Abstract: This paper describes a new algorithm of arrangement
in parallel, based on Odd-Even Mergesort, called division and
concurrent mixes. The main idea of the algorithm is to achieve that
each processor uses a sequential algorithm for ordering a part of the
vector, and after that, for making the processors work in pairs in
order to mix two of these sections ordered in a greater one, also
ordered; after several iterations, the vector will be completely
ordered. The paper describes the implementation of the new
algorithm on a Message Passing environment (such as MPI). Besides,
it compares the obtained experimental results with the quicksort
sequential algorithm and with the parallel implementations (also on
MPI) of the algorithms quicksort and bitonic sort. The comparison
has been realized in an 8 processors cluster under GNU/Linux which
is running on a unique PC processor.
Abstract: We decribe a formal specification and verification of the Rabin public-key scheme in the formal proof system Is-abelle/HOL. The idea is to use the two views of cryptographic verification: the computational approach relying on the vocabulary of probability theory and complexity theory and the formal approach based on ideas and techniques from logic and programming languages. The analysis presented uses a given database to prove formal properties of our implemented functions with computer support. Thema in task in designing a practical formalization of correctness as well as security properties is to cope with the complexity of cryptographic proving. We reduce this complexity by exploring a light-weight formalization that enables both appropriate formal definitions as well as eficient formal proofs. This yields the first computer-proved implementation of the Rabin public-key scheme in Isabelle/HOL. Consequently, we get reliable proofs with a minimal error rate augmenting the used database. This provides a formal basis for more computer proof constructions in this area.
Abstract: A novel and efficient approach to realize
fractional-order capacitors is investigated in this paper. Meanwhile, a
new approach which is more efficient for semiconductor
implementation of fractional-order capacitors is proposed. The
feasibility of the approach has been verified with the preliminary
measured results.
Abstract: The myoelectric signal (MES) is one of the Biosignals
utilized in helping humans to control equipments. Recent approaches
in MES classification to control prosthetic devices employing pattern
recognition techniques revealed two problems, first, the classification
performance of the system starts degrading when the number of
motion classes to be classified increases, second, in order to solve the
first problem, additional complicated methods were utilized which
increase the computational cost of a multifunction myoelectric
control system. In an effort to solve these problems and to achieve a
feasible design for real time implementation with high overall
accuracy, this paper presents a new method for feature extraction in
MES recognition systems. The method works by extracting features
using Wavelet Packet Transform (WPT) applied on the MES from
multiple channels, and then employs Fuzzy c-means (FCM)
algorithm to generate a measure that judges on features suitability for
classification. Finally, Principle Component Analysis (PCA) is
utilized to reduce the size of the data before computing the
classification accuracy with a multilayer perceptron neural network.
The proposed system produces powerful classification results (99%
accuracy) by using only a small portion of the original feature set.
Abstract: Cooperative visual modeling is more and more
necessary in our complicated world. A collaborative environment
which supports interactive operation and communication is required
to increase work efficiency. We present a collaborative visual
modeling framework which collaborative platform could be built on.
On this platform, cooperation and communication is available for
designers from different regions. This framework, which is different
from other collaborative frameworks, contains a uniform message
format, a message handling mechanism and other functions such as
message pretreatment and Role-Communication-Token Access
Control (RCTAC). We also show our implementation of this
framework called Orchestra Designer, which support BPLE
workflow modeling cooperatively online.
Abstract: The Implementation of the Union law faces major
challenges today. If for a long period of time, the Community and the
Union have persevered in their legislative vocation, now one can
notice that this large legislative quantity has complicated the task of
knowledge and of application the European standards. Under these
circumstances, it became necessary, in order to give effectiveness to
the European legislation, the development of some operational
application criteria and the generation of some new implementation
tools. The correct application of the European Union legislation by
the national public administrations was considered by the European
Commission as being crucial for further integration and proper
functioning of the internal market. Among the initiatives launched in
the past years to promote the exchange of good administrative
practices in the correct application of European Union legislation,
SOLVIT net has proved to be one of the most effective.
Abstract: A suitable e-learning system management needs to
carry out a web-information system in order to allow integrated
fruition of data and metadata concerning the activities typical of elearning
environment. The definition of a “web information system"
for e-learning takes advantage of the potentialities of Web
technologies both as for the access to metadata present on the several
platforms, and as for the implementation of courseware which make
up the relative didactic environment. What information systems have
in common is the technological environment on which they are
generally implemented and the use of metadata in order to structure
information at all cognitive and organization levels. In this work we
are going to define a methodology for the implementation of a
specific web information system for an e-learning environment.
Abstract: Nowadays there is a growing environmental concern
and the business communities have slowly started recognising
environmental protection and sustainable utilization of natural
resources into their marketing strategies. This paper discusses the
various Ecolabeling and Certification Systems developed world
over to regulate and introduce Fair Trade in Ornamental Fish
Industry. Ecolabeling and green certification are considered as part
of these strategies implemented partly out of compulsion from the
National and International Regulatory Bodies and Environmental
Movements. All the major markets of ornamental fishes like
European Union, USA and Japan have started putting restrictions on
the trade to impose ecolabeling as a non tariff barrier like the one
imposed on seafood and aqua cultured products. A review was done
on the available Ecolabeling and Green Certification Schemes
available at local, national and international levels for fisheries
including aquaculture and ornamental fish trade and to examine the
success and constraints faced by these schemes during its
implementation. The primary downside of certification is the
multiplicity of ecolabels and cost incurred by applicants for
certification, costs which may in turn be passed on to consumers.
The studies reveal serious inadequacies in a number of ecolabels
and cast doubt on their overall contribution to effective fisheries
management and sustainability. The paper also discusses the
inititive taken in India to develop guidelines for Green Certification
of Fresh water ornamental fishes.
Abstract: The purpose of the paper is to develop an informationcontrol environment for overall management and self-reconfiguration of the reconfigurable multifunctional machine tool for machining both rotation and prismatic parts and high concentration of different technological operations - turning, milling, drilling, grinding, etc. For the realization of this purpose on the basis of defined sub-processes for the implementation of the technological process, architecture of the information-search system for machine control is suggested. By using the object-oriented method, a structure and organization of the search system based on agents and manager with central control are developed. Thus conditions for identification of available information in DBs, self-reconfiguration of technological system and entire control of the reconfigurable multifunctional machine tool are created.
Abstract: The objective of this paper is to analyse the
application of the Half-Sweep Gauss-Seidel (HSGS) method by using
the Half-sweep approximation equation based on central difference
(CD) and repeated trapezoidal (RT) formulas to solve linear fredholm
integro-differential equations of first order. The formulation and
implementation of the Full-Sweep Gauss-Seidel (FSGS) and Half-
Sweep Gauss-Seidel (HSGS) methods are also presented. The HSGS
method has been shown to rapid compared to the FSGS methods.
Some numerical tests were illustrated to show that the HSGS method
is superior to the FSGS method.
Abstract: In this paper the FPGA implementations for four
stream ciphers are presented. The two stream ciphers, MUGI and
SNOW 2.0 are recently adopted by the International Organization for
Standardization ISO/IEC 18033-4:2005 standard. The other two
stream ciphers, MICKEY 128 and TRIVIUM have been submitted
and are under consideration for the eSTREAM, the ECRYPT
(European Network of Excellence for Cryptology) Stream Cipher
project. All ciphers were coded using VHDL language. For the
hardware implementation, an FPGA device was used. The proposed
implementations achieve throughputs range from 166 Mbps for
MICKEY 128 to 6080 Mbps for MUGI.
Abstract: Signal processing applications which are iterative in
nature are best represented by data flow graphs (DFG). In these
applications, the maximum sampling frequency is dependent on the
topology of the DFG, the cyclic dependencies in particular. The
determination of the iteration bound, which is the reciprocal of the
maximum sampling frequency, is critical in the process of hardware
implementation of signal processing applications. In this paper, a
novel technique to compute the iteration bound is proposed. This
technique is different from all previously proposed techniques, in the
sense that it is based on the natural flow of tokens into the DFG
rather than the topology of the graph. The proposed algorithm has
lower run-time complexity than all known algorithms. The
performance of the proposed algorithm is illustrated through
analytical analysis of the time complexity, as well as through
simulation of some benchmark problems.
Abstract: Internet Protocol version 4 (IPv4) address is decreasing and a rapid transition method to the next generation IP address (IPv6) should be established. This study aims to evaluate and select the best performance of the IPv6 address network transitionmechanisms, such as IPv4/IPv6 dual stack, transport Relay Translation (TRT) and Reverse Proxy with additional features. It is also aim to prove that faster access can be done while ensuring optimal usage of available resources used during the test and actual implementation. This study used two test methods such asInternet Control Message Protocol (ICMP)ping and ApacheBenchmark (AB) methodsto evaluate the performance.Performance metrics for this study include aspects ofaverageaccessin one second,time takenfor singleaccess,thedata transfer speed and the costof additional requirements.Reverse Proxy with Caching featureis the most efficientmechanism because of it simpler configurationandthe best performerfrom the test conducted.
Abstract: We report in this paper the procedure of a system of
automatic speech recognition based on techniques of the dynamic
programming. The technique of temporal retiming is a technique
used to synchronize between two forms to compare. We will see how
this technique is adapted to the field of the automatic speech
recognition. We will expose, in a first place, the theory of the
function of retiming which is used to compare and to adjust an
unknown form with a whole of forms of reference constituting the
vocabulary of the application. Then we will give, in the second place,
the various algorithms necessary to their implementation on machine.
The algorithms which we will present were tested on part of the
corpus of words in Arab language Arabdic-10 [4] and gave whole
satisfaction. These algorithms are effective insofar as we apply them
to the small ones or average vocabularies.
Abstract: The performance of sensor-less controlled induction
motor drive depends on the accuracy of the estimated speed.
Conventional estimation techniques being mathematically complex
require more execution time resulting in poor dynamic response. The
nonlinear mapping capability and powerful learning algorithms of
neural network provides a promising alternative for on-line speed
estimation. The on-line speed estimator requires the NN model to be
accurate, simpler in design, structurally compact and computationally
less complex to ensure faster execution and effective control in real
time implementation. This in turn to a large extent depends on the
type of Neural Architecture. This paper investigates three types of
neural architectures for on-line speed estimation and their
performance is compared in terms of accuracy, structural
compactness, computational complexity and execution time. The
suitable neural architecture for on-line speed estimation is identified
and the promising results obtained are presented.
Abstract: Network reconfiguration is an operation to modify the
network topology. The implementation of network reconfiguration
has many advantages such as loss minimization, increasing system
security and others. In this paper, two topics about the network
reconfiguration in distribution system are briefly described. The first
topic summarizes its impacts while the second explains some
heuristic optimization techniques for solving the network
reconfiguration problem.
Abstract: Even though so many efforts have been taken to
renovate and renew the architecture of Miyaneh villages in cold and
dry regions of Iran-s northwest, these efforts failed due to lack of
significant study and ignoring the past and sustainable history of
those villages. Considering the overpopulation of Iran-s villages as
well as the importance in preventing their immigration to cities,
recognizing village architecture and its construction technology is of
great significance to attain sustainable residence in villages. As the
only vertical surface in the space, wall possesses its unique special
characteristics, and it is also a very important architectural element
able to provide the immunity and comfort space for the residents.
This article analyzes the characteristics of this vertical element, main
types of adobe and stone walls, locally constructed technologies,
implementation, the elements forming the walls in the frame of
village house typology of Miyaneh, which has the most villages in
East Azerbaijan, based on sustainable architectural construction
materials of walls.
Abstract: Creation of information society, or in other words, a
society based on knowledge, has wide consequences, both on
individual and complete society, and in general – on a economy of
one country. Development and implementation of ICT represents a
stimulant for economic growth. On individual level, knowledge,
skills and information gathered using ICT, are expanding individual
possibilities of persons, enabling them to have access to timely
sensitive information, such as market prices or investment
conditions, possibilities to access Government-s or private
development funds, etc. By doing so, productivity is increased both
on individual and national level and therefore social wellbeing in
general. In one word, creation of information society - a knowledge
society is happening.
This work will describe challenges and strategies that will follow
the development as well as obstacles in creating information society
– knowledge society in Montenegro.
Abstract: Functionalities and control behavior are both primary
requirements in design of a complex system. Automata theory plays
an important role in modeling behavior of a system. Z is an ideal
notation which is used for describing state space of a system and then
defining operations over it. Consequently, an integration of automata
and Z will be an effective tool for increasing modeling power for a
complex system. Further, nondeterministic finite automata (NFA)
may have different implementations and therefore it is needed to
verify the transformation from diagrams to a code. If we describe
formal specification of an NFA before implementing it, then
confidence over transformation can be increased. In this paper, we
have given a procedure for integrating NFA and Z. Complement of a
special type of NFA is defined. Then union of two NFAs is
formalized after defining their complements. Finally, formal
construction of intersection of NFAs is described. The specification
of this relationship is analyzed and validated using Z/EVES tool.
Abstract: There have been numerous implementations of
security system using biometric, especially for identification and
verification cases. An example of pattern used in biometric is the iris
pattern in human eye. The iris pattern is considered unique for each
person. The use of iris pattern poses problems in encoding the human
iris.
In this research, an efficient iris recognition method is proposed.
In the proposed method the iris segmentation is based on the
observation that the pupil has lower intensity than the iris, and the
iris has lower intensity than the sclera. By detecting the boundary
between the pupil and the iris and the boundary between the iris and
the sclera, the iris area can be separated from pupil and sclera. A step
is taken to reduce the effect of eyelashes and specular reflection of
pupil. Then the four levels Coiflet wavelet transform is applied to the
extracted iris image. The modified Hamming distance is employed to
measure the similarity between two irises.
This research yields the identification success rate of 84.25% for
the CASIA version 1.0 database. The method gives an accuracy of
77.78% for the left eyes of MMU 1 database and 86.67% for the
right eyes. The time required for the encoding process, from the
segmentation until the iris code is generated, is 0.7096 seconds.
These results show that the accuracy and speed of the method is
better than many other methods.