Abstract: This paper presents the design and implementation of CASTE, a Cloud-based automatic software test environment. We first present the architecture of CASTE, then the main packages and classes of it are described in detail. CASTE is built upon a private Infrastructure as a Service platform. Through concentrated resource management of virtualized testing environment and automatic execution control of test scripts, we get a better solution to the testing resource utilization and test automation problem. Experiments on CASTE give very appealing results.
Abstract: A brushless DC motor with integrated drive circuit for air management system is presented. Using magnetic equivalent circuit model a basic design of the motor is determined, and specific configurations are inspected thanks to finite element analysis. In order to reduce an unbalanced magnetic force in an axial direction, induced forces between a stator core and a permanent magnet are calculated with respect to the relative positions of them. For the high efficiency, and high power density, BLDC motor and drive are developed. Also vibration mode and eccentricity of a rotor are considered at the rated and maximum rotational speed Through the experimental results, a validity of the simulated one is confirmed.
Abstract: Real-time hand tracking is a challenging task in many
computer vision applications such as gesture recognition. This paper
proposes a robust method for hand tracking in a complex environment
using Mean-shift analysis and Kalman filter in conjunction with 3D
depth map. The depth information solve the overlapping problem
between hands and face, which is obtained by passive stereo measuring
based on cross correlation and the known calibration data of
the cameras. Mean-shift analysis uses the gradient of Bhattacharyya
coefficient as a similarity function to derive the candidate of the hand
that is most similar to a given hand target model. And then, Kalman
filter is used to estimate the position of the hand target. The results
of hand tracking, tested on various video sequences, are robust to
changes in shape as well as partial occlusion.
Abstract: Sequential pattern mining is a challenging task in data mining area with large applications. One among those applications is mining patterns from weblog. Recent times, weblog is highly dynamic and some of them may become absolute over time. In addition, users may frequently change the threshold value during the data mining process until acquiring required output or mining interesting rules. Some of the recently proposed algorithms for mining weblog, build the tree with two scans and always consume large time and space. In this paper, we build Revised PLWAP with Non-frequent Items (RePLNI-tree) with single scan for all items. While mining sequential patterns, the links related to the nonfrequent items are not considered. Hence, it is not required to delete or maintain the information of nodes while revising the tree for mining updated transactions. The algorithm supports both incremental and interactive mining. It is not required to re-compute the patterns each time, while weblog is updated or minimum support changed. The performance of the proposed tree is better, even the size of incremental database is more than 50% of existing one. For evaluation purpose, we have used the benchmark weblog dataset and found that the performance of proposed tree is encouraging compared to some of the recently proposed approaches.
Abstract: Sequences of execution of algorithms in an interactive
manner using multimedia tools are employed in this paper. It helps to
realize the concept of fundamentals of algorithms such as searching
and sorting method in a simple manner. Visualization gains more
attention than theoretical study and it is an easy way of learning
process. We propose methods for finding runtime sequence of each
algorithm in an interactive way and aims to overcome the drawbacks
of the existing character systems. System illustrates each and every
step clearly using text and animation. Comparisons of its time
complexity have been carried out and results show that our approach
provides better perceptive of algorithms.
Abstract: The purpose of this study is two-fold. First, it attempts to explore potential opportunities for utilizing visual interactive simulations along with Business Intelligence (BI) as a decision support tool for strategic decision making. Second, it tries to figure out the essential top-level managerial requirements that would transform strategic decision simulation into an integral component of BI systems. The domain of particular interest was the application of visual interactive simulation capabilities in the field of supply chains. A qualitative exploratory method was applied, through the use of interviews with two leading companies. The collected data was then analysed to demonstrate the difference between the literature perspective and the practical managerial perspective on the issue. The results of the study suggest that although the use of simulation particularly in managing supply chains is very evident in literature, yet, in practice such utilization is still in its infancy, particularly regarding strategic decisions. Based on the insights a prototype of a simulation based BI-solution-extension was developed and evaluated.
Abstract: Human activities are increasingly based on the use of remote resources and services, and on the interaction between
remotely located parties that may know little about each other. Mobile agents must be prepared to execute on different hosts with
various environmental security conditions. The aim of this paper is to
propose a trust based mechanism to improve the security of mobile
agents and allow their execution in various environments. Thus, an
adaptive trust mechanism is proposed. It is based on the dynamic interaction between the agent and the environment. Information
collected during the interaction enables generation of an environment
key. This key informs on the host-s trust degree and permits the mobile agent to adapt its execution. Trust estimation is based on
concrete parameters values. Thus, in case of distrust, the source of problem can be located and a mobile agent appropriate behavior can
be selected.
Abstract: It has formed an essential issue that Climate Change, composed of highly knowledge complexity, reveals its significant impact on human existence. Therefore, specific national policies, some of which present the educational aspects, have been published for overcoming the imperative problem. Accordingly, the study aims to analyze as well as integrate the relationship between Climate Change and environmental education and apply the perspective of concept map to represent the knowledge contents and structures of Climate Change; by doing so, knowledge contents of Climate Change could be represented in an even more comprehensive way and manipulated as the tool for environmental education. The method adapted for this study is knowledge conversion model compounded of the platform for experts and teachers, who were the participants for this study, to cooperate and combine each participant-s standpoints into a complete knowledge framework that is the foundation for structuring the concept map. The result of this research contains the important concepts, the precise propositions and the entire concept map for representing the robust concepts of Climate Change.
Abstract: This paper presents design trade-off and performance impacts of
the amount of pipeline phase of control path signals in a wormhole-switched
network-on-chip (NoC). The numbers of the pipeline phase of the control
path vary between two- and one-cycle pipeline phase. The control paths
consist of the routing request paths for output selection and the arbitration
paths for input selection. Data communications between on-chip routers are
implemented synchronously and for quality of service, the inter-router data
transports are controlled by using a link-level congestion control to avoid
lose of data because of an overflow. The trade-off between the area (logic
cell area) and the performance (bandwidth gain) of two proposed NoC router
microarchitectures are presented in this paper. The performance evaluation is
made by using a traffic scenario with different number of workloads under
2D mesh NoC topology using a static routing algorithm. By using a 130-nm
CMOS standard-cell technology, our NoC routers can be clocked at 1 GHz,
resulting in a high speed network link and high router bandwidth capacity
of about 320 Gbit/s. Based on our experiments, the amount of control path
pipeline stages gives more significant impact on the NoC performance than
the impact on the logic area of the NoC router.
Abstract: A state of the art Speaker Identification (SI) system
requires a robust feature extraction unit followed by a speaker
modeling scheme for generalized representation of these features.
Over the years, Mel-Frequency Cepstral Coefficients (MFCC)
modeled on the human auditory system has been used as a standard
acoustic feature set for speech related applications. On a recent
contribution by authors, it has been shown that the Inverted Mel-
Frequency Cepstral Coefficients (IMFCC) is useful feature set for
SI, which contains complementary information present in high
frequency region. This paper introduces the Gaussian shaped filter
(GF) while calculating MFCC and IMFCC in place of typical
triangular shaped bins. The objective is to introduce a higher
amount of correlation between subband outputs. The performances
of both MFCC & IMFCC improve with GF over conventional
triangular filter (TF) based implementation, individually as well as
in combination. With GMM as speaker modeling paradigm, the
performances of proposed GF based MFCC and IMFCC in
individual and fused mode have been verified in two standard
databases YOHO, (Microphone Speech) and POLYCOST
(Telephone Speech) each of which has more than 130 speakers.
Abstract: In diversity rich environments, such as in Ultra-
Wideband (UWB) applications, the a priori determination of the
number of strong diversity branches is difficult, because of the considerably large number of diversity paths, which are characterized
by a variety of power delay profiles (PDPs). Several
Rake implementations have been proposed in the past, in order to reduce the number of the estimated and combined paths. To this
aim, we introduce two adaptive Rake receivers, which combine
a subset of the resolvable paths considering simultaneously the
quality of both the total combining output signal-to-noise ratio (SNR) and the individual SNR of each path. These schemes achieve
better adaptation to channel conditions compared to other known receivers, without further increasing the complexity. Their performance
is evaluated in different practical UWB channels, whose models are based on extensive propagation measurements. The
proposed receivers compromise between the power consumption,
complexity and performance gain for the additional paths, resulting in important savings in power and computational resources.
Abstract: The environment pollution with pesticides and heavy
metals is a recognized problem nowadays, with extension to the
global scale the tendency of amplification. Even with all the progress
in the environmental field, both in the emphasize of the effect of the
pollutants upon health, the linked studies environment-health are
insufficient, not only in Romania but all over the world also. We aim
to describe the particular situation in Romania regarding the
uncontrolled use of pesticides, to identify and evaluate the risk zones
for health and the environment in Romania, with the final goal of
designing adequate programs for reduction and control of the risk
sources. An exploratory study was conducted to determine the
magnitude of the pesticide use problem in a population living in
Saliste, a rural setting in Transylvania, Romania. The significant
stakeholders in Saliste region were interviewed and a sample from
the population living in Saliste area was selected to fill in a designed
questionnaire. All the selected participants declared that they used
pesticides in their activities for more than one purpose. They
declared they annually applied pesticides for a period of time
between 11 and 30 years, from 5 to 9 days per year on average,
mainly on crops situated at some distance from the houses but high
risk behavior was identified as the volunteers declared the use of
pesticides in the backyard gardens, near their homes, where children
were playing. The pesticide applicators did not have the necessary
knowledge about safety and exposure. The health data must be
correlated with exposure biomarkers in attempt to identify the
possible health effects of the pesticides exposure. Future plans
include educational campaigns to raise the awareness of the
population on the danger of uncontrolled use of pesticides.
Abstract: For Romania, the fulfilment of the obligations
undertaken as a member state of the European Union in accordance
with the Treaty of Accession requires the effective implementation of
sustainable development principles and practices, this being the only
reasonable development option, which adequately draws in on the
economic, social and environment resources. Achieving this
objective is based on a profound analysis of the realities in the
Romanian economy, which will reflect the existent situation and the
action directions for the future. The paper presents an analysis of the
Romanian economic performances compared to the EU economy,
based on the sustainable value (SV) model. The analysis highlighted
the considerable gap between Romania and the EU regarding the
sustainable capitalization of resources, the provided information
being useful to justify strategic development decisions at a micro and
macro levels.
Abstract: Increasing the demand for effectively use of the
production facility requires the tools for sharing the manufacturing
facility through remote operation of the machining process. This
research introduces the methodology of machining technology for
direct remote operation of networked milling machine. The
integrated tools with virtual simulation, remote desktop protocol and
Setup Free Attachment for remote operation of milling process are
proposed. Accessing and monitoring of machining operation is
performed by remote desktop interface and 3D virtual simulations.
Capability of remote operation is supported by an auto setup
attachment with a reconfigurable pin type setup free technology
installed on the table of CNC milling machine to perform unattended
machining process. The system is designed using a computer server
and connected to a PC based controlled CNC machine for real time
monitoring. A client will access the server through internet
communication and virtually simulate the machine activity. The
result has been presented that combination between real time virtual
simulation and remote desktop tool is enabling to operate all machine
tool functions and as well as workpiece setup..
Abstract: Graph has become increasingly important in modeling
complicated structures and schemaless data such as proteins, chemical
compounds, and XML documents. Given a graph query, it is desirable
to retrieve graphs quickly from a large database via graph-based
indices. Different from the existing methods, our approach, called
VFM (Vertex to Frequent Feature Mapping), makes use of vertices
and decision features as the basic indexing feature. VFM constructs
two mappings between vertices and frequent features to answer graph
queries. The VFM approach not only provides an elegant solution to
the graph indexing problem, but also demonstrates how database
indexing and query processing can benefit from data mining,
especially frequent pattern mining. The results show that the proposed
method not only avoids the enumeration method of getting subgraphs
of query graph, but also effectively reduces the subgraph isomorphism
tests between the query graph and graphs in candidate answer set in
verification stage.
Abstract: Many Wireless Sensor Network (WSN) applications necessitate secure multicast services for the purpose of broadcasting delay sensitive data like video files and live telecast at fixed time-slot. This work provides a novel method to deal with end-to-end delay and drop rate of packets. Opportunistic Routing chooses a link based on the maximum probability of packet delivery ratio. Null Key Generation helps in authenticating packets to the receiver. Markov Decision Process based Adaptive Scheduling algorithm determines the time slot for packet transmission. Both theoretical analysis and simulation results show that the proposed protocol ensures better performance in terms of packet delivery ratio, average end-to-end delay and normalized routing overhead.
Abstract: Everyday the usages of the Internet increase and simply a world of the data become accessible. Network providers do not want to let the provided services to be used in harmful or terrorist affairs, so they used a variety of methods to protect the special regions from the harmful data. One of the most important methods is supposed to be the firewall. Firewall stops the transfer of such packets through several ways, but in some cases they do not use firewall because of its blind packet stopping, high process power needed and expensive prices. Here we have proposed a method to find a discriminate function to distinguish between usual packets and harmful ones by the statistical processing on the network router logs. So an administrator can alarm to the user. This method is very fast and can be used simply in adjacent with the Internet routers.
Abstract: Molar excess Volumes, VE ijk and speeds of sound , uijk of 2-pyrrolidinone (i) + benzene or toluene (j) + ethanol (k) ternary mixture have been measured as a function of composition at 308.15 K. The observed speeds of sound data have been utilized to determine excess isentropic compressiblities, ( E S κ )ijk of ternary (i + j + k) mixtures. Molar excess volumes, VE ijk and excess isentropic compressibilities, ( E S κ )ijk data have fitted to the Redlich-Kister equation to calculate ternary adjustable parameters and standard deviations. The Moelywn-Huggins concept (Huggins in Polymer 12: 389-399, 1971) of connectivity between the surfaces of the constituents of binary mixtures has been extended to ternary mixtures (using the concept of a connectivity parameter of third degree of molecules, 3ξ , which inturn depends on its topology) to obtain an expression that describes well the measured VE ijk and ( E S κ )ijk data.
Abstract: In this paper, we propose a supervised method for
color image classification based on a multilevel sigmoidal neural
network (MSNN) model. In this method, images are classified into
five categories, i.e., “Car", “Building", “Mountain", “Farm" and
“Coast". This classification is performed without any segmentation
processes. To verify the learning capabilities of the proposed method,
we compare our MSNN model with the traditional Sigmoidal Neural
Network (SNN) model. Results of comparison have shown that the
MSNN model performs better than the traditional SNN model in the
context of training run time and classification rate. Both color
moments and multi-level wavelets decomposition technique are used
to extract features from images. The proposed method has been
tested on a variety of real and synthetic images.
Abstract: Tourists- eyes will often be attracted by the unique
phenomenon of the roadsides: betel nut beauties (pronounced as
binlang xishi in Mandarin), if they drive on the roads of Taiwan.
Sitting in the neon-lit glass stalls with attractive dress on the roadsides,
betel nut beauties usually sell betel nuts to the passing truckers or car
drivers with much of their efforts. Moreover, in order to attract
peoples- eyesight and increase the sales volume, the young girls are in
skimpy clothing to promote betel nuts or beverages to their customers.
Therefore, when the Chinese tourists come to Taiwan, to see the
unique betel nut beauty phenomenon has become one of their greatly
interested things or even a “must see". This paper describes betel but
beauties in Taiwan, explained why the Chinese tourists like to see
them in Taiwan and proposed propositions for examination.