Abstract: Positive real and strictly positive real transfer functions are important concepts in the control theory. In this paper, the results of researches in these areas are summarized. Definitions together with their graphical interpretations are mentioned. The equivalent conditions in the frequency domain and state space representations are reviewed. Their equivalent electrical networks are explained. Also, a comprehensive discussion about a difference between behavior of real part of positive real and strictly positive real transfer functions in high frequencies is presented. Furthermore, several illustrative examples are given.
Abstract: This paper is devoted to present the advances in the design of a prototype that is able to supervise the complex behavior of water quality parameters such as pH and temperature, via a real-time monitoring system. The current water quality tests that are performed in government water quality institutions in Mexico are carried out in problematic locations and they require taking manual samples. The water samples are then taken to the institution laboratory for examination. In order to automate this process, a water quality monitoring system based on wireless sensor networks is proposed. The system consists of a sensor node which contains one pH sensor, one temperature sensor, a microcontroller, and a ZigBee radio, and a base station composed by a ZigBee radio and a PC. The progress in this investigation shows the development of a water quality monitoring system. Due to recent events that affected water quality in Mexico, the main motivation of this study is to address water quality monitoring systems, so in the near future, a more robust, affordable, and reliable system can be deployed.
Abstract: Governments constantly seek to offer faster, more secure, efficient and effective services for their citizens. Recent changes and developments to communication services and technologies, mainly due the Internet, have led to immense improvements in the way governments of advanced countries carry out their interior operations Therefore, advances in e-government services have been broadly adopted and used in various developed countries, as well as being adapted to developing countries. The implementation of advances depends on the utilization of the most innovative structures of data techniques, mainly in web dependent applications, to enhance the main functions of governments. These functions, in turn, have spread to mobile and wireless techniques, generating a new advanced direction called m-government. This paper discusses a selection of available m-government applications and several business modules and frameworks in various fields. Practically, the m-government models, techniques and methods have become the improved version of e-government. M-government offers the potential for applications which will work better, providing citizens with services utilizing mobile communication and data models incorporating several government entities. Developing countries can benefit greatly from this innovation due to the fact that a large percentage of their population is young and can adapt to new technology and to the fact that mobile computing devices are more affordable. The use of models of mobile transactions encourages effective participation through the use of mobile portals by businesses, various organizations, and individual citizens. Although the application of m-government has great potential, it does have major limitations. The limitations include: the implementation of wireless networks and relative communications, the encouragement of mobile diffusion, the administration of complicated tasks concerning the protection of security (including the ability to offer privacy for information), and the management of the legal issues concerning mobile applications and the utilization of services.
Abstract: MSN used to be the most popular application for
communicating among social networks, but Facebook chat is now the
most popular. Facebook and MSN have similar characteristics,
including usefulness, ease-of-use, and a similar function, which is the
exchanging of information with friends. Facebook outperforms MSN
in both of these areas. However, the adoption of Facebook and
abandonment of MSN have occurred for other reasons. Functions can
be improved, but users’ willingness to use does not just depend on
functionality. Flow status has been established to be crucial to users’
adoption of cyber applications and to affects users’ adoption of
software applications. If users experience flow in using software
application, they will enjoy using it frequently, and even change their
preferred application from an old to this new one. However, no
investigation has examined choice behavior related to switching from
Facebook to MSN based on a consideration of flow experiences and
functions. This investigation discusses the flow experiences and
functions of social-networking applications. Flow experience is found
to affect perceived ease of use and perceived usefulness; perceived
ease of use influences information ex-change with friends, and
perceived usefulness; information exchange influences perceived
usefulness, but information exchange has no effect on flow
experience.
Abstract: Wireless Body Area Network (WBAN) is a short-range
wireless communication around human body for various applications
such as wearable devices, entertainment, military, and especially
medical devices. WBAN attracts the attention of continuous health
monitoring system including diagnostic procedure, early detection of
abnormal conditions, and prevention of emergency situations.
Compared to cellular network, WBAN system is more difficult to
control inter- and inner-cell interference due to the limited power,
limited calculation capability, mobility of patient, and
non-cooperation among WBANs.
In this paper, we compare the performance of resource allocation
scheme based on several Pseudo Orthogonal Codewords (POCs) to
mitigate inter-WBAN interference. Previously, the POCs are widely
exploited for a protocol sequence and optical orthogonal code. Each
POCs have different properties of auto- and cross-correlation and
spectral efficiency according to its construction of POCs. To identify
different WBANs, several different pseudo orthogonal patterns based
on POCs exploits for resource allocation of WBANs. By simulating
these pseudo orthogonal resource allocations of WBANs on
MATLAB, we obtain the performance of WBANs according to
different POCs and can analyze and evaluate the suitability of POCs
for the resource allocation in the WBANs system.
Abstract: This research aims to develop ways of lodging
business management of Bang Khonthi community in Samut
Songkram province that are appropriate with the cultural context of
the Bang Khonthi community.
Eight lodging business owners were interviewed. It was found that
lodging business that are family business must be done with passion,
correct understanding of self, culture, nature, Thai way of life,
thorough, professional development, environmentally concerned,
building partnerships with various networks both community level,
and public sector and business cohorts. Public relations should be
done through media both traditional and modern outlets, such as
websites and social networks to provide customers convenience,
security, happiness, knowledge, love and value when travel to Bang
Khonthi. This will also help them achieve sustainability in business,
in line with the 10 Home Stay Standard Thailand.
Suggestions for operators are as follows: Operators need to
improve their public relations work. They need to use technology in
public relations such as the internet. Management standards must be
improved. Souvenir and local products shops should be arranged in
the compound. Product pricing must be set accordingly. They need to
join hands to help each other. Quality of the business operation
should be raised to meet the standards. Educational measures to
reduce the impact caused by tourism on the community such as
efforts to reduce energy consumption.
Abstract: Social networks have recently gained a growing
interest on the web. Traditional formalisms for representing social
networks are static and suffer from the lack of semantics. In this
paper, we will show how semantic web technologies can be used to
model social data. The SemTemp ontology aligns and extends
existing ontologies such as FOAF, SIOC, SKOS and OWL-Time to
provide a temporal and semantically rich description of social data.
We also present a modeling scenario to illustrate how our ontology
can be used to model social networks.
Abstract: In recent years, a wide variety of applications are developed with Support Vector Machines -SVM- methods and Artificial Neural Networks -ANN-. In general, these methods depend on intrusion knowledge databases such as KDD99, ISCX, and CAIDA among others. New classes of detectors are generated by machine learning techniques, trained and tested over network databases. Thereafter, detectors are employed to detect anomalies in network communication scenarios according to user’s connections behavior. The first detector based on training dataset is deployed in different real-world networks with mobile and non-mobile devices to analyze the performance and accuracy over static detection. The vulnerabilities are based on previous work in telemedicine apps that were developed on the research group. This paper presents the differences on detections results between some network scenarios by applying traditional detectors deployed with artificial neural networks and support vector machines.
Abstract: HMS Industrial Networks AB has been recognized as
one of the most innovative companies in the industrial
communication industry worldwide. The creation of their Anybus
innovation during the 1990s contributed considerably to the
company’s success. From inception, HMS’ employees were
innovating for the purpose of creating new business (the creation
phase). After the Anybus innovation, they began the process of
internationalization (the commercialization phase), which in turn led
them to concentrate on cost reduction, product quality, delivery
precision, operational efficiency, and increasing growth (the growth
phase). As a result of this transformation, performing new radical
innovations have become more complicated. The purpose of our research was to explore the dynamics of
innovation at HMS from the aspect of key actors, activities, and
events, over the three phases, in order to understand what led to the
creation of their Anybus innovation, and why it has become
increasingly challenging for HMS to create new radical innovations
for the future. Our research methodology was based on a longitudinal,
retrospective study from the inception of HMS in 1988 to 2014, a
single case study inspired by the grounded theory approach. We
conducted 47 interviews and collected 1 024 historical documents for
our research. Our analysis has revealed that HMS’ success in creating the
Anybus, and developing a successful business around the innovation,
was based on three main capabilities – cultivating customer relations
on different managerial and organizational levels, inspiring business
relations, and balancing complementary human assets for the purpose
of business creation. The success of HMS has turned the management’s attention away
from past activities of key actors, of their behavior, and how they
influenced and stimulated the creation of radical innovations.
Nowadays, they are rhetorically focusing on creativity and
innovation. All the while, their real actions put emphasis on growth,
cost reduction, product quality, delivery precision, operational
efficiency, and moneymaking. In the process of becoming an
international company, HMS gradually refocused. In so doing they
became profitable and successful, but they also forgot what made
them innovative in the first place. Fortunately, HMS’ management
has come to realize that this is the case and they are now in search of
recapturing innovation once again. Our analysis indicates that HMS’ management is facing several
barriers to innovation related path dependency and other lock-in
phenomena. HMS’ management has been captured, trapped in their
mindset and actions, by the success of the past. But now their future has to be secured, and they have come to realize that moneymaking is
not everything. In recent years, HMS’ management have begun to
search for innovation once more, in order to recapture their past
capabilities for creating radical innovations. In order to unlock their
managerial perceptions of customer needs and their counter-innovation
driven activities and events, to utilize the full potential of
their employees and capture the innovation opportunity for the future.
Abstract: Wireless sensors, also known as wireless sensor nodes,
have been making a significant impact on human daily life. The
Radio Frequency Identification (RFID) and Wireless Sensor Network
(WSN) are two complementary technologies; hence, an integrated
implementation of these technologies expands the overall
functionality in obtaining long-range and real-time information on the
location and properties of objects and people. An approach for
integrating ZigBee and RFID networks is proposed in this paper, to
create an energy-efficient network improved by the benefits of
combining ZigBee and RFID architecture. Furthermore, the
compatibility and requirements of the ZigBee device and
communication links in the typical RFID system which is presented
with the real world experiment on the capabilities of the proposed
RFID system.
Abstract: E-Learning enables the users to learn at anywhere at
any time. In E-Learning systems, authenticating the E-Learning user
has security issues. The usage of appropriate communication
networks for providing the internet connectivity for E-learning is
another challenge. WiMAX networks provide Broadband Wireless
Access through the Multicast Broadcast Service so these networks
can be most suitable for E-Learning applications. The authentication
of E-Learning user is vulnerable to session hijacking problems. The
repeated authentication of users can be done to overcome these
issues. In this paper, session based Profile Caching Authentication is
proposed. In this scheme, the credentials of E-Learning users can be
cached at authentication server during the initial authentication
through the appropriate subscriber station. The proposed cache based
authentication scheme performs fast authentication by using cached
user profile. Thus, the proposed authentication protocol reduces the
delay in repeated authentication to enhance the security in ELearning.
Abstract: Mumbai, being traditionally the epicenter of India's
trade and commerce, the existing major ports such as Mumbai and
Jawaharlal Nehru Ports (JN) situated in Thane estuary are also
developing its waterfront facilities. Various developments over the
passage of decades in this region have changed the tidal flux
entering/leaving the estuary. The intake at Pir-Pau is facing the
problem of shortage of water in view of advancement of shoreline,
while jetty near Ulwe faces the problem of ship scheduling due to
existence of shallower depths between JN Port and Ulwe Bunder. In
order to solve these problems, it is inevitable to have information
about tide levels over a long duration by field measurements.
However, field measurement is a tedious and costly affair;
application of artificial intelligence was used to predict water levels
by training the network for the measured tide data for one lunar tidal
cycle. The application of two layered feed forward Artificial Neural
Network (ANN) with back-propagation training algorithms such as
Gradient Descent (GD) and Levenberg-Marquardt (LM) was used to
predict the yearly tide levels at waterfront structures namely at Ulwe
Bunder and Pir-Pau. The tide data collected at Apollo Bunder, Ulwe,
and Vashi for a period of lunar tidal cycle (2013) was used to train,
validate and test the neural networks. These trained networks having
high co-relation coefficients (R= 0.998) were used to predict the tide
at Ulwe, and Vashi for its verification with the measured tide for the
year 2000 & 2013. The results indicate that the predicted tide levels
by ANN give reasonably accurate estimation of tide. Hence, the
trained network is used to predict the yearly tide data (2015) for
Ulwe. Subsequently, the yearly tide data (2015) at Pir-Pau was
predicted by using the neural network which was trained with the
help of measured tide data (2000) of Apollo and Pir-Pau. The analysis of measured data and study reveals that: The
measured tidal data at Pir-Pau, Vashi and Ulwe indicate that there is
maximum amplification of tide by about 10-20 cm with a phase lag
of 10-20 minutes with reference to the tide at Apollo Bunder
(Mumbai). LM training algorithm is faster than GD and with increase
in number of neurons in hidden layer and the performance of the
network increases. The predicted tide levels by ANN at Pir-Pau and
Ulwe provides valuable information about the occurrence of high and
low water levels to plan the operation of pumping at Pir-Pau and
improve ship schedule at Ulwe.
Abstract: Many cluster based routing protocols have been
proposed in the field of wireless sensor networks, in which a group of
nodes are formed as clusters. A cluster head is selected from one
among those nodes based on residual energy, coverage area, number
of hops and that cluster-head will perform data gathering from
various sensor nodes and forwards aggregated data to the base station
or to a relay node (another cluster-head), which will forward the
packet along with its own data packet to the base station. Here a
Game Theory based Diligent Energy Utilization Algorithm (GTDEA)
for routing is proposed. In GTDEA, the cluster head selection is done
with the help of game theory, a decision making process, that selects
a cluster-head based on three parameters such as residual energy
(RE), Received Signal Strength Index (RSSI) and Packet Reception
Rate (PRR). Finding a feasible path to the destination with minimum
utilization of available energy improves the network lifetime and is
achieved by the proposed approach. In GTDEA, the packets are
forwarded to the base station using inter-cluster routing technique,
which will further forward it to the base station. Simulation results
reveal that GTDEA improves the network performance in terms of
throughput, lifetime, and power consumption.
Abstract: Although Mobile Wireless Sensor Networks (MWSNs),
which consist of mobile sensor nodes (MSNs), can cover a wide range
of observation region by using a small number of sensor nodes, they
need to construct a network to collect the sensing data on the base
station by moving the MSNs. As an effective method, the network
construction method based on Virtual Rails (VRs), which is referred
to as VR method, has been proposed. In this paper, we propose two
types of effective techniques for the VR method. They can prolong
the operation time of the network, which is limited by the battery
capabilities of MSNs and the energy consumption of MSNs. The
first technique, an effective arrangement of VRs, almost equalizes
the number of MSNs belonging to each VR. The second technique,
an adaptive movement method of MSNs, takes into account the
residual energy of battery. In the simulation, we demonstrate that each
technique can improve the network lifetime and the combination of
both techniques is the most effective.
Abstract: In IEEE 802.11 networks, it is well known that the
traditional time-domain contention often leads to low channel
utilization. The first frequency-domain contention scheme, the time to
frequency (T2F), has recently been proposed to improve the channel
utilization and has attracted a great deal of attention. In this paper, we
present the latest research progress on the weighed frequency-domain
contention. We compare the basic ideas, work principles of these
related schemes and point out their differences. This paper is very
useful for further study on frequency-domain contention.
Abstract: Energy has a prominent role for development of
nations. Countries which have energy resources also have strategic
power in the international trade of energy since it is essential for all
stages of production in the economy. Thus, it is important for
countries to analyze the weaknesses and strength of the system. On
the other side, international trade is one of the fields that are analyzed
as a complex network via network analysis. Complex network is one
of the tools to analyze complex systems with heterogeneous agents
and interaction between them. A complex network consists of nodes
and the interactions between these nodes. Total properties which
emerge as a result of these interactions are distinct from the sum of
small parts (more or less) in complex systems. Thus, standard
approaches to international trade are superficial to analyze these
systems. Network analysis provides a new approach to analyze
international trade as a network. In this network, countries constitute
nodes and trade relations (export or import) constitute edges. It
becomes possible to analyze international trade network in terms of
high degree indicators which are specific to complex networks such
as connectivity, clustering, assortativity/disassortativity, centrality,
etc. In this analysis, international trade of crude oil and coal which
are types of fossil fuel has been analyzed from 2005 to 2014 via
network analysis. First, it has been analyzed in terms of some
topological parameters such as density, transitivity, clustering etc.
Afterwards, fitness to Pareto distribution has been analyzed via
Kolmogorov-Smirnov test. Finally, weighted HITS algorithm has
been applied to the data as a centrality measure to determine the real
prominence of countries in these trade networks. Weighted HITS
algorithm is a strong tool to analyze the network by ranking countries
with regards to prominence of their trade partners. We have
calculated both an export centrality and an import centrality by
applying w-HITS algorithm to the data. As a result, impacts of the
trading countries have been presented in terms of high-degree
indicators.
Abstract: The early-stage damage detection in offshore
structures requires continuous structural health monitoring and for the
large area the position of sensors will also plays an important role in
the efficient damage detection. Determining the dynamic behavior of
offshore structures requires dense deployment of sensors. The wired
Structural Health Monitoring (SHM) systems are highly expensive
and always needs larger installation space to deploy. Wireless sensor
networks can enhance the SHM system by deployment of scalable
sensor network, which consumes lesser space. This paper presents the
results of wireless sensor network based Structural Health Monitoring
method applied to a scaled experimental model of offshore structure
that underwent wave loading. This method determines the
serviceability of the offshore structure which is subjected to various
environment loads. Wired and wireless sensors were installed in the
model and the response of the scaled BLSRP model under wave
loading was recorded. The wireless system discussed in this study is
the Raspberry pi board with Arm V6 processor which is programmed
to transmit the data acquired by the sensor to the server using Wi-Fi
adapter, the data is then hosted in the webpage. The data acquired
from the wireless and wired SHM systems were compared and the
design of the wireless system is verified.
Abstract: We investigate the large scale of networks in the
context of network survivability under attack. We use appropriate
techniques to evaluate and the attacker-based- and the defenderbased-
network survivability. The attacker is unaware of the operated
links by the defender. Each attacked link has some pre-specified
probability to be disconnected. The defender choice is so that to
maximize the chance of successfully sending the flow to the
destination node. The attacker however will select the cut-set with
the highest chance to be disabled in order to partition the network.
Moreover, we extend the problem to the case of selecting the best p
paths to operate by the defender and the best k cut-sets to target by
the attacker, for arbitrary integers p,k>1. We investigate some
variations of the problem and suggest polynomial-time solutions.
Abstract: Maintenance and design engineers have great concern
for the functioning of rotating machineries due to the vibration
phenomenon. Improper functioning in rotating machinery originates
from the damage to rolling element bearings. The status of rolling
element bearings require advanced technologies to monitor their
health status efficiently and effectively. Avoiding vibration during
machine running conditions is a complicated process. Vibration
simulation should be carried out using suitable sensors/ transducers to
recognize the level of damage on bearing during machine operating
conditions. Various issues arising in rotating systems are interlinked
with bearing faults. This paper presents an approach for fault
diagnosis of bearings using neural networks and time/frequencydomain
vibration analysis.
Abstract: Companies face increasing challenges in research due
to higher costs and risks. The intensifying technology complexity and
interdisciplinarity require unique know-how. Therefore, companies
need to decide whether research shall be conducted internally or
externally with partners. On the other hand, research institutes meet
increasing efforts to achieve good financing and to maintain high
research reputation. Therefore, relevant research topics need to be
identified and specialization of competency is necessary. However,
additional competences for solving interdisciplinary research projects
are also often required. Secured financing can be achieved by
bonding industry partners as well as public fundings. The realization
of faster and better research drives companies and research institutes
to cooperate in organized research networks, which are managed by
an administrative organization. For an effective and efficient
cooperation, necessary processes, roles, tools and a set of rules need
to be determined. Goal of this paper is to show the state-of-art
research and to propose a governance framework for organized
research networks.