Abstract: Markov games can be effectively used to design
controllers for nonlinear systems. The paper presents two novel
controller design algorithms by incorporating ideas from gametheory
literature that address safety and consistency issues of the
'learned' control strategy. A more widely used approach for
controller design is the H∞ optimal control, which suffers from high
computational demand and at times, may be infeasible. We generate
an optimal control policy for the agent (controller) via a simple
Linear Program enabling the controller to learn about the unknown
environment. The controller is facing an unknown environment and
in our formulation this environment corresponds to the behavior rules
of the noise modeled as the opponent. Proposed approaches aim to
achieve 'safe-consistent' and 'safe-universally consistent' controller
behavior by hybridizing 'min-max', 'fictitious play' and 'cautious
fictitious play' approaches drawn from game theory. We empirically
evaluate the approaches on a simulated Inverted Pendulum swing-up
task and compare its performance against standard Q learning.
Abstract: A fast adaptive Tomlinson Harashima (T-H) precoder structure is presented for indoor wireless communications, where the channel may vary due to rotation and small movement of the mobile terminal. A frequency-selective slow fading channel which is time-invariant over a frame is assumed. In this adaptive T-H precoder, feedback coefficients are updated at the end of every uplink frame by using system identification technique for channel estimation in contrary with the conventional T-H precoding concept where the channel is estimated during the starting of the uplink frame via Wiener solution. In conventional T-H precoder it is assumed the channel is time-invariant in both uplink and downlink frames. However assuming the channel is time-invariant over only one frame instead of two, the proposed adaptive T-H precoder yields better performance than conventional T-H precoder if the channel is varied in uplink after receiving the training sequence.
Abstract: Mobile Learning (M-Learning) is a new technology
which is to enhance current learning practices and activities for all
people especially students and academic practitioners UTP is
currently, implemented two types of learning styles which are
conventional and electronic learning. In order to improve current
learning approaches, it is necessary for UTP to implement m-learning
in UTP. This paper presents a study on the students- perceptions on
mobile utilization in the learning practices in UTP. Besides, this
paper also presents a survey that was conducted among 82 students
from System Analysis and Design (SAD) course in UTP. The survey
includes basic information of mobile devices that have been used by
the students, opinions on current learning practices and also the
opinions regarding the m-learning implementation in the current
learning practices especially in SAD course. Based on the results of
the survey, majority of the students are using the mobile devices that
can support m-learning environment. Other than that, students also
agreed that current learning practices are ineffective and they believe
that m-learning utilization can improve the effectiveness of current
learning practices.
Abstract: Checkpointing is one of the commonly used techniques to provide fault-tolerance in distributed systems so that the system can operate even if one or more components have failed. However, mobile computing systems are constrained by low bandwidth, mobility, lack of stable storage, frequent disconnections and limited battery life. Hence, checkpointing protocols having lesser number of synchronization messages and fewer checkpoints are preferred in mobile environment. There are two different approaches, although not orthogonal, to checkpoint mobile computing systems namely, time-based and index-based. Our protocol is a fusion of these two approaches, though not first of its kind. In the present exposition, an index-based checkpointing protocol has been developed, which uses time to indirectly coordinate the creation of consistent global checkpoints for mobile computing systems. The proposed algorithm is non-blocking, adaptive, and does not use any control message. Compared to other contemporary checkpointing algorithms, it is computationally more efficient because it takes lesser number of checkpoints and does not need to compute dependency relationships. A brief account of important and relevant works in both the fields, time-based and index-based, has also been included in the presentation.
Abstract: This paper introduces our first efforts of developing a
new team for RoboCup Middle Size Competition. In our robots we
have applied omni directional based mobile system with omnidirectional
vision system and fuzzy control algorithm to navigate
robots. The control architecture of MRL middle-size robots is a three
layered architecture, Planning, Sequencing, and Executing. It also
uses Blackboard system to achieve coordination among agents.
Moreover, the architecture should have minimum dependency on low
level structure and have a uniform protocol to interact with real
robot.
Abstract: In this paper we present a full performance analysis of an energy conserving routing protocol in mobile ad hoc network, named ER-AODV (Energy Reverse Ad-hoc On-demand Distance Vector routing). ER-AODV is a reactive routing protocol based on a policy which combines two mechanisms used in the basic AODV protocol. AODV and most of the on demand ad hoc routing protocols use single route reply along reverse path. Rapid change of topology causes that the route reply could not arrive to the source node, i.e. after a source node sends several route request messages, the node obtains a reply message, and this increases in power consumption. To avoid these problems, we propose a mechanism which tries multiple route replies. The second mechanism proposes a new adaptive approach which seeks to incorporate the metric "residual energy " in the process route selection, Indeed the residual energy of mobile nodes were considered when making routing decisions. The results of simulation show that protocol ER-AODV answers a better energy conservation.
Abstract: Recent communications environment significantly
expands the mobile environment. The popularization of smartphones
with various mobile services has emerged, and smartphone users are
rapidly increasing. Because of these symptoms, existing wired
environment in a variety of mobile traffic entering to mobile network
has threatened the stability of the mobile network. Unlike traditional
wired infrastructure, mobile networks has limited radio resources and
signaling procedures for complex radio resource management. So
these traffic is not a problem in wired networks but mobile networks, it
can be a threat. In this paper, we analyze the security threats in mobile
networks and provide direction to solve it.
Abstract: In recent years, global warming has become a
worldwide problem. The reduction of carbon dioxide emissions is a
top priority for many companies in the manufacturing industry. In the
automobile industry as well, the reduction of carbon dioxide emissions
is one of the most important issues. Technology to reduce the weight
of automotive parts improves the fuel economy of automobiles, and is
an important technology for reducing carbon dioxide. Also, even if
this weight reduction technology is applied to electric automobiles
rather than gasoline automobiles, reducing energy consumption
remains an important issue. Plastic processing of hollow pipes is one
important technology for realizing the weight reduction of automotive
parts. Ohashi et al. [1],[2] present an example of research on pipe
formation in which a process was carried out to enlarge a pipe
diameter using a lost core, achieving the suppression of wall thickness
reduction and greater pipe expansion than hydroforming.
In this study, we investigated a method to increase the wall
thickness of a pipe through pipe compression using planetary rolls.
The establishment of a technology whereby the wall thickness of a
pipe can be controlled without buckling the pipe is an important
technology for the weight reduction of products. Using the finite
element analysis method, we predicted that it would be possible to
increase the compression of an aluminum pipe with a 3mm wall
thickness by approximately 20%, and wall thickness by approximately
20% by pressing the hollow pipe with planetary rolls.
Abstract: Topological changes in mobile ad hoc networks
frequently render routing paths unusable. Such recurrent path failures
have detrimental effects on quality of service. A suitable technique
for eliminating this problem is to use multiple backup paths between
the source and the destination in the network. This paper proposes an
effective and efficient protocol for backup and disjoint path set in ad
hoc wireless network. This protocol converges to a highly reliable
path set very fast with no message exchange overhead. The paths
selection according to this algorithm is beneficial for mobile ad hoc
networks, since it produce a set of backup paths with more high
reliability. Simulation experiments are conducted to evaluate the
performance of our algorithm in terms of route numbers in the path
set and its reliability. In order to acquire link reliability estimates, we
use link expiration time (LET) between two nodes.
Abstract: In this paper, novel statistical sampling based equalization techniques and CNN based detection are proposed to increase the spectral efficiency of multiuser communication systems over fading channels. Multiuser communication combined with selective fading can result in interferences which severely deteriorate the quality of service in wireless data transmission (e.g. CDMA in mobile communication). The paper introduces new equalization methods to combat interferences by minimizing the Bit Error Rate (BER) as a function of the equalizer coefficients. This provides higher performance than the traditional Minimum Mean Square Error equalization. Since the calculation of BER as a function of the equalizer coefficients is of exponential complexity, statistical sampling methods are proposed to approximate the gradient which yields fast equalization and superior performance to the traditional algorithms. Efficient estimation of the gradient is achieved by using stratified sampling and the Li-Silvester bounds. A simple mechanism is derived to identify the dominant samples in real-time, for the sake of efficient estimation. The equalizer weights are adapted recursively by minimizing the estimated BER. The near-optimal performance of the new algorithms is also demonstrated by extensive simulations. The paper has also developed a (Cellular Neural Network) CNN based approach to detection. In this case fast quadratic optimization has been carried out by t, whereas the task of equalizer is to ensure the required template structure (sparseness) for the CNN. The performance of the method has also been analyzed by simulations.
Abstract: Surveillance system is widely used in the traffic
monitoring. The deployment of cameras is moving toward a
ubiquitous camera (UbiCam) environment. In our previous study, a
novel service, called GPS-VT, was firstly proposed by incorporating
global positioning system (GPS) and visual tracking techniques for
the UbiCam environment. The first prototype is called GODTA
(GPS-based Moving Object Detection and Tracking Approach). For a
moving person carried GPS-enabled mobile device, he can be
tracking when he enters the field-of-view (FOV) of a camera
according to his real-time GPS coordinate. In this paper, GPS-VT
service is applied to the tracking of vehicles. The moving speed of a
vehicle is much faster than a person. It means that the time passing
through the FOV is much shorter than that of a person. Besides, the
update interval of GPS coordinate is once per second, it is
asynchronous with the frame rate of the real-time image. The above
asynchronous is worsen by the network transmission delay. These
factors are the main challenging to fulfill GPS-VT service on a
vehicle.In order to overcome the influence of the above factors, a
back-propagation neural network (BPNN) is used to predict the
possible lane before the vehicle enters the FOV of a camera. Then, a
template matching technique is used for the visual tracking of a target
vehicle. The experimental result shows that the target vehicle can be
located and tracking successfully. The success location rate of the
implemented prototype is higher than that of the previous GODTA.
Abstract: The increasing development of wireless networks and
the widespread popularity of handheld devices such as Personal
Digital Assistants (PDAs), mobile phones and wireless tablets
represents an incredible opportunity to enable mobile devices as a
universal payment method, involving daily financial transactions.
Unfortunately, some issues hampering the widespread acceptance of
mobile payment such as accountability properties, privacy protection,
limitation of wireless network and mobile device. Recently, many
public-key cryptography based mobile payment protocol have been
proposed. However, limited capabilities of mobile devices and
wireless networks make these protocols are unsuitable for mobile
network. Moreover, these protocols were designed to preserve
traditional flow of payment data, which is vulnerable to attack and
increase the user-s risk. In this paper, we propose a private mobile
payment protocol which based on client centric model and by
employing symmetric key operations. The proposed mobile payment
protocol not only minimizes the computational operations and
communication passes between the engaging parties, but also
achieves a completely privacy protection for the payer. The future
work will concentrate on improving the verification solution to
support mobile user authentication and authorization for mobile
payment transactions.
Abstract: Application of flexible structures has been
significantly, increased in industry and aerospace missions due to
their contributions and unique advantages over the rigid counterparts.
In this paper, vibration analysis of a flexible structure i.e., automobile
wiper blade is investigated and controlled. The wiper generates
unwanted noise and vibration during the wiping the rain and other
particles on windshield which may cause annoying noise in different
ranges of frequency. A two dimensional analytical modeled wiper
blade whose model accuracy is verified by numerical studies in
literature is considered in this study. Particle swarm optimization
(PSO) is employed in alliance with input shaping (IS) technique in
order to control or to attenuate the amplitude level of unwanted
noise/vibration of the wiper blade.
Abstract: The abnormal increase in the number of applications available for download in Android markets is a good indication that they are being reused. However, little is known about their real reusability potential. A considerable amount of these applications is reported as having a poor quality or being malicious. Hence, in this paper, an approach to measure the reusability potential of classes in Android applications is proposed. The approach is not meant specifically for this particular type of applications. Rather, it is intended for Object-Oriented (OO) software systems in general and aims also to provide means to discard the classes of low quality and defect prone applications from being reused directly through inheritance and instantiation. An empirical investigation is conducted to measure and rank the reusability potential of the classes of randomly selected Android applications. The results obtained are thoroughly analyzed in order to understand the extent of this potential and the factors influencing it.
Abstract: We develop a new interface for Bus-Net which is
optimized for a smartphone. We are continuing to develop the shortest
path planning system of public transportation called "Bus-Net" in
Tottori prefecture as web application to improve the usability of
public transportation. Recent trend of computing platform, however
has shifted to an advanced mobile device called a smartphone such as
iPhone and Android in Japan. A smartphone has different characters
with existing feature phone in terms of OS, large touche panel, and
several other features. We derive a guideline to design the new interface
for a smartphone to full use of the functionality. The guideline is
about simplicity of user-s operation, location awareness and usability.
We developed the new interface for “Bus-Net" on iPhone referring
to the guideline. Due to the evaluation, the application interface we
developed is better than the existing web-based interface in terms of
the usability.
Abstract: The rapid development of the BlackBerry games industry and its development goals were not just for entertainment, but also used for educational of students interactively. Unfortunately the development of adaptive educational games on BlackBerry in Indonesian language that interesting and entertaining for learning process is very limited. This paper shows the research of development of novel adaptive educational games for students who can adjust the difficulty level of games based on the ability of the user, so that it can motivate students to continue to play these games. We propose a method where these games can adjust the level of difficulty, based on the assessment of the results of previous problems using neural networks with three inputs in the form of percentage correct, the speed of answer and interest mode of games (animation / lessons) and 1 output. The experimental results are presented and show the adaptive games are running well on mobile devices based on BlackBerry platform
Abstract: This paper reports the findings of a research
conducted to evaluate the ownership and usage of technology devices
within Distance Education students- according to their age. This
research involved 45 Distance Education students from USM
Universiti Sains Malaysia (DEUSM) as its respondents. Data was
collected through questionnaire that had been developed by the
researchers based on some literature review. The data was analyzed
to find out the frequencies of respondents agreements towards
ownership of technology devices and the use of technology devices.
The findings shows that all respondents own mobile phone and
majority of them reveal that they use mobile on regular basis. The
student in the age 30-39 has the heist ownership of the technology
devices.
Abstract: The demand for autonomous resource
management for distributed systems has increased in recent
years. Distributed systems require an efficient and powerful
communication mechanism between applications running on
different hosts and networks. The use of mobile agent
technology to distribute and delegate management tasks
promises to overcome the scalability and flexibility limitations
of the currently used centralized management approach. This
work proposes a multiagent system that adopts mobile agents
as a technology for tasks distribution, results collection, and
management of resources in large-scale distributed systems. A
new mobile agent-based approach for collecting results from
distributed system elements is presented. The technique of
artificial intelligence based on intelligent agents giving the
system a proactive behavior. The presented results are based
on a design example of an application operating in a mobile
environment.
Abstract: A combined three-microphone voice activity detector (VAD) and noise-canceling system is studied to enhance speech recognition in an automobile environment. A previous experiment clearly shows the ability of the composite system to cancel a single noise source outside of a defined zone. This paper investigates the performance of the composite system when there are frequently moving noise sources (noise sources are coming from different locations but are not always presented at the same time) e.g. there is other passenger speech or speech from a radio when a desired speech is presented. To work in a frequently moving noise sources environment, whilst a three-microphone voice activity detector (VAD) detects voice from a “VAD valid zone", the 3-microphone noise canceller uses a “noise canceller valid zone" defined in freespace around the users head. Therefore, a desired voice should be in the intersection of the noise canceller valid zone and VAD valid zone. Thus all noise is suppressed outside this intersection of area. Experiments are shown for a real environment e.g. all results were recorded in a car by omni-directional electret condenser microphones.
Abstract: This work aims to reduce the read power consumption
as well as to enhance the stability of the SRAM cell during the read
operation. A new 10-transisor cell is proposed with a new read
scheme to minimize the power consumption within the memory core.
It has separate read and write ports, thus cell read stability is
significantly improved. A 16Kb SRAM macro operating at 1V
supply voltage is demonstrated in 65 nm CMOS process. Its read
power consumption is reduced to 24% of the conventional design.
The new cell also has lower leakage current due to its special bit-line
pre-charge scheme. As a result, it is suitable for low-power mobile
applications where power supply is restricted by the battery.