Abstract: The complexity of today-s software systems makes
collaborative development necessary to accomplish tasks.
Frameworks are necessary to allow developers perform their tasks
independently yet collaboratively. Similarity detection is one of the
major issues to consider when developing such frameworks. It allows
developers to mine existing repositories when developing their own
views of a software artifact, and it is necessary for identifying the
correspondences between the views to allow merging them and
checking their consistency. Due to the importance of the
requirements specification stage in software development, this paper
proposes a framework for collaborative development of Object-
Oriented formal specifications along with a similarity detection
approach to support the creation, merging and consistency checking
of specifications. The paper also explores the impact of using
additional concepts on improving the matching results. Finally, the
proposed approach is empirically evaluated.
Abstract: We present a simplified equalization technique for a
π/4 differential quadrature phase shift keying ( π/4 -DQPSK) modulated
signal in a multipath fading environment. The proposed equalizer is
realized as a fractionally spaced adaptive decision feedback equalizer
(FS-ADFE), employing exponential step-size least mean square
(LMS) algorithm as the adaptation technique. The main advantage of
the scheme stems from the usage of exponential step-size LMS algorithm
in the equalizer, which achieves similar convergence behavior
as that of a recursive least squares (RLS) algorithm with significantly
reduced computational complexity. To investigate the finite-precision
performance of the proposed equalizer along with the π/4 -DQPSK
modem, the entire system is evaluated on a 16-bit fixed point digital
signal processor (DSP) environment. The proposed scheme is found
to be attractive even for those cases where equalization is to be
performed within a restricted number of training samples.
Abstract: The use of machine vision to inspect the outcome of
surgical tasks is investigated, with the aim of incorporating this
approach in robotic surgery systems. Machine vision is a non-contact
form of inspection i.e. no part of the vision system is in direct contact
with the patient, and is therefore well suited for surgery where
sterility is an important consideration,. As a proof-of-concept, three
primary surgical tasks for a common neurosurgical procedure were
inspected using machine vision. Experiments were performed on
cadaveric pig heads to simulate the two possible outcomes i.e.
satisfactory or unsatisfactory, for tasks involved in making a burr
hole, namely incision, retraction, and drilling. We identify low level
image features to distinguish the two outcomes, as well as report on
results that validate our proposed approach. The potential of using
machine vision in a surgical environment, and the challenges that
must be addressed, are identified and discussed.
Abstract: In this paper, investigation of subsynchronous
resonance (SSR) characteristics of a hybrid series compensated
system and the design of voltage controller for three level 24-pulse
Voltage Source Converter based Static Synchronous Series
Compensator (SSSC) is presented. Hybrid compensation consists of
series fixed capacitor and SSSC which is a active series FACTS
controller. The design of voltage controller for SSSC is based on
damping torque analysis, and Genetic Algorithm (GA) is adopted for
tuning the controller parameters. The SSR Characteristics of SSSC
with constant reactive voltage control modes has been investigated.
The results show that the constant reactive voltage control of SSSC
has the effect of reducing the electrical resonance frequency, which
detunes the SSR.The analysis of SSR with SSSC is carried out based
on frequency domain method, eigenvalue analysis and transient
simulation. While the eigenvalue and damping torque analysis are
based on D-Q model of SSSC, the transient simulation considers both
D-Q and detailed three phase nonlinear system model using
switching functions.
Abstract: Soccer simulation is an effort to motivate researchers and practitioners to do artificial and robotic intelligence research; and at the same time put into practice and test the results. Many researchers and practitioners throughout the world are continuously working to polish their ideas and improve their implemented systems. At the same time, new groups are forming and they bring bright new thoughts to the field. The research includes designing and executing robotic soccer simulation algorithms. In our research, a soccer simulation player is considered to be an intelligent agent that is capable of receiving information from the environment, analyze it and to choose the best action from a set of possible ones, for its next move. We concentrate on developing a two-phase method for the soccer player agent to choose its best next move. The method is then implemented into our software system called Nexus simulation team of Ferdowsi University. This system is based on TsinghuAeolus[1] team that was the champion of the world RoboCup soccer simulation contest in 2001 and 2002.
Abstract: An ethnobotanical study was conducted to document
local knowledge and potentials of wild edible tubers that has been
reported and sighted and to investigate and record their distribution in
Pulau Redang and nearby islands of Terengganu, Malaysia.
Information was gathered from 42 villagers by using semi-structured
questionnaire. These respondents were selected randomly and no
appointment was made prior to the visits. For distribution, the
locations of wild edible tubers were recorded by using the Global
Positioning System (GPS). The wild edible tubers recorded were ubi
gadung, ubi toyo, ubi kasu, ubi jaga, ubi seratus and ubi kertas.
Dioscorea or commonly known as yam is reported to be one of the
major food sources worldwide. The majority of villagers used
Dioscorea hispida Dennst. or ubi gadung in many ways in their life
such as for food, medicinal purposes and fish poison. The villagers
have identified this ubi gadung by looking at the morphological
characteristics; that include leaf shape, stem and the color of the
tuber-s flesh.
Abstract: Liquidity risk management ranks to key concepts
applied in finance. Liquidity is defined as a capacity to obtain
funding when needed, while liquidity risk means as a threat to this
capacity to generate cash at fair costs. In the paper we present
challenges of liquidity risk management resulting from the 2007-
2009 global financial upheaval. We see five main regulatory
liquidity risk management issues requiring revision in coming
years: liquidity measurement, intra-day and intra-group liquidity
management, contingency planning and liquidity buffers, liquidity
systems, controls and governance, and finally models testing the
viability of business liquidity models.
Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: One major source of performance decline in speaker
recognition system is channel mismatch between training and testing.
This paper focuses on improving channel robustness of speaker
recognition system in two aspects of channel compensation technique
and channel robust features. The system is text-independent speaker
identification system based on two-stage recognition. In the aspect of
channel compensation technique, this paper applies MAP (Maximum
A Posterior Probability) channel compensation technique, which was
used in speech recognition, to speaker recognition system. In the
aspect of channel robust features, this paper introduces
pitch-dependent features and pitch-dependent speaker model for the
second stage recognition. Based on the first stage recognition to
testing speech using GMM (Gaussian Mixture Model), the system
uses GMM scores to decide if it needs to be recognized again. If it
needs to, the system selects a few speakers from all of the speakers
who participate in the first stage recognition for the second stage
recognition. For each selected speaker, the system obtains 3
pitch-dependent results from his pitch-dependent speaker model, and
then uses ANN (Artificial Neural Network) to unite the 3
pitch-dependent results and 1 GMM score for getting a fused result.
The system makes the second stage recognition based on these fused
results. The experiments show that the correct rate of two-stage
recognition system based on MAP channel compensation technique
and pitch-dependent features is 41.7% better than the baseline system
for closed-set test.
Abstract: Prestressing in structure increases ratio of load-bearing capacity to weight. Suspendomes are single-layer braced domes reinforced with cable and strut. Prestressing of cables alter value and distribution of stress in structure. In this study two configuration, diamatic and lamella domes is selected. Investigated domes have span of 100m with rise-to-span ratios of 0.1, 0.2, and 0.3. Single layer domes loaded under service load combinations according to ISO code. After geometric nonlinear analysis, models are designed with tubular and I-shaped sections then reinforced with cable and strut and converted to suspendomes. Displacements and stresses of some groups of nodes and elements in all of single-layer domes and suspendomes for three load combinations, symmetric snow, asymmetric snow and wind are compared. Variation due to suspending system is investigated. Suspendomes are redesigned and minimum possible weight after addition of cable and strut is obtained.
Abstract: The purpose of planned islanding is to construct a
power island during system disturbances which are commonly
formed for maintenance purpose. However, in most of the cases
island mode operation is not allowed. Therefore distributed
generators (DGs) must sense the unplanned disconnection from the
main grid. Passive technique is the most commonly used method for
this purpose. However, it needs improvement in order to identify the
islanding condition. In this paper an effective method for
identification of islanding condition based on phase space and neural
network techniques has been developed. The captured voltage
waveforms at the coupling points of DGs are processed to extract the
required features. For this purposed a method known as the phase
space techniques is used. Based on extracted features, two neural
network configuration namely radial basis function and probabilistic
neural networks are trained to recognize the waveform class.
According to the test result, the investigated technique can provide
satisfactory identification of the islanding condition in the
distribution system.
Abstract: In the management of industrial waste, conversion from the use of paper invoices to electronic forms is currently under way in developed countries. Difficulties in such computerization include the lack of synchronization between the actual goods and the corresponding data managed by the server. Consequently, a system which utilizes the incorporation of a QR code in connection with the waste material has been developed. The code is read at each stage, from discharge until disposal, and progress at each stage can be easily reported. This system can be linked with Japanese public digital authentication service of waste, taking advantage of its good points, and can be used to submit reports to the regulatory authorities. Its usefulness was confirmed by a verification test, and put into actual practice.
Abstract: In highly competitive environments, a growing
number of companies must regularly launch new products speedily
and successfully. A company-s success is based on the systematic,
conscious product designing method which meets the market
requirements and takes risks as well as resources into consideration.
Research has found that developing and launching new products are
inherently risky endeavors. Hence in this research, we aim at
introducing a risk evaluation framework for the new product
innovation process. Our framework is based on the fuzzy analytical
hierarchy process (FAHP) methodology. We have applied all the
stages of the framework on the risk evaluation process of a
pharmaceuticals company.
Abstract: In this paper, some brief sufficient conditions for the stability of FO-LTI systems dαx(t) dtα = Ax(t) with the fractional order are investigated when the matrix A and the fractional order α are uncertain or both α and A are uncertain, respectively. In addition, we also relate the stability of a fractional-order system with order 0 < α ≤ 1 to the stability of its equivalent fractional-order system with order 1 ≤ β < 2, the relationship between α and β is presented. Finally, a numeric experiment is given to demonstrate the effectiveness of our results.
Abstract: From an economic standpoint the current and future
road traffic situation in urban areas is a cost factor. Traffic jams and
congestion prolong journey times and tie up resources in trucks and
personnel. Many discussions about imposing charges or tolls for
cities in Europe in order to reduce traffic congestion are currently in
progress. Both of these effects lead – directly or indirectly - to
additional costs for the urban distribution systems in retail
companies. One approach towards improving the efficiency of retail
distribution systems, and thus towards avoiding negative
environmental factors in urban areas, is horizontal collaboration for
deliveries to retail outlets – Urban Retail Logistics. This paper
presents a classification system to help reveal where cooperation
between retail companies is possible and makes sense for deliveries
to retail outlets in urban areas.
Abstract: Transmission control protocol (TCP) Vegas detects
network congestion in the early stage and successfully prevents
periodic packet loss that usually occurs in TCP Reno. It has been
demonstrated that TCP Vegas outperforms TCP Reno in many
aspects. However, TCP Vegas suffers several problems that affect its
congestion avoidance mechanism. One of the most important
weaknesses in TCP Vegas is that alpha and beta depend on a good
expected throughput estimate, which as we have seen, depends on a
good minimum RTT estimate. In order to make the system more
robust alpha and beta must be made responsive to network conditions
(they are currently chosen statically). This paper proposes a modified
Vegas algorithm, which can be adjusted to present good performance
compared to other transmission control protocols (TCPs). In order to
do this, we use PSO algorithm to tune alpha and beta. The simulation
results validate the advantages of the proposed algorithm in term of
performance.
Abstract: This paper examines the implementation of RC5 block cipher for digital images along with its detailed security analysis. A complete specification for the method of application of the RC5 block cipher to digital images is given. The security analysis of RC5 block cipher for digital images against entropy attack, bruteforce, statistical, and differential attacks is explored from strict cryptographic viewpoint. Experiments and results verify and prove that RC5 block cipher is highly secure for real-time image encryption from cryptographic viewpoint. Thorough experimental tests are carried out with detailed analysis, demonstrating the high security of RC5 block cipher algorithm.
Abstract: Cellular networks provide voice and data services to the users with mobility. To deliver services to the mobile users, the cellular network is capable of tracking the locations of the users, and allowing user movement during the conversations. These capabilities are achieved by the location management. Location management in mobile communication systems is concerned with those network functions necessary to allow the users to be reached wherever they are in the network coverage area. In a cellular network, a service coverage area is divided into smaller areas of hexagonal shape, referred to as cells. The cellular concept was introduced to reuse the radio frequency. Continued expansion of cellular networks, coupled with an increasingly restricted mobile spectrum, has established the reduction of communication overhead as a highly important issue. Much of this traffic is used in determining the precise location of individual users when relaying calls, with the field of location management aiming to reduce this overhead through prediction of user location. This paper describes and compares various location management schemes in the cellular networks.
Abstract: This paper mathematically analyses the varying
magnitude of production loss, which may occur due to idle time (inprocess
waiting time and traveling time) on a linear walking worker
assembly line. Within this flexible and reconfigurable assembly
system, each worker travels down the line carrying out each
assembly task at each station; and each worker accomplishes the
assembly of a unit from start to finish and then travels back to the
first station to start the assembly of a new product. This strategy of
system design attempts to combine the flexibility of the U-shaped
moving worker assembly cell with the efficiency of the conventional
fixed worker assembly line. The paper aims to evaluate the effect of
idle time that may offset the labor efficiency of each walking worker
providing an insight into the mechanism of such a flexible and
reconfigurable assembly system.
Abstract: In this paper, backup and recovery technique for Peer
to Peer applications, such as a distributed asynchronous Web-Based
Training system that we have previously proposed. In order to
improve the scalability and robustness of this system, all contents and
function are realized on mobile agents. These agents are distributed
to computers, and they can obtain using a Peer to Peer network
that modified Content-Addressable Network. In the proposed system,
although entire services do not become impossible even if some
computers break down, the problem that contents disappear occurs
with an agent-s disappearance. As a solution for this issue, backups
of agents are distributed to computers. If a failure of a computer is
detected, other computers will continue service using backups of the
agents belonged to the computer.