Abstract: This paper proposes a fast tree join scheme to provide
seamless multicast handover in the mobile networks based on the Fast
Mobile IPv6 (FMIPv6). In the existing FMIPv6-based multicast
handover scheme, the bi-directional tunnelling or the remote
subscription is employed with the packet forwarding from the previous
access router (AR) to the new AR. In general, the remote subscription
approach is preferred to the bi-directional tunnelling one, since in the
remote subscription scheme we can exploit an optimized multicast
path from a multicast source to many mobile receivers. However, in
the remote subscription scheme, if the tree joining operation takes a
long time, the amount of data packets to be forwarded and buffered for
multicast handover will increase, and thus the corresponding buffer
may overflow, which results in severe packet losses. In order to reduce
these costs associated with packet forwarding and buffering, this paper
proposes the fast join to multicast tree, in which the new AR will join
the multicast tree as fast as possible, so that the new multicast data
packets can also arrive at the new AR, by which the packet forwarding
and buffering costs can be reduced. From numerical analysis, it is
shown that the proposed scheme can give better performance than the
existing FMIPv6-based multicast handover schemes in terms of the
multicast packet delivery costs.
Abstract: Resource discovery is one of the chief services of a grid. A new approach to discover the provenances in grid through learning automata has been propounded in this article. The objective of the aforementioned resource-discovery service is to select the resource based upon the user-s applications and the mercantile yardsticks that is to say opting for an originator which can accomplish the user-s tasks in the most economic manner. This novel service is submitted in two phases. We proffered an applicationbased categorization by means of an intelligent nerve-prone plexus. The user in question sets his or her application as the input vector of the nerve-prone nexus. The output vector of the aforesaid network limns the appropriateness of any one of the resource for the presented executive procedure. The most scrimping option out of those put forward in the previous stage which can be coped with to fulfill the task in question is picked out. Te resource choice is carried out by means of the presented algorithm based upon the learning automata.
Abstract: A big organization may have multiple branches spread across different locations. Processing of data from these branches becomes a huge task when innumerable transactions take place. Also, branches may be reluctant to forward their data for centralized processing but are ready to pass their association rules. Local mining may also generate a large amount of rules. Further, it is not practically possible for all local data sources to be of the same size. A model is proposed for discovering valid rules from different sized data sources where the valid rules are high weighted rules. These rules can be obtained from the high frequency rules generated from each of the data sources. A data source selection procedure is considered in order to efficiently synthesize rules. Support Equalization is another method proposed which focuses on eliminating low frequency rules at the local sites itself thus reducing the rules by a significant amount.
Abstract: A logic model for analyzing complex systems- stability
is very useful to many areas of sciences. In the real world, we are
enlightened from some natural phenomena such as “biosphere", “food
chain", “ecological balance" etc. By research and practice, and taking
advantage of the orthogonality and symmetry defined by the theory of
multilateral matrices, we put forward a logic analysis model of
stability of complex systems with three relations, and prove it by
means of mathematics. This logic model is usually successful in
analyzing stability of a complex system. The structure of the logic
model is not only clear and simple, but also can be easily used to
research and solve many stability problems of complex systems. As an
application, some examples are given.
Abstract: This paper addresses an efficient technique to embed and detect digital fingerprint code. Orthogonal modulation method is a straightforward and widely used approach for digital fingerprinting but shows several limitations in computational cost and signal efficiency. Coded modulation method can solve these limitations in theory. However it is difficult to perform well in practice if host signals are not available during tracing colluders, other kinds of attacks are applied, and the size of fingerprint code becomes large. In this paper, we propose a hybrid modulation method, in which the merits of or-thogonal modulation and coded modulation method are combined so that we can achieve low computational cost and high signal efficiency. To analyze the performance, we design a new fingerprint code based on GD-PBIBD theory and modulate this code into images by our method using spread-spectrum watermarking on frequency domain. The results show that the proposed method can efficiently handle large fingerprint code and trace colluders against averaging attacks.
Abstract: The kinematics of manipulators is a central problem in the automatic control of robot manipulators. Theoretical background for the analysis of the 5 Dof Lynx-6 educational Robot Arm kinematics is presented in this paper. The kinematics problem is defined as the transformation from the Cartesian space to the joint space and vice versa. The Denavit-Harbenterg (D-H) model of representation is used to model robot links and joints in this study. Both forward and inverse kinematics solutions for this educational manipulator are presented, An effective method is suggested to decrease multiple solutions in inverse kinematics. A visual software package, named MSG, is also developed for testing Motional Characteristics of the Lynx-6 Robot arm. The kinematics solutions of the software package were found to be identical with the robot arm-s physical motional behaviors.
Abstract: Supplier selection, in real situation, is affected by
several qualitative and quantitative factors and is one of the most
important activities of purchasing department. Since at the time of
evaluating suppliers against the criteria or factors, decision makers
(DMS) do not have precise, exact and complete information, supplier
selection becomes more difficult. In this case, Grey theory helps us
to deal with this problem of uncertainty. Here, we apply Technique
for Order Preference by Similarity to Ideal Solution (TOPSIS)
method to evaluate and select the best supplier by using interval
fuzzy numbers. Through this article, we compare TOPSIS with some
other approaches and afterward demonstrate that the concept of
TOPSIS is very important for ranking and selecting right supplier.
Abstract: Supplementation of palm vitamin E has been reported
to prevent loss of bone density in ovariectomised female rats. The
mechanism by which palm vitamin E exerts these effects is still
unknown. We hypothesized that palm vitamin E may act by
preventing the protein expression changes. Two dimensional poly
acyrilamide gel electrophoresis (2-D PAGE) and PD Quest software
genomic solutions Investigator (proteomics) was used to analyze the
differential protein expression profile in femoral and humeri bones
harvested from three groups of rats; sham-operated rats (SO),
ovariectomised rats (Ovx) and ovariectomised rats supplemented for
2 months with palm vitamin E. The results showed that there were
over 300 valued spot on each of the groups PVE and OVX as
compared to about 200 in SO. Comparison between the differential
protein expression between OVX and PVE groups showed that ten
spots were down –regulated in OVX but up-regulated in PVE. The
ten differential spots were separately named P1-P10. The
identification and understanding of the pathway of the differential
protein expression among the groups is ongoing and may account for
the molecular mechanism through which palm vitamin E exert its
anti-osteoporotic effect.
Abstract: This paper presents a solution for ceramic cutting tools availability in interrupted machining. Experiments were performed on a special fixture – the interrupted cut simulator. This fixture was constructed at our Department of Machining and Assembly within the scope of a project by the Czech Science Foundation. The goals of the tests were to contribute to the wider usage of these cutting materials in machining, especially in interrupted machining. Through the centuries, producers of ceramic cutting tools have taken big steps forward. Namely, increasing durability in maintaining high levels of strength and hardness lends an advantage. Some producers of these materials advise cutting inserts for interrupted machining at the present time [1, 2].
Abstract: This research work proposes a model of network security systems aiming to prevent production system in a data center from being attacked by intrusions. Conceptually, we introduce a decoy system as a part of the security system for luring intrusions, and apply network intrusion detection (NIDS), coupled with the decoy system to perform intrusion prevention. When NIDS detects an activity of intrusions, it will signal a redirection module to redirect all malicious traffics to attack the decoy system instead, and hence the production system is protected and safe. However, in a normal situation, traffic will be simply forwarded to the production system as usual. Furthermore, we assess the performance of the model with various bandwidths, packet sizes and inter-attack intervals (attacking frequencies).
Abstract: Software Architecture plays a key role in software development but absence of formal description of Software Architecture causes different impede in software development. To cope with these difficulties, ontology has been used as artifact. This paper proposes ontology for Software Architectural design based on IEEE model for architecture description and Kruchten 4+1 model for viewpoints classification. For categorization of style and views, ISO/IEC 42010 has been used. Corpus method has been used to evaluate ontology. The main aim of the proposed ontology is to classify and locate Software Architectural design information.
Abstract: There are many views on how human decision makers behave. In this work, the Justices of the United States Supreme Court will be viewed in terms of constrained maximization and cognitivecybernetic theory. This paper will integrate research in such fields as law, political science, psychology, economics and decision making theory. It will be argued that due to its heavy workload, the Supreme Court is forced to make decisions in a boundedly rational manner. The ideas and theory put forward here will be tested in the area of the Court’s decisions involving religion. Therefore, the cases involving the U.S. Constitution’s Free Exercise Clause and Establishment Clause will be analyzed. Also, variables such as the U.S. government’s involvement in these cases will be considered. The years to be studied will be 1987-2011.
Abstract: In this paper we compare the accuracy of data mining
methods to classifying students in order to predicting student-s class
grade. These predictions are more useful for identifying weak
students and assisting management to take remedial measures at early
stages to produce excellent graduate that will graduate at least with
second class upper. Firstly we examine single classifiers accuracy on
our data set and choose the best one and then ensembles it with a
weak classifier to produce simple voting method. We present results
show that combining different classifiers outperformed other single
classifiers for predicting student performance.
Abstract: This paper describes the modeling and simulation of an
underwater robot glider used in the shallow-water environment. We
followed the Equations of motion derived by [2] and simplified
dynamic Equations of motion of an underwater glider according to our
underwater glider. A simulation code is built and operated in the
MATLAB Simulink environment so that we can make improvements
to our testing glider design. It may be also used to validate a robot
glider design.
Abstract: Documents retrieval in Information Retrieval
Systems (IRS) is generally about understanding of
information in the documents concern. The more the system
able to understand the contents of documents the more
effective will be the retrieval outcomes. But understanding of the
contents is a very complex task. Conventional IRS apply algorithms
that can only approximate the meaning of document contents through
keywords approach using vector space model. Keywords may be
unstemmed or stemmed. When keywords are stemmed and conflated
in retrieving process, we are a step forwards in applying semantic
technology in IRS. Word stemming is a process in morphological
analysis under natural language processing, before syntactic and
semantic analysis. We have developed algorithms for Malay and
Arabic and incorporated stemming in our experimental systems in
order to measure retrieval effectiveness. The results have shown that
the retrieval effectiveness has increased when stemming is used in
the systems.
Abstract: The agriculture lignocellulosic by-products are receiving increased attention, namely in the search for filter materials that retain contaminants from water. These by-products, specifically almond and hazelnut shells are abundant in Portugal once almond and hazelnuts production is a local important activity. Hazelnut and almond shells have as main constituents lignin, cellulose and hemicelluloses, water soluble extractives and tannins. Along the adsorption of heavy metals from contaminated waters, water soluble compounds can leach from shells and have a negative impact in the environment. Usually, the chemical characterization of treated water by itself may not show environmental impact caused by the discharges when parameters obey to legal quality standards for water. Only biological systems can detect the toxic effects of the water constituents. Therefore, the evaluation of toxicity by biological tests is very important when deciding the suitability for safe water discharge or for irrigation applications.
The main purpose of the present work was to assess the potential impacts of waters after been treated for heavy metal removal by hazelnut and almond shells adsorption systems, with short term acute toxicity tests.
To conduct the study, water at pH 6 with 25 mg.L-1 of lead, was treated with 10 g of shell per litre of wastewater, for 24 hours. This procedure was followed for each bark. Afterwards the water was collected for toxicological assays; namely bacterial resistance, seed germination, Lemna minor L. test and plant grow. The effect in isolated bacteria strains was determined by disc diffusion method and the germination index of seed was evaluated using lettuce, with temperature and humidity germination control for 7 days. For aquatic higher organism, Lemnas were used with 4 days contact time with shell solutions, in controlled light and temperature. For terrestrial higher plants, biomass production was evaluated after 14 days of tomato germination had occurred in soil, with controlled humidity, light and temperature.
Toxicity tests of water treated with shells revealed in some extent effects in the tested organisms, with the test assays showing a close behaviour as the control, leading to the conclusion that its further utilization may not be considered to create a serious risk to the environment.
Abstract: With the development of ubiquitous computing,
current user interaction approaches with keyboard, mouse and pen
are not sufficient. Due to the limitation of these devices the useable
command set is also limited. Direct use of hands as an input device is
an attractive method for providing natural Human Computer
Interaction which has evolved from text-based interfaces through 2D
graphical-based interfaces, multimedia-supported interfaces, to fully
fledged multi-participant Virtual Environment (VE) systems.
Imagine the human-computer interaction of the future: A 3Dapplication
where you can move and rotate objects simply by moving
and rotating your hand - all without touching any input device. In this
paper a review of vision based hand gesture recognition is presented.
The existing approaches are categorized into 3D model based
approaches and appearance based approaches, highlighting their
advantages and shortcomings and identifying the open issues.
Abstract: Texture information plays increasingly an important
role in remotely sensed imagery classification and many pattern
recognition applications. However, the selection of relevant textural
features to improve this classification accuracy is not a straightforward
task. This work investigates the effectiveness of two Mutual
Information Feature Selector (MIFS) algorithms to select salient
textural features that contain highly discriminatory information for
multispectral imagery classification. The input candidate features are
extracted from a SPOT High Resolution Visible(HRV) image using
Wavelet Transform (WT) at levels (l = 1,2).
The experimental results show that the selected textural features
according to MIFS algorithms make the largest contribution to
improve the classification accuracy than classical approaches such
as Principal Components Analysis (PCA) and Linear Discriminant
Analysis (LDA).
Abstract: COPD is characterized by loss of elastic fibers from
small airways and alveolar walls, with the decrease in elastin
increasing with disease severity. It is unclear why there is a lack of
repair of elastic fibers. We have examined fibroblasts cultured from
lung tissue from normal and COPD subjects to determine if the
secretory profile explains lack of tissue repair. In this study,
fibroblasts were cultured from lung parenchyma of bronchial
carcinoma patients with varying degrees of COPD; controls
(non-COPD, n=5), mild COPD (GOLD 1, n=5) and moderate-severe
COPD (GOLD 2-3, n=12). Measurements were made of proliferation,
senescence-associated beta-galactosidase-1, mRNA expression of
IL-6, IL-8, MMP-1, tropoelastin and versican, and protein levels for
IL-6, IL-8, PGE2, tropoelastin, insoluble elastin, and versican. It was
found that GOLD 2-3 fibroblasts proliferated more slowly (p
Abstract: Decision Feedback equalizers (DFEs) usually outperform linear equalizers for channels with intersymbol interference. However, the DFE performance is highly dependent on the availability of reliable past decisions. Hence, in coded systems, where reliable decisions are only available after decoding the full block, the performance of the DFE will be affected. A symbol based DFE is a DFE that only uses the decision after the block is decoded. In this paper we derive the optimal settings of both the feedforward and feedback taps of the symbol based equalizer. We present a novel symbol based DFE filterbank, and derive its taps optimal settings. We also show that it outperforms the classic DFE in terms of complexity and/or performance.