Abstract: This paper describes an enhanced cookie-based
method for counting the visitors of web sites by using a web log
processing system that aims to cope with the ambitious goal of
creating countrywide statistics about the browsing practices of real
human individuals. The focus is put on describing a new more
efficient way of detecting human beings behind web users by placing
different identifiers on the client computers. We briefly introduce our
processing system designed to handle the massive amount of data
records continuously gathered from the most important content
providers of the Hungary. We conclude by showing statistics of
different time spans comparing the efficiency of multiple visitor
counting methods to the one presented here, and some interesting
charts about content providers and web usage based on real data
recorded in 2007 will also be presented.
Abstract: This paper describes a feasibility study that is
included with the research, development and testing of a micro
communications sonobuoy deployable by Maritime Fixed wing
Unmanned Aerial Vehicles (M-UAV) and rotor wing Quad Copters
which are both currently being developed by the University of
Adelaide. The micro communications sonobuoy is developed to act
as a seamless communication relay between an Autonomous
Underwater Vehicle (AUV) and an above water human operator
some distance away. Development of such a device would eliminate
the requirement of physical communication tethers attached to
submersible vehicles for control and data retrieval.
Abstract: In this paper by using the port-controlled Hamiltonian
(PCH) systems theory, a full-order nonlinear controlled model is first
developed. Then a nonlinear passivity-based robust adaptive control
(PBRAC) of switched reluctance motor in the presence of external
disturbances for the purpose of torque ripple reduction and
characteristic improvement is presented. The proposed controller
design is separated into the inner loop and the outer loop controller.
In the inner loop, passivity-based control is employed by using
energy shaping techniques to produce the proper switching function.
The outer loop control is employed by robust adaptive controller to
determine the appropriate Torque command. It can also overcome the
inherent nonlinear characteristics of the system and make the whole
system robust to uncertainties and bounded disturbances. A 4KW 8/6
SRM with experimental characteristics that takes magnetic saturation
into account is modeled, simulation results show that the proposed
scheme has good performance and practical application prospects.
Abstract: Indigenous Knowledge (IK) has many social and
economic benefits. However, IK is at the risk of extinction due to the
difficulties to preserve it as most of the IK largely remains
undocumented. This study aims to design a model of the factors
affecting the adoption of Information and Communication
Technologies (ICTs) for the preservation of IK. The proposed model
is based on theoretical frameworks on ICT adoption. It was designed
following a literature review of ICT adoption theories for households,
and of the factors affecting ICT adoption for IK. The theory that
fitted to the best all factors was then chosen as the basis for the
proposed model. This study found that the Model of Adoption of
Technology in Households (MATH) is the most suitable theoretical
framework for modeling ICT adoption factors for the preservation of
IK.
Abstract: In this paper, we present a method named Signal Level
Matrix (SLM) which can improve the accuracy and stability of active
RFID indoor positioning system. Considering the accuracy and cost,
we use uniform distribution mode to set up and separate the
overlapped signal covering areas, in order to achieve preliminary
location setting. Then, based on the proposed SLM concept and the
characteristic of the signal strength value that attenuates as the
distance increases, this system cross-examines the distribution of
adjacent signals to locate the users more accurately. The experimental
results indicate that the adaptive positioning method proposed in this
paper could improve the accuracy and stability of the positioning
system effectively and satisfyingly.
Abstract: The recent growth of using multimedia transmission
over wireless communication systems, have challenges to protect the
data from lost due to wireless channel effect. Images are corrupted
due to the noise and fading when transmitted over wireless channel,
in wireless channel the image is transmitted block by block, Due to
severe fading, entire image blocks can be damaged. The aim of this
paper comes out from need to enhance the digital images at the
wireless receiver side. Proposed Boundary Interpolation (BI)
Algorithm using wavelet, have been adapted here used to
reconstruction the lost block in the image at the receiver depend on
the correlation between the lost block and its neighbors. New
Proposed technique by using Boundary Interpolation (BI) Algorithm
using wavelet with Pixel interleaver has been implemented. Pixel
interleaver work on distribute the pixel to new pixel position of
original image before transmitting the image. The block lost through
wireless channel is only effects individual pixel. The lost pixels at the
receiver side can be recovered by using Boundary Interpolation (BI)
Algorithm using wavelet. The results showed that the New proposed
algorithm boundary interpolation (BI) using wavelet with pixel
interleaver is better in term of MSE and PSNR.
Abstract: This contribution deals with the relationship between
communication effectiveness and the extent of communication
among organizational units. To facilitate communication between
employees and to increase the level of understanding, the knowledge
of communication tools is necessary. Recent experience has shown
that personal communication is critical for smooth running of
companies and cannot be fully replaced by any form of technical
communication devices.
Below are presented the outcomes of the research on the
relationship between the extent of communication among
organisational units and its efficiency.
Abstract: To support user mobility for a wireless network new mechanisms are needed and are fundamental, such as paging, location updating, routing, and handover. Also an important key feature is mobile QoS offered by the WATM. Several ATM network protocols should be updated to implement mobility management and to maintain the already ATM QoS over wireless ATM networks. A survey of the various schemes and types of handover is provided. Handover procedure allows guarantee the terminal connection reestablishment when it moves between areas covered by different base stations. It is useful to satisfy user radio link transfer without interrupting a connection. However, failure to offer efficient solutions will result in handover important packet loss, severe delays and degradation of QoS offered to the applications. This paper reviews the requirements, characteristics and open issues of wireless ATM, particularly with regard to handover. It introduces key aspects of WATM and mobility extensions, which are added in the fixed ATM network. We propose a flexible approach for handover management that will minimize the QoS deterioration. Functional entities of this flexible approach are discussed in order to achieve minimum impact on the connection quality when a MT crosses the BS.
Abstract: Due to the fast development of technology, the
competition of technological products is turbulent; therefore, it is
important to understand the market trend, consumers- demand and
preferences. As the smartphones are prevalent, the main purpose of
this paper is to utilize Analytic Hierarchy Process (AHP) to analyze
consumer-s purchase evaluation factors of smartphones. Through the
AHP expert questionnaire, the smartphones- main functions are
classified as “user interface", “mobile commerce functions",
“hardware and software specifications", “entertainment functions" and
“appearance and design", five aspects to analyze the weights. Then
four evaluation criteria are evaluated under each aspect to rank the
weights. Based on an analysis of data shows that consumers consider
when purchase factors are “hardware and software specifications",
“user interface", “appearance and design", “mobile commerce
functions" and “entertainment functions" in sequence. The “hardware
and software specifications" aspect obtains the weight of 33.18%; it is
the most important factor that consumers are taken into account. In
addition, the most important evaluation criteria are central processing
unit, operating system, touch screen, and battery function in sequence.
The results of the study can be adopted as reference data for mobile
phone manufacturers in the future on the design and marketing
strategy to satisfy the voice of customer.
Abstract: This paper describes a probabilistic method for
three-dimensional object recognition using a shared pool of surface
signatures. This technique uses flatness, orientation, and convexity
signatures that encode the surface of a free-form object into three
discriminative vectors, and then creates a shared pool of data by
clustering the signatures using a distance function. This method
applies the Bayes-s rule for recognition process, and it is extensible
to a large collection of three-dimensional objects.
Abstract: Feature selection is an important step in many pattern
classification problems. It is applied to select a subset of features,
from a much larger set, such that the selected subset is sufficient to
perform the classification task. Due to its importance, the problem of
feature selection has been investigated by many researchers. In this
paper, a novel feature subset search procedure that utilizes the Ant
Colony Optimization (ACO) is presented. The ACO is a
metaheuristic inspired by the behavior of real ants in their search for
the shortest paths to food sources. It looks for optimal solutions by
considering both local heuristics and previous knowledge. When
applied to two different classification problems, the proposed
algorithm achieved very promising results.
Abstract: This paper describes the design of a voltage based maximum power point tracker (MPPT) for photovoltaic (PV) applications. Of the various MPPT methods, the voltage based method is considered to be the simplest and cost effective. The major disadvantage of this method is that the PV array is disconnected from the load for the sampling of its open circuit voltage, which inevitably results in power loss. Another disadvantage, in case of rapid irradiance variation, is that if the duration between two successive samplings, called the sampling period, is too long there is a considerable loss. This is because the output voltage of the PV array follows the unchanged reference during one sampling period. Once a maximum power point (MPP) is tracked and a change in irradiation occurs between two successive samplings, then the new MPP is not tracked until the next sampling of the PV array voltage. This paper proposes an MPPT circuit in which the sampling interval of the PV array voltage, and the sampling period have been shortened. The sample and hold circuit has also been simplified. The proposed circuit does not utilize a microcontroller or a digital signal processor and is thus suitable for low cost and low power applications.
Abstract: The robot is a repeated task plant. The control of such
a plant under parameter variations and load disturbances is one of the
important problems. The aim of this work is to design Geno-Fuzzy
controller suitable for online applications to control single link rigid
robot arm plant. The genetic-fuzzy online controller (indirect
controller) has two genetic-fuzzy blocks, the first as controller, the
second as identifier. The identification method is based on inverse
identification technique. The proposed controller it tested in normal
and load disturbance conditions.
Abstract: The demand for new telecommunication services requiring higher capacities, data rates and different operating modes have motivated the development of new generation multi-standard wireless transceivers. A multi-standard design often involves extensive system level analysis and architectural partitioning, typically requiring extensive calculations. In this research, a decimation filter design tool for wireless communication standards consisting of GSM, WCDMA, WLANa, WLANb, WLANg and WiMAX is developed in MATLAB® using GUIDE environment for visual analysis. The user can select a required wireless communication standard, and obtain the corresponding multistage decimation filter implementation using this toolbox. The toolbox helps the user or design engineer to perform a quick design and analysis of decimation filter for multiple standards without doing extensive calculation of the underlying methods.
Abstract: QoS Routing aims to find paths between senders and
receivers satisfying the QoS requirements of the application which
efficiently using the network resources and underlying routing
algorithm to be able to find low-cost paths that satisfy given QoS
constraints. The problem of finding least-cost routing is known to be
NP hard or complete and some algorithms have been proposed to
find a near optimal solution. But these heuristics or algorithms either
impose relationships among the link metrics to reduce the complexity
of the problem which may limit the general applicability of the
heuristic, or are too costly in terms of execution time to be applicable
to large networks. In this paper, we analyzed two algorithms namely
Characterized Delay Constrained Routing (CDCR) and Optimized
Delay Constrained Routing (ODCR). The CDCR algorithm dealt an
approach for delay constrained routing that captures the trade-off
between cost minimization and risk level regarding the delay
constraint. The ODCR which uses an adaptive path weight function
together with an additional constraint imposed on the path cost, to
restrict search space and hence ODCR finds near optimal solution in
much quicker time.
Abstract: In this paper we present a novel design of a wearable
electronic textile. After defining a special application, we used the
specifications of some low power, tiny elements including sensors,
microcontrollers, transceivers, and a fault tolerant special topology to
have the most reliability as well as low power consumption and
longer lifetime. We have considered two different conditions as
normal and bodily critical conditions and set priorities for using
different sensors in various conditions to have a longer effective
lifetime.
Abstract: This paper proposes an architectural and graphical
user interface (GUI) design of a traditional Thai musical instrument
application for tablet computers for practicing “Ranaad Ek" which is
a trough-resonated keyboard percussion instrument. The application
provides percussion methods for a player as real as a physical
instrument. The application consists of two playing modes. The first
mode is free playing, a player can freely multi touches on wooden bar
to produce instrument sounds. The second mode is practicing mode
that guilds the player to follow percussions and rhythms of practice
songs. The application has achieved requirements and specifications.
Abstract: This article examines the nature and structure of ecological education of biology specialists in Kazakhstan. Also characterizes the ecological education in high school and specific features in training of biology specialists.
Abstract: Bacterial magnetic nanoparticles have great useful potential in biotechnological and biomedical applications. In this study, a liquid growth medium was modified for cultivation a fastidious magnetotactic bacterium that has been isolated from Anzali
lagoon, Iran in our previous research. These modifications include
change in vitamin, mineral, carbon sources and etcetera. In our
experience, the serum bottles and designed air-tight laboratory bottles
were used to create microaerobic conditions in order to development
of a method for scale-up experiment. This information may serve as a
guide to green chemistry based biological protocols for the synthesis
of magnetic nanoparticles with control over the chemical
composition, morphology and size.
Abstract: Internet is largely composed of textual contents and a
huge volume of digital contents gets floated over the Internet daily.
The ease of information sharing and re-production has made it
difficult to preserve author-s copyright. Digital watermarking came
up as a solution for copyright protection of plain text problem after
1993. In this paper, we propose a zero text watermarking algorithm
based on occurrence frequency of non-vowel ASCII characters and
words for copyright protection of plain text. The embedding
algorithm makes use of frequency non-vowel ASCII characters and
words to generate a specialized author key. The extraction algorithm
uses this key to extract watermark, hence identify the original
copyright owner. Experimental results illustrate the effectiveness of
the proposed algorithm on text encountering meaning preserving
attacks performed by five independent attackers.