Abstract: The advancement of smartphones, wireless
networking and Near Field Communication (NFC) technology have
opened up a new approach to indoor navigation. Although NFC
technology has been used to support electronic commerce, access
control, and ticketing, there is a lack of research work on building
NFC-based indoor navigation system for smartphone users. This
paper presents an indoor interactive navigation system (named
I2Navi) based on NFC technology for users to navigate within a
building with ease using their smartphones. The I2Navi system has
been implemented at the Faculty of Engineering (FOE), Multimedia
University (MMU) to enable students, parents, visitors who own
NFC-enabled Android smartphones to navigate themselves within the
faculty. An evaluation is carried out and the results show positive
response to the proposed indoor navigation system using NFC and
smartphone technologies.
Abstract: In this paper, the local grid refinement is focused by
using a nested grid technique. The Cartesian grid numerical method is
developed for simulating unsteady, viscous, incompressible flows
with complex immersed boundaries. A finite volume method is used in
conjunction with a two-step fractional-step procedure. The key aspects
that need to be considered in developing such a nested grid solver are
imposition of interface conditions on the inter-block and accurate
discretization of the governing equation in cells that are with the
inter-block as a control surface. A new interpolation procedure is
presented which allows systematic development of a spatial
discretization scheme that preserves the spatial accuracy of the
underlying solver. The present nested grid method has been tested by
two numerical examples to examine its performance in the two
dimensional problems. The numerical examples include flow past a
circular cylinder symmetrically installed in a Channel and flow past
two circular cylinders with different diameters. From the numerical
experiments, the ability of the solver to simulate flows with
complicated immersed boundaries is demonstrated and the nested grid
approach can efficiently speed up the numerical solutions.
Abstract: The paper presents an investigation into the role of virtual reality and web technologies in the field of distance education. Within this frame, special emphasis is given on the building of web-based virtual learning environments so as to successfully fulfill their educational objectives. In particular, basic pedagogical methods are studied, focusing mainly on the efficient preparation, approach and presentation of learning content, and specific designing rules are presented considering the hypermedia, virtual and educational nature of this kind of applications. The paper also aims to highlight the educational benefits arising from the use of virtual reality technology in medicine and study the emerging area of web-based medical simulations. Finally, an innovative virtual reality environment for distance education in medicine is demonstrated. The proposed environment reproduces conditions of the real learning process and enhances learning through a real-time interactive simulator.
Abstract: The concentrations of As, Hg, Co, Cr and Cd were
tested for each soil sample, and their spatial patterns were analyzed
by the semivariogram approach of geostatistics and geographical
information system technology. Multivariate statistic approaches
(principal component analysis and cluster analysis) were used to
identify heavy metal sources and their spatial pattern. Principal
component analysis coupled with correlation between heavy metals
showed that primary inputs of As, Hg and Cd were due to
anthropogenic while, Co, and Cr were associated with pedogenic
factors. Ordinary kriging was carried out to map the spatial patters of
heavy metals. The high pollution sources evaluated was related with
usage of urban and industrial wastewater. The results of this study
helpful for risk assessment of environmental pollution for decision
making for industrial adjustment and remedy soil pollution.
Abstract: The purpose of this study is to derive parameters
estimating for the Lyman–Kutcher–Burman (LKB) normal tissue
complication probability (NTCP) model using analysis of scintigraphy
assessments and quality of life (QoL) measurement questionnaires for
the parotid gland (xerostomia). In total, 31 patients with
head-and-neck (HN) cancer were enrolled. Salivary excretion factor
(SEF) and EORTC QLQ-H&N35 questionnaires datasets are used for
the NTCP modeling to describe the incidence of grade 4 xerostomia.
Assuming that n= 1, NTCP fitted parameters are given as TD50= 43.6
Gy, m= 0.18 in SEF analysis, and as TD50= 44.1 Gy, m= 0.11 in QoL
measurements, respectively. SEF and QoL datasets can validate the
Quantitative Analyses of Normal Tissue Effects in the Clinic
(QUANTEC) guidelines well, resulting in NPV-s of 100% for the both
datasets and suggests that the QUANTEC 25/20Gy gland-spared
guidelines are suitable for clinical used for the HN cohort to
effectively avoid xerostomia.
Abstract: Bicycle configuration is not as large as those of motorcycles or automobiles, while it indeed composes a complicated dynamic system. People-s requirements on comfortability, controllability and safety grow higher as the research and development technologies improve. The shock absorber affects the vehicle suspension performances enormously. The absorber takes the vibration energy and releases it at a suitable time, keeping the wheel under a proper contact condition with road surface, maintaining the vehicle chassis stability. Suspension design for mountain bicycles is more difficult than that of city bikes since it encounters dynamic variations on road and loading conditions. Riders need a stiff damper as they exert to tread on the pedals when climbing, while a soft damper when they descend downhill. Various switchable shock absorbers are proposed in markets, however riders have to manually switch them among soft, hard and lock positions. This study proposes a novel design of the bicycle shock absorber, which provides automatic smooth tuning of the damping coefficient, from a predetermined lower bound to theoretically unlimited. An automatic quick releasing valve is involved in this design so that it can release the peak pressure when the suspension fork runs into a square-wave type obstacle and prevent the chassis from damage, avoiding the rider skeleton from injury. This design achieves the automatic tuning process by innovative plunger valve and fluidic passage arrangements without any electronic devices. Theoretical modelling of the damper and spring are established in this study. Design parameters of the valves and fluidic passages are determined. Relations between design parameters and shock absorber performances are discussed in this paper. The analytical results give directions to the shock absorber manufacture.
Abstract: The recent development in learning technologies leads
to emerge many learning management systems (LMS). In this study,
we concentrate on the specifications and characteristics of LMSs.
Furthermore, this paper emphasizes on the feature of e-learning
management systems. The features take on the account main
indicators to assist and evaluate the quality of e-learning systems.
The proposed indicators based of ten dimensions.
Abstract: SQL injection on web applications is a very popular
kind of attack. There are mechanisms such as intrusion detection
systems in order to detect this attack. These strategies often rely on
techniques implemented at high layers of the application but do not
consider the low level of system calls. The problem of only
considering the high level perspective is that an attacker can
circumvent the detection tools using certain techniques such as URL
encoding. One technique currently used for detecting low-level
attacks on privileged processes is the tracing of system calls. System
calls act as a single gate to the Operating System (OS) kernel; they
allow catching the critical data at an appropriate level of detail. Our
basic assumption is that any type of application, be it a system
service, utility program or Web application, “speaks” the language of
system calls when having a conversation with the OS kernel. At this
level we can see the actual attack while it is happening. We conduct
an experiment in order to demonstrate the suitability of system call
analysis for detecting SQL injection. We are able to detect the attack.
Therefore we conclude that system calls are not only powerful in
detecting low-level attacks but that they also enable us to detect highlevel
attacks such as SQL injection.
Abstract: In this paper, linear multistep technique using power
series as the basis function is used to develop the block methods
which are suitable for generating direct solution of the special second
order ordinary differential equations of the form y′′ = f(x,y), a < = x < = b with associated initial or boundary conditions. The continuaous hybrid formulations enable us to differentiate and evaluate at some
grids and off – grid points to obtain two different three discrete
schemes, each of order (4,4,4)T, which were used in block form for
parallel or sequential solutions of the problems. The computational
burden and computer time wastage involved in the usual reduction of
second order problem into system of first order equations are avoided
by this approach. Furthermore, a stability analysis and efficiency of
the block method are tested on linear and non-linear ordinary
differential equations whose solutions are oscillatory or nearly
periodic in nature, and the results obtained compared favourably with
the exact solution.
Abstract: An effort estimation model is needed for softwareintensive
projects that consist of hardware, embedded software or
some combination of the two, as well as high level software
solutions. This paper first focuses on functional decomposition
techniques to measure functional complexity of a computer system
and investigates its impact on system development effort. Later, it
examines effects of technical difficulty and design team capability
factors in order to construct the best effort estimation model. With
using traditional regression analysis technique, the study develops a
system development effort estimation model which takes functional
complexity, technical difficulty and design team capability factors as
input parameters. Finally, the assumptions of the model are tested.
Abstract: this paper presented a survey analysis subjected on
network bandwidth management from published papers referred in
IEEE Explorer database in three years from 2009 to 2011. Network
Bandwidth Management is discussed in today-s issues for computer
engineering applications and systems. Detailed comparison is
presented between published papers to look further in the IP based
network critical research area for network bandwidth management.
Important information such as the network focus area, a few
modeling in the IP Based Network and filtering or scheduling used in
the network applications layer is presented. Many researches on
bandwidth management have been done in the broad network area
but fewer are done in IP Based network specifically at the
applications network layer. A few researches has contributed new
scheme or enhanced modeling but still the issue of bandwidth
management still arise at the applications network layer. This survey
is taken as a basic research towards implementations of network
bandwidth management technique, new framework model and
scheduling scheme or algorithm in an IP Based network which will
focus in a control bandwidth mechanism in prioritizing the network
traffic the applications layer.
Abstract: A common way to elude the signature-based Network Intrusion Detection System is based upon changing a recognizable attack to an unrecognizable one via the IDS. For example, in order to evade sign accommodation with intrusion detection system markers, a hacker spilt the payload packet into many small pieces or hides them within messages. In this paper we try to model the main fragmentation attack and create a new module in the intrusion detection architecture system which recognizes the main fragmentation attacks through verification of integrity checking of TCP packet in order to prevent elusion of the system and also to announce the necessary alert to the system administrator.
Abstract: The company-s ability to draw on a range of external
sources to meet their needs for innovation, has been termed 'open
innovation' (OI). Very few empirical analyses have been conducted
on Small and Medium Enterprises (SMEs) to the extent that they
describe and understand the characteristics and implications of this
new paradigm.
The study's objective is to identify and characterize different
modes of OI, (considering innovation process phases and the variety
and breadth of the collaboration), determinants, barriers and
motivations in SMEs. Therefore a survey was carried out among
Italian manufacturing firms and a database of 105 companies was
obtained. With regard to data elaboration, a factorial and cluster
analysis has been conducted and three different OI modes have
emerged: selective low open, unselective open upstream, and mid-
partners integrated open. The different behaviours of the three
clusters in terms of determinants factors, performance, firm-s
technology intensity, barriers and motivations have been analyzed
and discussed.
Abstract: The purpose of this study was to investigate the
relationships among students- process of study, creative self-efficacy
and creativity while attending college. A total of 60 students enrolled
in Hsiuping Institute of Technology in central Taiwan were selected as
samples for the study. The instruments for this study included three
questionnaires to explore the aforesaid aspects.
This researchers tested creative self-efficacy and process of study,
and creativity with Pearson correlation and hierarchical regression
analyses. The major findings of this research are (1) the process of
study had direct positive predictability on creativity, and (2) the
relationship between process of study and creativity is partially
mediated by creative self-efficacy.
Abstract: This paper investigates the performance of a speech
recognizer in an interactive voice response system for various coded
speech signals, coded by using a vector quantization technique namely
Multi Switched Split Vector Quantization Technique. The process of
recognizing the coded output can be used in Voice banking application.
The recognition technique used for the recognition of the coded speech
signals is the Hidden Markov Model technique. The spectral distortion
performance, computational complexity, and memory requirements of
Multi Switched Split Vector Quantization Technique and the
performance of the speech recognizer at various bit rates have been
computed. From results it is found that the speech recognizer is
showing better performance at 24 bits/frame and it is found that the
percentage of recognition is being varied from 100% to 93.33% for
various bit rates.
Abstract: In this research work, investigations are carried out on
Continuous Wave (CW) Nd:YAG laser welding system after
preliminary experimentation to understand the influencing parameters
associated with laser welding of AISI 304. The experimental
procedure involves a series of laser welding trials on AISI 304
stainless steel sheets with various combinations of process parameters
like beam power, beam incident angle and beam incident angle. An
industrial 2 kW CW Nd:YAG laser system, available at Welding
Research Institute (WRI), BHEL Tiruchirappalli, is used for
conducting the welding trials for this research. After proper tuning of
laser beam, laser welding experiments are conducted on AISI 304
grade sheets to evaluate the influence of various input parameters on
weld bead geometry i.e. bead width (BW) and depth of penetration
(DOP). From the laser welding results, it is noticed that the beam
power and welding speed are the two influencing parameters on
depth and width of the bead. Three dimensional finite element
simulation of high density heat source have been performed for laser
welding technique using finite element code ANSYS for predicting
the temperature profile of laser beam heat source on AISI 304
stainless steel sheets. The temperature dependent material properties
for AISI 304 stainless steel are taken into account in the simulation,
which has a great influence in computing the temperature profiles.
The latent heat of fusion is considered by the thermal enthalpy of
material for calculation of phase transition problem. A Gaussian
distribution of heat flux using a moving heat source with a conical
shape is used for analyzing the temperature profiles. Experimental
and simulated values for weld bead profiles are analyzed for stainless
steel material for different beam power, welding speed and beam
incident angle. The results obtained from the simulation are
compared with those from the experimental data and it is observed
that the results of numerical analysis (FEM) are in good agreement
with experimental results, with an overall percentage of error
estimated to be within ±6%.
Abstract: This paper describes an efficient hardware implementation of a new technique for interfacing the data exchange between the microprocessor-based systems and the external devices. This technique, based on the use of software/hardware system and a reduced physical address, enlarges the interfacing capacity of the microprocessor-based systems, uses the Direct Memory Access (DMA) to increases the frequency of the new bus, and improves the speed of data exchange. While using this architecture in microprocessor-based system or in computer, the input of the hardware part of our system will be connected to the bus system, and the output, which is a new bus, will be connected to an external device. The new bus is composed of a data bus, a control bus and an address bus. A Xilinx Integrated Software Environment (ISE) 7.1i has been used for the programmable logic implementation.
Abstract: In this paper the development of a heat exchanger as a
pilot plant for educational purpose is discussed and the use of neural
network for controlling the process is being presented. The aim of the
study is to highlight the need of a specific Pseudo Random Binary
Sequence (PRBS) to excite a process under control. As the neural
network is a data driven technique, the method for data generation
plays an important role. In light of this a careful experimentation
procedure for data generation was crucial task. Heat exchange is a
complex process, which has a capacity and a time lag as process
elements. The proposed system is a typical pipe-in- pipe type heat
exchanger. The complexity of the system demands careful selection,
proper installation and commissioning. The temperature, flow, and
pressure sensors play a vital role in the control performance. The
final control element used is a pneumatically operated control valve.
While carrying out the experimentation on heat exchanger a welldrafted
procedure is followed giving utmost attention towards safety
of the system. The results obtained are encouraging and revealing
the fact that if the process details are known completely as far as
process parameters are concerned and utilities are well stabilized then
feedback systems are suitable, whereas neural network control
paradigm is useful for the processes with nonlinearity and less
knowledge about process. The implementation of NN control
reinforces the concepts of process control and NN control paradigm.
The result also underlined the importance of excitation signal
typically for that process. Data acquisition, processing, and
presentation in a typical format are the most important parameters
while validating the results.
Abstract: Nowadays, several techniques such as; Fuzzy
Inference System (FIS) and Neural Network (NN) are employed for
developing of the predictive models to estimate parameters of water
quality. The main objective of this study is to compare between the
predictive ability of the Adaptive Neuro-Fuzzy Inference System
(ANFIS) model and Artificial Neural Network (ANN) model to
estimate the Biochemical Oxygen Demand (BOD) on data from 11
sampling sites of Saen Saep canal in Bangkok, Thailand. The data is
obtained from the Department of Drainage and Sewerage, Bangkok
Metropolitan Administration, during 2004-2011. The five parameters
of water quality namely Dissolved Oxygen (DO), Chemical Oxygen
Demand (COD), Ammonia Nitrogen (NH3N), Nitrate Nitrogen
(NO3N), and Total Coliform bacteria (T-coliform) are used as the
input of the models. These water quality indices affect the
biochemical oxygen demand. The experimental results indicate that
the ANN model provides a higher correlation coefficient (R=0.73)
and a lower root mean square error (RMSE=4.53) than the
corresponding ANFIS model.
Abstract: In this paper, we observe that developed countries are generally equipped with innovation capabilities and produce major chunk of the world-s knowledge and technology. The contribution of developing countries, on the other hand, is insignificant, and most of them far behind the global technological front. More specifically, we empirically observe that the developing world neither contributes substantially to the world-s scientific publications nor to the R&D activities. They also have lesser “absorptive capacity" and “technological capability", and their “innovation systems" are plagued with many problems. Finally, we argue that these countries can break the shackles and improve their innovation capabilities by pursuing genuine innovation policies on long-term basis with honesty and commitment.