Abstract: TiO2 thin films have been prepared by the sol-gel dipcoating
technique in order to elaborate antireflective thin films for
monocrystalline silicon (mono-Si). The titanium isopropoxyde was
chosen as a precursor with hydrochloric acid as a catalyser for
preparing a stable solution. The optical properties have been tailored
with varying the solution concentration, the withdrawn speed, and the
heat-treatment. We showed that using a TiO2 single layer with 64.5
nm in thickness, heat-treated at 450°C or 300°C reduces the mono-Si
reflection at a level lower than 3% over the broadband spectral
domains [669-834] nm and [786-1006] nm respectively. Those latter
performances are similar to the ones obtained with double layers of
low and high refractive index glasses respectively.
Abstract: The exact theoretical expression describing the
probability distribution of nonlinear sea-surface elevations derived
from the second-order narrowband model has a cumbersome form
that requires numerical computations, not well-disposed to theoretical
or practical applications. Here, the same narrowband model is reexamined
to develop a simpler closed-form approximation suitable
for theoretical and practical applications. The salient features of the
approximate form are explored, and its relative validity is verified
with comparisons to other readily available approximations, and
oceanic data.
Abstract: The ad hoc networks are the future of wireless
technology as everyone wants fast and accurate error free information
so keeping this in mind Bit Error Rate (BER) and power is optimized
in this research paper by using the Genetic Algorithm (GA). The
digital modulation techniques used for this paper are Binary Phase
Shift Keying (BPSK), M-ary Phase Shift Keying (M-ary PSK), and
Quadrature Amplitude Modulation (QAM). This work is
implemented on Wireless Ad Hoc Networks (WLAN). Then it is
analyze which modulation technique is performing well to optimize
the BER and power of WLAN.
Abstract: The use of eXtensible Markup Language (XML) in
web, business and scientific databases lead to the development of
methods, techniques and systems to manage and analyze XML data.
Semi-structured documents suffer due to its heterogeneity and
dimensionality. XML structure and content mining represent
convergence for research in semi-structured data and text mining. As
the information available on the internet grows drastically, extracting
knowledge from XML documents becomes a harder task. Certainly,
documents are often so large that the data set returned as answer to a
query may also be very big to convey the required information. To
improve the query answering, a Semantic Tree Based Association
Rule (STAR) mining method is proposed. This method provides
intentional information by considering the structure, content and the
semantics of the content. The method is applied on Reuter’s dataset
and the results show that the proposed method outperforms well.
Abstract: Endowed of renewable energy sources (RES) are the
advantages of ASEAN, but they are using a low amount of RES only
to generate electricity because their primary energy sources are fossil
and coal. The cost of purchasing fossil and coal is cheaper now, but it
might be expensive soon, as it will be depleted sooner and after.
ASEAN showed that the RES are convenient to be implemented.
Some country in ASEAN has huge renewable energy sources
potential and use. The primary aim of this project is to assist ASEAN
countries in preparing the renewable energy and to guide the policies
for RES in the more upright direction. The Green-Y model will help
ASEAN government to study and forecast the economic concept,
including feed-in tariff.
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: Femtocells are regarded as a milestone for next
generation cellular networks. As femtocells are deployed in an
unplanned manner, there is a chance of assigning same resource to
neighboring femtocells. This scenario may induce co-channel
interference and may seriously affect the service quality of
neighboring femtocells. In addition, the dominant transmit power of a
femtocell will induce co-tier interference to neighboring femtocells.
Thus to jointly handle co-tier and co-channel interference, we
propose an interference-free power and resource block allocation
(IFPRBA) algorithm for closely located, closed access femtocells.
Based on neighboring list, inter-femto-base station distance and
uplink noise power, the IFPRBA algorithm assigns non-interfering
power and resource to femtocells. The IFPRBA algorithm also
guarantees the quality of service to femtouser based on the
knowledge of resource requirement, connection type, and the
tolerable delay budget. Simulation result shows that the interference
power experienced in IFPRBA algorithm is below the tolerable
interference power and hence the overall service success ratio, PRB
efficiency and network throughput are maximum when compared to
conventional resource allocation framework for femtocell (RAFF)
algorithm.
Abstract: In this research, waterglass based aerogel powder was
prepared by sol–gel process and ambient pressure drying. Inspired by
limited dust releasing, aerogel powder was introduced to the PET
electrospinning solution in an attempt to create required bulk and
surface structure for the nanofibers to improve their hydrophobic and
insulation properties. The samples evaluation was carried out by
measuring density, porosity, contact angle, heat transfer, FTIR, BET,
and SEM. According to the results, porous silica aerogel powder was
fabricated with mean pore diameter of 24 nm and contact angle of
145.9º. The results indicated the usefulness of the aerogel powder
confined into nanofibers to control surface roughness for
manipulating superhydrophobic nanowebs with water contact angle
of 147º. It can be due to a multi-scale surface roughness which was
created by nanowebs structure itself and nanofibers surface
irregularity in presence of the aerogels while a layer of fluorocarbon
created low surface energy. The wettability of a solid substrate is an
important property that is controlled by both the chemical
composition and geometry of the surface. Also, a decreasing trend in
the heat transfer was observed from 22% for the nanofibers without
any aerogel powder to 8% for the nanofibers with 4% aerogel
powder. The development of thermal insulating materials has become
increasingly more important than ever in view of the fossil energy
depletion and global warming that call for more demanding energysaving
practices.
Abstract: The focal aspire of e-Government (eGovt) is to offer
citizen-centered service delivery. Accordingly, the citizenry
consumes services from multiple government agencies through
national portal. Thus, eGovt is an enterprise with the primary
business motive of transparent, efficient and effective public services
to its citizenry and its logical structure is the eGovernment Enterprise
Architecture (eGEA). Since eGovt is IT oriented multifaceted
service-centric system, EA doesn’t do much on an automated
enterprise other than the business artifacts. Service-Oriented
Architecture (SOA) manifestation led some governments to pertain
this in their eGovts, but it limits the source of business artifacts. The
concurrent use of EA and SOA in eGovt executes interoperability and
integration and leads to Service-Oriented e-Government Enterprise
(SOeGE). Consequently, agile eGovt system becomes a reality. As an
IT perspective eGovt comprises of centralized public service artifacts
with the existing application logics belong to various departments at
central, state and local level. The eGovt is renovating to SOeGE by
apply the Service-Orientation (SO) principles in the entire system.
This paper explores IT perspective of SOeGE in India which
encompasses the public service models and illustrated with a case
study the Passport service of India.
Abstract: Real time image and video processing is a demand in
many computer vision applications, e.g. video surveillance, traffic
management and medical imaging. The processing of those video
applications requires high computational power. Thus, the optimal
solution is the collaboration of CPU and hardware accelerators. In
this paper, a Canny edge detection hardware accelerator is proposed.
Edge detection is one of the basic building blocks of video and image
processing applications. It is a common block in the pre-processing
phase of image and video processing pipeline. Our presented
approach targets offloading the Canny edge detection algorithm from
processing system (PS) to programmable logic (PL) taking the
advantage of High Level Synthesis (HLS) tool flow to accelerate the
implementation on Zynq platform. The resulting implementation
enables up to a 100x performance improvement through hardware
acceleration. The CPU utilization drops down and the frame rate
jumps to 60 fps of 1080p full HD input video stream.
Abstract: This paper presents observations on the early
supervised internships in Psychology, currently called basic
internships in Brazil, and its importance in professional training. The
work is an experience report and focuses on the Professional training,
illustrated by the reality of a Brazilian institution, used as a case
study. It was developed from the authors' experience as academic
supervisors of this kind of practice throughout this undergraduate
course, combined with aspects investigated in the post-doctoral
research of one of them. Theoretical references on the subject and
related national legislation are analyzed, as well as reports of students
who experienced at least one semester of this type of practice,
articulated to the observations of the authors. The results demonstrate
the importance of the early supervised internships as a way of
creating opportunities for the students of a first contact with the
professional reality and the practice of psychologists in different
fields of insertion, preparing them for further experiments that require
more involvement in activities of training and practices in
Psychology.
Abstract: Braille alphabet is an important tool that enables
visually impaired individuals to have a comfortable life like those
who have normal vision. For this reason, new applications related to
the Braille alphabet are being developed. In this study, a new
Refreshable Braille Display was developed to help visually impaired
individuals learn the Braille alphabet easier. By means of this system,
any text downloaded on a computer can be read by the visually
impaired individual at that moment by feeling it by his/her hands.
Through this electronic device, it was aimed to make learning the
Braille alphabet easier for visually impaired individuals with whom
the necessary tests were conducted.
Abstract: The final step to complete the “Analytical Systems
Engineering Process” is the “Allocated Architecture” in which all
Functional Requirements (FRs) of an engineering system must be
allocated into their corresponding Physical Components (PCs). At
this step, any design for developing the system’s allocated
architecture in which no clear pattern of assigning the exclusive
“responsibility” of each PC for fulfilling the allocated FR(s) can be
found is considered a poor design that may cause difficulties in
determining the specific PC(s) which has (have) failed to satisfy a
given FR successfully. The present study utilizes the Axiomatic
Design method principles to mathematically address this problem and
establishes an “Axiomatic Model” as a solution for reaching good
alternatives for developing the allocated architecture. This study
proposes a “loss Function”, as a quantitative criterion to monetarily
compare non-ideal designs for developing the allocated architecture
and choose the one which imposes relatively lower cost to the
system’s stakeholders. For the case-study, we use the existing design
of U. S. electricity marketing subsystem, based on data provided by
the U.S. Energy Information Administration (EIA). The result for
2012 shows the symptoms of a poor design and ineffectiveness due to
coupling among the FRs of this subsystem.
Abstract: Safety is one of the most important considerations
when buying a new car. While active safety aims at avoiding
accidents, passive safety systems such as airbags and seat belts
protect the occupant in case of an accident. In addition to legal
regulations, organizations like Euro NCAP provide consumers with
an independent assessment of the safety performance of cars and
drive the development of safety systems in automobile industry.
Those ratings are mainly based on injury assessment reference values
derived from physical parameters measured in dummies during a car
crash test.
The components and sub-systems of a safety system are designed
to achieve the required restraint performance. Sled tests and other
types of tests are then carried out by car makers and their suppliers
to confirm the protection level of the safety system. A Knowledge
Discovery in Databases (KDD) process is proposed in order to
minimize the number of tests. The KDD process is based on the
data emerging from sled tests according to Euro NCAP specifications.
About 30 parameters of the passive safety systems from different data
sources (crash data, dummy protocol) are first analysed together with
experts opinions. A procedure is proposed to manage missing data
and validated on real data sets. Finally, a procedure is developed to
estimate a set of rough initial parameters of the passive system before
testing aiming at reducing the number of tests.
Abstract: Solar air heater is a type of heat exchanger which
transforms solar radiation into heat energy. The thermal performance
of conventional solar air heater has been found to be poor because of
the low convective heat transfer coefficient from the absorber plate to
the air. It is attributed to the formation of a very thin boundary layer
at the absorber plate surface commonly known as viscous sub-layer.
Thermal efficiency of solar air heater can be improved by providing
the artificial roughness on absorber plate is the most efficient
technique. In this paper an attempt is made to provide artificial
roughness by incorporating inclined multiple V-ribs in the underside
of the absorber plate. 60˚V – ribs are arranged inclined to the
direction of air flow. Performance of collector estimated theoretically
and experimentally. Results of the investigation reveal that thermal
efficiency of collector with multiple V-ribs increased by 14%.
Abstract: Several of the practical industrial control processes are
multivariable processes. Due to the relation amid the variables
(interaction), delay in the loops, it is very intricate to design a
controller directly for these processes. So first, the interaction of the
variables is analyzed using Relative Normalized Gain Array
(RNGA), which considers the time constant, static gain and delay
time of the processes. Based on the effect of RNGA, relative gain
array (RGA) and NI, the pair (control configuration) of variables to
be controlled by decentralized control is selected. The equivalent
transfer function (ETF) of the process model is estimated as first
order process with delay using the corresponding elements in the
Relative gain array and Relative average residence time array
(RARTA) of the processes. Secondly, a decentralized Proportional-
Integral (PI) controller is designed for each ETF simply using
frequency response specifications. Finally, the performance and
robustness of the algorithm is comparing with existing related
approaches to validate the effectiveness of the projected algorithm.
Abstract: The demand of high quality services has fueled
dimensional research and development in wireless communications
and networking. As a result, different wireless technologies like
Wireless LAN, CDMA, GSM, UMTS, MANET, Bluetooth and
satellite networks etc. have emerged in the last two decades. Future
networks capable of carrying multimedia traffic need IP convergence,
portability, seamless roaming and scalability among the existing
networking technologies without changing the core part of the
existing communications networks. To fulfill these goals, the present
networking systems are required to work in cooperation to ensure
technological independence, seamless roaming, high security and
authentication, guaranteed Quality of Services (QoS). In this paper, a
conceptual framework for a cooperative network (CN) is proposed
for integration of heterogeneous existing networks to meet out the
requirements of the next generation wireless networks.
Abstract: Many of the ever-growing elderly population require
exercise, such as running, for health management. One important
element of a runner’s training is the choice of shoes for exercise; shoes
are important because they provide the interface between the feet and
road. When we purchase shoes, we may instinctively choose a pair
after trying on many different pairs of shoes. Selecting the shoes
instinctively may work, but it does not guarantee a suitable fit for
running activities. Therefore, if we could select suitable shoes for each
runner from the viewpoint of brain activities, it would be helpful for
validating shoe selection. In this paper, we describe how brain
activities show different characteristics during particular task,
corresponding to different properties of shoes. Using five subjects, we
performed a verification experiment, applying weight, softness, and
flexibility as shoe properties. In order to affect the shoe property’s
differences to the brain, subjects run for 10 min. Before and after
running, subjects conducted a paced auditory serial addition task
(PASAT) as the particular task; and the subjects’ brain activities
during the PASAT are evaluated based on oxyhemoglobin and
deoxyhemoglobin relative concentration changes, measured by
near-infrared spectroscopy (NIRS). When the brain works actively,
oxihemoglobin and deoxyhemoglobin concentration drastically
changes; therefore, we calculate the maximum values of concentration
changes. In order to normalize relative concentration changes after
running, the maximum value are divided by before running maximum
value as evaluation parameters. The classification of the groups of
shoes is expressed on a self-organizing map (SOM). As a result,
deoxyhemoglobin can make clusters for two of the three types of
shoes.
Abstract: This paper reports a structured literature review of the
application of Health Information Technology in developing
countries, defined as the World Bank categories Low-income
countries, Lower-middle-income, and Upper-middle-income
countries. The aim was to identify and classify the various
applications of health information technology to assess its current
state in developing countries and explore potential areas of research.
We offer specific analysis and application of HIT in Libya as one of
the developing countries. A structured literature review was
conducted using the following online databases: IEEE, Science
Direct, PubMed, and Google Scholar. Publication dates were set for
2000-2013. For the PubMed search, publications in English, French,
and Arabic were specified. Using a content analysis approach, 159
papers were analyzed and a total number of 26 factors were identified
that affect the adoption of health information technology. Of the 2681
retrieved articles, 159 met the inclusion criteria which were carefully
analyzed and classified. The implementation of health information
technology across developing countries is varied. Whilst it was
initially expected financial constraints would have severely limited
health information technology implementation, some developing
countries like India have nevertheless dominated the literature and
taken the lead in conducting scientific research. Comparing the
number of studies to the number of countries in each category, we
found that Low-income countries and Lower-middle-income had
more studies carried out than Upper-middle-income countries.
However, whilst IT has been used in various sectors of the economy,
the healthcare sector in developing countries is still failing to benefit
fully from the potential advantages that IT can offer.
Abstract: The inspection of underneath vehicle system has been
given significant attention by governments after the threat of
terrorism become more prevalent. New technologies such as mobile
robots and computer vision are led to have more secure environment.
This paper proposed that a mobile robot like Aria robot can be used
to search and inspect the bombs under parking a lot vehicle. This
robot is using fuzzy logic and subsumption algorithms to control the
robot that movies underneath the vehicle. An OpenCV library and
laser Hokuyo are added to Aria robot to complete the experiment for
under vehicle inspection. This experiment was conducted at the
indoor environment to demonstrate the efficiency of our methods to
search objects and control the robot movements under vehicle. We
got excellent results not only by controlling the robot movement but
also inspecting object by the robot camera at same time. This success
allowed us to know the requirement to construct a new cost effective
robot with more functionality.