Abstract: Risk Assessment Tool (RAT) is an expert system that
assesses, monitors, and gives preliminary treatments automatically
based on the project plan. In this paper, a review was taken out for
the current project time management risk assessment tools for SME
software development projects, analyze risk assessment parameters,
conditions, scenarios, and finally propose risk assessment tool (RAT)
model to assess, treat, and monitor risks. An implementation prototype
system is developed to validate the model.
Abstract: In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Ye et al. proposed a statistical en-route filtering scheme (SEF) to detect such false reports during the forwarding process. In this scheme, the choice of a security threshold value is important since it trades off detection power and overhead. In this paper, we propose a fuzzy logic for determining a security threshold value in the SEF based sensor networks. The fuzzy logic determines a security threshold by considering the number of partitions in a global key pool, the number of compromised partitions, and the energy level of nodes. The fuzzy based threshold value can conserve energy, while it provides sufficient detection power.
Abstract: A wideband 2-1-1 cascaded ΣΔ modulator with a
single-bit quantizer in the two first stages and a 4-bit quantizer in the
final stage is developed. To reduce sensitivity of digital-to-analog
converter (DAC) nonlinearities in the feedback of the last stage,
dynamic element matching (DEM) is introduced. This paper presents
two modelling approaches: The first is MATLAB description and the
second is VHDL-AMS modelling of the proposed architecture and
exposes some high-level-simulation results allowing a behavioural
study. The detail of both ideal and non-ideal behaviour modelling are
presented. Then, the study of the effect of building blocks
nonidealities is presented; especially the influences of nonlinearity,
finite operational amplifier gain, amplifier slew rate limitation and
capacitor mismatch. A VHDL-AMS description presents a good
solution to predict system-s performances and can provide sensitivity
curves giving the impact of nonidealities on the system performance.
Abstract: In the way of growing and developing firms especially
high-tech firms, on many occasions manager of firm is mainly involved in solving problems of his business and decision making about executive activities of the firm, while besides executive
measures, attention to planning of firm's success and growth way and
application of long experience and sagacity in designing business model are vital and necessary success in a business is achieved as a
result of different factors, one of the most important of them is designing and performing an optimal business model at the beginning
of the firm's work. This model is determining the limit of profitability
achieved by innovation and gained value added. Therefore, business
model is the process of connecting innovation environment and
technology with economic environment and business and is important
for succeeding modern businesses considering their traits.
Abstract: Nowadays, web-based technologies influence in
people-s daily life such as in education, business and others.
Therefore, many web developers are too eager to develop their web
applications with fully animation graphics and forgetting its
accessibility to its users. Their purpose is to make their web
applications look impressive. Thus, this paper would highlight on the
usability and accessibility of a voice recognition browser as a tool to
facilitate the visually impaired and blind learners in accessing virtual
learning environment. More specifically, the objectives of the study
are (i) to explore the challenges faced by the visually impaired
learners in accessing virtual learning environment (ii) to determine
the suitable guidelines for developing a voice recognition browser
that is accessible to the visually impaired. Furthermore, this study
was prepared based on an observation conducted with the Malaysian
visually impaired learners. Finally, the result of this study would
underline on the development of an accessible voice recognition
browser for the visually impaired.
Abstract: In order to monitor the water table depth on soil profile
salinity buildup, a field study was carried out during 2006-07. Wheat
(Rabi) and Sorghum (Kharif) fodder were sown in with three
treatments. The results showed that watertable depth lowered from
1.15m to 2.89 m depth at the end of experiment. With lower of
watertable depth, pH, ECe and SAR decreased under crops both
without and with gypsum and increased in fallowing. Soil moisture
depletion was directly proportional to lowering of watertable. With the
application of irrigation water (58cm) pH, ECe and SAR were reduced
in cropped plots, reduction was higher in gypsum applied plots than
non-gypsum plots. In case of fallowing, there was increase in pH, EC,
while slight reduction occurred in SAR values. However, soil salinity
showed an increasing upward trend under fallowing and its value in
0-30 cm soil layer was the highest amongst the treatments.
Abstract: One of the most importance of intelligence in-car and
roadside systems is the cooperative vehicle-infrastructure system. In
Thailand, ITS technologies are rapidly growing and real-time vehicle
information is considerably needed for ITS applications; for example,
vehicle fleet tracking and control and road traffic monitoring
systems. This paper defines the communication protocols and
software design for middleware components of B-VIS (Burapha
Vehicle-Infrastructure System). The proposed B-VIS middleware architecture serves the needs of a distributed RFID sensor network and simplifies some intricate details of several communication standards.
Abstract: A 3D simulation study for an incompressible
slip flow around a spherical aerosol particle was performed.
The full Navier-Stokes equations were solved and the velocity
jump at the gas-particle interface was treated numerically by
imposition of the slip boundary condition. Analytical solution
to the Stokesian slip flow past a spherical particle was used as
a benchmark for code verification, and excellent agreement
was achieved. The Simulation results showed that in addition
to the Knudsen number, the Reynolds number affects the slip
correction factor. Thus, the Cunningham-based slip corrections
must be augmented by the inclusion of the effect of
Reynolds number for application to Lagrangian tracking of
fine particles. A new expression for the slip correction factor
as a function of both Knudsen number and Reynolds number
was developed.
Abstract: The Chiu-s method which generates a Takagi-Sugeno Fuzzy Inference System (FIS) is a method of fuzzy rules extraction. The rules output is a linear function of inputs. In addition, these rules are not explicit for the expert. In this paper, we develop a method which generates Mamdani FIS, where the rules output is fuzzy. The method proceeds in two steps: first, it uses the subtractive clustering principle to estimate both the number of clusters and the initial locations of a cluster centers. Each obtained cluster corresponds to a Mamdani fuzzy rule. Then, it optimizes the fuzzy model parameters by applying a genetic algorithm. This method is illustrated on a traffic network management application. We suggest also a Mamdani fuzzy rules generation method, where the expert wants to classify the output variables in some fuzzy predefined classes.
Abstract: In this work, an organic compound 5,10,15,20-
Tetrakis(3,5-di-tertbutylphenyl)porphyrinatocopper(II) (TDTBPPCu)
is studied as an active material for thin film electronic devices. To
investigate the electrical properties of TDTBPPCu, junction of
TDTBPPCu with heavily doped n-Si and Al is fabricated.
TDTBPPCu film was sandwiched between Al and n-Si electrodes.
Various electrical parameters of TDTBPPCu are determined. The
current-voltage characteristics of the junction are nonlinear,
asymmetric and show rectification behavior, which gives the clue of
formation of depletion region. This behavior indicates the potential
of TDTBPPCu for electronics applications. The current-voltage and
capacitance-voltage techniques are used to find the different
electronic parameters.
Abstract: An ontology is widely used in many kinds of applications as a knowledge representation tool for domain knowledge. However, even though an ontology schema is well prepared by domain experts, it is tedious and cost-intensive to add instances into the ontology. The most confident and trust-worthy way to add instances into the ontology is to gather instances from tables in the related Web pages. In automatic populating of instances, the primary task is to find the most proper concept among all possible concepts within the ontology for a given table. This paper proposes a novel method for this problem by defining the similarity between the table and the concept using the overlap of their properties. According to a series of experiments, the proposed method achieves 76.98% of accuracy. This implies that the proposed method is a plausible way for automatic ontology population from Web tables.
Abstract: The reluctance motor is an electric motor in which
torque is produced by the tendency of its moveable part to move to a
position where the inductance of the excited winding is maximized.
In this paper switched reluctance motors (SRMs) with two different
configurations(3-phase SRM with 4rotor poles and 6 stator poles, 4-
phase SRM with 6rotor poles and 8 stator poles) is designed by
RMxprt, and performance of them is analyzed. Efficiency and torque
of SRM for different configurations in full-load condition have been
presented. The results indicate that with correct choosing of motor
applications, maximum efficiency can be found.
Abstract: As one of the big government bank, Bank X is paying attention its performance, so that it can compete. One of them is the existence of organizational culture which recognized with term TIPEC (Trust, Integrity, Professionalism, Costumer Focus, and Excellence). In application of organizational culture, it is needed the existence of employee involvement (job involvement). It can be influenced by various factors, such as Locus of Control. Related to above mentioned, the problems are how employee tendency of Locus of Control, how job involvement, how organizational culture applied by employees and how influence of Locus of Control and job involvement to the organizational culture applied by employees. Researchers collected data with questioner spreading, and respondents number of 30 people. After that, the data were analyzed with SPSS software constructively. The influence of Locus of Control and job involvement to the application of organizational culture was strong, i.e. 58.3%.
Abstract: Space Vector Pulse Width Modulation SVPWM is
one of the most used techniques to generate sinusoidal voltage and
current due to its facility and efficiency with low harmonics
distortion. This algorithm is specially used in power electronic
applications. This paper describes simulation algorithm of SVPWM
& SPWM using MatLab/simulink environment. It also implements a
closed loop three phases DC-AC converter controlling its outputs
voltages amplitude and frequency using MatLab. Also comparison
between SVPWM & SPWM results is given.
Abstract: The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
Abstract: Dealing with hundreds of features in character
recognition systems is not unusual. This large number of features
leads to the increase of computational workload of recognition
process. There have been many methods which try to remove
unnecessary or redundant features and reduce feature dimensionality.
Besides because of the characteristics of Farsi scripts, it-s not
possible to apply other languages algorithms to Farsi directly. In this
paper some methods for feature subset selection using genetic
algorithms are applied on a Farsi optical character recognition (OCR)
system. Experimental results show that application of genetic
algorithms (GA) to feature subset selection in a Farsi OCR results in
lower computational complexity and enhanced recognition rate.
Abstract: The radio frequency identification (RFID) is a
technology for automatic identification of items, particularly in
supply chain, but it is becoming increasingly important for industrial
applications. Unlike barcode technology that detects the optical
signals reflected from barcode labels, RFID uses radio waves to
transmit the information from an RFID tag affixed to the physical
object. In contrast to today most often use of this technology in
warehouse inventory and supply chain, the focus of this paper is an
overview of the structure of RFID systems used by RFID technology
and it also presents a solution based on the application of RFID for
brand authentication, traceability and tracking, by implementing a
production management system and extending its use to traders.
Abstract: Micro droplet formation is considered as a growing
emerging area of research due to its wide-range application in
chemistry as well as biology. The mechanism of micro droplet
formation using two immiscible liquids running through a T-junction
has been widely studied.
We believe that the flow of these two immiscible phases can be of
greater important factor that could have an impact on out-flow
hydrodynamic behavior, the droplets generated and the size of the
droplets. In this study, the type of the capillary tubes used also
represents another important factor that can have an impact on the
generation of micro droplets.
The tygon capillary tubing with hydrophilic inner surface doesn't
allow regular out-flows due to the fact that the continuous phase
doesn't adhere to the wall of the capillary inner surface.
Teflon capillary tubing, presents better wettability than tygon
tubing, and allows to obtain steady and regular regimes of out-flow,
and the micro droplets are homogeneoussize.
The size of the droplets is directly dependent on the flows of the
continuous and dispersed phases. Thus, as increasing the flow of the
continuous phase, to flow of the dispersed phase stationary, the size
of the drops decreases. Inversely, while increasing the flow of the
dispersed phase, to flow of the continuous phase stationary, the size
of the droplet increases.
Abstract: A new method for low complexity image coding is presented, that permits different settings and great scalability in the generation of the final bit stream. This coding presents a continuoustone still image compression system that groups loss and lossless compression making use of finite arithmetic reversible transforms. Both transformation in the space of color and wavelet transformation are reversible. The transformed coefficients are coded by means of a coding system in depending on a subdivision into smaller components (CFDS) similar to the bit importance codification. The subcomponents so obtained are reordered by means of a highly configure alignment system depending on the application that makes possible the re-configure of the elements of the image and obtaining different levels of importance from which the bit stream will be generated. The subcomponents of each level of importance are coded using a variable length entropy coding system (VBLm) that permits the generation of an embedded bit stream. This bit stream supposes itself a bit stream that codes a compressed still image. However, the use of a packing system on the bit stream after the VBLm allows the realization of a final highly scalable bit stream from a basic image level and one or several enhance levels.
Abstract: The batch nature limits the standard kernel principal component analysis (KPCA) methods in numerous applications, especially for dynamic or large-scale data. In this paper, an efficient adaptive approach is presented for online extraction of the kernel principal components (KPC). The contribution of this paper may be divided into two parts. First, kernel covariance matrix is correctly updated to adapt to the changing characteristics of data. Second, KPC are recursively formulated to overcome the batch nature of standard KPCA.This formulation is derived from the recursive eigen-decomposition of kernel covariance matrix and indicates the KPC variation caused by the new data. The proposed method not only alleviates sub-optimality of the KPCA method for non-stationary data, but also maintains constant update speed and memory usage as the data-size increases. Experiments for simulation data and real applications demonstrate that our approach yields improvements in terms of both computational speed and approximation accuracy.