Abstract: We present a new algorithm for nonlinear dimensionality reduction that consistently uses global information, and that enables understanding the intrinsic geometry of non-convex manifolds. Compared to methods that consider only local information, our method appears to be more robust to noise. Unlike most methods that incorporate global information, the proposed approach automatically handles non-convexity of the data manifold. We demonstrate the performance of our algorithm and compare it to state-of-the-art methods on synthetic as well as real data.
Abstract: There are a lot of extensions made to the classic model of multi-layer perceptron (MLP). A notable amount of them has been designed to hasten the learning process without considering the quality of generalization. The paper proposes a new MLP extension based on exploiting topology of the input layer of the network. Experimental results show the extended model to improve upon generalization capability in certain cases. The new model requires additional computational resources to compare to the classic model, nevertheless the loss in efficiency isn-t regarded to be significant.
Abstract: Security management has changed from the
management of security equipments and useful interface to manager.
It analyzes the whole security conditions of network and preserves the
network services from attacks. Secure router technology has security
functions, such as intrusion detection, IPsec(IP Security) and access
control, are applied to legacy router for secure networking. It controls
an unauthorized router access and detects an illegal network intrusion.
This paper relates to a security engine management of router based on
a security policy, which is the definition of security function against a
network intrusion. This paper explains the security policy and designs
the structure of security engine management framework.
Abstract: This paper presents an analytical model to estimate
the cost of an optimized design of reinforced concrete isolated
footing base on structural safety. Flexural and optimized formulas for
square and rectangular footingare derived base on ACI building code
of design, material cost and optimization. The optimization
constraints consist of upper and lower limits of depth and area of
steel. Footing depth and area of reinforcing steel are to be minimized
to yield the optimal footing dimensions. Optimized footing materials
cost of concrete, reinforcing steel and formwork of the designed
sections are computed. Total cost factor TCF and other cost factors
are developed to generalize and simplify the calculations of footing
material cost. Numerical examples are presented to illustrate the
model capability of estimating the material cost of the footing for a
desired axial load.
Abstract: This paper describes a new algorithm of arrangement
in parallel, based on Odd-Even Mergesort, called division and
concurrent mixes. The main idea of the algorithm is to achieve that
each processor uses a sequential algorithm for ordering a part of the
vector, and after that, for making the processors work in pairs in
order to mix two of these sections ordered in a greater one, also
ordered; after several iterations, the vector will be completely
ordered. The paper describes the implementation of the new
algorithm on a Message Passing environment (such as MPI). Besides,
it compares the obtained experimental results with the quicksort
sequential algorithm and with the parallel implementations (also on
MPI) of the algorithms quicksort and bitonic sort. The comparison
has been realized in an 8 processors cluster under GNU/Linux which
is running on a unique PC processor.
Abstract: Low power consumption is a major constraint for battery-powered system like computer notebook or PDA. In the past, specialists usually designed both specific optimized equipments and codes to relief this concern. Doing like this could work for quite a long time, however, in this era, there is another significant restraint, the time to market. To be able to serve along the power constraint while can launch products in shorter production period, objectoriented programming (OOP) has stepped in to this field. Though everyone knows that OOP has quite much more overhead than assembly and procedural languages, development trend still heads to this new world, which contradicts with the target of low power consumption. Most of the prior power related software researches reported that OOP consumed much resource, however, as industry had to accept it due to business reasons, up to now, no papers yet had mentioned about how to choose the best OOP practice in this power limited boundary. This article is the pioneer that tries to specify and propose the optimized strategy in writing OOP software under energy concerned environment, based on quantitative real results. The language chosen for studying is C# based on .NET Framework 2.0 which is one of the trendy OOP development environments. The recommendation gotten from this research would be a good roadmap that can help developers in coding that well balances between time to market and time of battery.
Abstract: In order to encourage the construction of green homes
(GH) in Malaysia, a simple and attainable framework for designing
and building GHs is needed. This can be achieved by aligning GH
principles against Cole-s 'Sustainable Building Criteria' (SBC). This
set of considerations was used to categorize the GH features of three
case studies from Malaysia. Although the categorization of building
features is useful at exploring the presence of sustainability
inclinations of each house, the overall impact of building features in
each of the five SBCs are unknown. Therefore, this paper explored
the possibility of quantifying the impact of building features
categorized in SBC1 – “Buildings will have to adapt to the new
environment and restore damaged ecology while mitigating resource
use" based on existing GH assessment tools and methods and other
literature. This process as reported in this paper could lead to a new
dimension in green home rating and assessment methods.
Abstract: Waiting times and queues are a daily problem for theme parks. Fast lines or priority queues appear as a solution for a specific segment of customers, that is, tourists who are willing to pay to avoid waiting. This paper analyzes the fast line system and explores the factors that affect the decision to purchase a fast line pass. A greater understanding of these factors may help companies to design appropriate products and services. This conceptual paper was based on a literature review in marketing and consumer behavior. Additional research was identified in related disciplines such as leisure studies, psychology, and sociology. A conceptual framework of the factors influencing the decision to purchase a fast line pass is presented.
Abstract: We decribe a formal specification and verification of the Rabin public-key scheme in the formal proof system Is-abelle/HOL. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. The analysis presented uses a given database to prove formal properties of our implemented functions with computer support. Thema in task in designing a practical formalization of correctness as well as security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as eficient formal proofs. This yields the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Consequently, we get reliable proofs with a minimal error rate augmenting the used database. This provides a formal basis for more computer proof constructions in this area.
Abstract: The myoelectric signal (MES) is one of the Biosignals
utilized in helping humans to control equipments. Recent approaches
in MES classification to control prosthetic devices employing pattern
recognition techniques revealed two problems, first, the classification
performance of the system starts degrading when the number of
motion classes to be classified increases, second, in order to solve the
first problem, additional complicated methods were utilized which
increase the computational cost of a multifunction myoelectric
control system. In an effort to solve these problems and to achieve a
feasible design for real time implementation with high overall
accuracy, this paper presents a new method for feature extraction in
MES recognition systems. The method works by extracting features
using Wavelet Packet Transform (WPT) applied on the MES from
multiple channels, and then employs Fuzzy c-means (FCM)
algorithm to generate a measure that judges on features suitability for
classification. Finally, Principle Component Analysis (PCA) is
utilized to reduce the size of the data before computing the
classification accuracy with a multilayer perceptron neural network.
The proposed system produces powerful classification results (99%
accuracy) by using only a small portion of the original feature set.
Abstract: The history of money is described in relationship to the history of computing. With the transformation and acceptance of money as information, major challenges to the security of money have involved engineering, computer science, and management. Research opportunities and challenges are described as money continues its transformation into information.
Abstract: This paper discusses a systematic design of a Σ-Δ fractional-N Phase-Locked Loop based on HDL behavioral modeling. The proposed design consists in describing the mixed behavior of this PLL architecture starting from the specifications of each building block. The HDL models of critical PLL blocks have been described in VHDL-AMS to predict the different specifications of the PLL. The effect of different noise sources has been efficiently introduced to study the PLL system performances. The obtained results are compared with transistor-level simulations to validate the effectiveness of the proposed models for wireless applications in the frequency range around 2.45 GHz.
Abstract: Article 5(3) of the Brussels I Regulation provides that a person domiciled in a Member State may be sued in another Member State in matters relating to tort, delict or quasi-delict, in the courts for the place where the harmful events occurred or may occur. For a number of years Article 5 (3) of the Brussels I Regulation has been at the centre of the debate regarding the intellectual property rights infringement over the Internet. Nothing has been done to adapt the provisions relating to non-internet cases of infringement of intellectual property rights to the context of the Internet. The author’s findings indicate that in the case of intellectual property rights infringement on the Internet, the plaintiff has the option to sue either: the court of the Member State of the event giving rise to the damage: where the publisher of the newspaper is established; the court of the Member State where the damage occurred: where defamatory article is distributed. However, it must be admitted that whilst infringement over the Internet has some similarity to multi-State defamation by means of newspapers, the position is not entirely analogous due to the cross-border nature of the Internet. A simple example which may appropriately illustrate its contentious nature is a defamatory statement published on a website accessible in different Member States, and available in different languages. Therefore, we need to answer the question: how these traditional jurisdictional rules apply in the case of intellectual property rights infringement over the Internet? Should these traditional jurisdictional rules be modified?
Abstract: In this paper, the estimation of the stress-strength
parameter R = P(Y < X), when X and Y are independent and both
are Lomax distributions with the common scale parameters but
different shape parameters is studied. The maximum likelihood
estimator of R is derived. Assuming that the common scale parameter
is known, the bayes estimator and exact confidence interval of R are
discussed. Simulation study to investigate performance of the
different proposed methods has been carried out.
Abstract: This paper describes a simulation model for analyzing artificial emotion injected to design the game characters. Most of the game storyboard is interactive in nature and the virtual characters of the game are equipped with an individual personality and dynamic emotion value which is similar to real life emotion and behavior. The uncertainty in real expression, mood and behavior is also exhibited in game paradigm and this is focused in the present paper through a fuzzy logic based agent and storyboard. Subsequently, a pheromone distribution or labeling is presented mimicking the behavior of social insects.
Abstract: This paper presents Qmulus- a Cloud Based GPS
Model. Qmulus is designed to compute the best possible route which
would lead the driver to the specified destination in the shortest time
while taking into account real-time constraints. Intelligence
incorporated to Qmulus-s design makes it capable of generating and
assigning priorities to a list of optimal routes through customizable
dynamic updates. The goal of this design is to minimize travel and
cost overheads, maintain reliability and consistency, and implement
scalability and flexibility. The model proposed focuses on
reducing the bridge between a Client Application and a Cloud
service so as to render seamless operations. Qmulus-s system
model is closely integrated and its concept has the potential to be
extended into several other integrated applications making it capable
of adapting to different media and resources.
Abstract: To make use of the limited amounts of water in arid
region, the Iranians developed man-made underground water
channels called qanats (kanats) .In fact, qanats may be considered as
the first long-distance water transfer system. Qanats are an ancient
water transfer system found in arid regions wherein groundwater
from mountainous areas, aquifers and sometimes from rivers, was
brought to points of re-emergence such as an oasis, through one or
more underground tunnels. The tunnels, many of which were
kilometers in length, had designed for slopes to provide gravitational
flow. The tunnels allowed water to drain out to the surface by gravity
to supply water to lower and flatter agricultural land.
Qanats have been an ancient, sustainable system facilitating the
harvesting of water for centuries in Iran, and more than 35 additional
countries of the world such as India, Arabia, Egypt, North Africa,
Spain and even to New world.
There are about 22000 qanats in Iran with 274000 kilometers of
underground conduits all built by manual labor. The amount of
water of the usable qanats of Iran produce is altogether 750 to
1000 cubic meter per second. The longest chain of qanat is
situated in Gonabad region in Khorasan province. It is 70
kilometers long. Qanats are renewable water supply systems that
have sustained agricultural settlement on the Iranian plateau for
millennia. The great advantages of Qanats are no evaporation
during transit, little seepage , no raising of the water- table and no
pollution in the area surrounding the conduits. Qanat systems
have a profound influence on the lives of the water users in Iran, and
conform to Iran-s climate. Qanat allows those living in a desert
environment adjacent to a mountain watershed to create a large oasis
in an otherwise stark environment.
This paper explains qanats structure designs, their history,
objectives causing their creation, construction materials, locations
and their importance in different times, as well as their present
sustainable role in Iran.
Abstract: Cooperative visual modeling is more and more
necessary in our complicated world. A collaborative environment
which supports interactive operation and communication is required
to increase work efficiency. We present a collaborative visual
modeling framework which collaborative platform could be built on.
On this platform, cooperation and communication is available for
designers from different regions. This framework, which is different
from other collaborative frameworks, contains a uniform message
format, a message handling mechanism and other functions such as
message pretreatment and Role-Communication-Token Access
Control (RCTAC). We also show our implementation of this
framework called Orchestra Designer, which support BPLE
workflow modeling cooperatively online.
Abstract: In this paper we present a full performance analysis of an energy conserving routing protocol in mobile ad hoc network, named ER-AODV (Energy Reverse Ad-hoc On-demand Distance Vector routing). ER-AODV is a reactive routing protocol based on a policy which combines two mechanisms used in the basic AODV protocol. AODV and most of the on demand ad hoc routing protocols use single route reply along reverse path. Rapid change of topology causes that the route reply could not arrive to the source node, i.e. after a source node sends several route request messages, the node obtains a reply message, and this increases in power consumption. To avoid these problems, we propose a mechanism which tries multiple route replies. The second mechanism proposes a new adaptive approach which seeks to incorporate the metric "residual energy " in the process route selection, Indeed the residual energy of mobile nodes were considered when making routing decisions. The results of simulation show that protocol ER-AODV answers a better energy conservation.
Abstract: Education in the modern world provides the socioeconomic
progress of society. In today's society, where the presence
of large middle class ensures its stability and is a symbol of
resolution of hidden economic problems, education is an integral part
of formation and reproduction of the middle class. This article presents part of results of the sociological study conducted under the
project "Kazakhstan model of education: international experience and national traditions" supported by the Foundation of the First President
of Republic of Kazakhstan - Leader of the Nation to determine the
ratio of students to the transformations of the educational system. The
authors conclude that the Kazakhstani system of education, passing
through the transformation processes, improving the quality of
educational programs and trying to correspond to the international
standards, not yet in full range, but begins to perform important
functions in the formation of the middle class.