Abstract: A topologically oriented neural network is very
efficient for real-time path planning for a mobile robot in changing
environments. When using a recurrent neural network for this
purpose and with the combination of the partial differential equation
of heat transfer and the distributed potential concept of the network,
the problem of obstacle avoidance of trajectory planning for a
moving robot can be efficiently solved. The related dimensional
network represents the state variables and the topology of the robot's
working space. In this paper two approaches to problem solution are
proposed. The first approach relies on the potential distribution of
attraction distributed around the moving target, acting as a unique
local extreme in the net, with the gradient of the state variables
directing the current flow toward the source of the potential heat. The
second approach considers two attractive and repulsive potential
sources to decrease the time of potential distribution. Computer
simulations have been carried out to interrogate the performance of
the proposed approaches.
Abstract: In order to accommodate various multimedia
services, next generation wireless networks are characterized
by very high transmission bit rates. Thus, in such systems and
networks, the received signal is not only limited by noise but -
especially with increasing symbols rate often more
significantly by the intersymbol interference (ISI) caused by
the time dispersive radio channels such as those are used in
this work. This paper deals with the study of the performance
of detector for high bit rate transmission on some worst case
models of frequency selective fading channels for outdoor
mobile radio environments. This paper deals with a number of
different wireless channels with different power profiles and
different number of resolvable paths. All the radio channels
generated in this paper are for outdoor vehicular environments
with Doppler spread of 100 Hz. A carrier frequency of 1800
MHz is used and all the channels used in this work are such
that they are useful for next generation wireless systems.
Schemes for mitigation of ISI with adaptive equalizers of
different types have been investigated and their performances
have been investigated in terms of BER measured as a function
of SNR.
Abstract: QoS Routing aims to find paths between senders and
receivers satisfying the QoS requirements of the application which
efficiently using the network resources and underlying routing
algorithm to be able to find low-cost paths that satisfy given QoS
constraints. The problem of finding least-cost routing is known to be
NP-hard or complete and some algorithms have been proposed to
find a near optimal solution. But these heuristics or algorithms either
impose relationships among the link metrics to reduce the complexity
of the problem which may limit the general applicability of the
heuristic, or are too costly in terms of execution time to be applicable
to large networks. In this paper, we concentrate an algorithm that
finds a near-optimal solution fast and we named this algorithm as
optimized Delay Constrained Routing (ODCR), which uses an
adaptive path weight function together with an additional constraint
imposed on the path cost, to restrict search space and hence ODCR
finds near optimal solution in much quicker time.
Abstract: Over the past few years, a number of efforts have
been exerted to build parallel processing systems that utilize the idle
power of LAN-s and PC-s available in many homes and corporations.
The main advantage of these approaches is that they provide cheap
parallel processing environments for those who cannot afford the
expenses of supercomputers and parallel processing hardware.
However, most of the solutions provided are not very flexible in the
use of available resources and very difficult to install and setup.
In this paper, a multi-level web-based parallel processing system
(MWPS) is designed (appendix). MWPS is based on the idea of
volunteer computing, very flexible, easy to setup and easy to use.
MWPS allows three types of subscribers: simple volunteers (single
computers), super volunteers (full networks) and end users. All of
these entities are coordinated transparently through a secure web site.
Volunteer nodes provide the required processing power needed by
the system end users. There is no limit on the number of volunteer
nodes, and accordingly the system can grow indefinitely. Both
volunteer and system users must register and subscribe. Once, they
subscribe, each entity is provided with the appropriate MWPS
components. These components are very easy to install.
Super volunteer nodes are provided with special components that
make it possible to delegate some of the load to their inner nodes.
These inner nodes may also delegate some of the load to some other
lower level inner nodes .... and so on. It is the responsibility of the
parent super nodes to coordinate the delegation process and deliver
the results back to the user.
MWPS uses a simple behavior-based scheduler that takes into
consideration the current load and previous behavior of processing
nodes. Nodes that fulfill their contracts within the expected time get a
high degree of trust. Nodes that fail to satisfy their contract get a
lower degree of trust.
MWPS is based on the .NET framework and provides the minimal
level of security expected in distributed processing environments.
Users and processing nodes are fully authenticated. Communications
and messages between nodes are very secure. The system has been
implemented using C#.
MWPS may be used by any group of people or companies to
establish a parallel processing or grid environment.
Abstract: The latest Geographic Information System (GIS)
technology makes it possible to administer the spatial components of
daily “business object," in the corporate database, and apply suitable
geographic analysis efficiently in a desktop-focused application. We
can use wireless internet technology for transfer process in spatial
data from server to client or vice versa. However, the problem in
wireless Internet is system bottlenecks that can make the process of
transferring data not efficient. The reason is large amount of spatial
data. Optimization in the process of transferring and retrieving data,
however, is an essential issue that must be considered. Appropriate
decision to choose between R-tree and Quadtree spatial data indexing
method can optimize the process. With the rapid proliferation of
these databases in the past decade, extensive research has been
conducted on the design of efficient data structures to enable fast
spatial searching. Commercial database vendors like Oracle have also
started implementing these spatial indexing to cater to the large and
diverse GIS. This paper focuses on the decisions to choose R-tree
and quadtree spatial indexing using Oracle spatial database in mobile
GIS application. From our research condition, the result of using
Quadtree and R-tree spatial data indexing method in one single
spatial database can save the time until 42.5%.
Abstract: Multiparty voice over IP (MVoIP) systems allows a group of people to freely communicate each other via the internet, which have many applications such as online gaming, teleconferencing, online stock trading etc. Peertalk is a peer to peer multiparty voice over IP system (MVoIP) which is more feasible than existing approaches such as p2p overlay multicast and coupled distributed processing. Since the stream mixing and distribution are done by the peers, it is vulnerable to major security threats like nodes misbehavior, eavesdropping, Sybil attacks, Denial of Service (DoS), call tampering, Man in the Middle attacks etc. To thwart the security threats, a security framework called PEERTS (PEEred Reputed Trustworthy System for peertalk) is implemented so that efficient and secure communication can be carried out between peers.
Abstract: This paper presents a pulse doubling technique in a 12-pulse ac-dc converter which supplies direct torque controlled motor drives (DTCIMD-s) in order to have better power quality conditions at the point of common coupling. The proposed technique increases the number of rectification pulses without significant changes in the installations and yields in harmonic reduction in both ac and dc sides. The 12-pulse rectified output voltage is accomplished via two paralleled six-pulse ac-dc converters each of them consisting of three-phase diode bridge rectifier. An autotransformer is designed to supply the rectifiers. The design procedure of magnetics is in a way such that makes it suitable for retrofit applications where a six-pulse diode bridge rectifier is being utilized. Independent operation of paralleled diode-bridge rectifiers, i.e. dc-ripple re-injection methodology, requires a Zero Sequence Blocking Transformer (ZSBT). Finally, a tapped interphase reactor is connected at the output of ZSBT to double the pulse numbers of output voltage up to 24 pulses. The aforementioned structure improves power quality criteria at ac mains and makes them consistent with the IEEE-519 standard requirements for varying loads. Furthermore, near unity power factor is obtained for a wide range of DTCIMD operation. A comparison is made between 6- pulse, 12-pulse, and proposed converters from view point of power quality indices. Results show that input current total harmonic distortion (THD) is less than 5% for the proposed topology at various loads.
Abstract: Presently and in line with the United Nations (EPA),
human thinking system has shifted towards clean fuels so as to
maintain a cleaner environment and to save our planet earth.
One of the most successful studies in order to achieve new
energies includes the use of animal wastes and their organic residues,
and the result of these researches has been represented in the form of
very simple and cheap methods called biogas technology. Biogas
technology has developed a lot in the recent decades; its reason is the
high cost of fossil fuels and the greater attention of countries to the
environmental pollutions due to the consumption of this kind of
fuels.
IRAN is ready for the optimized application of renewable
energies, having much enriched resources of this kind of energies; so
a special place could be considered for it when making programs.
The purpose of biogas technology is the recovery of energy and
finally the protection of the environment, which is much appropriate
for the third world farmers with respect to their technical abilities and
economic potentials. Studies show that the production and
consumption of biogas is appropriate and economic in IRAN,
because of the high amount of waste in the agriculture sector, the
significant amount of animal and human excrement production, the
great volume of garbage produced and the most important the
specific social, climatic and agricultural conditions in IRAN, in order
to proceed towards the reduction of pollution due to the use of fossil
fuels.
Abstract: In this paper, we propose a selective mutation method
for improving the performances of genetic algorithms. In selective
mutation, individuals are first ranked and then additionally mutated
one bit in a part of their strings which is selected corresponding to
their ranks. This selective mutation helps genetic algorithms to fast
approach the global optimum and to quickly escape local optima.
This results in increasing the performances of genetic algorithms.
We measured the effects of selective mutation with four function
optimization problems. It was found from extensive experiments that
the selective mutation can significantly enhance the performances of
genetic algorithms.
Abstract: In general fuzzy sets are used to analyze the fuzzy
system reliability. Here intuitionistic fuzzy set theory for analyzing
the fuzzy system reliability has been used. To analyze the fuzzy
system reliability, the reliability of each component of the system as
a triangular intuitionistic fuzzy number is considered. Triangular
intuitionistic fuzzy number and their arithmetic operations are
introduced. Expressions for computing the fuzzy reliability of a
series system and a parallel system following triangular intuitionistic
fuzzy numbers have been described. Here an imprecise reliability
model of an electric network model of dark room is taken. To
compute the imprecise reliability of the above said system, reliability
of each component of the systems is represented by triangular
intuitionistic fuzzy numbers. Respective numerical example is
presented.
Abstract: The issue of leadership has been investigated from
several perspectives; however, very less from ethical perspective.
With the growing number of corporate scandals and unethical roles
played by business leaders in several parts of the world, the need to
examine leadership from ethical perspective cannot be over
emphasized. The importance of leadership credibility has been
discussed in the authentic model of leadership. Authentic leaders
display high degree of integrity, have deep sense of purpose, and
committed to their core values. As a result they promote a more
trusting relationship in their work groups that translates into several
positive outcomes. The present study examined how authentic
leadership contribute to subordinates- trust in leadership and how this
trust, in turn, predicts subordinates- work engagement. A sample of
395 employees was randomly selected from several local banks
operating in Malaysia. Standardized tools such as ALQ, OTI, and
EEQ were employed. Results indicated that authentic leadership
promoted subordinates- trust in leader, and contributed to work
engagement. Also, interpersonal trust predicted employees- work
engagement as well as mediated the relationship between this style of
leadership and employees- work engagement.
Abstract: This paper presents a speed sensorless direct torque
control scheme using space vector modulation (DTC-SVM) for
permanent magnet synchronous motor (PMSM) drive based a Model
Reference Adaptive System (MRAS) algorithm and stator resistance
estimator. The MRAS is utilized to estimate speed and stator
resistance and compensate the effects of parameter variation on stator
resistance, which makes flux and torque estimation more accurate
and insensitive to parameter variation. In other hand the use of SVM
method reduces the torque ripple while achieving a good dynamic
response. Simulation results are presented and show the effectiveness
of the proposed method.
Abstract: Regarding previous research studies it was concluded
that thin-walled fiber-cement composites are able to conduct electric
current under specific conditions. This property is ensured by using
of various kinds of carbon materials. Though carbon fibers are less
conductive than metal fibers, composites with carbon fibers were
evaluated as better current conductors than the composites with metal
fibers. The level of electric conductivity is monitored by the means of
impedance measurement of designed samples. These composites
could be used for a range of applications such as heating of
trafficable surfaces or shielding of electro-magnetic fields.
The aim of the present research was to design an element with the
ability to monitor internal processes in building structures and
prevent them from collapsing. As a typical element for laboratory
testing there was chosen a concrete column, which was repeatedly
subjected to load by simple pressure with continual monitoring of
changes in electrical properties.
Abstract: There are many expand of Wi-Fi zones provided
mobile careers and usage of wireless access point at home as increase
of usage of wireless internet caused by the use of smart phone. This
paper shows wireless local area network status, security threats of
WLAN and functionality of major wireless access point in Korea. We
propose security countermeasures concerned with life cycle of access
point from manufacturing to installation, using and finally disposal.
There needed to releasing with configured secure at access point.
Because, it is most cost effective resolution than stage of installation or
other life cycle of access point.
Abstract: In this study, we illustrated the performance and
microbial community of single- and two-phase systems anaerobically
co-digesting cassava pulp and pig manure. The results showed that
the volatile solid reduction and biogas productivity of two-phase
CSTR were 66 ± 4% and 2000 ± 210 ml l-1 d-1, while those of singlephase
CSTR were 59 ± 1% and 1670 ± 60 ml l-1 d-1, respectively. Codigestion
in two-phase CSTR gave higher 12% solid degradation and
25% methane production than single-phase CSTR. Phylogenetic
analysis of 16S rDNA clone library revealed that the Bacteroidetes
were the most abundant group, followed by the Clostridia in singlephase
CSTR. In hydrolysis/acidification reactor of two-phase system,
the bacteria within the phylum Firmicutes, especially Clostridium,
Eubacteriaceae and Lactobacillus were the dominant phylogenetic
groups. Among the Archaea, Methanosaeta sp. was the exclusive
predominant in both digesters while the relative abundance of
Methanosaeta sp. and Methanospirillum hungatei differed between
the two systems.
Abstract: Water pipe network is installed underground and once equipped, it is difficult to recognize the state of pipes when the leak or burst happens. Accordingly, post management is often delayed
after the fault occurs. Therefore, the systematic fault management system of water pipe network is required to prevent the accident and
minimize the loss. In this work, we develop online fault detection system of water pipe network using data of pipes such as flow rate
or pressure. The transient model describing water flow in pipelines
is presented and simulated using MATLAB. The fault situations such
as the leak or burst can be also simulated and flow rate or pressure data when the fault happens are collected. Faults are detected using
statistical methods of fast Fourier transform and discrete wavelet transform, and they are compared to find which method shows the
better fault detection performance.
Abstract: This paper discusses on the use of Spline Interpolation
and Mean Square Error (MSE) as tools to process data acquired from
the developed simulator that shall replicate sea bed logging environment.
Sea bed logging (SBL) is a new technique that uses marine
controlled source electromagnetic (CSEM) sounding technique and is
proven to be very successful in detecting and characterizing hydrocarbon
reservoirs in deep water area by using resistivity contrasts. It uses
very low frequency of 0.1Hz to 10 Hz to obtain greater wavelength.
In this work the in house built simulator was used and was provided
with predefined parameters and the transmitted frequency was varied
for sediment thickness of 1000m to 4000m for environment with and
without hydrocarbon. From series of simulations, synthetics data were
generated. These data were interpolated using Spline interpolation
technique (degree of three) and mean square error (MSE) were
calculated between original data and interpolated data. Comparisons
were made by studying the trends and relationship between frequency
and sediment thickness based on the MSE calculated. It was found
that the MSE was on increasing trends in the set up that has the
presence of hydrocarbon in the setting than the one without. The MSE
was also on decreasing trends as sediment thickness was increased
and with higher transmitted frequency.
Abstract: Optical 1x12 fused-taper-twisted polymer optical fiber (POF) couplers has been fabricated by a perform technique. Characterization of the coupler which proposed to be used in passive night vision application to tracking a blind sport area was reported. During the development process of fused-taper-twisted POF couplers was carried out, red LED fully utilized to be injected into the couplers to test the quality of fabricated couplers. Some characterization parameters, such as optical output power, POFs attenuation characteristics and power losses on the network were observed. The maximum output power efficiency of the coupler is about 40%, but it can be improved gradually through experience and practice.
Abstract: With the turn of this century, many researchers
started showing interest in Embedded Firewall (EF) implementations.
These are not the usual firewalls that are used as checkpoints at network gateways. They are, rather, applied near those hosts that need protection. Hence by using them, individual or grouped network
components can be protected from the inside as well as from external attacks.
This paper presents a study of EF-s, looking at their architecture and problems. A comparative study assesses how practical each kind is. It particularly focuses on the architecture, weak points, and
portability of each kind. A look at their use by different categories of users is also presented.
Abstract: The mitigation of crop loss due to damaging freezes
requires accurate air temperature prediction models. Previous work
established that the Ward-style artificial neural network (ANN) is a
suitable tool for developing such models. The current research
focused on developing ANN models with reduced average prediction
error by increasing the number of distinct observations used in
training, adding additional input terms that describe the date of an
observation, increasing the duration of prior weather data included in
each observation, and reexamining the number of hidden nodes used
in the network. Models were created to predict air temperature at
hourly intervals from one to 12 hours ahead. Each ANN model,
consisting of a network architecture and set of associated parameters,
was evaluated by instantiating and training 30 networks and
calculating the mean absolute error (MAE) of the resulting networks
for some set of input patterns. The inclusion of seasonal input terms,
up to 24 hours of prior weather information, and a larger number of
processing nodes were some of the improvements that reduced
average prediction error compared to previous research across all
horizons. For example, the four-hour MAE of 1.40°C was 0.20°C, or
12.5%, less than the previous model. Prediction MAEs eight and 12
hours ahead improved by 0.17°C and 0.16°C, respectively,
improvements of 7.4% and 5.9% over the existing model at these
horizons. Networks instantiating the same model but with different
initial random weights often led to different prediction errors. These
results strongly suggest that ANN model developers should consider
instantiating and training multiple networks with different initial
weights to establish preferred model parameters.