Abstract: In this paper, novel statistical sampling based equalization techniques and CNN based detection are proposed to increase the spectral efficiency of multiuser communication systems over fading channels. Multiuser communication combined with selective fading can result in interferences which severely deteriorate the quality of service in wireless data transmission (e.g. CDMA in mobile communication). The paper introduces new equalization methods to combat interferences by minimizing the Bit Error Rate (BER) as a function of the equalizer coefficients. This provides higher performance than the traditional Minimum Mean Square Error equalization. Since the calculation of BER as a function of the equalizer coefficients is of exponential complexity, statistical sampling methods are proposed to approximate the gradient which yields fast equalization and superior performance to the traditional algorithms. Efficient estimation of the gradient is achieved by using stratified sampling and the Li-Silvester bounds. A simple mechanism is derived to identify the dominant samples in real-time, for the sake of efficient estimation. The equalizer weights are adapted recursively by minimizing the estimated BER. The near-optimal performance of the new algorithms is also demonstrated by extensive simulations. The paper has also developed a (Cellular Neural Network) CNN based approach to detection. In this case fast quadratic optimization has been carried out by t, whereas the task of equalizer is to ensure the required template structure (sparseness) for the CNN. The performance of the method has also been analyzed by simulations.
Abstract: The treatment of the industrial wastewater can be
particularly difficult in the presence of toxic compounds. Excessive
concentration of Chromium in soluble form is toxic to a wide variety
of living organisms. Biological removal of heavy metals using natural
and genetically engineered microorganisms has aroused great interest
because of its lower impact on the environment. Ralston
metallidurans, formerly known as Alcaligenes eutrophus is a LProteobacterium
colonizing industrial wastewater with a high content
of heavy metals. Tris-buffered mineral salt medium was used for
growing Alcaligenes eutrophus AE104 (pEBZ141). The cells were
cultivated for 18 h at 30 oC in Tris-buffered mineral salt medium
containing 3 mM disodium sulphate and 46 mM sodium gluconate as
the carbon source. The cells were harvested by centrifugation,
washed, and suspended in 10 mM Tris HCl, pH 7.0, containing 46
mM sodium gluconate, and 5 mM Chromium. Interaction among
induction of chr resistance determinant, and chromate reduction have
been demonstrated. Results of this study show that the above bacteria
can be very useful for bioremediation of chromium from industrial
wastewater.
Abstract: Surveillance system is widely used in the traffic
monitoring. The deployment of cameras is moving toward a
ubiquitous camera (UbiCam) environment. In our previous study, a
novel service, called GPS-VT, was firstly proposed by incorporating
global positioning system (GPS) and visual tracking techniques for
the UbiCam environment. The first prototype is called GODTA
(GPS-based Moving Object Detection and Tracking Approach). For a
moving person carried GPS-enabled mobile device, he can be
tracking when he enters the field-of-view (FOV) of a camera
according to his real-time GPS coordinate. In this paper, GPS-VT
service is applied to the tracking of vehicles. The moving speed of a
vehicle is much faster than a person. It means that the time passing
through the FOV is much shorter than that of a person. Besides, the
update interval of GPS coordinate is once per second, it is
asynchronous with the frame rate of the real-time image. The above
asynchronous is worsen by the network transmission delay. These
factors are the main challenging to fulfill GPS-VT service on a
vehicle.In order to overcome the influence of the above factors, a
back-propagation neural network (BPNN) is used to predict the
possible lane before the vehicle enters the FOV of a camera. Then, a
template matching technique is used for the visual tracking of a target
vehicle. The experimental result shows that the target vehicle can be
located and tracking successfully. The success location rate of the
implemented prototype is higher than that of the previous GODTA.
Abstract: Least Development Countries (LDC) like
Bangladesh, whose 25% revenue earning is achieved from Textile
export, requires producing less defective textile for minimizing
production cost and time. Inspection processes done on these
industries are mostly manual and time consuming. To reduce error
on identifying fabric defects requires more automotive and
accurate inspection process. Considering this lacking, this research
implements a Textile Defect Recognizer which uses computer
vision methodology with the combination of multi-layer neural
networks to identify four classifications of textile defects. The
recognizer, suitable for LDC countries, identifies the fabric defects
within economical cost and produces less error prone inspection
system in real time. In order to generate input set for the neural
network, primarily the recognizer captures digital fabric images by
image acquisition device and converts the RGB images into binary
images by restoration process and local threshold techniques.
Later, the output of the processed image, the area of the faulty
portion, the number of objects of the image and the sharp factor of
the image, are feed backed as an input layer to the neural network
which uses back propagation algorithm to compute the weighted
factors and generates the desired classifications of defects as an
output.
Abstract: The vehicle fleet of public transportation companies is often equipped with intelligent on-board passenger information systems. A frequently used but time and labor-intensive way for keeping the on-board controllers up-to-date is the manual update using different memory cards (e.g. flash cards) or portable computers. This paper describes a compression algorithm that enables data transmission using low bandwidth wireless radio networks (e.g. GPRS) by minimizing the amount of data traffic. In typical cases it reaches a compression rate of an order of magnitude better than that of the general purpose compressors. Compressed data can be easily expanded by the low-performance controllers, too.
Abstract: In this article we propose to model Net-banking
system by game theory. We adopt extensive game to model our web
application. We present the model in term of players and strategy.
We present UML diagram related the protocol game.
Abstract: It has been recognized that due to the autonomy and
heterogeneity, of Web services and the Web itself, new approaches
should be developed to describe and advertise Web services. The
most notable approaches rely on the description of Web services
using semantics. This new breed of Web services, termed semantic
Web services, will enable the automatic annotation, advertisement,
discovery, selection, composition, and execution of interorganization
business logic, making the Internet become a common
global platform where organizations and individuals communicate
with each other to carry out various commercial activities and to
provide value-added services. This paper deals with two of the
hottest R&D and technology areas currently associated with the Web
– Web services and the semantic Web. It describes how semantic
Web services extend Web services as the semantic Web improves the
current Web, and presents three different conceptual approaches to
deploying semantic Web services, namely, WSDL-S, OWL-S, and
WSMO.
Abstract: In this paper performance of Puma 560
manipulator is being compared for hybrid gradient descent
and least square method learning based ANFIS controller with
hybrid Genetic Algorithm and Generalized Pattern Search
tuned radial basis function based Neuro-Fuzzy controller.
ANFIS which is based on Takagi Sugeno type Fuzzy
controller needs prior knowledge of rule base while in radial
basis function based Neuro-Fuzzy rule base knowledge is not
required. Hybrid Genetic Algorithm with generalized Pattern
Search is used for tuning weights of radial basis function
based Neuro- fuzzy controller. All the controllers are checked
for butterfly trajectory tracking and results in the form of
Cartesian and joint space errors are being compared. ANFIS
based controller is showing better performance compared to
Radial Basis Function based Neuro-Fuzzy Controller but rule
base independency of RBF based Neuro-Fuzzy gives it an
edge over ANFIS
Abstract: The resource-based view of the firm regards
knowledge as one of the most important organizational assets and a
key strategic resource that contributes unique value to organizations.
The acquisition, absorption and internalization of external
knowledge are central to an organization-s innovative capabilities.
This ability to evaluate, acquire and integrate new knowledge from
its environment is referred to as a firm-s absorptive capacity (AC).
This research in progress paper explores the link between interorganizational
Social Networks (SNs) and a firm-s Absorptive
Capacity (AC). Based on an in-depth literature survey of both
concepts, four propositions are proposed that explain the link
between AC and SNs. These propositions suggest that SNs are key
to a firm-s AC. A qualitative research method is proposed to test the
set of propositions in the next stage of this research.
Abstract: Home Automation is a field that, among other
subjects, is concerned with the comfort, security and energy
requirements of private homes. The configuration of automatic
functions in this type of houses is not always simple to its inhabitants
requiring the initial setup and regular adjustments. In this work, the
ubiquitous computing system vision is used, where the users- action
patterns are captured, recorded and used to create the contextawareness
that allows the self-configuration of the home automation
system. The system will try to free the users from setup adjustments
as the home tries to adapt to its inhabitants- real habits. In this paper
it is described a completely automated process to determine the light
state and act on them, taking in account the users- daily habits.
Artificial Neural Network (ANN) is used as a pattern recognition
method, classifying for each moment the light state. The work
presented uses data from a real house where a family is actually
living.
Abstract: The increasing development of wireless networks and
the widespread popularity of handheld devices such as Personal
Digital Assistants (PDAs), mobile phones and wireless tablets
represents an incredible opportunity to enable mobile devices as a
universal payment method, involving daily financial transactions.
Unfortunately, some issues hampering the widespread acceptance of
mobile payment such as accountability properties, privacy protection,
limitation of wireless network and mobile device. Recently, many
public-key cryptography based mobile payment protocol have been
proposed. However, limited capabilities of mobile devices and
wireless networks make these protocols are unsuitable for mobile
network. Moreover, these protocols were designed to preserve
traditional flow of payment data, which is vulnerable to attack and
increase the user-s risk. In this paper, we propose a private mobile
payment protocol which based on client centric model and by
employing symmetric key operations. The proposed mobile payment
protocol not only minimizes the computational operations and
communication passes between the engaging parties, but also
achieves a completely privacy protection for the payer. The future
work will concentrate on improving the verification solution to
support mobile user authentication and authorization for mobile
payment transactions.
Abstract: Nonspecific protein adsorption generally occurs on
any solid surfaces and usually has adverse consequences. Adsorption
of proteins onto a solid surface is believed to be the initial and
controlling step in biofouling. Surfaces modified with end-tethered
poly(ethylene glycol) (PEG) have been shown to be protein-resistant
to some degree. In this study, the adsorption of β-casein and
lysozyme was performed on 6 different types of surfaces where PEG
was tethered onto stainless steel by polyethylene imine (PEI) through
either OH or NHS end groups. Protein adsorption was also performed
on the bare stainless steel surface as a control. The adsorption was
conducted at 23 °C and pH 7.2. In situ QCM-D was used to
determine PEG adsorption kinetics, plateau PEG chain densities,
protein adsorption kinetics and plateau protein adsorbed quantities.
PEG grafting density was the highest for a NHS coupled chain,
around 0.5 chains / nm2. Interestingly, lysozyme which has smaller
size than β-casein, appeared to adsorb much less mass than that of β-
casein. Overall, the surface with high PEG grafting density exhibited
a good protein rejection.
Abstract: Due to the limited energy resources, energy efficient operation of sensor node is a key issue in wireless sensor networks. Clustering is an effective method to prolong the lifetime of energy constrained wireless sensor network. However, clustering in wireless sensor network faces several challenges such as selection of an optimal group of sensor nodes as cluster, optimum selection of cluster head, energy balanced optimal strategy for rotating the role of cluster head in a cluster, maintaining intra and inter cluster connectivity and optimal data routing in the network. In this paper, we propose a protocol supporting an energy efficient clustering, cluster head selection/rotation and data routing method to prolong the lifetime of sensor network. Simulation results demonstrate that the proposed protocol prolongs network lifetime due to the use of efficient clustering, cluster head selection/rotation and data routing.
Abstract: In the oil and gas industry, energy prediction can help
the distributor and customer to forecast the outgoing and incoming
gas through the pipeline. It will also help to eliminate any
uncertainties in gas metering for billing purposes. The objective of
this paper is to develop Neural Network Model for energy
consumption and analyze the performance model. This paper
provides a comprehensive review on published research on the
energy consumption prediction which focuses on structures and the
parameters used in developing Neural Network models. This paper is
then focused on the parameter selection of the neural network
prediction model development for energy consumption and analysis
on the result. The most reliable model that gives the most accurate
result is proposed for the prediction. The result shows that the
proposed neural network energy prediction model is able to
demonstrate an adequate performance with least Root Mean Square
Error.
Abstract: K-Means (KM) is considered one of the major
algorithms widely used in clustering. However, it still has some
problems, and one of them is in its initialization step where it is
normally done randomly. Another problem for KM is that it
converges to local minima. Genetic algorithms are one of the
evolutionary algorithms inspired from nature and utilized in the field
of clustering. In this paper, we propose two algorithms to solve the
initialization problem, Genetic Algorithm Initializes KM (GAIK) and
KM Initializes Genetic Algorithm (KIGA). To show the effectiveness
and efficiency of our algorithms, a comparative study was done
among GAIK, KIGA, Genetic-based Clustering Algorithm (GCA),
and FCM [19].
Abstract: Internet Protocol version 4 (IPv4) address is decreasing and a rapid transition method to the next generation IP address (IPv6) should be established. This study aims to evaluate and select the best performance of the IPv6 address network transitionmechanisms, such as IPv4/IPv6 dual stack, transport Relay Translation (TRT) and Reverse Proxy with additional features. It is also aim to prove that faster access can be done while ensuring optimal usage of available resources used during the test and actual implementation. This study used two test methods such asInternet Control Message Protocol (ICMP)ping and ApacheBenchmark (AB) methodsto evaluate the performance.Performance metrics for this study include aspects ofaverageaccessin one second,time takenfor singleaccess,thedata transfer speed and the costof additional requirements.Reverse Proxy with Caching featureis the most efficientmechanism because of it simpler configurationandthe best performerfrom the test conducted.
Abstract: In this paper, we propose improved versions of DVHop
algorithm as QDV-Hop algorithm and UDV-Hop algorithm for
better localization without the need for additional range measurement
hardware. The proposed algorithm focuses on third step of DV-Hop,
first error terms from estimated distances between unknown node and
anchor nodes is separated and then minimized. In the QDV-Hop
algorithm, quadratic programming is used to minimize the error to
obtain better localization. However, quadratic programming requires
a special optimization tool box that increases computational
complexity. On the other hand, UDV-Hop algorithm achieves
localization accuracy similar to that of QDV-Hop by solving
unconstrained optimization problem that results in solving a system
of linear equations without much increase in computational
complexity. Simulation results show that the performance of our
proposed schemes (QDV-Hop and UDV-Hop) is superior to DV-Hop
and DV-Hop based algorithms in all considered scenarios.
Abstract: The Address Resolution Protocol (ARP) is used by
computers to map logical addresses (IP) to physical addresses
(MAC). However ARP is an all trusting protocol and is stateless
which makes it vulnerable to many ARP cache poisoning attacks
such as Man-in-the-Middle (MITM) and Denial of service (DoS)
attacks. These flaws result in security breaches thus weakening the
appeal of the computer for exchange of sensitive data. In this paper
we describe ARP, outline several possible ARP cache poisoning
attacks and give the detailed of some attack scenarios in network
having both wired and wireless hosts. We have analyzed each of
proposed solutions, identify their strengths and limitations. Finally
get that no solution offers a feasible solution. Hence, this paper
presents an efficient and secure version of ARP that is able to cope
up with all these types of attacks and is also a feasible solution. It is a
stateful protocol, by storing the information of the Request frame in
the ARP cache, to reduce the chances of various types of attacks in
ARP. It is more efficient and secure by broadcasting ARP Reply
frame in the network and storing related entries in the ARP cache
each time when communication take place.
Abstract: We report in this paper the procedure of a system of
automatic speech recognition based on techniques of the dynamic
programming. The technique of temporal retiming is a technique
used to synchronize between two forms to compare. We will see how
this technique is adapted to the field of the automatic speech
recognition. We will expose, in a first place, the theory of the
function of retiming which is used to compare and to adjust an
unknown form with a whole of forms of reference constituting the
vocabulary of the application. Then we will give, in the second place,
the various algorithms necessary to their implementation on machine.
The algorithms which we will present were tested on part of the
corpus of words in Arab language Arabdic-10 [4] and gave whole
satisfaction. These algorithms are effective insofar as we apply them
to the small ones or average vocabularies.
Abstract: The performance of sensor-less controlled induction
motor drive depends on the accuracy of the estimated speed.
Conventional estimation techniques being mathematically complex
require more execution time resulting in poor dynamic response. The
nonlinear mapping capability and powerful learning algorithms of
neural network provides a promising alternative for on-line speed
estimation. The on-line speed estimator requires the NN model to be
accurate, simpler in design, structurally compact and computationally
less complex to ensure faster execution and effective control in real
time implementation. This in turn to a large extent depends on the
type of Neural Architecture. This paper investigates three types of
neural architectures for on-line speed estimation and their
performance is compared in terms of accuracy, structural
compactness, computational complexity and execution time. The
suitable neural architecture for on-line speed estimation is identified
and the promising results obtained are presented.