Abstract: The aim of this paper is to investigate the
performance of the developed two point block method designed for
two processors for solving directly non stiff large systems of higher
order ordinary differential equations (ODEs). The method calculates
the numerical solution at two points simultaneously and produces
two new equally spaced solution values within a block and it is
possible to assign the computational tasks at each time step to a
single processor. The algorithm of the method was developed in C
language and the parallel computation was done on a parallel shared
memory environment. Numerical results are given to compare the
efficiency of the developed method to the sequential timing. For
large problems, the parallel implementation produced 1.95 speed-up
and 98% efficiency for the two processors.
Abstract: Lean production (or lean management respectively)
gained popularity in several waves. The last three decades have been
filled with numerous attempts to apply these concepts in companies.
However, this has only been partially successful. The roots of lean
production can be traced back to Toyota-s just-in-time production.
This concept, which according to Womack-s, Jones- and Roos-
research at MIT was employed by Japanese car manufacturers,
became popular under its international names “lean production",
“lean-manufacturing" and was termed “Schlanke Produktion" in
Germany. This contribution shows a review about lean production in
Germany over the last thirty years: development, trial & error and
implementation as well.
Abstract: Internet is nowadays included to all National Curriculums of the elementary school. A comparative study of their
goals leads to the conclusion that a complete curriculum should aim to student-s acquisition of the abilities to navigate and search for
information and additionally to emphasize on the evaluation of the information provided by the World Wide Web. In a constructivistic knowledge framework the design of a course has to take under
consideration the conceptual representations of students. The following paper presents the conceptual representation of students of eleven years old, attending the Sixth Grade of Greek Elementary School about World Wide Web and their use in the design and
implementation of an innovative course.
Abstract: The key to the continued success of ANN depends, considerably,
on the use of hybrid structures implemented on cooperative
frame-works. Hybrid architectures provide the ability to the ANN
to validate heterogeneous learning paradigms. This work describes
the implementation of a set of Distributed and Hybrid ANN models
for Character Recognition applied to Anglo-Assamese scripts. The
objective is to describe the effectiveness of Hybrid ANN setups as
innovative means of neural learning for an application like multilingual
handwritten character and numeral recognition.
Abstract: Corrugated wire mesh laminates (CWML) are a class
of engineered open cell structures that have potential for applications
in many areas including aerospace and biomedical engineering. Two
different methods of fabricating corrugated wire mesh laminates from
stainless steel, one using a high temperature Lithobraze alloy and the
other using a low temperature Eutectic solder for joining the
corrugated wire meshes are described herein. Their implementation is
demonstrated by manufacturing CWML samples of 304 and 316
stainless steel (SST). It is seen that due to the facility of employing
wire meshes of different densities and wire diameters, it is possible to
create CWML laminates with a wide range of effective densities. The
fabricated laminates are tested under uniaxial compression. The
variation of the compressive yield strength with relative density of the
CWML is compared to the theory developed by Gibson and Ashby for
open cell structures [22]. It is shown that the compressive strength of
the corrugated wire mesh laminates can be described using the same
equations by using an appropriate value for the linear coefficient in the
Gibson-Ashby model.
Abstract: SAD (Sum of Absolute Difference) algorithm is
heavily used in motion estimation which is computationally highly
demanding process in motion picture encoding. To enhance the
performance of motion picture encoding on a VLIW processor, an
efficient implementation of SAD algorithm on the VLIW processor is
essential. SAD algorithm is programmed as a nested loop with a
conditional branch. In VLIW processors, loop is usually optimized by
software pipelining, but researches on optimal scheduling of software
pipelining for nested loops, especially nested loops with conditional
branches are rare. In this paper, we propose an optimal scheduling and
implementation of SAD algorithm with conditional branch on a VLIW
DSP processor. The proposed optimal scheduling first transforms the
nested loop with conditional branch into a single loop with conditional
branch with consideration of full utilization of ILP capability of the
VLIW processor and realization of earlier escape from the loop. Next,
the proposed optimal scheduling applies a modulo scheduling
technique developed for single loop. Based on this optimal scheduling
strategy, optimal implementation of SAD algorithm on TMS320C67x,
a VLIW DSP is presented. Through experiments on TMS320C6713
DSK, it is shown that H.263 encoder with the proposed SAD
implementation performs better than other H.263 encoder with other
SAD implementations, and that the code size of the optimal SAD
implementation is small enough to be appropriate for embedded
environments.
Abstract: Knowledge-based e-mail systems focus on
incorporating knowledge management approach in order to enhance
the traditional e-mail systems. In this paper, we present a knowledgebased
e-mail system called KS-Mail where people do not only send
and receive e-mail conventionally but are also able to create a sense
of knowledge flow. We introduce semantic processing on the e-mail
contents by automatically assigning categories and providing links to
semantically related e-mails. This is done to enrich the knowledge
value of each e-mail as well as to ease the organization of the e-mails
and their contents. At the application level, we have also built
components like the service manager, evaluation engine and search
engine to handle the e-mail processes efficiently by providing the
means to share and reuse knowledge. For this purpose, we present the
KS-Mail architecture, and elaborate on the details of the e-mail
server and the application server. We present the ontology mapping
technique used to achieve the e-mail content-s categorization as well
as the protocols that we have developed to handle the transactions in
the e-mail system. Finally, we discuss further on the implementation
of the modules presented in the KS-Mail architecture.
Abstract: The one of most important objects in implementation
of damage analysis observations is manner of dam break wave
propagation. In this paper velocity and wave height due dam break in
with and without tailwater states for appointment hazardous lands
and flood radius are investigate. In order to modeling above
phenomenon finite volume method of Roe type for solving shallow
water equations is used. Results indicated that in the dry bed state
risk radius due to dam break is too high. While in the wet bed risk
radius has a less wide. Therefore in the first state constructions and
storage facilities are encountered with destruction risk. Further
velocity due to dam break in the second state is more comparing to
the first state. Hence erosion and scour the river bed in the dry bed is
too more compare to the wet bed.
Abstract: This work deals with aspects of support vector learning for large-scale data mining tasks. Based on a decomposition algorithm that can be run in serial and parallel mode we introduce a data transformation that allows for the usage of an expensive generalized kernel without additional costs. In order to speed up the decomposition algorithm we analyze the problem of working set selection for large data sets and analyze the influence of the working set sizes onto the scalability of the parallel decomposition scheme. Our modifications and settings lead to improvement of support vector learning performance and thus allow using extensive parameter search methods to optimize classification accuracy.
Abstract: With the fast progression of data exchange in electronic way, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like image encryption and Visual Cryptography). Implementations of these two algorithms have been realized for experimental purposes. The results of analysis are given in this paper.
Abstract: The aim of this study is to determine the basic information and communication technology (ICT) skills that may be needed by students studying in the 8th grade of the primary education in their cooperative project works implemented via the Internet. Within the scope of the study, the curriculum used for European Computer Driving License (ECDL) and the curriculum used in Turkey are also compared in terms of the ability to use ICT, which is aimed to be provided to the students. The research population of the study, during which the pre test – post test control group experimental model was used, consisted of 40 students from three different schools. In the first stage of the study, the skills that might be needed by students for their cooperative project works implemented via the Internet were determined through examination of the completed Comenious, e – twinning and WorldLinks projects. In the second stage of the study, the curriculums of the Turkish Ministry of National Education (MEB) and ECDL were evaluated by seven different teachers in line with these skills. Also in this study the ECDL and MEB curriculums were compared in terms of capability to provide the skills to implement cooperative projects via the Internet. In line with the findings of the study, the skills that might be needed by students to implement cooperative projects via the Internet were outlined, and existence of a significant difference was established in favor of the ECDL curriculum upon comparison of both curriculums in accordance with this outline (U = 50,500; p
Abstract: The objective of this research intends to create a suitable model of distance training for community leaders in the upper northeastern region of Thailand. The implementation of the research process is divided into four steps: The first step is to analyze relevant documents. The second step deals with an interview in depth with experts. The third step is concerned with constructing a model. And the fourth step takes aim at model validation by expert assessments. The findings reveal the two important components for constructing an appropriate model of distance training for community leaders in the upper northeastern region. The first component consists of the context of technology management, e.g., principle, policy and goals. The second component can be viewed in two ways. Firstly, there are elements comprising input, process, output and feedback. Secondly, the sub-components include steps and process in training. The result of expert assessments informs that the researcher-s constructed model is consistent and suitable and overall the most appropriate.
Abstract: In this paper, enhanced ground proximity warning simulation and validation system is designed and implemented. First, based on square grid and sub-grid structure, the global digital terrain database is designed and constructed. Terrain data searching is implemented through querying the latitude and longitude bands and separated zones of global terrain database with the current aircraft position. A combination of dynamic scheduling and hierarchical scheduling is adopted to schedule the terrain data, and the terrain data can be read and delete dynamically in the memory. Secondly, according to the scope, distance, approach speed information etc. to the dangerous terrain in front, and using security profiles calculating method, collision threat detection is executed in real-time, and provides caution and warning alarm. According to this scheme, the implementation of the enhanced ground proximity warning simulation system is realized. Simulations are carried out to verify a good real-time in terrain display and alarm trigger, and the results show simulation system is realized correctly, reasonably and stable.
Abstract: There is inadequate information on the practice of
female genital mutilation (FGM) in the UK, and there are often
myths and perceptions within communities that influence the
effectiveness of prevention programmes. This means it is difficult to
address the trends and changes in the practice in the UK.
To this end, FORWARD undertook novel and innovative research
using the Participatory Ethnographic and Evaluative Research
(PEER) method to explore the views of women from Eritrea, Sudan,
Somalia and Ethiopia that live in London and Bristol (two UK cities).
Women-s views, taken from PEER interviews, reflected reasons for
continued practice of FGM: marriageability, the harnessing and
control of female sexuality, and upholding traditions from their
countries of origin. It was also clear that the main supporters of the
practice were believed to be older women within families and
communities.
Women described the impact FGM was having on their lives as
isolating. And although it was clearly considered a private and
personal matter, they developed a real sense of connection with their
peers within the research process.
The women were overwhelmingly positive about combating the
practice, although they believed it would probably take a while
before it ends completely. They also made concrete
recommendations on how to improve support services for women
affected by FGM: Training for professionals (particularly in
healthcare), increased engagement with, and outreach to,
communities, culturally appropriate materials and information made
available and accessible to communities, and more consequent
implementation of legislation.
Finally, the women asked for more empathy and understanding,
particularly from health professionals. Rather than presenting FGM
as a completely alien and inconceivable practice, it may help for
those looking into these women-s lives and working with them to
understand the social and economic context in which the practice
takes place.
Abstract: This paper describes the design concepts and
implementation of a 5-Joint mechanical arm for a rescue robot named
CEO Mission II. The multi-joint arm is a five degree of freedom
mechanical arm with a four bar linkage, which can be stretched to
125 cm. long. It is controlled by a teleoperator via the user-friendly
control and monitoring GUI program. With Inverse Kinematics
principle, we developed the method to control the servo angles of all
arm joints to get the desired tip position. By clicking the determined
tip position or dragging the tip of the mechanical arm on the
computer screen to the desired target point, the robot will compute
and move its multi-joint arm to the pose as seen on the GUI screen.
The angles of each joint are calculated and sent to all joint servos
simultaneously in order to move the mechanical arm to the desired
pose at once. The operator can also use a joystick to control the
movement of this mechanical arm and the locomotion of the robot.
Many sensors are installed at the tip of this mechanical arm for
surveillance from the high level and getting the vital signs of victims
easier and faster in the urban search and rescue tasks. It works very
effectively and easy to control. This mechanical arm and its software
were developed as a part of the CEO Mission II Rescue Robot that
won the First Runner Up award and the Best Technique award from
the Thailand Rescue Robot Championship 2006. It is a low cost,
simple, but functioning 5-Jiont mechanical arm which is built from
scratch, and controlled via wireless LAN 802.11b/g. This 5-Jiont
mechanical arm hardware concept and its software can also be used
as the basic mechatronics to many real applications.
Abstract: This paper presents an analysis on the capacity and performance of MIMO-OFDM systems. The work is focused on the capacity of MIMO-OFDM systems over rician fading channel, in the case of the channel being known at the receiver only, which is more practical case of the channel. Simple expression for capacity is derived for the case of correlated rician fading. The performance of some MIMO-OFDM implementations with rician fading model is presented using an Alamouti coding scheme and Simulation results are obtained for both capacity and performance analysis.
Abstract: In this paper a novel, simple and reliable digital firing
scheme has been implemented for speed control of three-phase
induction motor using ac voltage controller. The system consists of
three-phase supply connected to the three-phase induction motor via
three triacs and its control circuit. The ac voltage controller has three
modes of operation depending on the shape of supply current. The
performance of the induction motor differs in each mode where the
speed is directly proportional with firing angle in two modes and
inversely in the third one. So, the control system has to detect the
current mode of operation to choose the correct firing angle of triacs.
Three sensors are used to feed the line currents to control system to
detect the mode of operation. The control strategy is implemented
using a low cost Xilinx Spartan-3E field programmable gate array
(FPGA) device. Three PI-controllers are designed on FPGA to
control the system in the three-modes. Simulation of the system is
carried out using PSIM computer program. The simulation results
show stable operation for different loading conditions especially in
mode 2/3. The simulation results have been compared with the
experimental results from laboratory prototype.
Abstract: As a vital activity for companies, new product
development (NPD) is also a very risky process due to the high
uncertainty degree encountered at every development stage and the
inevitable dependence on how previous steps are successfully
accomplished. Hence, there is an apparent need to evaluate new
product initiatives systematically and make accurate decisions under
uncertainty. Another major concern is the time pressure to launch a
significant number of new products to preserve and increase the
competitive power of the company. In this work, we propose an
integrated decision-making framework based on neural networks and
fuzzy logic to make appropriate decisions and accelerate the
evaluation process. We are especially interested in the two initial
stages where new product ideas are selected (go/no go decision) and
the implementation order of the corresponding projects are
determined. We show that this two-staged intelligent approach allows
practitioners to roughly and quickly separate good and bad product
ideas by making use of previous experiences, and then, analyze a
more shortened list rigorously.
Abstract: The “PYRAMIDS" Block Cipher is a symmetric encryption algorithm of a 64, 128, 256-bit length, that accepts a variable key length of 128, 192, 256 bits. The algorithm is an iterated cipher consisting of repeated applications of a simple round transformation with different operations and different sequence in each round. The algorithm was previously software implemented in Cµ code. In this paper, a hardware implementation of the algorithm, using Field Programmable Gate Arrays (FPGA), is presented. In this work, we discuss the algorithm, the implemented micro-architecture, and the simulation and implementation results. Moreover, we present a detailed comparison with other implemented standard algorithms. In addition, we include the floor plan as well as the circuit diagrams of the various micro-architecture modules.
Abstract: Designing and implementing intelligent systems has become a crucial factor for the innovation and development of better products of space technologies. A neural network is a parallel system, capable of resolving paradigms that linear computing cannot. Field programmable gate array (FPGA) is a digital device that owns reprogrammable properties and robust flexibility. For the neural network based instrument prototype in real time application, conventional specific VLSI neural chip design suffers the limitation in time and cost. With low precision artificial neural network design, FPGAs have higher speed and smaller size for real time application than the VLSI and DSP chips. So, many researchers have made great efforts on the realization of neural network (NN) using FPGA technique. In this paper, an introduction of ANN and FPGA technique are briefly shown. Also, Hardware Description Language (VHDL) code has been proposed to implement ANNs as well as to present simulation results with floating point arithmetic. Synthesis results for ANN controller are developed using Precision RTL. Proposed VHDL implementation creates a flexible, fast method and high degree of parallelism for implementing ANN. The implementation of multi-layer NN using lookup table LUT reduces the resource utilization for implementation and time for execution.