Abstract: Spatial trends are one of the valuable patterns in geo
databases. They play an important role in data analysis and
knowledge discovery from spatial data. A spatial trend is a regular
change of one or more non spatial attributes when spatially moving
away from a start object. Spatial trend detection is a graph search
problem therefore heuristic methods can be good solution. Artificial
immune system (AIS) is a special method for searching and
optimizing. AIS is a novel evolutionary paradigm inspired by the
biological immune system. The models based on immune system
principles, such as the clonal selection theory, the immune network
model or the negative selection algorithm, have been finding
increasing applications in fields of science and engineering.
In this paper, we develop a novel immunological algorithm based
on clonal selection algorithm (CSA) for spatial trend detection. We
are created neighborhood graph and neighborhood path, then select
spatial trends that their affinity is high for antibody. In an
evolutionary process with artificial immune algorithm, affinity of
low trends is increased with mutation until stop condition is satisfied.
Abstract: In this paper, the application of neural networks to study the design of short-term load forecasting (STLF) Systems for Illam state located in west of Iran was explored. One important architecture of neural networks named Multi-Layer Perceptron (MLP) to model STLF systems was used. Our study based on MLP was trained and tested using three years (2004-2006) data. The results show that MLP network has the minimum forecasting error and can be considered as a good method to model the STLF systems.
Abstract: DNA shuffling is a powerful method used for in vitro
evolute molecules with specific functions and has application in areas
such as, for example, pharmaceutical, medical and agricultural
research. The success of such experiments is dependent on a variety
of parameters and conditions that, sometimes, can not be properly
pre-established. Here, two computational models predicting DNA
shuffling results is presented and their use and results are evaluated
against an empirical experiment. The in silico and in vitro results
show agreement indicating the importance of these two models and
motivating the study and development of new models.
Abstract: Inverse kinematics analysis plays an important role in developing a robot manipulator. But it is not too easy to derive the inverse kinematic equation of a robot manipulator especially robot manipulator which has numerous degree of freedom. This paper describes an application of Artificial Neural Network for modeling the inverse kinematics equation of a robot manipulator. In this case, the robot has three degree of freedoms and the robot was implemented for drilling a printed circuit board. The artificial neural network architecture used for modeling is a multilayer perceptron networks with steepest descent backpropagation training algorithm. The designed artificial neural network has 2 inputs, 2 outputs and varies in number of hidden layer. Experiments were done in variation of number of hidden layer and learning rate. Experimental results show that the best architecture of artificial neural network used for modeling inverse kinematics of is multilayer perceptron with 1 hidden layer and 38 neurons per hidden layer. This network resulted a RMSE value of 0.01474.
Abstract: A scalable QoS aware multicast deployment in
DiffServ networks has become an important research dimension in
recent years. Although multicasting and differentiated services are
two complementary technologies, the integration of the two
technologies is a non-trivial task due to architectural conflicts
between them. A popular solution proposed is to extend the
functionality of the DiffServ components to support multicasting. In
this paper, we propose an algorithm to construct an efficient QoSdriven
multicast tree, taking into account the available bandwidth per
service class. We also present an efficient way to provision the
limited available bandwidth for supporting heterogeneous users. The
proposed mechanism is evaluated using simulated tests. The
simulated result reveals that our algorithm can effectively minimize
the bandwidth use and transmission cost
Abstract: In this paper we study the use of a new code called
Random Diagonal (RD) code for Spectral Amplitude Coding (SAC)
optical Code Division Multiple Access (CDMA) networks, using
Fiber Bragg-Grating (FBG), FBG consists of a fiber segment whose
index of reflection varies periodically along its length. RD code is
constructed using code level and data level, one of the important
properties of this code is that the cross correlation at data level is
always zero, which means that Phase intensity Induced Phase (PIIN)
is reduced. We find that the performance of the RD code will be
better than Modified Frequency Hopping (MFH) and Hadamard code
It has been observed through experimental and theoretical simulation
that BER for RD code perform significantly better than other codes.
Proof –of-principle simulations of encoding with 3 channels, and 10
Gbps data transmission have been successfully demonstrated together
with FBG decoding scheme for canceling the code level from SAC-signal.
Abstract: The purpose of this study is to identify ideal urban
design elements of waterfronts and to analyze the differences in users-
cognition among these elements. This study follows three steps as
following: first is identifying the urban design elements of waterfronts
from literature review and second is evaluating intended users-
cognition of urban design elements in urban waterfronts. Lastly, third
is analyzing the users- cognition differences. As the result, evaluations
of waterfront areas by users show similar features that non-waterfront
urban design elements contain the highest degree of importance. This
indicates the difference of users- cognition has dimensions of
frequency and distance, and demonstrates differences in the aspect of
importance than of satisfaction. Multi-Dimensional Scaling Method
verifies differences among their cognition. This study provides
elements to increase satisfaction of users from differences of their
cognition on design elements for waterfronts. It also suggests
implications on elements when waterfronts are built.
Abstract: Average current analysis checking the impact of
current flow is very important to guarantee the reliability of
semiconductor systems. As semiconductor process technologies
improve, the coupling capacitance often become bigger than self
capacitances. In this paper, we propose an analytic technique for
analyzing average current on interconnects in multi-conductor
structures. The proposed technique has shown to yield the acceptable
errors compared to HSPICE results while providing computational
efficiency.
Abstract: The spiral angle of the elementary cellulose fibril in
the wood cell wall, often called microfibril angle, (MFA). Microfibril
angle in hardwood is one of the key determinants of solid timber
performance due to its strong influence on the stiffness, strength,
shrinkage, swelling, thermal-dynamics mechanical properties and
dimensional stability of wood. Variation of MFA (degree) in the S2
layer of the cell walls among Acacia mangium trees was determined
using small-angle X-ray scattering (SAXS). The length and
orientation of the microfibrils of the cell walls in the irradiated
volume of the thin samples are measured using SAXS and optical
microscope for 3D surface measurement. The undetermined
parameters in the analysis are the MFA, (M) and the standard
deviation (σФ) of the intensity distribution arising from the wandering
of the fibril orientation about the mean value. Nine separate pairs of
values are determined for nine different values of the angle of the
incidence of the X-ray beam relative to the normal to the radial
direction in the sample. The results show good agreement. The
curve distribution of scattered intensity for the real cell wall structure
is compared with that calculated with that assembly of rectangular
cells with the same ratio of transverse to radial cell wall length. It is
demonstrated that for β = 45°, the peaks in the curve intensity
distribution for the real and the rectangular cells coincide. If this
peak position is Ф45, then the MFA can be determined from the
relation M = tan-1 (tan Ф45 / cos 45°), which is precise for rectangular
cells. It was found that 92.93% of the variation of MFA can be
attributed to the distance from pith to bark. Here we shall present our
results of the MFA in the cell wall with respect to its shape, structure
and the distance from pith to park as an important fast check and yet
accurate towards the quality of wood, its uses and application.
Abstract: We present a new intuitionistic fuzzy aggregation
operator called the intuitionistic fuzzy ordered weighted
averaging-weighted average (IFOWAWA) operator. The main
advantage of the IFOWAWA operator is that it unifies the OWA
operator with the WA in the same formulation considering the degree
of importance that each concept has in the aggregation. Moreover, it is
able to deal with an uncertain environment that can be assessed with
intuitionistic fuzzy numbers. We study some of its main properties and
we see that it has a lot of particular cases such as the intuitionistic
fuzzy weighted average (IFWA) and the intuitionistic fuzzy OWA
(IFOWA) operator. Finally, we study the applicability of the new
approach on a financial decision making problem concerning the
selection of financial strategies.
Abstract: In this paper electrical characteristics of various kinds
of multiple-gate silicon nanowire transistors (SNWT) with the
channel length equal to 7 nm are compared. A fully ballistic quantum
mechanical transport approach based on NEGF was employed to
analyses electrical characteristics of rectangular and cylindrical
silicon nanowire transistors as well as a Double gate MOS FET. A
double gate, triple gate, and gate all around nano wires were studied
to investigate the impact of increasing the number of gates on the
control of the short channel effect which is important in nanoscale
devices. Also in the case of triple gate rectangular SNWT inserting
extra gates on the bottom of device can improve the application of
device. The results indicate that by using gate all around structures
short channel effects such as DIBL, subthreshold swing and delay
reduces.
Abstract: Rice, which is the staple food in Sierra Leone, is
consumed on a daily basis. It is the most imperative food crop
extensively grown by farmers across all ecologies in the country.
Though much attention is now given to rice grain production through
the small holder commercialization programme (SHCP), however, no
attention has been given in investigating the limitations faced by rice
producers. This paper will contribute to attempts to overcome the
development challenges caused by food insecurity. The objective of
this paper is thus, to analysis the relationship between rice production
and the domestic retail price of rice. The study employed a log linear
model in which, the quantity of rice produced is the dependent
variable, quantity of rice imported, price of imported rice and price of
domestic rice as explanatory variables. Findings showed that, locally
produced rice is even more expensive than the imported rice per ton,
and almost all the inhabitants in the capital city which hosts about
65% of the entire population of the country favor imported rice, as it
is free from stones with other impurities. On the other hand, to
control price and simultaneously increase rice production, the
government should purchase the rice from the farmers and then sell to private retailers.
Abstract: The common bean is the most important grain legume for direct human consumption in the world and BCMV is one of the world's most serious bean diseases that can reduce yield and quality of harvested product. To determine the best tolerance index to BCMV and recognize tolerant genotypes, 2 experiments were conducted in field conditions. Twenty five common bean genotypes were sown in 2 separate RCB design with 3 replications under contamination and non-contamination conditions. On the basis of the results of indices correlations GMP, MP and HARM were determined as the most suitable tolerance indices. The results of principle components analysis indicated 2 first components totally explained 98.52% of variations among data. The first and second components were named potential yield and stress susceptible respectively. Based on the results of BCMV tolerance indices assessment and biplot analysis WA8563-4, WA8563-2 and Cardinal were the genotypes that exhibited potential seed yield under contamination and noncontamination conditions.
Abstract: Gold passbook is an investing tool that is especially
suitable for investors to do small investment in the solid gold. The gold
passbook has the lower risk than other ways investing in gold, but its
price is still affected by gold price. However, there are many factors
can cause influences on gold price. Therefore, building a model to
predict the price of gold passbook can both reduce the risk of
investment and increase the benefits. This study investigates the
important factors that influence the gold passbook price, and utilize
the Group Method of Data Handling (GMDH) to build the predictive
model. This method can not only obtain the significant variables but
also perform well in prediction. Finally, the significant variables of
gold passbook price, which can be predicted by GMDH, are US dollar
exchange rate, international petroleum price, unemployment rate,
whole sale price index, rediscount rate, foreign exchange reserves,
misery index, prosperity coincident index and industrial index.
Abstract: Business process model describes process flow of a
business and can be seen as the requirement for developing a
software application. This paper discusses a BPM2CD guideline
which complements the Model Driven Architecture concept by
suggesting how to create a platform-independent software model in
the form of a UML class diagram from a business process model. An
important step is the identification of UML classes from the business
process model. A technique for object-oriented analysis called
domain analysis is borrowed and key concepts in the business
process model will be discovered and proposed as candidate classes
for the class diagram. The paper enhances this step by using ontology
search to help identify important classes for the business domain. As
ontology is a source of knowledge for a particular domain which
itself can link to ontologies of related domains, the search can give a
refined set of candidate classes for the resulting class diagram.
Abstract: The purpose of this study is i) to investigate the driving factors and barriers of the adoption of Information and Communication Technology (ICT) in Halal logistic and ii) to develop an ICT adoption framework for Halal logistic service provider. The Halal LSPs selected for the study currently used ICT service platforms, such as accounting and management system for Halal logistic business. The study categorizes the factors influencing the adoption decision and process by LSPs into four groups: technology related factors, organizational and environmental factors, Halal assurance related factors, and government related factors. The major contribution in this study is the discovery that technology related factors (ICT compatibility with Halal requirement) and Halal assurance related factors are the most crucial factors among the Halal LSPs applying ICT for Halal control in transportation-s operation. Among the government related factors, ICT requirement for monitoring Halal included in Halal Logistic Standard on Transportation (MS2400:2010) are the most influencing factors in the adoption of ICT with the support of the government. In addition, the government related factors are very important in the reducing the main barriers and the creation of the atmosphere of ICT adoption in Halal LSP sector.
Abstract: This article discusses the customs and traditions in
Turkestan in the late XIXth and early XXth centuries. Having a long
history, Turkestan is well-known as the birthplace of many nations
and nationalities. The name of Turkestan is also given to it for a
reason - the land of the Turkic peoples who inhabited Central Asia
and united under together. Currently, nations and nationalities of the
Turkestan region formed their own sovereign states, and every year
they prove their country names in the world community. Political,
economic importance of Turkestan, which became the gold wire
between Asia and Europe was always very high. So systematically
various aggressive actions were made by several great powers. As a
result of expansionary policy of colonization of the Russian Empire -
the Turkestan has appeared.
Abstract: A mobile agent is a software which performs an
action autonomously and independently as a person or an
organizations assistance. Mobile agents are used for searching
information, retrieval information, filtering, intruder recognition in
networks, and so on. One of the important issues of mobile agent is
their security. It must consider different security issues in effective
and secured usage of mobile agent. One of those issues is the
integrity-s protection of mobile agents.
In this paper, the advantages and disadvantages of each method,
after reviewing the existing methods, is examined. Regarding to this
matter that each method has its own advantage or disadvantage, it
seems that by combining these methods, one can reach to a better
method for protecting the integrity of mobile agents. Therefore, this
method is provided in this paper and then is evaluated in terms of
existing method. Finally, this method is simulated and its results are
the sign of improving the possibility of integrity-s protection of
mobile agents.
Abstract: All practical real-time scheduling algorithms in multiprocessor systems present a trade-off between their computational complexity and performance. In real-time systems, tasks have to be performed correctly and timely. Finding minimal schedule in multiprocessor systems with real-time constraints is shown to be NP-hard. Although some optimal algorithms have been employed in uni-processor systems, they fail when they are applied in multiprocessor systems. The practical scheduling algorithms in real-time systems have not deterministic response time. Deterministic timing behavior is an important parameter for system robustness analysis. The intrinsic uncertainty in dynamic real-time systems increases the difficulties of scheduling problem. To alleviate these difficulties, we have proposed a fuzzy scheduling approach to arrange real-time periodic and non-periodic tasks in multiprocessor systems. Static and dynamic optimal scheduling algorithms fail with non-critical overload. In contrast, our approach balances task loads of the processors successfully while consider starvation prevention and fairness which cause higher priority tasks have higher running probability. A simulation is conducted to evaluate the performance of the proposed approach. Experimental results have shown that the proposed fuzzy scheduler creates feasible schedules for homogeneous and heterogeneous tasks. It also and considers tasks priorities which cause higher system utilization and lowers deadline miss time. According to the results, it performs very close to optimal schedule of uni-processor systems.
Abstract: Biometric techniques are gaining importance for
personal authentication and identification as compared to the
traditional authentication methods. Biometric templates are
vulnerable to variety of attacks due to their inherent nature. When a
person-s biometric is compromised his identity is lost. In contrast to
password, biometric is not revocable. Therefore, providing security
to the stored biometric template is very crucial. Crypto biometric
systems are authentication systems, which blends the idea of
cryptography and biometrics. Fuzzy vault is a proven crypto
biometric construct which is used to secure the biometric templates.
However fuzzy vault suffer from certain limitations like nonrevocability,
cross matching. Security of the fuzzy vault is affected
by the non-uniform nature of the biometric data. Fuzzy vault when
hardened with password overcomes these limitations. Password
provides an additional layer of security and enhances user privacy.
Retina has certain advantages over other biometric traits. Retinal
scans are used in high-end security applications like access control to
areas or rooms in military installations, power plants, and other high
risk security areas. This work applies the idea of fuzzy vault for
retinal biometric template. Multimodal biometric system
performance is well compared to single modal biometric systems.
The proposed multi modal biometric fuzzy vault includes combined
feature points from retina and fingerprint. The combined vault is
hardened with user password for achieving high level of security.
The security of the combined vault is measured using min-entropy.
The proposed password hardened multi biometric fuzzy vault is
robust towards stored biometric template attacks.