Abstract: LDPC codes could be used in magnetic storage devices because of their better decoding performance compared to other error correction codes. However, their hardware implementation results in large and complex decoders. This one of the main obstacles the decoders to be incorporated in magnetic storage devices. We construct small high girth and rate 2 columnweight codes from cage graphs. Though these codes have low performance compared to higher column weight codes, they are easier to implement. The ease of implementation makes them more suitable for applications such as magnetic recording. Cages are the smallest known regular distance graphs, which give us the smallest known column-weight 2 codes given the size, girth and rate of the code.
Abstract: This research paper evaluates and compares the
performance of equal cost adaptive multi-path routing algorithms
taking the transport protocols TCP (Transmission Control Protocol)
and UDP (User Datagram Protocol) using network simulator ns2 and
concludes which one is better.
Abstract: Abstract— The paper presents a preliminary study on modeling and estimation of basic wind speed ( extreme wind gusts ) for the consideration of vulnerability and design of building in Ayeyarwady Region. The establishment of appropriate design wind speeds is a critical step towards the calculation of design wind loads for structures. In this paper the extreme value analysis of this prediction work is based on the anemometer data (1970-2009) maintained by the department of meteorology and hydrology of Pathein. Statistical and probabilistic approaches are used to derive formulas for estimating 3-second gusts from recorded data (10-minute sustained mean wind speeds).
Abstract: This paper presents a new approach using Combined Artificial Neural Network (CANN) module for daily peak load forecasting. Five different computational techniques –Constrained method, Unconstrained method, Evolutionary Programming (EP), Particle Swarm Optimization (PSO), and Genetic Algorithm (GA) – have been used to identify the CANN module for peak load forecasting. In this paper, a set of neural networks has been trained with different architecture and training parameters. The networks are trained and tested for the actual load data of Chennai city (India). A set of better trained conventional ANNs are selected to develop a CANN module using different algorithms instead of using one best conventional ANN. Obtained results using CANN module confirm its validity.
Abstract: In this paper, we propose an architecture for easily
constructing a robot controller. The architecture is a multi-agent
system which has eight agents: the Man-machine interface, Task
planner, Task teaching editor, Motion planner, Arm controller,
Vehicle controller, Vision system and CG display. The controller has
three databases: the Task knowledge database, the Robot database and
the Environment database. Based on this controller architecture, we
are constructing an experimental power distribution line maintenance
robot system and are doing the experiment for the maintenance tasks,
for example, “Bolt insertion task".
Abstract: Polynomial bases and normal bases are both used for
elliptic curve cryptosystems, but field arithmetic operations such as
multiplication, inversion and doubling for each basis are implemented
by different methods. In general, it is said that normal bases, especially
optimal normal bases (ONB) which are special cases on normal bases,
are efficient for the implementation in hardware in comparison with
polynomial bases. However there seems to be more examined by
implementing and analyzing these systems under similar condition. In
this paper, we designed field arithmetic operators for each basis over
GF(2233), which field has a polynomial basis recommended by SEC2
and a type-II ONB both, and analyzed these implementation results.
And, in addition, we predicted the efficiency of two elliptic curve
cryptosystems using these field arithmetic operators.
Abstract: The index of sustainable functionality (ISF) is an adaptive, multi-criteria technique that is used to measure sustainability; it is a concept that can be transposed to many regions throughout the world. An ISF application of the Southern Regional Organisation of Councils (SouthROC) in South East Queensland (SEQ) – the fastest growing region in Australia – indicated over a 25 year period an increase of over 10% level of functionality from 58.0% to 68.3%. The ISF of SouthROC utilised methodologies that derived from an expert panel based approach. The overall results attained an intermediate level of functionality which amounted to related concerns of economic progress and lack of social awareness. Within the region, a solid basis for future testing by way of measured changes and developed trends can be established. In this regard as management tool, the ISF record offers support for regional sustainability practice and decision making alike. This research adaptively analyses sustainability – a concept that is lacking throughout much of the academic literature and any reciprocal experimentation. This lack of knowledge base has been the emphasis of where future sustainability research can grow from and prove useful in rapidly growing regions. It is the intentions of this research to help further develop the notions of index-based quantitative sustainability.
Abstract: A feed-forward, back-propagation Artificial Neural
Network (ANN) model has been used to forecast the occurrences of
wastewater overflows in a combined sewerage reticulation system.
This approach was tested to evaluate its applicability as a method
alternative to the common practice of developing a complete
conceptual, mathematical hydrological-hydraulic model for the
sewerage system to enable such forecasts. The ANN approach
obviates the need for a-priori understanding and representation of the
underlying hydrological hydraulic phenomena in mathematical terms
but enables learning the characteristics of a sewer overflow from the
historical data.
The performance of the standard feed-forward, back-propagation
of error algorithm was enhanced by a modified data normalizing
technique that enabled the ANN model to extrapolate into the
territory that was unseen by the training data. The algorithm and the
data normalizing method are presented along with the ANN model
output results that indicate a good accuracy in the forecasted sewer
overflow rates. However, it was revealed that the accurate
forecasting of the overflow rates are heavily dependent on the
availability of a real-time flow monitoring at the overflow structure
to provide antecedent flow rate data. The ability of the ANN to
forecast the overflow rates without the antecedent flow rates (as is
the case with traditional conceptual reticulation models) was found to
be quite poor.
Abstract: The utilization of renewable energy sources in electric
power systems is increasing quickly because of public apprehensions
for unpleasant environmental impacts and increase in the energy
costs involved with the use of conventional energy sources. Despite
the application of these energy sources can considerably diminish the
system fuel costs, they can also have significant influence on the
system reliability. Therefore an appropriate combination of the
system reliability indices level and capital investment costs of system
is vital. This paper presents a hybrid wind/photovoltaic plant, with
the aim of supplying IEEE reliability test system load pattern while
the plant capital investment costs is minimized by applying a hybrid
particle swarm optimization (PSO) / harmony search (HS) approach,
and the system fulfills the appropriate level of reliability.
Abstract: This study created new graphical icons and operating
functions in a CAD/CAM software system by analyzing icons in some
of the popular systems, such as AutoCAD, AlphaCAM, Mastercam
and the 1st edition of LiteCAM. These software systems all focused on
geometric design and editing, thus how to transmit messages
intuitively from icon itself to users is an important function of
graphical icons. The primary purpose of this study is to design
innovative icons and commands for new software.
This study employed the TRIZ method, an innovative design
method, to generate new concepts systematically. Through literature
review, it then investigated and analyzed the relationship between
TRIZ and idea development. Contradiction Matrix and 40 Principles
were used to develop an assisting tool suitable for icon design in
software development. We first gathered icon samples from the
selected CAD/CAM systems. Then grouped these icons by
meaningful functions, and compared useful and harmful properties.
Finally, we developed new icons for new software systems in order to
avoid intellectual property problem.
Abstract: During more than a decade, many proposals and standards have been designed to deal with the mobility issues; however, there are still some serious limitations in basing solutions on them. In this paper we discuss the possibility of handling mobility at the application layer. We do this while revisiting the conventional implementation of the Two Phase Commit (2PC) protocol which is a fundamental asset of transactional technology for ensuring the consistent commitment of distributed transactions. The solution is based on an execution framework providing an efficient extension that is aware of the mobility and preserves the 2PC principle.
Abstract: In this article, we introduce a new approach for
analyzing UML designs to detect the inconsistencies between
multiple state diagrams and sequence diagrams. The Super State
Analysis (SSA) identifies the inconsistencies in super states, single
step transitions, and sequences. Because SSA considers multiple
UML state diagrams, it discovers inconsistencies that cannot be
discovered when considering only a single UML state diagram. We
have introduced a transition set that captures relationship information
that is not specifiable in UML diagrams. The SSA model uses the
transition set to link transitions of multiple state diagrams together.
The analysis generates three different sets automatically. These sets
are compared to the provided sets to detect the inconsistencies. SSA
identifies five types of inconsistencies: impossible super states,
unreachable super states, illegal transitions, missing transitions, and
illegal sequences.
Abstract: Natural frequencies and dynamic response of a spur
gear sector are investigated using a two dimensional finite element
model that offers significant advantages for dynamic gear analyses.
The gear teeth are analyzed for different operating speeds. A primary
feature of this modeling is determination of mesh forces using a
detailed contact analysis for each time step as the gears roll through
the mesh. Transient mode super position method has been used to
find horizontal and vertical components of displacement and
dynamic stress. The finite element analysis software ANSYS has
been used on the proposed model to find the natural frequencies by
Block Lanczos technique and displacements and dynamic stresses by
transient mode super position method. A comparison of theoretical
(natural frequency and static stress) results with the finite element
analysis results has also been done. The effect of rotational speed of
the gears on the dynamic response of gear tooth has been studied and
design limits have been discussed.
Abstract: The systematic manipulations of shapes and sizes of
inorganic compounds greatly benefit the various application fields
including optics, magnetic, electronics, catalysis and medicine.
However shape control has been much more difficult to achieve.
Hence exploration of novel method for the preparation of differently
shaped nanoparticles is challenging research area. II-VI group of
semiconductor cadmium sulphide (CdS) nanostructure with different
morphologies (such as, acicular like, mesoporous, spherical shapes)
and of crystallite sizes vary from 11 to 16 nm were successfully
synthesized by chemical aqueous precipitation of Cd2+ ions with
homogeneously released S2- ions from decomposition of cadmium
sulphate (CdSO4) and thioacetamide (CH3CSNH2) by annealing at
different radiations (microwave, ultrasonic and sunlight) with matter
and systematic research has been done for various factors affecting
the controlled growth rate of CdS nanoparticles. The obtained
nanomaterials have been characterized by X-ray Diffraction (XRD),
Fourier Transform Infrared Spectroscopy (FTIR),
Thermogravometric (DSC-TGA) analysis and Scanning Electron
Microscopy (SEM). The result indicates that on increasing the
reaction time particle size increases but on increasing the molar ratios
grain size decreases.
Abstract: Machine Translation (MT 3) of English text to its Urdu equivalent is a difficult challenge. Lot of attempts has been made, but a few limited solutions are provided till now. We present a direct approach, using an expert system to translate English text into its equivalent Urdu, using The Unicode Standard, Version 4.0 (ISBN 0-321-18578-1) Range: 0600–06FF. The expert system works with a knowledge base that contains grammatical patterns of English and Urdu, as well as a tense and gender-aware dictionary of Urdu words (with their English equivalents).
Abstract: In this paper, we propose an approach of unsupervised
segmentation with fuzzy connectedness. Valid seeds are first specified
by an unsupervised method based on scale space theory. A region is
then extracted for each seed with a relative object extraction method of
fuzzy connectedness. Afterwards, regions are merged according to the
values between them of an introduced measure. Some theorems and
propositions are also provided to show the reasonableness of the
measure for doing mergence. Experiment results on a synthetic image,
a color image and a large amount of MR images of our method are
reported.
Abstract: As the majority of faults are found in a few of its modules so there is a need to investigate the modules that are affected severely as compared to other modules and proper maintenance need to be done on time especially for the critical applications. In this paper, we have explored the different predictor models to NASA-s public domain defect dataset coded in Perl programming language. Different machine learning algorithms belonging to the different learner categories of the WEKA project including Mamdani Based Fuzzy Inference System and Neuro-fuzzy based system have been evaluated for the modeling of maintenance severity or impact of fault severity. The results are recorded in terms of Accuracy, Mean Absolute Error (MAE) and Root Mean Squared Error (RMSE). The results show that Neuro-fuzzy based model provides relatively better prediction accuracy as compared to other models and hence, can be used for the maintenance severity prediction of the software.
Abstract: Problem Statement:Rapid technological developments of the 21st century have advanced our daily lives in various ways. Particularly in education, students frequently utilize technological resources to aid their homework and to access information. listen to radio or watch television (26.9 %) and e-mails (34.2 %) [26]. Not surprisingly, the increase in the use of technologies also resulted in an increase in the use of e-mail, instant messaging, chat rooms, mobile phones, mobile phone cameras and web sites by adolescents to bully peers. As cyber bullying occurs in the cyber space, lesser access to technologies would mean lesser cyber-harm. Therefore, the frequency of technology use is a significant predictor of cyber bullying and cyber victims. Cyber bullies try to harm the victim using various media. These tools include sending derogatory texts via mobile phones, sending threatening e-mails and forwarding confidential emails to everyone on the contacts list. Another way of cyber bullying is to set up a humiliating website and invite others to post comments. In other words, cyber bullies use e-mail, chat rooms, instant messaging, pagers, mobile texts and online voting tools to humiliate and frighten others and to create a sense of helplessness. No matter what type of bullying it is, it negatively affects its victims. Children who bully exhibit more emotional inhibition and attribute themselves more negative self-statements compared to non-bullies. Students whose families are not sympathetic and who receive lower emotional support are more prone to bully their peers. Bullies have authoritarian families and do not get along well with them. The family is the place where the children-s physical, social and psychological needs are satisfied and where their personalities develop. As the use of the internet became prevalent so did parents- restrictions on their children-s internet use. However, parents are unaware of the real harm. Studies that explain the relationship between parental attitudes and cyber bullying are scarce in literature. Thus, this study aims to investigate the relationship between cyber bullying and parental attitudes in the primary school. Purpose of Study: This study aimed to investigate the relationship between cyber bullying and parental attitudes. A second aim was to determine whether parental attitudes could predict cyber bullying and if so which variables could predict it significantly. Methods:The study had a cross-sectional and relational survey model. A demographics information form, questions about cyber bullying and a Parental Attitudes Inventory were conducted with a total of 346 students (189 females and 157 males) registered at various primary schools. Data was analysed by multiple regression analysis using the software package SPSS 16.
Abstract: In this paper the modeling and analysis of Space
Vector Pulse Width Modulation (SVPWM) based Dynamic Voltage
Restorer (DVR) using PSCAD/EMTDC software will be presented in
details. The simulation includes full modeling of the SVPWM
technique used to control the DVR inverter. A test power system
composed of three phase voltage source, sag generator, DVR and
three phase resistive load is used to demonstrate restoration capability
of the DVR. The simulation results of the presented DVR proved
excellent voltage sag mitigation to protect sensitive loads.
Abstract: Mining Sequential Patterns in large databases has become
an important data mining task with broad applications. It is
an important task in data mining field, which describes potential
sequenced relationships among items in a database. There are many
different algorithms introduced for this task. Conventional algorithms
can find the exact optimal Sequential Pattern rule but it takes a
long time, particularly when they are applied on large databases.
Nowadays, some evolutionary algorithms, such as Particle Swarm
Optimization and Genetic Algorithm, were proposed and have been
applied to solve this problem. This paper will introduce a new kind
of hybrid evolutionary algorithm that combines Genetic Algorithm
(GA) with Particle Swarm Optimization (PSO) to mine Sequential
Pattern, in order to improve the speed of evolutionary algorithms
convergence. This algorithm is referred to as SP-GAPSO.