Abstract: Experimental & numeral study of temperature
distribution during milling process, is important in milling quality
and tools life aspects. In the present study the milling cross-section
temperature is determined by using Artificial Neural Networks
(ANN) according to the temperature of certain points of the work
piece and the point specifications and the milling rotational speed of
the blade. In the present work, at first three-dimensional model of the
work piece is provided and then by using the Computational Heat
Transfer (CHT) simulations, temperature in different nods of the
work piece are specified in steady-state conditions. Results obtained
from CHT are used for training and testing the ANN approach. Using
reverse engineering and setting the desired x, y, z and the milling
rotational speed of the blade as input data to the network, the milling
surface temperature determined by neural network is presented as
output data. The desired points temperature for different milling
blade rotational speed are obtained experimentally and by
extrapolation method for the milling surface temperature is obtained
and a comparison is performed among the soft programming ANN,
CHT results and experimental data and it is observed that ANN soft
programming code can be used more efficiently to determine the
temperature in a milling process.
Abstract: Nature is a great source of inspiration for solving
complex problems in networks. It helps to find the optimal solution.
Metaheuristic algorithm is one of the nature-inspired algorithm which
helps in solving routing problem in networks. The dynamic features,
changing of topology frequently and limited bandwidth make the
routing, challenging in MANET. Implementation of appropriate
routing algorithms leads to the efficient transmission of data in
mobile ad hoc networks. The algorithms that are inspired by the
principles of naturally-distributed/collective behavior of social
colonies have shown excellence in dealing with complex
optimization problems. Thus some of the bio-inspired metaheuristic
algorithms help to increase the efficiency of routing in ad hoc
networks. This survey work presents the overview of bio-inspired
metaheuristic algorithms which support the efficiency of routing in
mobile ad hoc networks.
Abstract: Large-scale data stream analysis has become one of
the important business and research priorities lately. Social networks
like Twitter and other micro-blogging platforms hold an enormous
amount of data that is large in volume, velocity and variety.
Extracting valuable information and trends out of these data would
aid in a better understanding and decision-making. Multiple analysis
techniques are deployed for English content. Moreover, one of the
languages that produce a large amount of data over social networks
and is least analyzed is the Arabic language. The proposed paper is a
survey on the research efforts to analyze the Arabic content in
Twitter focusing on the tools and methods used to extract the
sentiments for the Arabic content on Twitter.
Abstract: Every machine plays roles of client and server
simultaneously in a peer-to-peer (P2P) network. Though a P2P
network has many advantages over traditional client-server models
regarding efficiency and fault-tolerance, it also faces additional
security threats. Users/IT administrators should be aware of risks
from malicious code propagation, downloaded content legality, and
P2P software’s vulnerabilities. Security and preventative measures
are a must to protect networks from potential sensitive information
leakage and security breaches. Bit Torrent is a popular and scalable
P2P file distribution mechanism which successfully distributes large
files quickly and efficiently without problems for origin server. Bit
Torrent achieved excellent upload utilization according to
measurement studies, but it also raised many questions as regards
utilization in settings, than those measuring, fairness, and Bit
Torrent’s mechanisms choice. This work proposed a block selection
technique using Fuzzy ACO with optimal rules selected using ACO.
Abstract: Load modeling is one of the central functions in
power systems operations. Electricity cannot be stored, which means
that for electric utility, the estimate of the future demand is necessary
in managing the production and purchasing in an economically
reasonable way. A majority of the recently reported approaches are
based on neural network. The attraction of the methods lies in the
assumption that neural networks are able to learn properties of the
load. However, the development of the methods is not finished, and
the lack of comparative results on different model variations is a
problem. This paper presents a new approach in order to predict the
Tunisia daily peak load. The proposed method employs a
computational intelligence scheme based on the Fuzzy neural
network (FNN) and support vector regression (SVR). Experimental
results obtained indicate that our proposed FNN-SVR technique gives
significantly good prediction accuracy compared to some classical
techniques.
Abstract: The distribution networks are often exposed to harmful
incidents which can halt the electricity supply of the customer. In this
context, we studied a real case of a critical zone of the Tunisian
network which is currently characterized by the dysfunction of its
plan of protection. In this paper, we were interested in the
harmonization of the protection plan settings in order to ensure a
perfect selectivity and a better continuity of service on the whole of
the network.
Abstract: Urban areas have been expanded throughout the
globe. Monitoring and modelling urban growth have become a
necessity for a sustainable urban planning and decision making.
Urban prediction models are important tools for analyzing the causes
and consequences of urban land use dynamics. The objective of this
research paper is to analyze and model the urban change, which has
been occurred from 1990 to 2000 using CORINE land cover maps.
The model was developed using drivers of urban changes (such as
road distance, slope, etc.) under an Artificial Neural Network
modelling approach. Validation was achieved using a prediction map
for 2006 which was compared with a real map of Urban Atlas of
2006. The accuracy produced a Kappa index of agreement of 0,639
and a value of Cramer's V of 0,648. These encouraging results
indicate the importance of the developed urban growth prediction
model which using a set of available common biophysical drivers
could serve as a management tool for the assessment of urban
change.
Abstract: The use of technology in the classroom is an issue that
is constantly evolving. Digital age students learn differently than their
teachers did, so now the teacher should be constantly evolving their
methods and teaching techniques to be more in touch with the
student. In this paper a case study presents how were used some of
these technologies by accompanying a classroom course, this in order
to provide students with a different and innovative experience as their
teacher usually presented the activities to develop. As students
worked in the various activities, they increased their digital skills by
employing unknown tools that helped them in their professional
training. The twenty-first century teacher should consider the use of
Information and Communication Technologies in the classroom
thinking in skills that students of the digital age should possess. It
also takes a brief look at the history of distance education and it is
also highlighted the importance of integrating technology as part of
the student's training.
Abstract: Different tools and technologies were implemented
for Crisis Response and Management (CRM) which is generally
using available network infrastructure for information exchange.
Depending on type of disaster or crisis, network infrastructure could
be affected and it could not be able to provide reliable connectivity.
Thus any tool or technology that depends on the connectivity could
not be able to fulfill its functionalities. As a solution, a new message
exchange framework has been developed. Framework provides
offline/online information exchange platform for CRM Information
Systems (CRMIS) and it uses XML compression and packet
prioritization algorithms and is based on open source web
technologies. By introducing offline capabilities to the web
technologies, framework will be able to perform message exchange
on unreliable networks. The experiments done on the simulation
environment provide promising results on low bandwidth networks
(56kbps and 28.8 kbps) with up to 50% packet loss and the solution is
to successfully transfer all the information on these low quality
networks where the traditional 2 and 3 tier applications failed.
Abstract: This article is to review and understand the new
generation of students to understand their expectations and attitudes.
There are a group of students on school projects, creative work,
educational software and digital signal source, the use of social
networking tools to communicate with friends and a part in the
competition. Today's students have been described as the new
millennium students. They use information and communication
technology in a more creative and innovative at home than at school,
because the information and communication technologies for
different purposes, in the home, usually occur in school. They
collaborate and communicate more effectively when they are at
home. Most children enter school, they will bring about how to use
information and communication technologies, some basic skills and
some tips on how to use information and communication technology
will provide a more advanced than most of the school's expectations.
Many teachers can help students, however, still a lot of work,
"tradition", without a computer, and did not see the "new social
computing networks describe young people to learn and new ways of
working life in the future", in the education system of the benefits of
using a computer.
Abstract: Recent research in neural networks science and
neuroscience for modeling complex time series data and statistical
learning has focused mostly on learning from high input space and
signals. Local linear models are a strong choice for modeling local
nonlinearity in data series. Locally weighted projection regression is
a flexible and powerful algorithm for nonlinear approximation in
high dimensional signal spaces. In this paper, different learning
scenario of one and two dimensional data series with different
distributions are investigated for simulation and further noise is
inputted to data distribution for making different disordered
distribution in time series data and for evaluation of algorithm in
locality prediction of nonlinearity. Then, the performance of this
algorithm is simulated and also when the distribution of data is high
or when the number of data is less the sensitivity of this approach to
data distribution and influence of important parameter of local
validity in this algorithm with different data distribution is explained.
Abstract: The idea of the asynchronous transmission in
wavelength division multiplexing (WDM) ring MANs is studied in
this paper. Especially, we present an efficient access technique to
coordinate the collisions-free transmission of the variable sizes of IP
traffic in WDM ring core networks. Each node is equipped with a
tunable transmitter and a tunable receiver. In this way, all the
wavelengths are exploited for both transmission and reception. In
order to evaluate the performance measures of average throughput,
queuing delay and packet dropping probability at the buffers, a
simulation model that assumes symmetric access rights among the
nodes is developed based on Poisson statistics. Extensive numerical
results show that the proposed protocol achieves apart from high
bandwidth exploitation for a wide range of offered load, fairness of
queuing delay and dropping events among the different packets size
categories.
Abstract: Vertical Handover(VHO) among different
communication technologies ensuring uninterruption and service
continuity is one of the most important performance parameter in
Heterogenous networks environment. In an integrated Universal
Mobile Telecommunicatin System(UMTS) and Wireless Local
Area Network(WLAN), WLAN is given an inherent priority over
UMTS because of its high data rates with low cost. Therefore
mobile users want to be associated with WLAN maximum of the
time while roaming, to enjoy best possible services with low cost.
That encourages reduction of number of VHO. In this work the
reduction of number of VHO with respect to varying number of
WLAN Access Points(APs) in an integrated UMTS and WLAN
network is investigated through simulation to provide best possible
cost effective service to the users. The simulation has been carried
out for an area (7800 × 9006)m2 where COST-231 Hata model
and 3GPP (TR 101 112 V 3.1.0) specified models are used for
WLAN and UMTS path loss models respectively. The handover
decision is triggered based on the received signal level as compared
to the fade margin. Fade margin gives a probabilistic measure of
the reliability of the communication link. A relationship between
number of WLAN APs and the number of VHO is also established
in this work.
Abstract: Wireless mesh networking is rapidly gaining in
popularity with a variety of users: from municipalities to enterprises,
from telecom service providers to public safety and military
organizations. This increasing popularity is based on two basic facts:
ease of deployment and increase in network capacity expressed in
bandwidth per footage; WMNs do not rely on any fixed
infrastructure. Many efforts have been used to maximizing
throughput of the network in a multi-channel multi-radio wireless
mesh network. Current approaches are purely based on either static or
dynamic channel allocation approaches. In this paper, we use a
hybrid multichannel multi radio wireless mesh networking
architecture, where static and dynamic interfaces are built in the
nodes. Dynamic Adaptive Channel Allocation protocol (DACA), it
considers optimization for both throughput and delay in the channel
allocation. The assignment of the channel has been allocated to be codependent
with the routing problem in the wireless mesh network and
that should be based on passage flow on every link. Temporal and
spatial relationship rises to re compute the channel assignment every
time when the pattern changes in mesh network, channel assignment
algorithms assign channels in network. In this paper a computing
path which captures the available path bandwidth is the proposed
information and the proficient routing protocol based on the new path
which provides both static and dynamic links. The consistency
property guarantees that each node makes an appropriate packet
forwarding decision and balancing the control usage of the network,
so that a data packet will traverse through the right path.
Abstract: The main aim of a communication system is to
achieve maximum performance. In Cognitive Radio any user or
transceiver has ability to sense best suitable channel, while channel is
not in use. It means an unlicensed user can share the spectrum of a
licensed user without any interference. Though, the spectrum sensing
consumes a large amount of energy and it can reduce by applying
various artificial intelligent methods for determining proper spectrum
holes. It also increases the efficiency of Cognitive Radio Network
(CRN). In this survey paper we discuss the use of different learning
models and implementation of Artificial Neural Network (ANN) to
increase the learning and decision making capacity of CRN without
affecting bandwidth, cost and signal rate.
Abstract: Spam is any unwanted electronic message or material
in any form posted too many people. As the world is growing as
global world, social networking sites play an important role in
making world global providing people from different parts of the
world a platform to meet and express their views. Among different
social networking sites Facebook become the leading one. With
increase in usage different users start abusive use of Facebook by
posting or creating ways to post spam. This paper highlights the
potential spam types nowadays Facebook users’ faces. This paper
also provide the reason how user become victim to spam attack. A
methodology is proposed in the end discusses how to handle different
types of spam.
Abstract: In this study, data loss tolerance of Support Vector Machines (SVM) based activity recognition model and multi activity classification performance when data are received over a lossy wireless sensor network is examined. Initially, the classification algorithm we use is evaluated in terms of resilience to random data loss with 3D acceleration sensor data for sitting, lying, walking and standing actions. The results show that the proposed classification method can recognize these activities successfully despite high data loss. Secondly, the effect of differentiated quality of service performance on activity recognition success is measured with activity data acquired from a multi hop wireless sensor network, which introduces high data loss. The effect of number of nodes on the reliability and multi activity classification success is demonstrated in simulation environment. To the best of our knowledge, the effect of data loss in a wireless sensor network on activity detection success rate of an SVM based classification algorithm has not been studied before.
Abstract: Given a graph G. A cycle of G is a sequence of
vertices of G such that the first and the last vertices are the same.
A hamiltonian cycle of G is a cycle containing all vertices of G.
The graph G is k-ordered (resp. k-ordered hamiltonian) if for any
sequence of k distinct vertices of G, there exists a cycle (resp.
hamiltonian cycle) in G containing these k vertices in the specified
order. Obviously, any cycle in a graph is 1-ordered, 2-ordered and 3-
ordered. Thus the study of any graph being k-ordered (resp. k-ordered
hamiltonian) always starts with k = 4. Most studies about this topic
work on graphs with no real applications. To our knowledge, the
chordal ring families were the first one utilized as the underlying
topology in interconnection networks and shown to be 4-ordered.
Furthermore, based on our computer experimental results, it was
conjectured that some of them are 4-ordered hamiltonian. In this
paper, we intend to give some possible directions in proving the
conjecture.
Abstract: In this study, we propose a novel technique for acoustic
echo suppression (AES) during speech recognition under barge-in
conditions. Conventional AES methods based on spectral subtraction
apply fixed weights to the estimated echo path transfer function
(EPTF) at the current signal segment and to the EPTF estimated until
the previous time interval. However, the effects of echo path changes
should be considered for eliminating the undesired echoes. We
describe a new approach that adaptively updates weight parameters in
response to abrupt changes in the acoustic environment due to
background noises or double-talk. Furthermore, we devised a voice
activity detector and an initial time-delay estimator for barge-in speech
recognition in communication networks. The initial time delay is
estimated using log-spectral distance measure, as well as
cross-correlation coefficients. The experimental results show that the
developed techniques can be successfully applied in barge-in speech
recognition systems.
Abstract: Factors affecting construction unit cost vary
depending on a country’s political, economic, social and
technological inclinations. Factors affecting construction costs have
been studied from various perspectives. Analysis of cost factors
requires an appreciation of a country’s practices. Identified cost
factors provide an indication of a country’s construction economic
strata. The purpose of this paper is to identify the essential factors
that affect unit cost estimation and their breakdown using artificial
neural networks. Twenty five (25) identified cost factors in road
construction were subjected to a questionnaire survey and employing
SPSS factor analysis the factors were reduced to eight. The 8 factors
were analysed using neural network (NN) to determine the
proportionate breakdown of the cost factors in a given construction
unit rate. NN predicted that political environment accounted 44% of
the unit rate followed by contractor capacity at 22% and financial
delays, project feasibility and overhead & profit each at 11%. Project
location, material availability and corruption perception index had
minimal impact on the unit cost from the training data provided.
Quantified cost factors can be incorporated in unit cost estimation
models (UCEM) to produce more accurate estimates. This can create
improvements in the cost estimation of infrastructure projects and
establish a benchmark standard to assist the process of alignment of
work practises and training of new staff, permitting the on-going
development of best practises in cost estimation to become more
effective.