Abstract: Identifying protein coding regions in DNA sequences is a basic step in the location of genes. Several approaches based on signal processing tools have been applied to solve this problem, trying to achieve more accurate predictions. This paper presents a new predictor that improves the efficacy of three techniques that use the Fourier Transform to predict coding regions, and that could be computed using an algorithm that reduces the computation load. Some ideas about the combination of the predictor with other methods are discussed. ROC curves are used to demonstrate the efficacy of the proposed predictor, based on the computation of 25 DNA sequences from three different organisms.
Abstract: Recent developments in automotive technology are focused on economy, comfort and safety. Vehicle tracking and collision detection systems are attracting attention of many investigators focused on safety of driving in the field of automotive mechatronics. In this paper, a vision-based vehicle detection system is presented. Developed system is intended to be used in collision detection and driver alert. The system uses RGB images captured by a camera in a car driven in the highway. Images captured by the moving camera are used to detect the moving vehicles in the image. A vehicle ahead of the camera is detected in daylight conditions. The proposed method detects moving vehicles by subtracting successive images. Plate height of the vehicle is determined by using a plate recognition algorithm. Distance of the moving object is calculated by using the plate height. After determination of the distance of the moving vehicle relative speed of the vehicle and Time-to-Collision are calculated by using distances measured in successive images. Results obtained in road tests are discussed in order to validate the use of the proposed method.
Abstract: Point quad tree is considered as one of the most
common data organizations to deal with spatial data & can be used to
increase the efficiency for searching the point features. As the
efficiency of the searching technique depends on the height of the
tree, arbitrary insertion of the point features may make the tree
unbalanced and lead to higher time of searching. This paper attempts
to design an algorithm to make a nearly balanced quad tree. Point
pattern analysis technique has been applied for this purpose which
shows a significant enhancement of the performance and the results
are also included in the paper for the sake of completeness.
Abstract: This paper seeks to give a general idea of the universe of project portfolio management, from its multidisciplinary nature, to the many challenges it raises, passing through the different techniques, models and tools used to solve the multiple problems known. It is intended to contribute to the clarification, with great depth, of the impacts and relationships involved in managing the projects- portfolio. It aims at proposing a technique for the project alignment with the organisational strategy, in order to select projects that later on will be considered in the analysis and selection of the portfolio. We consider the development of a methodology for assessing the project alignment index very relevant in the global market scenario. It can help organisations to gain a greater awareness of market dynamics, speed up the decision process and increase its consistency, thus enabling the strategic alignment and the improvement of the organisational performance.
Abstract: The noticeable advance in the area of computer technology has paved the way for the invention of powerful mobile devices. However, limited storage, short battery life, and relatively low computational power define the major problems of such devices. Due to the ever increasing computational requirements, such devices may fail to process needed tasks under certain constraints. One of the proposed solutions to this drawback is the introduction of Collaborative Computing, a new concept dealing with the distribution of computational tasks amongst several handhelds. This paper introduces the basics of Collaborative Computing, and proposes a new protocol that aims at managing and optimizing computing tasks in Ad-Hoc Collaborative Computing Environments.
Abstract: This paper addresses a current problem that occurs among Thai internet service providers with regard to bandwidth network quality management. The IPSTAR department of Telecom Organization of Thailand public company (TOT); the largest internet service provider in Thailand, is the case study to analyze the problem that exists. The Internet bandwidth network quality management (iBWQM) framework is mainly applied to the problem that has been found. Bandwidth management policy (BMP) and quality of service (QoS) are two antecedents of iBWQM. This paper investigates internet user behavior, marketing demand and network operation views in order to determine bandwidth management policy (e.g. quota management, scheduling and malicious management). The congestion of bandwidth is also analyzed to enhance quality of service (QoS). Moreover, the iBWQM framework is able to improve the quality of service and increase bandwidth utilization, minimize complaint rate concerns to slow speed, and provide network planning guidelines through Thai Internet services providers.
Abstract: Active network was developed to solve the problem of
the current sharing-based network–difficulty in applying new
technology, service or standard, and duplicated operation at several
protocol layers. Active network can transport the packet loaded with
the executable codes, which enables to change the state of the network
node. However, if the network node is placed in the sharing-based
network, security and safety issues should be resolved. To satisfy this
requirement, various security aspects are required such as
authentication, authorization, confidentiality and integrity. Among
these security components, the core factor is the encryption key. As a
result, this study is designed to propose the scheme that manages the
encryption key, which is used to provide security of the
comprehensive active directory, based on the domain.
Abstract: The home in these days has not one computer connected to the Internet but rather a network of many devices within the home, and that network might be connected to the Internet. In such an environment, the potential for attacks is greatly increased. The general security technology can not apply because of the use of various wired and wireless network, middleware and protocol in digital home environment and a restricted system resource of home information appliances. To offer secure home services home network environments have need of access control for various home devices and information when users want to access. Therefore home network access control for user authorization is a very important issue. In this paper we propose access control model using RBAC in home network environments to provide home users with secure home services.
Abstract: Innovations, especially technological, are considered
key-drivers for sustainable economic growth and competitiveness in
the globalised world. As such they should also play an important role
in the process of economical convergence inside the EU.
Unfortunately, the problem of insufficient innovation performance
concerns around half of the EU countries. Poland shows that a lack of
a consistent high-tech financing system constitutes a serious obstacle
for the development of innovative firms. In this article we will
evaluate these questions referring to the example of Ammono S.A., a
Polish company established to develop and commercialise an original
technology for the production of bulk GaN crystals. We will focus on
its efforts to accumulate the financial resources necessary at different
stages of its development. The purpose of this article is to suggest
possible ways to improve the national innovative system, which
would make it more competent in generating high-tech leaders.
Abstract: Summarizing skills have been introduced to English
syllabus in secondary school in Malaysia to evaluate student-s comprehension for a given text where it requires students to employ several strategies to produce the summary. This paper reports on our effort to develop a computer-based summarization assessment system
that detects the strategies used by the students in producing their
summaries. Sentence decomposition of expert-written summaries is
used to analyze how experts produce their summary sentences. From
the analysis, we identified seven summarizing strategies and their
rules which are then transformed into a set of heuristic rules on how
to determine the summarizing strategies. We developed an algorithm
based on the heuristic rules and performed some experiments to
evaluate and support the technique proposed.
Abstract: Service discovery is a very important component of Service Oriented Architectures (SOA). This paper presents two alternative approaches to customise the query results of private service registry such as Universal Description, Discovery and Integration (UDDI). The customisation is performed based on some pre-defined and/or real-time changing parameters. This work identifies the requirements, designs and additional mechanisms that must be applied to UDDI in order to support this customisation capability. We also detail the implements of the approaches and examine its performance and scalability. Based on our experimental results, we conclude that both approaches can be used to customise registry query results, but by storing personalization parameters in external resource will yield better performance and but less scalable when size of query results increases. We believe these approaches when combined with semantics enabled service registry will enhance the service discovery methods within a private UDDI registry environment.
Abstract: An Advance Driver Assistance System (ADAS) is a computer system on board a vehicle which is used to reduce the risk of vehicular accidents by monitoring factors relating to the driver, vehicle and environment and taking some action when a risk is identified. Much work has been done on assessing vehicle and environmental state but there is still comparatively little published work that tackles the problem of driver state. Visual attention is one such driver state. In fact, some researchers claim that lack of attention is the main cause of accidents as factors such as fatigue, alcohol or drug use, distraction and speeding all impair the driver-s capacity to pay attention to the vehicle and road conditions [1]. This seems to imply that the main cause of accidents is inappropriate driver behaviour in cases where the driver is not giving full attention while driving. The work presented in this paper proposes an ADAS system which uses an image based template matching algorithm to detect if a driver is failing to observe particular windscreen cells. This is achieved by dividing the windscreen into 24 uniform cells (4 rows of 6 columns) and matching video images of the driver-s left eye with eye-gesture templates drawn from images of the driver looking at the centre of each windscreen cell. The main contribution of this paper is to assess the accuracy of this approach using Receiver Operating Characteristic analysis. The results of our evaluation give a sensitivity value of 84.3% and a specificity value of 85.0% for the eye-gesture template approach indicating that it may be useful for driver point of regard determinations.
Abstract: power-line networks are promise infrastructure for
broadband services provision to end users. However, the network
performance is affected by stochastic channel changing which is due
to load impedances, number of branches and branched line lengths. It
has been proposed that multi-carrier modulations techniques such as
orthogonal frequency division multiplexing (OFDM), Multi-Carrier
Spread Spectrum (MC-SS), wavelet OFDM can be used in such
environment. This paper investigates the performance of different
indoor topologies of power-line networks that uses MC-SS
modulation scheme.It is observed that when a branch is added in the
link between sending and receiving end of an indoor channel an
average of 2.5dB power loss is found. In additional, when the branch
is added at a node an average of 1dB power loss is found.
Additionally when the terminal impedances of the branch change
from line characteristic impedance to impedance either higher or
lower values the channel performances were tremendously improved.
For example changing terminal load from characteristic impedance
(85 .) to 5 . the signal to noise ratio (SNR) required to attain the
same performances were decreased from 37dB to 24dB respectively.
Also, changing the terminal load from channel characteristic
impedance (85 .) to very higher impedance (1600 .) the SNR
required to maintain the same performances were decreased from
37dB to 23dB. The result concludes that MC-SS performs better
compared with OFDM techniques in all aspects and especially when
the channel is terminated in either higher or lower impedances.
Abstract: This paper explores an application of an adaptive learning mechanism for robots based on the natural immune system. Most of the research carried out so far are based either on the innate or adaptive characteristics of the immune system, we present a combination of these to achieve behavior arbitration wherein a robot learns to detect vulnerable areas of a track and adapts to the required speed over such portions. The test bed comprises of two Lego robots deployed simultaneously on two predefined near concentric tracks with the outer robot capable of helping the inner one when it misaligns. The helper robot works in a damage-control mode by realigning itself to guide the other robot back onto its track. The panic-stricken robot records the conditions under which it was misaligned and learns to detect and adapt under similar conditions thereby making the overall system immune to such failures.
Abstract: The gel-supported precipitation (GSP) process can be
used to make spherical particles (spherules) of nuclear fuel,
particularly for very high temperature reactors (VHTR) and even for
implementing the process called SPHEREPAC. In these different
cases, the main characteristics are the sphericity of the particles to be
manufactured and the control over their grain size. Nonetheless,
depending on the specifications defined for these spherical particles,
the GSP process has intrinsic limits, particularly when fabricating
very small particles. This paper describes the use of secondary
fragmentation (water, water/PVA and uranyl nitrate) on solid
surfaces under varying temperature and vibration conditions to assess
the relevance of using this new technique to manufacture very small
spherical particles by means of a modified GSP process. The
fragmentation mechanisms are monitored and analysed, before the
trends for its subsequent optimised application are described.
Abstract: The whole-cell protein-profiling technique was
evaluated for studying differences in banding pattern of three
different species of Cyanobacteria i.e. Anabaena fertilissima,
Aulosira fertilissima and Westiellopsis prolifica under the influence
of four different pesticides-2,4-D (Ethyl Ester of 2,4-Dichloro
Phenoxy Acetic Acid), Pencycuron (N-[(4-chlorophenyl)methyl]-Ncyclopentyl-
N'–phenylurea), Endosulfan (6,7,8,9,10,10hexachloro-
1,5,5a,6,9,9a-hexahydro-6,9-methano-2,4,3-benzodioxathiepine-3-
oxide) and Tebuconazole (1-(4-Chlorophenyl)-4,4-dimethyl-3-(1,2,4-
triazol-1-ylmethyl)pentan-3-ol). Whole-cell extracts were obtained by
sonication treatment (Sonifier cell disruptor -Branson Digital Sonifier
S-450D, USA) and were analyzed by sodium dodecyl sulfate
polyacrylamide gel electrophoresis (SDS-PAGE). SDS-PAGE
analyses of the total protein profile of Anabaena fertilissima,
Aulosira fertilissima and Westiellopsis prolifica showed a linear
decrease in the protein content with increasing pesticide stress when
administered to different concentrations of 2, 4-D, Pencycuron,
Endosulfan and Tebuconazole. The results indicate that different
stressors exert specific effects on cyanobacterial protein synthesis.
Abstract: Protection of slope and embankment from erosion has
become an important issue in Bangladesh. The constructions of
strong structures require large capital, integrated designing, high
maintenance cost. Strong structure methods have negative impact on
the environment and sometimes not function for the design period.
Plantation of vetiver system along the slopes is an alternative
solution. Vetiver not only serves the purpose of slope protection but
also adds green environment reducing pollution. Vetiver is available
in almost all the districts of Bangladesh. This paper presents the
application of vetiver system with geo-jute, for slope protection and
erosion control of embankments and slopes. In-situ shear tests have
been conducted on vetiver rooted soil system to find the shear
strength. The shear strength and effective soil cohesion of vetiver
rooted soil matrix are respectively 2.0 times and 2.1 times higher than
that of the bared soil. Similar trends have been found in direct shear
tests conducted on laboratory reconstituted samples. Field trials have
been conducted in road embankment and slope protection with
vetiver at different sites. During the time of vetiver root growth the
soil protection has been accomplished by geo-jute. As the geo-jute
degrades with time, vetiver roots grow and take over the function of
geo-jutes. Slope stability analyses showed that vegetation increase
the factor of safety significantly.
Abstract: The major focus of this work was to characterize hydrodynamics in a packed-bed with and without static mixer by using Computational Fluid Dynamic (CFD). The commercial software: COMSOL MULTIPHYSICSTM Version 3.3 was used to simulate flow fields of mixed-gas reactants i.e. CO and H2. The packed-bed was a single tube with the inside diameter of 0.8 cm and the length of 1.2 cm. The static mixer was inserted inside the tube. The number of twisting elements was 1 with 0.8 cm in diameter and 1.2 cm in length. The packed-bed with and without static mixer were both packed with approximately 700 spherical structures representing catalyst pellets. Incompressible Navier-Stokes equations were used to model the gas flow inside the beds at steady state condition, in which the inlet Reynolds Number (Re) was 2.31. The results revealed that, with the insertion of static mixer, the gas was forced to flow radially inward and outward between the central portion of the tube and the tube wall. This could help improving the overall performance of the packed-bed, which could be utilized for heterogeneous catalytic reaction such as reforming and Fischer- Tropsch reactions.
Abstract: In this paper, FinFET devices are analyzed with
emphasis on sub-threshold leakage current control. This is achieved
through proper biasing of the back gate, and through the use of
asymmetric work functions for the four terminal FinFET devices. We
are also examining different configurations of multiplexers and XOR
gates using transistors of symmetric and asymmetric work functions.
Based on extensive characterization data for MUX circuits, our
proposed configuration using symmetric devices lead to leakage
current and delay improvements of 65% and 47% respectively
compared to results in the literature. For XOR gates, a 90%
improvement in the average leakage current is achieved by using
asymmetric devices. All simulations are based on a 25nm FinFET
technology using the University of Florida UFDG model.
Abstract: Sinc-collocation scheme is one of the new techniques
used in solving numerical problems involving integral equations. This
method has been shown to be a powerful numerical tool for finding
fast and accurate solutions. So, in this paper, some properties of the
Sinc-collocation method required for our subsequent development
are given and are utilized to reduce integral equation of the first
kind to some algebraic equations. Then convergence with exponential
rate is proved by a theorem to guarantee applicability of numerical
technique. Finally, numerical examples are included to demonstrate
the validity and applicability of the technique.