Abstract: Manufacturing Industries face a crucial change as products and processes are required to, easily and efficiently, be reconfigurable and reusable. In order to stay competitive and flexible, situations also demand distribution of enterprises globally, which requires implementation of efficient communication strategies. A prototype system called the “Broadcaster" has been developed with an assumption that the control environment description has been engineered using the Component-based system paradigm. This prototype distributes information to a number of globally distributed partners via an adoption of the circular-based data processing mechanism. The work highlighted in this paper includes the implementation of this mechanism in the domain of the manufacturing industry. The proposed solution enables real-time remote propagation of machine information to a number of distributed supply chain client resources such as a HMI, VRML-based 3D views and remote client instances regardless of their distribution nature and/ or their mechanisms. This approach is presented together with a set of evaluation results. Authors- main concentration surrounds the reliability and the performance metric of the adopted approach. Performance evaluation is carried out in terms of the response times taken to process the data in this domain and compared with an alternative data processing implementation such as the linear queue mechanism. Based on the evaluation results obtained, authors justify the benefits achieved from this proposed implementation and highlight any further research work that is to be carried out.
Abstract: Recently, much research has been conducted for
security for wireless sensor networks and ubiquitous computing.
Security issues such as authentication and data integrity are major
requirements to construct sensor network systems. Advanced
Encryption Standard (AES) is considered as one of candidate
algorithms for data encryption in wireless sensor networks. In this
paper, we will present the hardware architecture to implement low
power AES crypto module. Our low power AES crypto module has
optimized architecture of data encryption unit and key schedule unit
which could be applicable to wireless sensor networks. We also details
low power design methods used to design our low power AES crypto
module.
Abstract: Cognitive Infocommunications (CogInfoCom) is a new
research direction which has emerged as the synergic convergence
of infocommunications and the cognitive sciences. In this paper,
we provide the definition of CogInfoCom, and propose an architectural
framework for the interaction-oriented design of CogInfoCom
systems. We provide the outlines of an application example of
the interaction-oriented architecture, and briefly discuss its main
characteristics.
Abstract: Searching similar documents and document
management subjects have important place in text mining. One of the
most important parts of similar document research studies is the
process of classifying or clustering the documents. In this study, a
similar document search approach that includes discussion of out the
case of belonging to multiple categories (multiple categories
problem) has been carried. The proposed method that based on Fuzzy
Similarity Classification (FSC) has been compared with Rocchio
algorithm and naive Bayes method which are widely used in text
mining. Empirical results show that the proposed method is quite
successful and can be applied effectively. For the second stage,
multiple categories vector method based on information of categories
regarding to frequency of being seen together has been used.
Empirical results show that achievement is increased almost two
times, when proposed method is compared with classical approach.
Abstract: Nowadays, fluidized bed plays an important part in industry. The design of this kind of reactor requires knowing the interfacial area between two phases and this interfacial area leads to calculate the solid holdup in the bed. Consequently achieving interfacial area between gas and solid in the bed experimentally is so significant. On interfacial area measurement in fluidized bed with gas has been worked, but light transmission technique has been used less. Therefore, in the current research the possibility of using of this technique and its accuracy are investigated. Measuring, a fluidized bed was designed and the problems were averted as far as possible. By using fine solid with equal shape and diameter and installing an optical system, the absorption of light during the time of fluidization has been measured. Results indicate that this method that its validity has been proved in the gas-liquid system, by different reasons have less application in gas-solid system. One important reason could be non-uniformity in such systems.
Abstract: The chemistry of sulphone hydrazide has gained increase interest in both synthetic organic chemistry and biological fields and has considerable value. The therapeutic importance of these compounds is the attractive force to continue research in such a point. The present review covers the literature up to date for the synthesis, reactions and applications of such compounds.
Abstract: Learning programming is difficult for many learners. Some researches have found that the main difficulty relates to cognitive load. Cognitive overload happens in programming due to the nature of the subject which is intrinisicly over-bearing on the working memory. It happens due to the complexity of the subject itself. The problem is made worse by the poor instructional design methodology used in the teaching and learning process. Various efforts have been proposed to reduce the cognitive load, e.g. visualization softwares, part-program method etc. Use of many computer based systems have also been tried to tackle the problem. However, little success has been made to alleviate the problem. More has to be done to overcome this hurdle. This research attempts at understanding how cognitive load can be managed so as to reduce the problem of overloading. We propose a mechanism to measure the cognitive load during pre instruction, post instruction and in instructional stages of learning. This mechanism is used to help the instruction. As the load changes the instruction is made to adapt itself to ensure cognitive viability. This mechanism could be incorporated as a sub domain in the student model of various computer based instructional systems to facilitate the learning of programming.
Abstract: Cloud Computing has recently emerged as a
compelling paradigm for managing and delivering services over the
internet. The rise of Cloud Computing is rapidly changing the
landscape of information technology, and ultimately turning the longheld
promise of utility computing into a reality. As the development
of Cloud Computing paradigm is speedily progressing, concepts, and
terminologies are becoming imprecise and ambiguous, as well as
different technologies are interfering. Thus, it becomes crucial to
clarify the key concepts and definitions. In this paper, we present the
anatomy of Cloud Computing, covering its essential concepts,
prominent characteristics, its affects, architectural design and key
technologies. We differentiate various service and deployment
models. Also, significant challenges and risks need are tackled in
order to guarantee the long-term success of Cloud Computing. The
aim of this paper is to provide a better understanding of the anatomy
of Cloud Computing and pave the way for further research in this
area.
Abstract: The line sleeves on power transmission line connects
two conductors while the transmission line is constructing. However,
the line sleeves sometimes cause transmission line break down,
because the line sleeves are deteriorated and decayed by acid rain.
When the transmission line is broken, the economical loss is huge.
Therefore the line sleeves on power transmission lines should be
inspected periodically to prevent power failure. In this paper, Korea
Electric Power Research Institute reviewed several robots to inspect
line status and proposes a robot to inspect line sleeve by measuring
magnetic field on line sleeve. The developed inspection tool can
reliable to move along transmission line and overcome several
obstacles on transmission line. The developed system is also applied
on power transmission line and verified the efficiency of the robot.
Abstract: Microarrays have become the effective, broadly used tools in biological and medical research to address a wide range of problems, including classification of disease subtypes and tumors. Many statistical methods are available for analyzing and systematizing these complex data into meaningful information, and one of the main goals in analyzing gene expression data is the detection of samples or genes with similar expression patterns. In this paper, we express and compare the performance of several clustering methods based on data preprocessing including strategies of normalization or noise clearness. We also evaluate each of these clustering methods with validation measures for both simulated data and real gene expression data. Consequently, clustering methods which are common used in microarray data analysis are affected by normalization and degree of noise and clearness for datasets.
Abstract: E-learning aims to build knowledge and skills in order
to enhance the quality of learning. Research has shown that the
majority of the e-learning solutions lack in pedagogical background
and present some serious deficiencies regarding teaching strategies
and content delivery, time and pace management, interface design
and preservation of learners- focus. The aim of this review is to
approach the design of e-learning solutions with a pedagogical
perspective and to present some good practices of e-learning design
grounded on the core principles of Learning Theories (LTs).
Abstract: The performances of small and medium enterprises
have stagnated in the last two decades. This has mainly been due to
the emergence of HIV / Aids. The disease has had a detrimental
effect on the general economy of the country leading to morbidity
and mortality of the Kenyan workforce in their primary age. The
present study sought to establish the economic impact of HIV / Aids
on the micro-enterprise development in Obunga slum – Kisumu, in
terms of production loss, increasing labor related cost and to establish
possible strategies to address the impact of HIV / Aids on microenterprises.
The study was necessitated by the observation that most
micro-enterprises in the slum are facing severe economic and social
crisis due to the impact of HIV / Aids, they get depleted and close
down within a short time due to death of skilled and experience
workforce. The study was carried out between June 2008 and June
2009 in Obunga slum. Data was subjected to computer aided
statistical analysis that included descriptive statistic, chi-squared and
ANOVA techniques. Chi-squared analysis on the micro-enterprise
owners opinion on the impact of HIV / Aids on depletion of microenterprise
compared to other diseases indicated high levels of the
negative effects of the disease at significance levels of P
Abstract: In this research, the flow pattern influence on
performance of a micro PEMFC was investigated
experimentally. The investigation focused on the impacts of
bend angels and rib/channel dimensions of serpentine flow
channel pattern on the performance and investigated how they
improve the performance. The fuel cell employed for these
experiments was a micro single PEMFC with a membrane of
1.44 cm2 Nafion NRE-212. The results show that 60° and 120°
bend angles can provide the better performances at 20 and 40
sccm inlet flow rates comparing to that the conventional design.
Additionally, wider channel with narrower rib spacing gives
better performance. These results may be applied to develop
universal heuristics for the design of flow pattern of micro
PEMFC.
Abstract: In this research, we have developed a new efficient
heuristic algorithm for the dynamic facility layout problem with
budget constraint (DFLPB). This heuristic algorithm combines two
mathematical programming methods such as discrete event
simulation and linear integer programming (IP) to obtain a near
optimum solution. In the proposed algorithm, the non-linear model
of the DFLP has been changed to a pure integer programming (PIP)
model. Then, the optimal solution of the PIP model has been used in
a simulation model that has been designed in a similar manner as the
DFLP for determining the probability of assigning a facility to a
location. After a sufficient number of runs, the simulation model
obtains near optimum solutions. Finally, to verify the performance of
the algorithm, several test problems have been solved. The results
show that the proposed algorithm is more efficient in terms of speed
and accuracy than other heuristic algorithms presented in previous
works found in the literature.
Abstract: The purposes of this research were 1) to study
consumer-based equity of luxury brands, 2) to study consumers-
purchase intention for luxury brands, 3) to study direct factors
affecting purchase intention towards luxury brands, and 4) to study
indirect factors affecting purchase intention towards luxury brands
through brand consciousness and brand equity to analyze information
by descriptive statistic and hierarchical stepwise regression analysis.
The findings revealed that the eight variables of the framework which
were: need for uniqueness, normative susceptibility, status
consumption, brand consciousness, brand awareness, perceived
quality, brand association, and brand loyalty affected the purchase
intention of the luxury brands (at the significance of 0.05). Brand
Loyalty had the strongest direct effect while status consumption had
the strongest indirect effect affecting the purchase intention towards
luxury brands. Brand consciousness and brand equity had the
mediators through the purchase intention of the luxury brands (at the
significance of 0.05).
Abstract: Content-Based Image Retrieval (CBIR) has been
one on the most vivid research areas in the field of computer vision
over the last 10 years. Many programs and tools have been
developed to formulate and execute queries based on the visual or
audio content and to help browsing large multimedia repositories.
Still, no general breakthrough has been achieved with respect to
large varied databases with documents of difering sorts and with
varying characteristics. Answers to many questions with respect to
speed, semantic descriptors or objective image interpretations are
still unanswered. In the medical field, images, and especially
digital images, are produced in ever increasing quantities and used
for diagnostics and therapy. In several articles, content based
access to medical images for supporting clinical decision making
has been proposed that would ease the management of clinical data
and scenarios for the integration of content-based access methods
into Picture Archiving and Communication Systems (PACS) have
been created. This paper gives an overview of soft computing
techniques. New research directions are being defined that can
prove to be useful. Still, there are very few systems that seem to be
used in clinical practice. It needs to be stated as well that the goal
is not, in general, to replace text based retrieval methods as they
exist at the moment.
Abstract: Ambiguities in effects of earthquake on various
structures in all earthquake codes would necessitate more study and
research concerning influential factors on dynamic behavior.
Previous studies which were done on different features in different
buildings play a major role in the type of response a structure makes
to lateral vibrations. Diagnosing each of these irregularities can help
structure designers in choosing appropriate setbacks for decreasing
possible damages. Therefore vertical setback is one of the irregularity
factors in the height of the building where can be seen in skyscrapers
and hotels. Previous researches reveal notable changes in the place of
these setbacks showing dynamic response of the structure.
Consequently analyzing 48 models of concrete frames for 3, 6 and 9
stories heights with three different bays in general shape of a surface
decline by height have been constructed in ETABS2000 software,
and then the shape effect of each and every one of these frames in
period scale has been discussed. The result of this study reveals that
not only mass, stiffness and height but also shape of the frame is
influential.
Abstract: In this paper, the transformers over-load problem of Shiraz substation in Fars Regional Electric Company (FREC) is investigated for a period of three years plan. So the suggestions for using phase shifting transformer (PST) and unified power flow controller (UPFC) in order to solve this problem are examined in details and finally, some economical and practical designs will be given in order to solve the related problems. Practical consideration and using the basic and fundamental concept of powers in transmission lines in order to find the economical design are the main advantages of this research. The simulation results of the integrated overall system with different designs compare them base on economical and practical aspects to solve the over-load and loss-reduction.
Abstract: Because nodes are usually battery-powered, the energy
presents a very scarce resource in wireless sensor networks. For this
reason, the design of medium access control had to take energy
efficiency as one of its hottest concerns. Accordingly, in order to
improve the energy performance of MAC schemes in wireless sensor
networks, several ways can be followed. In fact, some researchers try
to limit idle listening while others focus on mitigating overhearing
(i.e. a node can hear a packet which is destined to another node)
or reducing the number of the used control packets. We, in this
paper, propose a new hybrid MAC protocol termed ELE-MAC
(i.e. Energy Latency Efficient MAC). The ELE-MAC major design
goals are energy and latency efficiencies. It adopts less control
packets than SMAC in order to preserve energy. We carried out ns-
2 simulations to evaluate the performance of the proposed protocol.
Thus, our simulation-s results prove the ELE-MAC energy efficiency.
Additionally, our solution performs statistically the same or better
latency characteristic compared to adaptive SMAC.
Abstract: In this paper is to evaluate audio and speech quality
with the help of Digital Audio Watermarking Technique under the
different types of attacks (signal impairments) like Gaussian Noise,
Compression Error and Jittering Effect. Further attacks are
considered as Hostile Environment. Audio and Speech Quality
Evaluation is an important research topic. The traditional way for
speech quality evaluation is using subjective tests. They are reliable,
but very expensive, time consuming, and cannot be used in certain
applications such as online monitoring. Objective models, based on
human perception, were developed to predict the results of subjective
tests. The existing objective methods require either the original
speech or complicated computation model, which makes some
applications of quality evaluation impossible.