Abstract: Cooperative diversity (CD) has been adopted in many communication systems because it helps in improving performance of the wireless communication systems with the help of the relays that emulate the multiple antenna terminals. This work aims to provide the derivation of the performance analysis expressions of the multiuser diversity (MUD) in the two-hop cooperative multi-relay wireless networks (TCMRNs). Considering the work analysis, we provide analytically the derivation of a closed form expression of the two most commonly used performance metrics namely, the outage probability and the symbol error probability (SEP) for the fixed decode-and-forward (FDF) protocol with MUD.
Abstract: Prior research evidenced that unimodal biometric
systems have several tradeoffs like noisy data, intra-class variations,
restricted degrees of freedom, non-universality, spoof attacks, and
unacceptable error rates. In order for the biometric system to be more
secure and to provide high performance accuracy, more than one
form of biometrics are required. Hence, the need arise for multimodal
biometrics using combinations of different biometric modalities. This
paper introduces a multimodal biometric system (MMBS) based on
fusion of whole dorsal hand geometry and fingerprints that acquires
right and left (Rt/Lt) near-infra-red (NIR) dorsal hand geometry (HG)
shape and (Rt/Lt) index and ring fingerprints (FP). Database of 100
volunteers were acquired using the designed prototype. The acquired
images were found to have good quality for all features and patterns
extraction to all modalities. HG features based on the hand shape
anatomical landmarks were extracted. Robust and fast algorithms for
FP minutia points feature extraction and matching were used. Feature
vectors that belong to similar biometric traits were fused using
feature fusion methodologies. Scores obtained from different
biometric trait matchers were fused using the Min-Max
transformation-based score fusion technique. Final normalized scores
were merged using the sum of scores method to obtain a single
decision about the personal identity based on multiple independent
sources. High individuality of the fused traits and user acceptability
of the designed system along with its experimental high performance
biometric measures showed that this MMBS can be considered for
med-high security levels biometric identification purposes.
Abstract: Contact centres have been exemplars of scientific management in the discipline of operations management for more than a decade now. With the movement of industries from a resource based economy to knowledge based economy businesses have started to realize the customer eccentricity being the key to sustainability amidst high velocity of the market. However, as technologies have converged and advanced, so have the contact centres. Contact Centres have redirected the supply chains and the concept of retailing is highly diminished due to over exaggeration of cost reduction strategies. In conditions of high environmental velocity together with services featuring considerable information intensity contact centres will require up to date and enlightened agents to satisfy the demands placed upon them by those requesting their services. In this paper we examine salient factors such as Power Distance, Knowledge structures and the dynamics of job specialisation and enlargement to suggest critical success factors in the domain of contact centres.
Abstract: Flash memory has become an important storage device
in many embedded systems because of its high performance, low
power consumption and shock resistance. Multi-level cell (MLC) is
developed as an effective solution for reducing the cost and increasing
the storage density in recent years. However, most of flash file system
cannot handle the error correction sufficiently. To correct more errors
for MLC, we implement Reed-Solomon (RS) code to YAFFS, what is
widely used for flash-based file system. RS code has longer computing
time but the correcting ability is much higher than that of Hamming
code.
Abstract: As data to be stored in storage subsystems
tremendously increases, data protection techniques have become more
important than ever, to provide data availability and reliability. In this
paper, we present the file system-based data protection (WOWSnap)
that has been implemented using WORM (Write-Once-Read-Many)
scheme. In the WOWSnap, once WORM files have been created, only
the privileged read requests to them are allowed to protect data against
any intentional/accidental intrusions. Furthermore, all WORM files
are related to their protection cycle that is a time period during which
WORM files should securely be protected. Once their protection cycle
is expired, the WORM files are automatically moved to the
general-purpose data section without any user interference. This
prevents the WORM data section from being consumed by
unnecessary files. We evaluated the performance of WOWSnap on
Linux cluster.
Abstract: It is well known that metallic particles reduce the
reliability of Gas-Insulated Substation (GIS) equipments by initiating
partial discharge (PDs) that can lead to breakdown and complete
failure of GIS. This paper investigates the characteristics of PDs
caused by metallic particle adhering to the solid spacer. The PD
detection and measurement were carried out by using IEC 60270
method with particles of different sizes and at different positions on
the spacer surface. The results show that a particle of certain size at
certain position possesses a unique PD characteristic as compared to
those caused by particles of different sizes and/or at different
positions. Therefore PD characteristics may be useful for the particle
size and position identification.
Abstract: Phase error in communications systems degrades error
performance. In this paper, we present a simple approximation for the
average error probability of the binary phase shift keying (BPSK) in
the presence of phase error having a uniform distribution on arbitrary
intervals. For the simple approximation, we use symmetry and
periodicity of a sinusoidal function. Approximate result for the
average error probability is derived, and the performance is verified
through comparison with simulation result.
Abstract: Adapting wireless devices to communicate within grid
networks empowers us by providing range of possibilities.. These
devices create a mechanism for consumers and publishers to create
modern networks with or without peer device utilization. Emerging
mobile networks creates new challenges in the areas of reliability,
security, and adaptability. In this paper, we propose a system
encompassing mobility management using AAA context transfer for
mobile grid networks. This system ultimately results in seamless task
processing and reduced packet loss, communication delays,
bandwidth, and errors.
Abstract: Development of a Robust Supply Chain for Dynamic
Operating Environment as we move further into the twenty first
century, organisations are under increasing pressure to deliver a high
product variation at a reasonable cost without compromise in quality.
In a number of cases this will take the form of a customised or high
variety low volume manufacturing system that requires prudent
management of resources, among a number of functions, to achieve
competitive advantage. Purchasing and Supply Chain management is
one of such function and due to the substantial interaction with
external elements needs to be strategically managed. This requires a
number of primary and supporting tools that will enable the
appropriate decisions to be made rapidly. This capability is
especially vital in a dynamic environment as it provides a pivotal role
in increasing the profit margin of the product. The management of
this function can be challenging by itself and even more for Small
and Medium Enterprises (SMEs) due to the limited resources and
expertise available at their disposal.
This paper discusses the development of tools and concepts
towards effectively managing the purchasing and supply chain
function. The developed tools and concepts will provide a cost
effective way of managing this function within SMEs. The paper
further shows the use of these tools within Contechs, a manufacturer
of luxury boat interiors, and the associated benefits achieved as a
result of this implementation. Finally a generic framework towards
use in such environments is presented.
Abstract: Directive 2009/28/CE establishes, as obligatory objective, a share of renewable energies on energetic consumption of 20%, in European Union, in 2020 However, such European normative gives freedom to member states in the selection of the renewable promotion mechanism that allows them to obtain that objective. In this paper, we analyze the main characteristics of the promotion mechanisms of renewable energy used in the countries that shape the Electricity Iberian Market (Spain and Portugal) and the results in employment. The importance of these countries is given by the great increasing of the renewable energies which suppose a share higher than 30% of the overall generation in 2010. Therefore, this research paper can serve as the basis for the learning of other countries with regard to the main advantages that entail the use of a feed-in tariff system.
Abstract: This paper describes a computer model of Quantum Field Theory (QFT), referred to in this paper as QTModel. After specifying the initial configuration for a QFT process (e.g. scattering) the model generates the possible applicable processes in terms of Feynman diagrams, the equations for the scattering matrix, and evaluates probability amplitudes for the scattering matrix and cross sections. The computations of probability amplitudes are performed numerically. The equations generated by QTModel are provided for demonstration purposes only. They are not directly used as the base for the computations of probability amplitudes. The computer model supports two modes for the computation of the probability amplitudes: (1) computation according to standard QFT, and (2) computation according to a proposed functional interpretation of quantum theory.
Abstract: The aim of the current work is to present a comparison among three popular optimization methods in the inverse elastostatics problem (IESP) of flaw detection within a solid. In more details, the performance of a simulated annealing, a Hooke & Jeeves and a sequential quadratic programming algorithm was studied in the test case of one circular flaw in a plate solved by both the boundary element (BEM) and the finite element method (FEM). The proposed optimization methods use a cost function that utilizes the displacements of the static response. The methods were ranked according to the required number of iterations to converge and to their ability to locate the global optimum. Hence, a clear impression regarding the performance of the aforementioned algorithms in flaw identification problems was obtained. Furthermore, the coupling of BEM or FEM with these optimization methods was investigated in order to track differences in their performance.
Abstract: This paper presents a wavelet transform and Support
Vector Machine (SVM) based algorithm for estimating fault location
on transmission lines. The Discrete wavelet transform (DWT) is used
for data pre-processing and this data are used for training and testing
SVM. Five types of mother wavelet are used for signal processing to
identify a suitable wavelet family that is more appropriate for use in
estimating fault location. The results demonstrated the ability of SVM
to generalize the situation from the provided patterns and to
accurately estimate the location of faults with varying fault resistance.
Abstract: This paper presents a distributed intrusion
detection system IDS, based on the concept of specialized
distributed agents community representing agents with the
same purpose for detecting distributed attacks. The semantic of
intrusion events occurring in a predetermined network has been
defined. The correlation rules referring the process which our
proposed IDS combines the captured events that is distributed
both spatially and temporally. And then the proposed IDS tries
to extract significant and broad patterns for set of well-known
attacks. The primary goal of our work is to provide intrusion
detection and real-time prevention capability against insider
attacks in distributed and fully automated environments.
Abstract: Purpose of this work is the development of an
automatic classification system which could be useful for radiologists
in the investigation of breast cancer. The software has been designed
in the framework of the MAGIC-5 collaboration.
In the automatic classification system the suspicious regions with
high probability to include a lesion are extracted from the image as
regions of interest (ROIs). Each ROI is characterized by some
features based on morphological lesion differences.
Some classifiers as a Feed Forward Neural Network, a K-Nearest
Neighbours and a Support Vector Machine are used to distinguish the
pathological records from the healthy ones.
The results obtained in terms of sensitivity (percentage of
pathological ROIs correctly classified) and specificity (percentage of
non-pathological ROIs correctly classified) will be presented through
the Receive Operating Characteristic curve (ROC). In particular the
best performances are 88% ± 1 of area under ROC curve obtained
with the Feed Forward Neural Network.
Abstract: Value engineering is an efficacious contraption for
administrators to make up their minds. Value perusals proffer the
gaffers a suitable instrument to decrease the expenditures of the life
span, quality amelioration, structural improvement, curtailment of the
construction schedule, longevity prolongation or a merging of the
aforementioned cases. Subjecting organizers to pressures on one
hand and their accountability towards their pertinent fields together
with inherent risks and ambiguities of other options on the other hand
set some comptrollers in a dilemma utilization of risk management
and the value engineering in projects manipulation with regard to
complexities of implementing projects can be wielded as a
contraption to identify and efface each item which wreaks
unnecessary expenses and time squandering sans inflicting any
damages upon the essential project applications. Of course It should
be noted that implementation of risk management and value
engineering with regard to the betterment of efficiency and functions
may lead to the project implementation timing elongation. Here time
revamping does not refer to time diminishing in the whole cases. his
article deals with risk and value engineering conceptualizations at
first. The germane reverberations effectuated due to its execution in
Iran Khodro Corporation are regarded together with the joint features
and amalgamation of the aforesaid entia; hence the proposed
blueprint is submitted to be taken advantage of in engineering and
industrial projects including Iran Khodro Corporation.
Abstract: The hard clam (meretrix lusoria) cultivated industry
has been developed vigorously for recent years in Taiwan, and
seawater quality determines the cultivated environment. The pH
concentration variation affects survival rate of meretrix lusoria
immediately. In order to monitor seawater quality, solid-state sensing
electrode of ruthenium-doped titanium dioxide (TiO2:Ru) is developed
to measure hydrogen ion concentration in different cultivated
solutions. Because the TiO2:Ru sensing electrode has high chemical
stability and superior sensing characteristics, thus it is applied as a pH
sensor. Response voltages of TiO2:Ru sensing electrode are readout by
instrument amplifier in different sample solutions. Mean sensitivity
and linearity of TiO2:Ru sensing electrode are 55.20 mV/pH and 0.999
from pH1 to pH13, respectively. We expect that the TiO2:Ru sensing
electrode can be applied to real environment measurement, therefore
we collect two sample solutions by different meretrix lusoria
cultivated ponds in the Yunlin, Taiwan. The two sample solutions are
both measured for 200 seconds after calibration of standard pH buffer
solutions (pH7, pH8 and pH 9). Mean response voltages of sample 1
and sample 2 are -178.758 mV (Standard deviation=0.427 mV) and
-180.206 mV (Standard deviation =0.399 mV), respectively. Response
voltages of the two sample solutions are between pH 8 and pH 9 which
conform to weak alkali range and suitable meretrix lusoria growth. For
long-term monitoring, drift of cultivated solutions (sample 1 and
sample 2) are 1.16 mV/hour and 1.03 mV/hour, respectively.
Abstract: This paper analyzes the effect of a single uniform accounting rule on reporting quality by investigating the influence of IFRS on earnings management. This paper examines whether earnings management is reduced after IFRS adoption through the use of “loss avoidance thresholds”, a method that has been verified in earlier studies. This paper concentrates on two European countries: one that represents the continental code law tradition with weak protection of investors (France) and one that represents the Anglo-American common law tradition, which typically implies a strong enforcement system (the United Kingdom).
The research investigates a sample of 526 companies (6822 firm-year observations) during the years 2000 – 2013. The results are different for the two jurisdictions. This study demonstrates that a single set of accounting standards contributes to better reporting quality and reduces the pervasiveness of earnings management in France. In contrast, there is no evidence that a reduction in earnings management followed the implementation of IFRS in the United Kingdom. Due to the fact that IFRS benefit France but not the United Kingdom, other political and economic factors, such legal system or capital market strength, must play a significant role in influencing the comparability and transparency cross-border companies’ financial statements. Overall, the result suggests that IFRS moderately contribute to the accounting quality of reported financial statements and bring benefit for stakeholders, though the role played by other economic factors cannot be discounted.
Abstract: Service life of existing reinforced concrete (RC)
structures in coastal towns of Sabah has been affected very much.
Concrete crack, spalling of concrete cover and reinforcement rusting
of RC buildings are seen even within 5 years of construction in
Sabah. Hence, in this study a new mix design of concrete grout was
developed using locally available materials and investigated under
two curing conditions and workability, compressive strength,
Accelerated Mortar Bar Test (AMBT), water absorption, volume of
permeable voids (VPV), Sorptivity and 90-days salt ponding test
were conducted. The compressive strength of concrete grout at the
age 90 days was found to be 44.49 N/mm2 under water curing. It was
observed that the percentage of mortar bar length change was below
1% for developed concrete grout. The water absorption of the
concrete grout was in between the range of 0.88 % to 3.60 % under
two different curing up to the age 90 days. It was also observed that
the VPV of concrete was in the range of 0 % to 9.75 and 2.44% to
13.05% under water curing and site curing respectively. It was found
that the Sorptivity of the concrete grout under water curing at the age
of 28 days is 0.211mm/√min and at the age 90 day are 0.067
mm/√min. The chloride content decreased greatly, 90% after a depth
of 15 mm. It was noticed that the site cured samples showed higher
chloride contents near surface compared to water cured samples.
This investigation suggested that the developed mix design of
concrete grout using locally available construction materials can be
used for crack repairing of existing RC structures in Sabah.
Abstract: Using electrical machine in conventional vehicles, also called hybrid vehicles, has become a promising control scheme that enables some manners for fuel economy and driver assist for better stability. In this paper, vehicle stability control, fuel economy and Driving/Regeneration braking for a 4WD hybrid vehicle is investigated by using an electrical machine on each non-driven wheels. In front wheels driven vehicles, fuel economy and regenerative braking can be obtained by summing torques applied on rear wheels. On the other hand, unequal torques applied to rear wheels provides enhanced safety and path correction in steering. In this paper, a model with fourteen degrees of freedom is considered for vehicle body, tires and, suspension systems. Thereafter, powertrain subsystems are modeled. Considering an electrical machine on each rear wheel, a fuzzy controller is designed for each driving, braking, and stability conditions. Another fuzzy controller recognizes the vehicle requirements between the driving/regeneration and stability modes. Intelligent vehicle control to multi objective operation and forward simulation are the paper advantages. For reaching to these aims, power management control and yaw moment control will be done by three fuzzy controllers. Also, the above mentioned goals are weighted by another fuzzy sub-controller base on vehicle dynamic. Finally, Simulations performed in MATLAB/SIMULINK environment show that the proposed structure can enhance the vehicle performance in different modes effectively.