Abstract: A self-evolution algorithm for optimizing neural networks using a combination of PSO and JPSO is proposed. The algorithm optimizes both the network topology and parameters simultaneously with the aim of achieving desired accuracy with less complicated networks. The performance of the proposed approach is compared with conventional back-propagation networks using several synthetic functions, with better results in the case of the former. The proposed algorithm is also implemented on slope stability problem to estimate the critical factor of safety. Based on the results obtained, the proposed self evolving network produced a better estimate of critical safety factor in comparison to conventional BPN network.
Abstract: The Boundary Representation of a 3D manifold contains
FACES (connected subsets of a parametric surface S : R2 -!
R3). In many science and engineering applications it is cumbersome
and algebraically difficult to deal with the polynomial set and
constraints (LOOPs) representing the FACE. Because of this reason, a
Piecewise Linear (PL) approximation of the FACE is needed, which is
usually represented in terms of triangles (i.e. 2-simplices). Solving the
problem of FACE triangulation requires producing quality triangles
which are: (i) independent of the arguments of S, (ii) sensitive to the
local curvatures, and (iii) compliant with the boundaries of the FACE
and (iv) topologically compatible with the triangles of the neighboring
FACEs. In the existing literature there are no guarantees for the point
(iii). This article contributes to the topic of triangulations conforming
to the boundaries of the FACE by applying the concept of parameterindependent
Gabriel complex, which improves the correctness of the
triangulation regarding aspects (iii) and (iv). In addition, the article
applies the geometric concept of tangent ball to a surface at a point to
address points (i) and (ii). Additional research is needed in algorithms
that (i) take advantage of the concepts presented in the heuristic
algorithm proposed and (ii) can be proved correct.
Abstract: In this paper, a two factor scheme is proposed to
generate cryptographic keys directly from biometric data, which
unlike passwords, are strongly bound to the user. Hash value of the
reference iris code is used as a cryptographic key and its length
depends only on the hash function, being independent of any other
parameter. The entropy of such keys is 94 bits, which is much higher
than any other comparable system. The most important and distinct
feature of this scheme is that it regenerates the reference iris code by
providing a genuine iris sample and the correct user password. Since
iris codes obtained from two images of the same eye are not exactly
the same, error correcting codes (Hadamard code and Reed-Solomon
code) are used to deal with the variability. The scheme proposed here
can be used to provide keys for a cryptographic system and/or for
user authentication. The performance of this system is evaluated on
two publicly available databases for iris biometrics namely CBS and
ICE databases. The operating point of the system (values of False
Acceptance Rate (FAR) and False Rejection Rate (FRR)) can be set
by properly selecting the error correction capacity (ts) of the Reed-
Solomon codes, e.g., on the ICE database, at ts = 15, FAR is 0.096%
and FRR is 0.76%.
Abstract: Video watermarking is usually considered as watermarking of a set of still images. In frame-by-frame watermarking approach, each video frame is seen as a single watermarked image, so collusion attack is more critical in video watermarking. If the same or redundant watermark is used for embedding in every frame of video, the watermark can be estimated and then removed by watermark estimate remodolulation (WER) attack. Also if uncorrelated watermarks are used for every frame, these watermarks can be washed out with frame temporal filtering (FTF). Switching watermark system or so-called SS-N system has better performance against WER and FTF attacks. In this system, for each frame, the watermark is randomly picked up from a finite pool of watermark patterns. At first SS-N system will be surveyed and then a new collusion attack for SS-N system will be proposed using a new algorithm for separating video frame based on watermark pattern. So N sets will be built in which every set contains frames carrying the same watermark. After that, using WER attack in every set, N different watermark patterns will be estimated and removed later.
Abstract: This paper proposes a new algebraic scheme to design a PID controller for higher order linear time invariant continuous systems. Modified PSO (MPSO) based model order formulation techniques have applied to obtain the effective formulated second order system. A controller is tuned to meet the desired performance specification by using pole-zero cancellation method. Proposed PID controller is attached with both higher order system and formulated second order system. The closed loop response is observed for stabilization process and compared with general PSO based formulated second order system. The proposed method is illustrated through numerical example from literature.
Abstract: This paper presents the benchmarking results and
performance evaluation of differentclustersbuilt atthe National Center
for High-Performance Computingin Taiwan. Performance of
processor, memory subsystem andinterconnect is a critical factor in the
overall performance of high performance computing platforms. The
evaluation compares different system architecture and software
platforms. Most supercomputer used HPL to benchmark their system
performance, in accordance with the requirement of the TOP500 List.
In this paper we consider system memory access factors that affect
benchmark performance, such as processor and memory
performance.We hope these works will provide useful information for
future development and construct cluster system.
Abstract: Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed.
Abstract: This study carried out in order to investigate the
effects of salinity on carbon isotope discrimination (Δ) of shoots and
roots of four sugar beet cultivars (cv) including Madison (British
origin) and three Iranian culivars (7233-P12, 7233-P21 and 7233-P29).
Plants were grown in sand culture medium in greenhouse conditions.
Plants irrigated with saline water (tap water as control, 50 mM, 150
mM, 250 mM and 350 mM of NaCl + CaCl2 in 5 to 1 molar ratio)
from 4 leaves stage for 16 weeks. Carbon isotope discrimination
significantly decreased with increasing salinity. Significant
differences of Δ between shoot and root were observed in all cvs and
all levels of salinity. Madison cv showed lower Δ in shoot and root
than other three cvs at all levels of salinity expect control, but cv
7233-P29 had significantly higher Δ values at saline conditions of 150
mM and above. Therefore, Δ might be applicable, as a useful tool, for
study of salinity tolerance of sugar beet genotypes.
Abstract: This paper presents an optimal design of poly-phase induction motor using Quadratic Interpolation based Particle Swarm Optimization (QI-PSO). The optimization algorithm considers the efficiency, starting torque and temperature rise as objective function (which are considered separately) and ten performance related items including harmonic current as constraints. The QI-PSO algorithm was implemented on a test motor and the results are compared with the Simulated Annealing (SA) technique, Standard Particle Swarm Optimization (SPSO), and normal design. Some benchmark problems are used for validating QI-PSO. From the test results QI-PSO gave better results and more suitable to motor-s design optimization. Cµ code is used for implementing entire algorithms.
Abstract: Nowadays wireless technology plays an important
role in public and personal communication. However, the growth of
wireless networking has confused the traditional boundaries between
trusted and untrusted networks. Wireless networks are subject to a
variety of threats and attacks at present. An attacker has the ability to
listen to all network traffic which becoming a potential intrusion.
Intrusion of any kind may lead to a chaotic condition. In addition,
improperly configured access points also contribute the risk to
wireless network. To overcome this issue, a security solution that
includes an intrusion detection and prevention system need to be
implemented. In this paper, first the security drawbacks of wireless
network will be analyzed then investigate the characteristics and also
the limitations on current wireless intrusion detection and prevention
system. Finally, the requirement of next wireless intrusion prevention
system will be identified including some key issues which should be
focused on in the future to overcomes those limitations.
Abstract: Modern applications realized onto FPGAs exhibit high connectivity demands. Throughout this paper we study the routing constraints of Virtex devices and we propose a systematic methodology for designing a novel general-purpose interconnection network targeting to reconfigurable architectures. This network consists of multiple segment wires and SB patterns, appropriately selected and assigned across the device. The goal of our proposed methodology is to maximize the hardware utilization of fabricated routing resources. The derived interconnection scheme is integrated on a Virtex style FPGA. This device is characterized both for its high-performance, as well as for its low-energy requirements. Due to this, the design criterion that guides our architecture selections was the minimal Energy×Delay Product (EDP). The methodology is fully-supported by three new software tools, which belong to MEANDER Design Framework. Using a typical set of MCNC benchmarks, extensive comparison study in terms of several critical parameters proves the effectiveness of the derived interconnection network. More specifically, we achieve average Energy×Delay Product reduction by 63%, performance increase by 26%, reduction in leakage power by 21%, reduction in total energy consumption by 11%, at the expense of increase of channel width by 20%.
Abstract: The present energy situation and the concerns
about global warming has stimulated active research interest
in non-petroleum, carbon free compounds and non-polluting
fuels, particularly for transportation, power generation, and
agricultural sectors. Environmental concerns and limited
amount of petroleum fuels have caused interests in the
development of alternative fuels for internal combustion (IC)
engines. The petroleum crude reserves however, are declining
and consumption of transport fuels particularly in the
developing countries is increasing at high rates. Severe
shortage of liquid fuels derived from petroleum may be faced
in the second half of this century. Recently more and more
stringent environmental regulations being enacted in the USA
and Europe have led to the research and development
activities on clean alternative fuels. Among the gaseous fuels
hydrogen is considered to be one of the clean alternative fuel.
Hydrogen is an interesting candidate for future internal
combustion engine based power trains. In this experimental
investigation, the performance and combustion analysis were
carried out on a direct injection (DI) diesel engine using
hydrogen with diesel following the TMI(Time Manifold
Injection) technique at different injection timings of 10
degree,45 degree and 80 degree ATDC using an electronic
control unit (ECU) and injection durations were controlled.
Further, the tests have been carried out at a constant speed of
1500rpm at different load conditions and it can be observed
that brake thermal efficiency increases with increase in load
conditions with a maximum gain of 15% at full load
conditions during all injection strategies of hydrogen. It was
also observed that with the increase in hydrogen energy share
BSEC started reducing and it reduced to a maximum of 9% as
compared to baseline diesel at 10deg ATDC injection during
maximum injection proving the exceptional combustion
properties of hydrogen.
Abstract: To understand the material characteristics of singleand
poly-crystals of pure copper, the respective relationships between
crystallographic orientations and microstructures, and the bending
and mechanical properties were examined. And texture distribution
is also analyzed. A bending test is performed in a SEM apparatus and
while its behaviors are observed in situ. Furthermore, some
analytical results related to crystal direction maps, inverse pole
figures, and textures were obtained from EBSD analyses.
Abstract: Graduate attributes have received increasing attention
over recent years as universities incorporate these attributes into the
curriculum. Graduates who have adequate technical knowledge only
are not sufficiently equipped to compete effectively in the work
place; they also need non disciplinary skills ie, graduate attributes.
The purpose of this paper is to investigate the impact of an eportfolio
in a technical communication course to enhance engineering
students- graduate attributes: namely, learning of communication,
critical thinking and problem solving and teamwork skills. Two
questionnaires were used to elicit information from the students: one
on their preferred and the other on the actual learning process. In
addition, student perceptions of the use of eportfolio as a learning
tool were investigated. Preliminary findings showed that most of the
students- expectations have been met with their actual learning. This
indicated that eportfolio has the potential as a tool to enhance
students- graduate attributes.
Abstract: A stage-structured predator-prey system with two time delays is considered. By analyzing the corresponding characteristic equation, the local stability of a positive equilibrium is investigated and the existence of Hopf bifurcations is established. Formulae are derived to determine the direction of bifurcations and the stability of bifurcating periodic solutions by using the normal form theory and center manifold theorem. Numerical simulations are carried out to illustrate the theoretical results. Based on the global Hopf bifurcation theorem for general functional differential equations, the global existence of periodic solutions is established.
Abstract: To solve the quick and accurate level-adjusting
problem in the process of spacecraft precise mating, automatic leveling
and equalizing hoist device for spacecraft is developed. Based on
lifting point adjustment by utilizing XY-workbench, the leveling and
equalizing controller by a self-adaptive control algorithm is proposed.
By simulation analysis and lifting test using engineering prototype,
validity and reliability of the hoist device is verified, which can meet
the precision mating requirements of practical applications for
spacecraft.
Abstract: The distressing flood scenarios that occur in
recent years at the surrounding areas of Sarawak River have
left damages of properties and indirectly caused disruptions of
productive activities. This study is meant to reconstruct a 100-year
flood event that took place in this river basin. Sarawak River Subbasin
was chosen and modeled using the one-dimensional
hydrodynamic modeling approach using InfoWorks River Simulation
(RS), in combination with Geographical Information System (GIS).
This produces the hydraulic response of the river and its floodplains
in extreme flooding conditions. With different parameters introduced
to the model, correlations of observed and simulated data are
between 79% – 87%. Using the best calibrated model, flood
mitigation structures are imposed along the sub-basin. Analysis is
done based on the model simulation results. Result shows that the
proposed retention ponds constructed along the sub-basin provide the
most efficient reduction of flood by 34.18%.
Abstract: Many experimental results suggest that more precise spike timing is significant in neural information processing. We construct a self-organization model using the spatiotemporal pat-terns, where Spike-Timing Dependent Plasticity (STDP) tunes the conduction delays between neurons. We show that, for highly syn-chronized inputs, the fluctuation of conduction delays causes globally continuous and locally distributed firing patterns through the self-organization.
Abstract: In this paper, we argue the security protocols of
ZigBee wireless sensor network in MAC layer. AES 128-bit
encryption algorithm in CCM* mode is secure transferred data;
however, AES-s secret key will be break within nearest future.
Efficient public key algorithm, ECC has been mixed with AES to
rescue the ZigBee wireless sensor from cipher text and replay attack.
Also, the proposed protocol can parallelize the integrity function to
increase system performance.
Abstract: In the present paper, we use generalized B-Spline curve in trigonometric form on circular domain, to capture the transcendental nature of circle involute curve and uncertainty characteristic of design. The required involute curve get generated within the given tolerance limit and is useful in gear design.