Abstract: Random Access Memory (RAM) is an important
device in computer system. It can represent the snapshot on how the
computer has been used by the user. With the growth of its
importance, the computer memory has been an issue that has been
discussed in digital forensics. A number of tools have been developed
to retrieve the information from the memory. However, most of the
tools have their limitation in the ability of retrieving the important
information from the computer memory. Hence, this paper is aimed
to discuss the limitation and the setback for two main techniques such
as process signature search and process enumeration. Then, a new
hybrid approach will be presented to minimize the setback in both
individual techniques. This new approach combines both techniques
with the purpose to retrieve the information from the process block
and other objects in the computer memory. Nevertheless, the basic
theory in address translation for x86 platforms will be demonstrated
in this paper.
Abstract: Operational safety of critical systems, such as nuclear power plants, industrial chemical processes and means of transportation, is a major concern for system engineers and operators. A means to assure that is on-line safety monitors that deliver three safety tasks; fault detection and diagnosis, alarm annunciation and fault controlling. While current monitors deliver these tasks, benefits and limitations in their approaches have at the same time been highlighted. Drawing from those benefits, this paper develops a distributed monitor based on semi-independent agents, i.e. a multiagent system, and monitoring knowledge derived from a safety assessment model of the monitored system. Agents are deployed hierarchically and provided with knowledge portions and collaboration protocols to reason and integrate over the operational conditions of the components of the monitored system. The monitor aims to address limitations arising from the large-scale, complicated behaviour and distributed nature of monitored systems and deliver the aforementioned three monitoring tasks effectively.
Abstract: The IEEE802.16 standard which has emerged as
Broadband Wireless Access (BWA) technology, promises to deliver
high data rate over large areas to a large number of subscribers in the
near future. This paper analyze the effect of overheads over capacity
of downlink (DL) of orthogonal frequency division multiple access
(OFDMA)–based on the IEEE802.16e mobile WiMAX system with
and without overheads. The analysis focuses in particular on the
impact of Adaptive Modulation and Coding (AMC) as well as
deriving an algorithm to determine the maximum numbers of
subscribers that each specific WiMAX sector may support. An
analytical study of the WiMAX propagation channel by using Cost-
231 Hata Model is presented. Numerical results and discussion
estimated by using Matlab to simulate the algorithm for different
multi-users parameters.
Abstract: Most standard software development methodologies
are often not applied to software projects in many developing
countries of the world. The approach generally practice is close to
what eXtreme Programming (XP) is likely promoting, just keep
coding and testing as the requirement evolves. XP is an agile
software process development methodology that has inherent
capability for improving efficiency of Business Software
Development (BSD). XP can facilitate Business-to-Development
(B2D) relationship due to its customer-oriented advocate. From
practitioner point of view, we applied XP to BSD and result shows
that customer involvement has positive impact on productivity, but
can as well frustrate the success of the project. In an effort to
promote software engineering practice in developing countries of
Africa, we present the experiment performed, lessons learned,
problems encountered and solution adopted in applying XP
methodology to BSD.
Abstract: This paper presents a conceptual model of agreement
options on negotiation support for civil engineering decision. The
negotiation support facilitates the solving of group choice decision
making problems in civil engineering decision to reduce the impact
of mud volcano disaster in Sidoarjo, Indonesia. The approach based
on application of analytical hierarchy process (AHP) method for
multi criteria decision on three level of decision hierarchy.
Decisions for reducing impact is very complicated since many
parties involved in a critical time. Where a number of stakeholders
are involved in choosing a single alternative from a set of solution
alternatives, there are different concern caused by differing
stakeholder preferences, experiences, and background. Therefore, a
group choice decision support is required to enable each stakeholder
to evaluate and rank the solution alternatives before engaging into
negotiation with the other stakeholders. Such civil engineering
solutions as alternatives are referred to as agreement options that are
determined by identifying the possible stakeholder choice, followed
by determining the optimal solution for each group of stakeholder.
Determination of the optimal solution is based on a game theory
model of n-person general sum game with complete information that
involves forming coalitions among stakeholders.
Abstract: Trust and Energy consumption is the most challenging
issue in routing protocol design for Mobile ad hoc networks
(MANETs), since mobile nodes are battery powered and nodes
behaviour are unpredictable. Furthermore replacing and recharging
batteries and making nodes co-operative is often impossible in
critical environments like military applications. In this paper, we
propose a trust based energy aware routing model in MANET.
During route discovery, node with more trust and maximum energy
capacity is selected as a router based on a parameter called
'Reliability'. Route request from the source is accepted by a node
only if its reliability is high. Otherwise, the route request is
discarded. This approach forms a reliable route from source to
destination thus increasing network life time, improving energy
utilization and decreasing number of packet loss during transmission.
Abstract: Today, incorrect use of lands and land use changes,
excessive grazing, no suitable using of agricultural farms, plowing on
steep slopes, road construct, building construct, mine excavation etc
have been caused increasing of soil erosion and sediment yield. For
erosion and sediment estimation one can use statistical and empirical
methods. This needs to identify land unit map and the map of
effective factors. However, these empirical methods are usually time
consuming and do not give accurate estimation of erosion. In this
study, we applied GIS techniques to estimate erosion and sediment of
Menderjan watershed at upstream Zayandehrud river in center of
Iran. Erosion faces at each land unit were defined on the basis of land
use, geology and land unit map using GIS. The UTM coordinates of
each erosion type that showed more erosion amounts such as rills and
gullies were inserted in GIS using GPS data. The frequency of
erosion indicators at each land unit, land use and their sediment yield
of these indices were calculated. Also using tendency analysis of
sediment yield changes in watershed outlet (Menderjan hydrometric
gauge station), was calculated related parameters and estimation
errors. The results of this study according to implemented watershed
management projects can be used for more rapid and more accurate
estimation of erosion than traditional methods. These results can also
be used for regional erosion assessment and can be used for remote
sensing image processing.
Abstract: A model-free robust control (MFRC) approach is proposed for position control of robot manipulators in the state space. The control approach is verified analytically to be robust subject to uncertainties including external disturbances, unmodeled dynamics, and parametric uncertainties. There is a high flexibility to work on different systems including actuators by the use of the proposed control approach. The proposed control approach can guarantee the robustness of control system. A PUMA 560 robot driven by geared permanent magnet dc motors is simulated. The simulation results show a satisfactory performance for control system under technical specifications. KeywordsModel-free, robust control, position control, PUMA 560.
Abstract: Manufacturing tolerancing is intended to determine
the intermediate geometrical and dimensional states of the part
during its manufacturing process. These manufacturing dimensions
also serve to satisfy not only the functional requirements given in
the definition drawing, but also the manufacturing constraints, for
example geometrical defects of the machine, vibration and the
wear of the cutting tool. In this paper, an experimental study on the
influence of the wear of the cutting tool (systematic dispersions) is
explored. This study was carried out on three stages .The first stage
allows machining without elimination of dispersions (random,
systematic) so the tolerances of manufacture according to total
dispersions. In the second stage, the results of the first stage are
filtered in such way to obtain the tolerances according to random
dispersions. Finally, from the two previous stages, the systematic
dispersions are generated. The objective of this study is to model
by the least squares method the error of manufacture based on
systematic dispersion. Finally, an approach of optimization of the
manufacturing tolerances was developed for machining on a CNC
machine tool
Abstract: The majority of micro-entrepreneurs in Malaysia
operate very small-scaled business activities such as food stalls,
burger stalls, night market hawkers, grocery stores, constructions,
rubber and oil palm small holders, and other agro-based services and
activities. Why are they venturing into entrepreneurship - is it for
survival, out of interest or due to encouragement and assistance from
the local government? And why is it that some micro-entrepreneurs
are lagging behind in entrepreneurship, and what do they need to
rectify this situation so that they are able to progress further?
Furthermore, what are the skills that the micro entrepreneurs should
developed to transform them into successful micro-enterprises and
become small and medium-sized enterprises (SME)? This paper
proposes a 7-Step approach that can serve as a basis for identification
of critical entrepreneurial success factors that enable policy makers,
practitioners, consultants, training managers and other agencies in
developing tools to assist micro business owners. This paper also
highlights the experience of one of the successful companies in
Malaysia that has transformed from micro-enterprise to become a
large organization in less than 10 years.
Abstract: Performance of a dual maximal ratio combining
receiver has been analyzed for M-ary coherent and non-coherent
modulations over correlated Nakagami-m fading channels with nonidentical
and arbitrary fading parameter. The classical probability
density function (PDF) based approach is used for analysis.
Expressions for outage probability and average symbol error
performance for M-ary coherent and non-coherent modulations have
been obtained. The obtained results are verified against the special
case published results and found to be matching. The effect of the
unequal fading parameters, branch correlation and unequal input
average SNR on the receiver performance has been studied.
Abstract: Recent widespread use of information and
communication technology has greatly changed information security
risks that businesses and institutions encounter. Along with this
situation, in order to ensure security and have confidence in electronic
trading, it has become important for organizations to take competent
information security measures to provide international confidence that
sensitive information is secure. Against this backdrop, the approach to
information security checking has come to an important issue, which
is believed to be common to all countries. The purpose of this paper is
to introduce the new system of information security checking program
in Korea and to propose synthetic information security
countermeasures under domestic circumstances in order to protect
physical equipment, security management and technology, and the
operation of security check for securing services on ISP(Internet
Service Provider), IDC(Internet Data Center), and
e-commerce(shopping malls, etc.)
Abstract: Model mapping and transformation are important processes in high level system abstractions, and form the cornerstone of model-driven architecture (MDA) techniques. Considerable research in this field has devoted attention to static system abstraction, despite the fact that most systems are dynamic with high frequency changes in behavior. In this paper we provide an overview of work that has been done with regard to behavior model mapping and transformation, based on: (1) the completeness of the platform independent model (PIM); (2) semantics of behavioral models; (3) languages supporting behavior model transformation processes; and (4) an evaluation of model composition to effect the best approach to describing large systems with high complexity.
Abstract: This paper presents a particle swarm optimization
(PSO) based approach for multiple object tracking based on histogram
matching. To start with, gray-level histograms are calculated to
establish a feature model for each of the target object. The difference
between the gray-level histogram corresponding to each particle in the
search space and the target object is used as the fitness value. Multiple
swarms are created depending on the number of the target objects
under tracking. Because of the efficiency and simplicity of the PSO
algorithm for global optimization, target objects can be tracked as
iterations continue. Experimental results confirm that the proposed
PSO algorithm can rapidly converge, allowing real-time tracking of
each target object. When the objects being tracked move outside the
tracking range, global search capability of the PSO resumes to re-trace
the target objects.
Abstract: Resource Discovery in Grids is critical for efficient
resource allocation and management. Heterogeneous nature and
dynamic availability of resources make resource discovery a
challenging task. As numbers of nodes are increasing from tens to
thousands, scalability is essentially desired. Peer-to-Peer (P2P)
techniques, on the other hand, provide effective implementation of
scalable services and applications. In this paper we propose a model
for resource discovery in Condor Middleware by using the four axis
framework defined in P2P approach. The proposed model enhances
Condor to incorporate functionality of a P2P system, thus aim to
make Condor more scalable, flexible, reliable and robust.
Abstract: This paper presents the use of a semi-classical signal
analysis method that has been developed recently for the analysis of
turbomachinery flow unsteadiness. We will focus on the correlation
between theSemi-Classical Signal Analysis parameters and some
physical parameters in relation with turbomachinery features. To
demonstrate the potential of the proposed approach, a static pressure
signal issued from a rotor/stator interaction of a centrifugal pump is
studied. Several configurations of the pump are compared.
Abstract: Powerline Communications –PLC– as an alternative
method for broadband networking, has the advantage of transmitting
over channels already used for electrical distribution or even
transmission. But these channels have been not designed with usual
wired channels requirements for broadband applications such as
stable impedance or known attenuation, and the network have to
reject noises caused by electrical appliances that share the same
channel. Noise control standards are difficult to complain or simply
do not exist on Latin-American environments. This paper analyzes
PLC throughput for home connectivity by probing noisy channel
scenarios in a PLC network and the statistical results are shown.
Abstract: This paper presents design and characterization of a
microaccelerometer designated for integration into cataract surgical
probe to detect hardness of different eye tissues during cataract
surgery. Soft posterior lens capsule of eye can be easily damaged in
comparison with hard opaque lens since the surgeon can not see
directly behind cutting needle during the surgery. Presence of
microsensor helps the surgeon to avoid rupturing posterior lens
capsule which if occurs leads to severe complications such as
glaucoma, infection, or even blindness. The microsensor having
overall dimensions of 480 μm x 395 μm is able to deliver significant
capacitance variations during encountered vibration situations which
makes it capable to distinguish between different types of tissue.
Integration of electronic components on chip ensures high level of
reliability and noise immunity while minimizes space and power
requirements. Physical characteristics and results on performance
testing, proves integration of microsensor as an effective tool to aid
the surgeon during this procedure.
Abstract: The one of best robust search technique on large scale
search area is heuristic and meta heuristic approaches. Especially in
issue that the exploitation of combinatorial status in the large scale
search area prevents the solution of the problem via classical
calculating methods, so such problems is NP-complete. in this
research, the problem of winner determination in combinatorial
auctions have been formulated and by assessing older heuristic
functions, we solve the problem by using of genetic algorithm and
would show that this new method would result in better performance
in comparison to other heuristic function such as simulated annealing
greedy approach.
Abstract: The proposed Multimedia Pronunciation Learning
Management System (MPLMS) in this study is a technology with
profound potential for inducing improvement in pronunciation
learning. The MPLMS optimizes the digitised phonetic symbols with
the integration of text, sound and mouth movement video. The
components are designed and developed in an online management
system which turns the web to a dynamic user-centric collection of
consistent and timely information for quality sustainable learning.
The aim of this study is to design and develop the MPLMS which
serves as an innovative tool to improve English pronunciation. This
paper discusses the iterative methodology and the three-phase Alessi
and Trollip model in the development of MPLMS. To align with the
flexibility of the development of educational software, the iterative
approach comprises plan, design, develop, evaluate and implement is
followed. To ensure the instructional appropriateness of MPLMS, the
instructional system design (ISD) model of Alessi and Trollip serves
as a platform to guide the important instructional factors and process.
It is expected that the results of future empirical research will support
the efficacy of MPLMS and its place as the premier pronunciation
learning system.