Abstract: In this paper, we propose a hardware and software
design method for automotive Electronic Control Units (ECU)
considering the functional safety. The proposed ECU is considered for
the application to Electro-Mechanical Actuator systems and the
validity of the design method is shown by the application to the
Electro-Mechanical Brake (EMB) control system which is used as a
brake actuator in Brake-By-Wire (BBW) systems. The importance of a
functional safety-based design approach to EMB ECU design has been
emphasized because of its safety-critical functions, which are executed
with the aid of many electric actuators, sensors, and application
software. Based on hazard analysis and risk assessment according to
ISO26262, the EMB system should be ASIL-D-compliant, the highest
ASIL level. To this end, an external signature watchdog and an
Infineon 32-bit microcontroller TriCore are used to reduce risks
considering common-cause hardware failure. Moreover, a software
design method is introduced for implementing functional
safety-oriented monitoring functions based on an asymmetric dual
core architecture considering redundancy and diversity. The validity
of the proposed ECU design approach is verified by using the EMB
Hardware-In-the-Loop (HILS) system, which consists of the EMB
assembly, actuator ECU, a host PC, and a few debugging devices.
Furthermore, it is shown that the existing sensor fault tolerant control
system can be used more effectively for mitigating the effects of
hardware and software faults by applying the proposed ECU design
method.
Abstract: The current education system in India is adept in
equipping and assessing the scholastic development of children.
However, there is an immediate need to strengthen co-scholastic
areas like life-skills, values and attitudes to equip students to face real
life challenges. Audio-visual technology and their respective media
can make a significant contribution to a value based learning
curriculum. Thus, co-scholastic skills need to be effectively nurtured
by a medium that is entertaining and impactful. Films in general have
a tremendous impact in our society. Films with a positive message
make a formidable learning experience that can influence and inspire
generations of learners. Leveraging on this powerful medium,
EduMedia India Pvt. Ltd. has introduced School Cinema a well
researched film-based learning module supported by a fun and
exciting workbook, designed to introduce and reaffirm life-skills and
values to children, thereby having a positive influence on their
attitudes.
Abstract: This Paper proposes a new facial feature extraction approach, Wash-Hadamard Transform (WHT). This approach is based on correlation between local pixels of the face image. Its primary advantage is the simplicity of its computation. The paper compares the proposed approach, WHT, which was traditionally used in data compression with two other known approaches: the Principal Component Analysis (PCA) and the Discrete Cosine Transform (DCT) using the face database of Olivetti Research Laboratory (ORL). In spite of its simple computation, the proposed algorithm (WHT) gave very close results to those obtained by the PCA and DCT. This paper initiates the research into WHT and the family of frequency transforms and examines their suitability for feature extraction in face recognition applications.
Abstract: Coverage is one of the main research interests in wireless sensor networks (WSN), it is used to determine the quality of service (QoS) of the networks. Therefore this paper aims to review the common strategies use in solving coverage problem in WSN. The strategies studied are used during deployment phase where the coverage is calculated based on the placement of the sensors on the region of interest (ROI). The strategies reviewed are categorized into three groups based on the approaches used, namely; force based, grid based or computational geometry based approach.
Abstract: This paper applies fuzzy AHP to evaluate the service
quality of online auction. Service quality is a composition of various
criteria. Among them many intangible attributes are difficult to
measure. This characteristic introduces the obstacles for respondents
on reply in the survey. So as to overcome this problem, we invite
fuzzy set theory into the measurement of performance and use AHP in
obtaining criteria. We found the most concerned dimension of service
quality is Transaction Safety Mechanism and the least is Charge Item.
Other criteria such as information security, accuracy and information
are too vital.
Abstract: Modular multiplication is the basic operation
in most public key cryptosystems, such as RSA, DSA, ECC,
and DH key exchange. Unfortunately, very large operands
(in order of 1024 or 2048 bits) must be used to provide
sufficient security strength. The use of such big numbers
dramatically slows down the whole cipher system, especially
when running on embedded processors.
So far, customized hardware accelerators - developed on
FPGAs or ASICs - were the best choice for accelerating
modular multiplication in embedded environments. On the
other hand, many algorithms have been developed to speed
up such operations. Examples are the Montgomery modular
multiplication and the interleaved modular multiplication
algorithms. Combining both customized hardware with
an efficient algorithm is expected to provide a much faster
cipher system.
This paper introduces an enhanced architecture for computing
the modular multiplication of two large numbers X
and Y modulo a given modulus M. The proposed design is
compared with three previous architectures depending on
carry save adders and look up tables. Look up tables should
be loaded with a set of pre-computed values. Our proposed
architecture uses the same carry save addition, but replaces
both look up tables and pre-computations with an enhanced
version of sign detection techniques. The proposed architecture
supports higher frequencies than other architectures.
It also has a better overall absolute time for a single operation.
Abstract: This research details a Computational Fluid Dynamics (CFD) approach to model fluid flow in a journal bearing with 8 equispaced semi-circular axial grooves. Water is used as the lubricant and is fed from one end of the bearing to the other, under pressure. The geometry of the bearing is modeled using a commercially available modeling software GAMBIT and the flow analysis is performed using a dedicated CFD analysis software FLUENT. The pressure distribution in the bearing clearance is obtained from FLUENT for various whirl ratios and is used to calculate the hydrodynamic force components in the radial and tangential direction of the bearing. These values along with the various whirl speeds can be used to do a regression analysis to determine the stiffness and damping coefficients. The values obtained are then compared with the stiffness and damping coefficients of a 3 Axial groove water lubricated journal bearing and those obtained from a FORTRAN code for a similar bearing.
Abstract: This paper discusses a curriculum approach that will
give emphasis on practical portions of teaching network security
subjects in information and communication technology courses. As
we are well aware, the need to use a practice and application oriented
approach in education is paramount. Research on active learning and
cooperative groups have shown that students grasps more and have
more tendency towards obtaining and realizing soft skills like
leadership, communication and team work as opposed to the more
traditional theory and exam based teaching and learning. While this
teaching and learning paradigm is relatively new in Malaysia, it has
been practiced widely in the West. This paper examines a certain
approach whereby students learning wireless security are divided into
and work in small and manageable groups where there will be 2
teams which consist of black hat and white hat teams. The former
will try to find and expose vulnerabilities in a wireless network while
the latter will try their best to prevent such attacks on their wireless
networks using hardware, software, design and enforcement of
security policy and etc. This paper will try to show that the approach
taken plus the use of relevant and up to date software and hardware
and with suitable environment setting will hopefully expose students
to a more fruitful outcome in terms of understanding of concepts,
theories and their motivation to learn.
Abstract: Most of the commercial gluten free products are
nutritionally inferior when compared to gluten containing
counterparts as manufacturers most often use the refined flours and
starches. So it is possible that people on gluten free diet have low
intake of fibre content. The foxtail millet flour and copra meal are
gluten free and have high fibre and protein contents. The formulation
of fibre rich gluten free cookies was optimized by response surface
methodology considering independent process variables as proportion
of Foxtail millet (Setaria italica) flour in mixed flour, fat content and
guar gum. The sugar, sodium chloride, sodium bicarbonates and
water were added in fixed proportion as 60, 1.0, 0.4 and 20% of
mixed flour weight, respectively. Optimum formulation obtained for
maximum spread ratio, fibre content, surface L-value, overall
acceptability and minimum breaking strength were 80% foxtail millet
flour in mixed flour, 42.8 % fat content and 0.05% guar gum.
Abstract: 4G Communication Networks provide heterogeneous
wireless technologies to mobile subscribers through IP based
networks and users can avail high speed access while roaming across
multiple wireless channels; possible by an organized way to manage
the Quality of Service (QoS) functionalities in these networks. This
paper proposes the idea of developing a novel QoS optimization
architecture that will judge the user requirements and knowing peak
times of services utilization can save the bandwidth/cost factors. The
proposed architecture can be customized according to the network
usage priorities so as to considerably improve a network-s QoS
performance.
Abstract: A real time distributed computing has
heterogeneously networked computers to solve a single problem. So
coordination of activities among computers is a complex task and
deadlines make more complex. The performances depend on many
factors such as traffic workloads, database system architecture,
underlying processors, disks speeds, etc. Simulation study have been
performed to analyze the performance under different transaction
scheduling: different workloads, arrival rate, priority policies,
altering slack factors and Preemptive Policy. The performance metric
of the experiments is missed percent that is the percentage of
transaction that the system is unable to complete. The throughput of
the system is depends on the arrival rate of transaction. The
performance can be enhanced with altering the slack factor value.
Working on slack value for the transaction can helps to avoid some
of transactions from killing or aborts. Under the Preemptive Policy,
many extra executions of new transactions can be carried out.
Abstract: The present investigation aimed to study the
histomorphometric characterizations of the thyroid gland of the duck.
Five adult male and five adult female ducks were used in the
experiment. Results showed that the overall histological structure of
the thyroid gland of the duck were similar to those of the other
vertebrae. The gland consisted of roughly spherical randomly
distributed micro and macrofollicles with very little interstitial tissue
between them. Each follicle is lined by a single layer of epithelial
cells enclosing a cavity, the follicular cavity, which is filled with
colloid. Ultrastructural findings showed that the apical surface of the
follicular cells bears a variable number of short, irregularly
distributed microvilli which are apparently more numerous on the
columnar cells than on the lower, relatively inactive cells.
Mitochondria and rough endoplasmic reticulum occupy the
subnuclear region of the follicular cell, whereas the Golgi complex,
free ribosomes and colloid droplets were found in the apical
cytoplasm. At light or electron microscopic levels, there was no sex
difference in histomorphometric characteristics of the thyroid
glands.ls.
Abstract: This paper compares the heuristic Global Search
Techniques; Genetic Algorithm, Particle Swarm Optimization,
Simulated Annealing, Generalized Pattern Search, genetic algorithm
hybridized with Nelder–Mead and Generalized pattern search
technique for tuning of fuzzy PID controller for Puma 560. Since the
actual control is in joint space ,inverse kinematics is used to generate
various joint angles correspoding to desired cartesian space
trajectory. Efficient dynamics and kinematics are modeled on Matlab
which takes very less simulation time. Performances of all the tuning
methods with and without disturbance are compared in terms of ITSE
in joint space and ISE in cartesian space for spiral trajectory tracking.
Genetic Algorithm hybridized with Generalized Pattern Search is
showing best performance.
Abstract: In films, visual effects have played the role of
expressing realities more realistically or describing imaginations as if
they are real. Such images are immediated images representing
realism, and the logic of immediation for the reality of images has
been perceived dominant in visual effects. In order for immediation to
have an identity as immediation, there should be the opposite concept
hypermediation.
In the mid 2000s, hypermediated images were settled as a code of
mass culture in Asia. Thus, among Asian films highly popular in those
days, this study selected five displaying hypermediated images – 2 Korean, 2 Japanese, and 1 Thailand movies – and examined the
semiotic meanings of such images using Roland Barthes- directional and implicated meaning analysis and Metz-s paradigmatic analysis
method, focusing on how hypermediated images work in the general
context of the films, how they are associated with spaces, and what
meanings they try to carry.
Abstract: The intermittent connectivity modifies the “always
on" network assumption made by all the distributed query processing
systems. In modern- day systems, the absence of network
connectivity is considered as a fault. Since the last upload, it might
not be feasible to transmit all the data accumulated right away over
the available connection. It is possible that vital information may be
delayed excessively when the less important information takes place
of the vital information. Owing to the restricted and uneven
bandwidth, it is vital that the mobile nodes make the most
advantageous use of the connectivity when it arrives. Hence, in order
to select the data that needs to be transmitted first, some sort of data
prioritization is essential. A continuous query processing system for
intermittently connected mobile networks that comprises of a delaytolerant
continuous query processor distributed across the mobile
hosts has been proposed in this paper. In addition, a mechanism for
prioritizing query results has been designed that guarantees enhanced
accuracy and reduced delay. It is illustrated that our architecture
reduces the client power consumption, increases query efficiency by
the extensive simulation results.
Abstract: The study will search the level of existence of the
sweethearting in Saudi Arabia's Supermarkets in Riyadh.
Sweethearting occurs when frontline workers give unauthorized free
or uncounted goods and services to customer-s conspirators. The
store managers and /or security managers were asked about the
sweethearting that occurs in the supermarkets. The characteristics of
sweethearting in Riyadh stores were investigated. Two independent
variables were related to the report of sweethearting. These
independent variables are: The effect of store environment on
sweethearting and the security techniques and loss prevention
electronics techniques used. This study expected to shed the light
about the level of sweethearting in Saudi Arabia and the factors
behind it. This study will serve as an exploratory study for such
phenomenon in Saudi Arabia as well as both descriptive for the
characteristics of sweethearting and explanatory study to link
between the environmental and security systems factors to
sweethearting.
Abstract: The culture of riding heavy motorcycles originates
from advanced countries and mainly comes from Europe, North
America, and Japan. Heavy duty motorcycle riders are different from
people who view motorcycles as a convenient mean of transportation.
They regard riding them as a kind of enjoyment and high-level taste.
The activities of riding heavy duty motorcycles have formes a
distinctive landscape in domestic land in Taiwan. Previous studies
which explored motorcycle culture in Taiwan still focused on the
objects of motorcycle engine displacement under 50 cc.. The study
aims to study the heavy duty motorcycles of engine displacement over
550 cc. and explores where their attractiveness is. For finding the
attractiveness of heavy duty motorcycle, the study chooses Miryoku
Engineering (Preference-Based Design) approach. Two steps are
adopted to proceed the research. First, through arranging the letters
obtained from interviewing experts, EGM (The Evaluation Grid
Method) was applied to find out the structure of attractiveness. The
attractive styles are eye-dazzling, leisure, classic, and racing
competitive styles. Secondarily, Quantification Theory Type I analysis
was adopted as a tool for analyzing the importance of attractiveness.
The relationship between style and attractive parts was also discussed.
The results could contribute to the design and research development of
heavy duty motorcycle industry in Taiwan.
Abstract: In this research work, a novel parallel manipulator
with high positioning and orienting rate is introduced. This
mechanism has two rotational and one translational degree of
freedom. Kinematics and Jacobian analysis are investigated.
Moreover, workspace analysis and optimization has been performed
by using genetic algorithm toolbox in Matlab software. Because of
decreasing moving elements, it is expected much more better
dynamic performance with respect to other counterpart mechanisms
with the same degrees of freedom. In addition, using couple of
cylindrical and revolute joints increased mechanism ability to have
more extended workspace.
Abstract: The objective of this study is to identify the factors
that influence the online purchasing loyalty for Thai herbal products.
Survey research is used to gather data from Thai herb online
merchants to assess factors that have impacts on enhancing loyalty.
Data were collected from 300 online customers who had experience
in online purchasing of Thai Herbal products. Prior experience
consists of data from previous usage of online herbs, herb purchase
and internet usage. E-Quality data consists of information quality,
system quality, service quality and the product quality of Thai herbal
products sold online. The results suggest that prior experience, Equality,
attitude toward purchase and trust in online merchant have
major impacts on loyalty. The good attitude and E-Quality of
purchasing Thai herbal product online are the most significant
determinants affecting loyalty.
Abstract: Intelligent Video-Surveillance (IVS) systems are
being more and more popular in security applications. The analysis
and recognition of abnormal behaviours in a video sequence has
gradually drawn the attention in the field of IVS, since it allows
filtering out a large number of useless information, which guarantees
the high efficiency in the security protection, and save a lot of human
and material resources. We present in this paper ADABeV, an
intelligent video-surveillance framework for event recognition in
crowded scene to detect the abnormal human behaviour. This
framework is attended to be able to achieve real-time alarming,
reducing the lags in traditional monitoring systems. This architecture
proposal addresses four main challenges: behaviour understanding in
crowded scenes, hard lighting conditions, multiple input kinds of
sensors and contextual-based adaptability to recognize the active
context of the scene.