Abstract: This article presents the results of researchrelated to the assessment protocol weightedcumulative expected transmission time (WCETT)applied to cognitive radio networks.The development work was based on researchdone by different authors, we simulated a network,which communicates wirelessly, using a licensedchannel, through which other nodes are notlicensed, try to transmit during a given time nodeuntil the station's owner begins its transmission.
Abstract: Multiple sequence alignment is a fundamental part in
many bioinformatics applications such as phylogenetic analysis.
Many alignment methods have been proposed. Each method gives a
different result for the same data set, and consequently generates a
different phylogenetic tree. Hence, the chosen alignment method
affects the resulting tree. However in the literature, there is no
evaluation of multiple alignment methods based on the comparison of
their phylogenetic trees. This work evaluates the following eight
aligners: ClustalX, T-Coffee, SAGA, MUSCLE, MAFFT, DIALIGN,
ProbCons and Align-m, based on their phylogenetic trees (test trees)
produced on a given data set. The Neighbor-Joining method is used
to estimate trees. Three criteria, namely, the dNNI, the dRF and the
Id_Tree are established to test the ability of different alignment
methods to produce closer test tree compared to the reference one
(true tree). Results show that the method which produces the most
accurate alignment gives the nearest test tree to the reference tree.
MUSCLE outperforms all aligners with respect to the three criteria
and for all datasets, performing particularly better when sequence
identities are within 10-20%. It is followed by T-Coffee at lower
sequence identity (30%), trees scores of all methods
become similar.
Abstract: Wireless sensor networks can be used to measure and monitor many challenging problems and typically involve in monitoring, tracking and controlling areas such as battlefield monitoring, object tracking, habitat monitoring and home sentry systems. However, wireless sensor networks pose unique security challenges including forgery of sensor data, eavesdropping, denial of service attacks, and the physical compromise of sensor nodes. Node in a sensor networks may be vanished due to power exhaustion or malicious attacks. To expand the life span of the sensor network, a new node deployment is needed. In military scenarios, intruder may directly organize malicious nodes or manipulate existing nodes to set up malicious new nodes through many kinds of attacks. To avoid malicious nodes from joining the sensor network, a security is required in the design of sensor network protocols. In this paper, we proposed a security framework to provide a complete security solution against the known attacks in wireless sensor networks. Our framework accomplishes node authentication for new nodes with recognition of a malicious node. When deployed as a framework, a high degree of security is reachable compared with the conventional sensor network security solutions. A proposed framework can protect against most of the notorious attacks in sensor networks, and attain better computation and communication performance. This is different from conventional authentication methods based on the node identity. It includes identity of nodes and the node security time stamp into the authentication procedure. Hence security protocols not only see the identity of each node but also distinguish between new nodes and old nodes.
Abstract: Although Model Driven Architecture has taken
successful steps toward model-based software development, this
approach still faces complex situations and ambiguous questions
while applying to real world software systems. One of these
questions - which has taken the most interest and focus - is how
model transforms between different abstraction levels, MDA
proposes. In this paper, we propose an approach based on Story
Driven Modeling and Aspect Oriented Programming to ease these
transformations. Service Oriented Architecture is taken as the target
model to test the proposed mechanism in a functional system.
Service Oriented Architecture and Model Driven Architecture [1]
are both considered as the frontiers of their own domain in the
software world. Following components - which was the greatest step
after object oriented - SOA is introduced, focusing on more
integrated and automated software solutions. On the other hand - and
from the designers' point of view - MDA is just initiating another
evolution. MDA is considered as the next big step after UML in
designing domain.
Abstract: In the supply chain management customer is the most
significant component and mass customization is mostly related to
customers because it is the capability of any industry or organization
to deliver highly customized products and its services to the
respective customers with flexibility and integration, providing such
a variety of products that nearly everyone can find what they want.
Today all over the world many companies and markets are facing
varied situations that at one side customers are demanding that their
orders should be completed as quickly as possible while on other
hand it requires highly customized products and services. By
applying mass customization some companies face unwanted cost
and complexity. Now they are realizing that they should completely
examine what kind of customization would be best suited for their
companies. In this paper authors review some approaches and
principles which show effect in supply chain management that can be
adopted and used by companies for quickly meeting the customer
orders at reduced cost, with minimum amount of inventory and
maximum efficiency.
Abstract: Abstract–Let k ≥ 3 be an integer, and let G be a graph of order n with n ≥ 9k +3- 42(k - 1)2 + 2. Then a spanning subgraph F of G is called a k-factor if dF (x) = k for each x ∈ V (G). A fractional k-factor is a way of assigning weights to the edges of a graph G (with all weights between 0 and 1) such that for each vertex the sum of the weights of the edges incident with that vertex is k. A graph G is a fractional k-deleted graph if there exists a fractional k-factor after deleting any edge of G. In this paper, it is proved that G is a fractional k-deleted graph if G satisfies δ(G) ≥ k + 1 and |NG(x) ∪ NG(y)| ≥ 1 2 (n + k - 2) for each pair of nonadjacent vertices x, y of G.
Abstract: In large Internet backbones, Service Providers
typically have to explicitly manage the traffic flows in order to
optimize the use of network resources. This process is often referred
to as Traffic Engineering (TE). Common objectives of traffic
engineering include balance traffic distribution across the network
and avoiding congestion hot spots. Raj P H and SVK Raja designed
the Bayesian network approach to identify congestion hors pots in
MPLS. In this approach for every node in the network the
Conditional Probability Distribution (CPD) is specified. Based on
the CPD the congestion hot spots are identified. Then the traffic can
be distributed so that no link in the network is either over utilized or
under utilized. Although the Bayesian network approach has been
implemented in operational networks, it has a number of well known
scaling issues.
This paper proposes a new approach, which we call the Pragati
(means Progress) Node Popularity (PNP) approach to identify the
congestion hot spots with the network topology alone. In the new
Pragati Node Popularity approach, IP routing runs natively over the
physical topology rather than depending on the CPD of each node as
in Bayesian network. We first illustrate our approach with a simple
network, then present a formal analysis of the Pragati Node
Popularity approach. Our PNP approach shows that for any given
network of Bayesian approach, it exactly identifies the same result
with minimum efforts. We further extend the result to a more
generic one: for any network topology and even though the network
is loopy. A theoretical insight of our result is that the optimal routing
is always shortest path routing with respect to some considerations of
hot spots in the networks.
Abstract: This study examines appearances of brand placement
as an alternative communication strategy in television series by
focusing on Yalan Dünya which is one of the most popular television
series in Turkey. Consequently, this study has a descriptive research
design and quantitative content analysis method is used in order to
analyze frequency and time data of brand placement appearances in
first 3 seasons of Yalan Dünya with 16 episodes.
Analysis of brand placement practices in Yalan Dünya is dealt in
three categories: episode-based analysis, season-based analysis and
comparative analysis. At the end, brand placement practices in Yalan
Dünya are evaluated in terms of type, form, duration and legal
arrangements.
As a result of this study, it is seen that brand placement plays a
determinant role in Yalan Dünya content. Also, current legal
arrangements make brand placement closer to other traditional
communication strategies instead of differing brand placement from
them distinctly.
Abstract: The stability of a software system is one of the most
important quality attributes affecting the maintenance effort. Many
techniques have been proposed to support the analysis of software
stability at the architecture, file, and class level of software systems,
but little effort has been made for that at the feature (i.e., method and
attribute) level. And the assumptions the existing techniques based
on always do not meet the practice to a certain degree. Considering
that, in this paper, we present a novel metric, Stability of Software
(SoS), to measure the stability of object-oriented software systems
by software change propagation analysis using a simulation way
in software dependency networks at feature level. The approach is
evaluated by case studies on eight open source Java programs using
different software structures (one employs design patterns versus one
does not) for the same object-oriented program. The results of the
case studies validate the effectiveness of the proposed metric. The
approach has been fully automated by a tool written in Java.
Abstract: Films of pure tin oxide SnO2 and in presence of
antimony atoms (SnO2-Sb) deposited onto glass substrates have
shown a sufficiently high energy gap to be transparent in the visible
region, a high electrical mobility and a carrier concentration which
displays a good electrical conductivity [1]. In this work, the effects of
polycrystalline silicon substrate on the optical properties of pure and
Sb doped tin oxide is investigated.
We used the APCVD (atmospheric pressure chemical vapour
deposition) technique, which is a low-cost and simple technique,
under nitrogen ambient, for growing this material. A series of SnO2
and SnO2-Sb have been deposited onto polycrystalline silicon
substrates with different contents of antimony atoms at the same
conditions of deposition (substrate temperature, flow oxygen,
duration and nitrogen atmosphere of the reactor). The effect of the
substrate in terms of morphology and nonlinear optical properties,
mainly the reflectance, was studied. The reflectance intensity of the
device, compared to the reflectance of tin oxide films deposited
directly on glass substrate, is clearly reduced on the overall
wavelength range. It is obvious that the roughness of the poly-c
silicon plays an important role by improving the reflectance and
hence the optical parameters.
A clear shift in the minimum of the reflectance upon doping level
is observed. This minimum corresponds to strong free carrier
absorption, resulting in different plasma frequency. This effect is
followed by an increase in the reflectance depending of the antimony
doping. Applying the extended Drude theory to the combining
optical and electrical obtained results these effects are discussed.
Abstract: This paper covers the present situation and problem of experimental teaching of mathematics specialty in recent years, puts
forward and demonstrates experimental teaching methods for different
education. From the aspects of content and experimental teaching
approach, uses as an example the course “Experiment for Program
Designing & Algorithmic Language" and discusses teaching practice
and laboratory course work. In addition a series of successful methods
and measures are introduced in experimental teaching.
Abstract: This paper proposes an investment cost recovery
based efficient and fast sequential optimization approach to optimal
allocation of thyristor controlled series compensator (TCSC) in
competitive power market. The optimization technique has been used
with an objective to maximizing the social welfare and minimizing
the device installation cost by suitable location and rating of TCSC in
the system. The effectiveness of proposed approach for location of
TCSC has been compared with some existing methods of TCSC
placement, in terms of its impact on social welfare, TCSC investment
recovery and optimal generation as well as load patterns. The results
have been obtained on modified IEEE 14-bus system.
Abstract: Wireless Mesh Networks (WMNs) are an emerging
technology for last-mile broadband access. In WMNs, similar to ad
hoc networks, each user node operates not only as a host but also as a
router. User packets are forwarded to and from an Internet-connected
gateway in multi-hop fashion. The WMNs can be integrated with
other networking technologies i.e. ad hoc networks, to implement a
smooth network extension. The meshed topology provides good
reliability and scalability, as well as low upfront investments. Despite
the recent start-up surge in WMNs, much research remains to be
done in standardizing the functional parameters of WMNs to fully
exploit their full potential. An edifice of the security concerns of
these networks is authentication of a new client joining an integrated
ad hoc network and such a scenario will require execution of a multihop
authentication technique. Our endeavor in this paper is to
introduce a secure authentication technique, with light over-heads
that can be conveniently implemented for the ad-hoc nodes forming
clients of an integrated WMN, thus facilitating their inter-operability.
Abstract: Overhead conveyor systems satisfy by their simple
construction, wide application range and their full compatibility with
other manufacturing systems, which are designed according to
international standards. Ultra-light overhead conveyor systems are
rope-based conveying systems with individually driven vehicles. The
vehicles can move automatically on the rope and this can be realized
by energy and signals. Crossings are realized by switches. Overhead
conveyor systems are particularly used in the automotive industry but
also at post offices. Overhead conveyor systems always must be
integrated with a logistical process by finding the best way for a
cheaper material flow and in order to guarantee precise and fast
workflows. With their help, any transport can take place without
wasting ground and space, without excessive company capacity, lost
or damaged products, erroneous delivery, endless travels and without
wasting time. Ultra-light overhead conveyor systems provide optimal
material flow, which produces profit and saves time. This article
illustrates the advantages of the structure of the ultra-light overhead
conveyor systems in logistics applications and explains the steps of
their system design. After an illustration of the steps, currently
available systems on the market will be shown by means of their
technical characteristics. Due to their simple construction, demands
to an ultra-light overhead conveyor system will be illustrated.
Abstract: This paper proposes a three-dimensional motion capture and feedback system of flying disc throwing action learners with use of Kinect device. Rather than conventional 3-D motion capture system, Kinect has advantages of cost merit, easy system development and operation. A novice learner of flying disc is trained to keep arm movement in steady height, to twist the waist, and to stretch the elbow according to the waist angle. The proposing system captures learners- body movement, checks their skeleton positions in pre-motion / motion / post-motion in several ways, and displays feedback messages to refine their actions.
Abstract: This paper presented a MATLAB-based system named Smart Access Network Testing, Analyzing and Database (SANTAD), purposely for in-service transmission surveillance and self restoration against fiber fault in fiber-to-the-home (FTTH) access network. The developed program will be installed with optical line terminal (OLT) at central office (CO) to monitor the status and detect any fiber fault that occurs in FTTH downwardly from CO towards residential customer locations. SANTAD is interfaced with optical time domain reflectometer (OTDR) to accumulate every network testing result to be displayed on a single computer screen for further analysis. This program will identify and present the parameters of each optical fiber line such as the line's status either in working or nonworking condition, magnitude of decreasing at each point, failure location, and other details as shown in the OTDR's screen. The failure status will be delivered to field engineers for promptly actions, meanwhile the failure line will be diverted to protection line to ensure the traffic flow continuously. This approach has a bright prospect to improve the survivability and reliability as well as increase the efficiency and monitoring capabilities in FTTH.
Abstract: Educational institutions increasingly adopt the
students-as-customers concept to satisfy their students.
Understanding students- perspectives on the use of this business
concept in educational institutions is necessary for the institutions to
effectively align these perspectives with their management practice.
The study investigates whether students in technology and business
disciplines have significantly different attitudes toward using the
students-as-customers concept in educational institutions and
explores the impact of treating students as customers in technology
disciplines under students- perspectives. The results from
quantitative and qualitative data analyses show that technology
students, in contrast to business students, fairly disagree with
educational institutions to treat students as customers. Treating
students as customers in technology disciplines will have a negative
influence on teaching performance, instructor-student relationships
and educational institutions- aim, but a positive influence on service
quality in educational institutions. The paper discusses the findings
and concludes with implications and limitations of the study.
Abstract: This paper addresses the stabilization issues for a class of uncertain switched neutral systems with nonlinear perturbations. Based on new classes of piecewise Lyapunov functionals, the stability assumption on all the main operators or the convex combination of coefficient matrices is avoid, and a new switching rule is introduced to stabilize the neutral systems. The switching rule is designed from the solution of the so-called Lyapunov-Metzler linear matrix inequalities. Finally, three simulation examples are given to demonstrate the significant improvements over the existing results.
Abstract: Environment today is featured with aging population,
increasing prevalence of chronic disease and complex of medical
treatment. Safe use of pharmaceutics relied very much on the efforts
made by both the health- related organizations and as well as the
government agencies. As far as the specialization concern in providing
health services to the patients, the government actively issued and
implemented the divisions of medical treatment and pharmaceutical to
improve the quality of care and to reduce medication errors and ensure
public health. Pharmaceutical sub-sector policy has been implemented
for 13 years. This study attempts to explore the factors that affect the
patients- behavior intention of refilling a prescription from a NHIB
pharmacy. Samples were those patients refilling their prescriptions
with the case NHIB pharmacies. A self-administered questionnaire
was used to collect respondents- information while the patients or
family members visit the pharmacy for the refilling. 1,200
questionnaires were dispatched in 37 pharmacies that randomly
selected from Pingtung City, Dongkang, Chaozhou, Hengchun areas.
732 responses were gained with 604 valid samples for further analyses.
Results of data analyses indicated that respondents- attitude,
subjective norm, perceived behavior control and behavior intentions
toward refilling behavior varied from some demographic variables to
another. This research also suggested adding actual behavior, either by
a self-report or observed, into the research.
Abstract: The realization of current-mode quadrature oscillators
using current controlled current conveyor transconductance
amplifiers (CCCCTAs) and grounded capacitors is presented. The
proposed oscillators can provide 2 sinusoidal output currents with 90º
phase difference. It is enabled non-interactive dual-current control for
both the condition of oscillation and the frequency of oscillation.
High output impedances of the configurations enable the circuit to be
cascaded without additional current buffers. The use of only
grounded capacitors is ideal for integration. The circuit performances
are depicted through PSpice simulations, they show good agreement
to theoretical anticipation.