireless traffic. The mentioned solution utilizes the open source
free S/WAN software which implements the Internet Protocol
Security –IPSEC. In addition to wireless components, wireless NIC
in PC and wireless access point needs a machine running Linux to act
as security gateway. While the current configuration assumes that the
wireless PC clients are running Linux, Windows XP/VISTA/7 based
machines equipped with VPN software which will allow to interface
with this configuration.
Abstract: Today, design requirements are extending more and
more from electronic (analogue and digital) to multidiscipline design.
These current needs imply implementation of methodologies to make
the CAD product reliable in order to improve time to market, study
costs, reusability and reliability of the design process.
This paper proposes a high level design approach applied for the
characterization and the optimization of Switched-Current Sigma-
Delta Modulators. It uses the new hardware description language
VHDL-AMS to help the designers to optimize the characteristics of
the modulator at a high level with a considerably reduced CPU time
before passing to a transistor level characterization.