Abstract: One of the main objectives of order reduction is to
design a controller of lower order which can effectively control the
original high order system so that the overall system is of lower
order and easy to understand. In this paper, a simple method is
presented for controller design of a higher order discrete system.
First the original higher order discrete system in reduced to a lower
order model. Then a Proportional Integral Derivative (PID)
controller is designed for lower order model. An error minimization
technique is employed for both order reduction and controller
design. For the error minimization purpose, Differential Evolution
(DE) optimization algorithm has been employed. DE method is
based on the minimization of the Integral Squared Error (ISE)
between the desired response and actual response pertaining to a
unit step input. Finally the designed PID controller is connected to
the original higher order discrete system to get the desired
specification. The validity of the proposed method is illustrated
through a numerical example.
Abstract: The purpose of this study was to investigate the religious behavior of students in high school and universality in Lamerd , a town in the south of Iran, with respect to increase in their level of education and age. The participants were 450 high school and university students in all levels from first year of junior high school
to the senior university students who were chosen through multistage
cluster sampling method and their religious behavior was
studied. Through the revised questionnaire by Nezar Alany from the University of Bahrain (r = 0/797), the religious behavior of the subjects were analyzed. Results showed that students in high school
in religious behavior were superior to the students of university (003/0>p) and there was a decline of religious behavior in junior high school third year students to second students of the same school
(042/0>p). More important is that the decrease in religious behavior was associated with increase in educational levels (017/0>p) and age (043/0>p).
Abstract: MM-Path, an acronym for Method/Message Path, describes the dynamic interactions between methods in object-oriented systems. This paper discusses the classifications of MM-Path, based on the characteristics of object-oriented software. We categorize it according to the generation reasons, the effect scope and the composition of MM-Path. A formalized representation of MM-Path is also proposed, which has considered the influence of state on response method sequences of messages. .Moreover, an automatic MM-Path generation approach based on UML Statechart diagram has been presented, and the difficulties in identifying and generating MM-Path can be solved. . As a result, it provides a solid foundation for further research on test cases generation based on MM-Path.
Abstract: The robustness of color-based signatures in the presence of a selection of representative distortions is investigated. Considered are five signatures that have been developed and evaluated within a new modular framework. Two signatures presented in this work are directly derived from histograms gathered from video frames. The other three signatures are based on temporal information by computing difference histograms between adjacent frames. In order to obtain objective and reproducible results, the evaluations are conducted based on several randomly assembled test sets. These test sets are extracted from a video repository that contains a wide range of broadcast content including documentaries, sports, news, movies, etc. Overall, the experimental results show the adequacy of color-histogram-based signatures for video fingerprinting applications and indicate which type of signature should be preferred in the presence of certain distortions.
Abstract: Energy efficiency is the key requirement in wireless sensor network as sensors are small, cheap and are deployed in very large number in a large geographical area, so there is no question of replacing the batteries of the sensors once deployed. Different ways can be used for efficient energy transmission including Multi-Hop algorithms, collaborative communication, cooperativecommunication, Beam- forming, routing algorithm, phase, frequency and time synchronization. The paper reviews the need for time synchronization and proposed a BFS based synchronization algorithm to achieve energy efficiency. The efficiency of our protocol has been tested and verified by simulation
Abstract: Decentralized Tuple Space (DTS) implements tuple
space model among a series of decentralized hosts and provides the
logical global shared tuple repository. Replication has been introduced
to promote performance problem incurred by remote tuple access. In
this paper, we propose a replication approach of DTS allowing
replication policies self-adapting. The accesses from users or other
nodes are monitored and collected to contribute the decision making.
The replication policy may be changed if the better performance is
expected. The experiments show that this approach suitably adjusts the
replication policies, which brings negligible overhead.
Abstract: This paper investigates the encryption efficiency of RC6 block cipher application to digital images, providing a new mathematical measure for encryption efficiency, which we will call the encryption quality instead of visual inspection, The encryption quality of RC6 block cipher is investigated among its several design parameters such as word size, number of rounds, and secret key length and the optimal choices for the best values of such design parameters are given. Also, the security analysis of RC6 block cipher for digital images is investigated from strict cryptographic viewpoint. The security estimations of RC6 block cipher for digital images against brute-force, statistical, and differential attacks are explored. Experiments are made to test the security of RC6 block cipher for digital images against all aforementioned types of attacks. Experiments and results verify and prove that RC6 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC6 block cipher algorithm. So, RC6 block cipher can be considered to be a real-time secure symmetric encryption for digital images.
Abstract: Vortices can develop in intakes of turbojet and turbo
fan aero engines during high power operation in the vicinity of solid
surfaces. These vortices can cause catastrophic damage to the engine.
The factors determining the formation of the vortex include both
geometric dimensions as well as flow parameters. It was shown that
the threshold at which the vortex forms or disappears is also
dependent on the initial flow condition (i.e. whether a vortex forms
after stabilised non vortex flow or vice-versa). A computational fluid
dynamics study was conducted to determine the difference in
thresholds between the two conditions. This is the first reported
numerical investigation of the “memory effect". The numerical
results reproduce the phenomenon reported in previous experimental
studies and additional factors, which had not been previously studied,
were investigated. They are the rate at which ambient velocity
changes and the initial value of ambient velocity. The former was
found to cause a shift in the threshold but not the later. It was also
found that the varying condition thresholds are not symmetrical about
the neutral threshold. The vortex to no vortex threshold lie slightly
further away from the neutral threshold compared to the no vortex to
vortex threshold. The results suggests that experimental investigation
of vortex formation threshold performed either in vortex to no vortex
conditions, or vice versa, solely may introduce mis-predictions
greater than 10%.
Abstract: Software Reusability is primary attribute of software
quality. There are metrics for identifying the quality of reusable
components but the function that makes use of these metrics to find
reusability of software components is still not clear. These metrics if
identified in the design phase or even in the coding phase can help us
to reduce the rework by improving quality of reuse of the component
and hence improve the productivity due to probabilistic increase in
the reuse level. In this paper, we have devised the framework of
metrics that uses McCabe-s Cyclometric Complexity Measure for
Complexity measurement, Regularity Metric, Halstead Software
Science Indicator for Volume indication, Reuse Frequency metric
and Coupling Metric values of the software component as input
attributes and calculated reusability of the software component. Here,
comparative analysis of the fuzzy, Neuro-fuzzy and Fuzzy-GA
approaches is performed to evaluate the reusability of software
components and Fuzzy-GA results outperform the other used
approaches. The developed reusability model has produced high
precision results as expected by the human experts.
Abstract: The use of neural networks for recognition application is generally constrained by their inherent parameters inflexibility after the training phase. This means no adaptation is accommodated for input variations that have any influence on the network parameters. Attempts were made in this work to design a neural network that includes an additional mechanism that adjusts the threshold values according to the input pattern variations. The new approach is based on splitting the whole network into two subnets; main traditional net and a supportive net. The first deals with the required output of trained patterns with predefined settings, while the second tolerates output generation dynamically with tuning capability for any newly applied input. This tuning comes in the form of an adjustment to the threshold values. Two levels of supportive net were studied; one implements an extended additional layer with adjustable neuronal threshold setting mechanism, while the second implements an auxiliary net with traditional architecture performs dynamic adjustment to the threshold value of the main net that is constructed in dual-layer architecture. Experiment results and analysis of the proposed designs have given quite satisfactory conducts. The supportive layer approach achieved over 90% recognition rate, while the multiple network technique shows more effective and acceptable level of recognition. However, this is achieved at the price of network complexity and computation time. Recognition generalization may be also improved by accommodating capabilities involving all the innate structures in conjugation with Intelligence abilities with the needs of further advanced learning phases.
Abstract: L-asparaginase was extracted from pathogenic
Escherichia coli which was isolated from urinary tract infection
patients. L-asparaginase was purified 96-fold by ultrafiltration, ion
exchange and gel filtration giving 39.19% yield with final specific
activity of 178.57 IU/mg. L-asparaginase showed 138,356±1,000
Dalton molecular weight with 31024±100 Dalton molecular mass.
Kinetic properties of enzyme resulting 1.25×10-5 mM Km and
2.5×10-3 M/min Vmax. L-asparaginase showed a maximum activity
at pH 7.5 when incubated at 37 ºC for 30 min and illustrated its full
activity (100%) after 15 min incubation at 20-37 ºC, while 70% of its
activity was lost when incubated at 60 ºC. L-asparaginase showed
cytotoxicity to U937 cell line with IC50 0.5±0.19 IU/ml, and
selectivity index (SI=7.6) about 8 time higher selectivity over the
lymphocyte cells. Therefore, the local pathogenic E. coli strains may
be used as a source of high yield of L-asparaginase to produce anti
cancer agent with high selectivity.
Abstract: Vehicular Ad-hoc Network (VANET) is taking more
attention in automotive industry due to the safety concern of human
lives on roads. Security is one of the safety aspects in VANET. To be
secure, network availability must be obtained at all times since
availability of the network is critically needed when a node sends any
life critical information to other nodes. However, it can be expected
that security attacks are likely to increase in the coming future due to
more and more wireless applications being developed and deployed
onto the well-known expose nature of the wireless medium. In this
respect, the network availability is exposed to many types of attacks.
In this paper, Denial of Service (DOS) attack on network availability
is presented and its severity level in VANET environment is
elaborated. A model to secure the VANET from the DOS attacks has
been developed and some possible solutions to overcome the attacks
have been discussed.
Abstract: This paper describes the design of new method of
propagation delay measurement in micro and nanostructures during
characterization of ASIC standard library cell. Providing more
accuracy timing information about library cell to the design team we
can improve a quality of timing analysis inside of ASIC design flow
process. Also, this information could be very useful for semiconductor
foundry team to make correction in technology process. By
comparison of the propagation delay in the CMOS element and result
of analog SPICE simulation. It was implemented as digital IP core for
semiconductor manufacturing process. Specialized method helps to
observe the propagation time delay in one element of the standard-cell
library with up-to picoseconds accuracy and less. Thus, the special
useful solutions for VLSI schematic to parameters extraction, basic
cell layout verification, design simulation and verification are
announced.
Abstract: Contact stress is an important problem in industry.
This is a problem that in the first attention may be don-t appears, but
disregard of these stresses cause a lot of damages in machines. These
stresses occur at locations such as gear teeth, bearings, cams and
between a locomotive wheel and the railroad rail. These stresses
cause failure by excessive elastic deformation, yielding and fracture.
In this paper we intend show the effective parameters in contact
stress and ponder effect of curvature. In this paper we study contact
stresses on the surface of gear teeth and compare these stresses for
four popular profiles of gear teeth (involute, cycloid, epicycloids, and
hypocycloid). We study this problem with mathematical and finite
element methods and compare these two methods on different profile
surfaces.
Abstract: The goal of a network-based intrusion detection
system is to classify activities of network traffics into two major
categories: normal and attack (intrusive) activities. Nowadays, data
mining and machine learning plays an important role in many
sciences; including intrusion detection system (IDS) using both
supervised and unsupervised techniques. However, one of the
essential steps of data mining is feature selection that helps in
improving the efficiency, performance and prediction rate of
proposed approach. This paper applies unsupervised K-means
clustering algorithm with information gain (IG) for feature selection
and reduction to build a network intrusion detection system. For our
experimental analysis, we have used the new NSL-KDD dataset,
which is a modified dataset for KDDCup 1999 intrusion detection
benchmark dataset. With a split of 60.0% for the training set and the
remainder for the testing set, a 2 class classifications have been
implemented (Normal, Attack). Weka framework which is a java
based open source software consists of a collection of machine
learning algorithms for data mining tasks has been used in the testing
process. The experimental results show that the proposed approach is
very accurate with low false positive rate and high true positive rate
and it takes less learning time in comparison with using the full
features of the dataset with the same algorithm.
Abstract: By the end of XX century in the structure of humanity some changes have been provoked: a new ethnos - Ethnos of Intellect is formed and is still being formed, beside the historical types of ethnoses: open ethnos, closed ethnos, wandering ethnos, dead ethnos, - and this event was caused by the technical progress, development of informational and transport communications, especially - by creation of Internet. The Ethnos of Intellect is something very close to the ÔÇ×Information Society“ described by J. Ellule and Y. Masuda that was regarded as the culture of XXI century, being an antithesis for technical and technicistical civilizations, but it-s necessary to indicate also the essential difference between these concepts: the Ethnos of Intellect is the antithesis of Socium. The existence of such an ethnos within human society that has already become an Information Society itself is extremely important in observing legally and informatically a new kind of reins in the hands of the political power, revealing every attempt to violate the human rights of simple citizens. A concrete example of some conjunction points of legal informatics and informatical law in a certain kind of ambiental studies of the project ''State Registre of Population'' in Russia is very eloquent.
Abstract: Information systems practitioners are frequently
required to master new technology, often without the aid of formal
training. They require the skill to manage their own learning and,
when this skill is developed in their formal training, their adaptability
to new technology may be improved. Self- directed learning is the
ability of the learner to manage his or her own learning experience
with some guidance from a facilitator. Self-directed learning skills
are best improved when practiced. This paper reflects on a critical
social research project to improve the self-directed learning skills of
fourth year Information Systems students. Critical social research
differs from other research paradigms in that the researcher is viewed
as the agent of change to achieve the desired outcome in the problem
situation.
Abstract: This paper has, as its point of departure, the foundational
axiomatic theory of E. De Giorgi (1996, Scuola Normale
Superiore di Pisa, Preprints di Matematica 26, 1), based on two
primitive notions of quality and relation. With the introduction of
a unary relation, we develop a system totally based on the sole
primitive notion of relation. Such a modification enables a definition
of the concept of dynamic unary relation. In this way we construct a
simple language capable to express other well known theories such
as Robinson-s arithmetic or a piece of a theory of concatenation. A
key role in this system plays an abstract relation designated by “( )",
which can be interpreted in different ways, but in this paper we will
focus on the case when we can perform computations and obtain
results.
Abstract: A vertical SOI-based MOSFET with trench body
structure operated as 1T DRAM cell at various temperatures has been
studied and investigated. Different operation temperatures are
assigned for the device for its performance comparison, thus the
thermal stability is carefully evaluated for the future memory device
applications. Based on the simulation, the vertical SOI-based
MOSFET with trench body structure demonstrates the electrical
characteristics properly and possess conspicuous kink effect at
various operation temperatures. Transient characteristics were also
performed to prove that its programming window values and
retention time behaviors are acceptable when the new 1T DRAM cell
is operated at high operation temperature.
Abstract: Artificial neural networks (ANN) have the ability to model input-output relationships from processing raw data. This characteristic makes them invaluable in industry domains where such knowledge is scarce at best. In the recent decades, in order to overcome the black-box characteristic of ANNs, researchers have attempted to extract the knowledge embedded within ANNs in the form of rules that can be used in inference systems. This paper presents a new technique that is able to extract a small set of rules from a two-layer ANN. The extracted rules yield high classification accuracy when implemented within a fuzzy inference system. The technique targets industry domains that possess less complex problems for which no expert knowledge exists and for which a simpler solution is preferred to a complex one. The proposed technique is more efficient, simple, and applicable than most of the previously proposed techniques.