Abstract: Transaction management is one of the most crucial requirements for enterprise application development which often require concurrent access to distributed data shared amongst multiple application / nodes. Transactions guarantee the consistency of data records when multiple users or processes perform concurrent operations. Existing Fault Tolerance Infrastructure for Mobile Agents (FTIMA) provides a fault tolerant behavior in distributed transactions and uses multi-agent system for distributed transaction and processing. In the existing FTIMA architecture, data flows through the network and contains personal, private or confidential information. In banking transactions a minor change in the transaction can cause a great loss to the user. In this paper we have modified FTIMA architecture to ensure that the user request reaches the destination server securely and without any change. We have used triple DES for encryption/ decryption and MD5 algorithm for validity of message.
Abstract: The challenge for software development house in
Bangladesh is to find a path of using minimum process rather than CMMI or ISO type gigantic practice and process area. The small and medium size organization in Bangladesh wants to ensure minimum
basic Software Process Improvement (SPI) in day to day operational
activities. Perhaps, the basic practices will ensure to realize their company's improvement goals. This paper focuses on the key issues in basic software practices for small and medium size software
organizations, who are unable to effort the CMMI, ISO, ITIL etc. compliance certifications. This research also suggests a basic software process practices model for Bangladesh and it will show the mapping of our suggestions with international best practice. In this IT
competitive world for software process improvement, Small and medium size software companies that require collaboration and
strengthening to transform their current perspective into inseparable global IT scenario. This research performed some investigations and analysis on some projects- life cycle, current good practice, effective approach, reality and pain area of practitioners, etc. We did some
reasoning, root cause analysis, comparative analysis of various
approach, method, practice and justifications of CMMI and real life. We did avoid reinventing the wheel, where our focus is for minimal
practice, which will ensure a dignified satisfaction between
organizations and software customer.
Abstract: The world-s largest Pre-stressed Concrete Cylinder
Pipe (PCCP) water supply project had a series of pipe failures which
occurred between 1999 and 2001. This has led the Man-Made River
Authority (MMRA), the authority in charge of the implementation
and operation of the project, to setup a rehabilitation plan for the
conveyance system while maintaining the uninterrupted flow of
water to consumers. At the same time, MMRA recognized the need
for a long term management tool that would facilitate repair and
maintenance decisions and enable taking the appropriate preventive
measures through continuous monitoring and estimation of the
remaining life of each pipe. This management tool is known as the
Pipe Risk Management System (PRMS) and now in operation at
MMRA. Both the rehabilitation plan and the PRMS require the
availability of complete and accurate pipe construction and
manufacturing data
This paper describes a systematic approach of data collection,
analysis, evaluation and correction for the construction and
manufacturing data files of phase I pipes which are the platform for
the PRMS database and any other related decision support system.
Abstract: The aim of this paper is to provide an empirical
evidence about the effects that the management of continuous
training have on employability (or employment stability) in the
Spanish labour market. With this purpose a binary logit model with
interaction effect is been used. The dependent variable includes two
situations of the active workers: continuous and discontinuous
employability. To distinguish between them an Employability Index
Stability (ESI) was calculated taking into account two factors: time
worked and job security. Various aspects of the continuous training
and personal workers data are used as independent variables. The
data obtained from a survey of a sample of 918 employed have
revealed a relationship between the likelihood of continuous
employability and continuous training received. The empirical results
support the positive and significant relationship between various
aspects of the training provided by firms and employability
likelihood of the workers, postulate alike from a theoretical point of
view.
Abstract: In this paper, a new probability density function (pdf)
is proposed to model the statistics of wavelet coefficients, and a
simple Kalman-s filter is derived from the new pdf using Bayesian
estimation theory. Specifically, we decompose the speckled image
into wavelet subbands, we apply the Kalman-s filter to the high
subbands, and reconstruct a despeckled image from the modified
detail coefficients. Experimental results demonstrate that our method
compares favorably to several other despeckling methods on test
synthetic aperture radar (SAR) images.
Abstract: In this work, we study the impact of dynamically changing link slowdowns on the stability properties of packetswitched networks under the Adversarial Queueing Theory framework. Especially, we consider the Adversarial, Quasi-Static Slowdown Queueing Theory model, where each link slowdown may take on values in the two-valued set of integers {1, D} with D > 1 which remain fixed for a long time, under a (w, p)-adversary. In this framework, we present an innovative systematic construction for the estimation of adversarial injection rate lower bounds, which, if exceeded, cause instability in networks that use the LIS (Longest-in- System) protocol for contention-resolution. In addition, we show that a network that uses the LIS protocol for contention-resolution may result in dropping its instability bound at injection rates p > 0 when the network size and the high slowdown D take large values. This is the best ever known instability lower bound for LIS networks.
Abstract: Whole genome duplication (WGD) increased the
number of yeast Saccharomyces cerevisiae chromosomes from 8 to
16. In spite of retention the number of chromosomes in the genome
of this organism after WGD to date, chromosomal rearrangement
events have caused an evolutionary distance between current genome
and its ancestor. Studies under evolutionary-based approaches on
eukaryotic genomes have shown that the rearrangement distance is an
approximable problem. In the case of S. cerevisiae, we describe that
rearrangement distance is accessible by using dedoubled adjacency
graph drawn for 55 large paired chromosomal regions originated
from WGD. Then, we provide a program extracted from a C program
database to draw a dedoubled genome adjacency graph for S.
cerevisiae. From a bioinformatical perspective, using the duplicated
blocks of current genome in S. cerevisiae, we infer that genomic
organization of eukaryotes has the potential to provide valuable
detailed information about their ancestrygenome.
Abstract: In this study, effects of premixed and equivalence
ratios on CO and HC emissions of a dual fuel HCCI engine are
investigated. Tests were conducted on a single-cylinder engine with
compression ratio of 17.5. Premixed gasoline is provided by a
carburetor connected to intake manifold and equipped with a screw
to adjust premixed air-fuel ratio, and diesel fuel is injected directly
into the cylinder through an injector at pressure of 250 bars. A heater
placed at inlet manifold is used to control the intake charge
temperature. Optimal intake charge temperature results in better
HCCI combustion due to formation of a homogeneous mixture,
therefore, all tests were carried out over the optimum intake
temperature of 110-115 ºC. Timing of diesel fuel injection has a great
effect on stratification of in-cylinder charge and plays an important
role in HCCI combustion phasing. Experiments indicated 35 BTDC
as the optimum injection timing. Varying the coolant temperature in
a range of 40 to 70 ºC, better HCCI combustion was achieved at 50
ºC. Therefore, coolant temperature was maintained 50 ºC during all
tests. Simultaneous investigation of effective parameters on HCCI
combustion was conducted to determine optimum parameters
resulting in fast transition to HCCI combustion. One of the
advantages of the method studied in this study is feasibility of easy
and fast transition of typical diesel engine to a dual fuel HCCI
engine. Results show that increasing premixed ratio, while keeping
EGR rate constant, increases unburned hydrocarbon (UHC)
emissions due to quenching phenomena and trapping of premixed
fuel in crevices, but CO emission decreases due to increase in CO to
CO2 reactions.
Abstract: In the recent years multimedia traffic and in particular
VoIP services are growing dramatically. We present a new algorithm
to control the resource utilization and to optimize the voice codec
selection during SIP call setup on behalf of the traffic condition
estimated on the network path.
The most suitable methodologies and the tools that perform realtime
evaluation of the available bandwidth on a network path have
been integrated with our proposed algorithm: this selects the best
codec for a VoIP call in function of the instantaneous available
bandwidth on the path. The algorithm does not require any explicit
feedback from the network, and this makes it easily deployable over
the Internet. We have also performed intensive tests on real network
scenarios with a software prototype, verifying the algorithm
efficiency with different network topologies and traffic patterns
between two SIP PBXs.
The promising results obtained during the experimental validation
of the algorithm are now the basis for the extension towards a larger
set of multimedia services and the integration of our methodology
with existing PBX appliances.
Abstract: A diamond-like carbon (DLC) based solid-lubricant
film was designed and DLC films were successfully prepared using a
microwave plasma enhanced magnetron sputtering deposition
technology. Post-test characterizations including Raman
spectrometry, X-ray diffraction, nano-indentation test, adhesion test,
friction coefficient test were performed to study the influence of
substrate bias voltage on the mechanical properties of the W- and
S-doped DLC films. The results indicated that the W- and S-doped
DLC films also had the typical structure of DLC films and a better
mechanical performance achieved by the application of a substrate
bias of -200V.
Abstract: Optimization of filter banks based on the knowledge of input statistics has been of interest for a long time. Finite impulse response (FIR) Compaction filters are used in the design of optimal signal adapted orthonormal FIR filter banks. In this paper we discuss three different approaches for the design of interpolated finite impulse response (IFIR) compaction filters. In the first method, the magnitude squared response satisfies Nyquist constraint approximately. In the second and third methods Nyquist constraint is exactly satisfied. These methods yield FIR compaction filters whose response is comparable with that of the existing methods. At the same time, IFIR filters enjoy significant saving in the number of multipliers and can be implemented efficiently. Since eigenfilter approach is used here, the method is less complex. Design of IFIR filters in the least square sense is presented.
Abstract: An innovative tri-axes micro-power receiver is
proposed. The tri-axes micro-power receiver consists of two sets 3-D
micro-solenoids and one set planar micro-coils in which iron core is
embedded. The three sets of micro-coils are designed to be orthogonal
to each other. Therefore, no matter which direction the flux is present
along, the magnetic energy can be harvested and transformed into
electric power. Not only dead space of receiving power is mostly
reduced, but also transformation efficiency of electromagnetic energy
to electric power can be efficiently raised. By employing commercial
software, Ansoft Maxwell, the preliminary simulation results verify
that the proposed micro-power receiver can efficiently pick up the
energy transmitted by magnetic power source.
As to the fabrication process, the isotropic etching technique is
employed to micro-machine the inverse-trapezoid fillister so that the
copper wire can be successfully electroplated. The adhesion between
micro-coils and fillister is much enhanced.
Abstract: this paper presents a multi-context recurrent network for time series analysis. While simple recurrent network (SRN) are very popular among recurrent neural networks, they still have some shortcomings in terms of learning speed and accuracy that need to be addressed. To solve these problems, we proposed a multi-context recurrent network (MCRN) with three different learning algorithms. The performance of this network is evaluated on some real-world application such as handwriting recognition and energy load forecasting. We study the performance of this network and we compared it to a very well established SRN. The experimental results showed that MCRN is very efficient and very well suited to time series analysis and its applications.
Abstract: Mathematical justifications are given for a simulation technique of multivariate nonGaussian random processes and fields based on Rosenblatt-s transformation of Gaussian processes. Different types of convergences are given for the approaching sequence. Moreover an original numerical method is proposed in order to solve the functional equation yielding the underlying Gaussian process autocorrelation function.
Abstract: This paper aims to perform the second law analysis of
thermodynamics on the laminar film condensation of pure saturated
vapor flowing in the direction of gravity on an ellipsoid with variable
wall temperature. The analysis provides us understanding how the
geometric parameter- ellipticity and non-isothermal wall temperature
variation amplitude “A." affect entropy generation during film-wise
condensation heat transfer process. To understand of which
irreversibility involved in this condensation process, we derived an
expression for the entropy generation number in terms of ellipticity
and A. The result indicates that entropy generation increases with
ellipticity. Furthermore, the irreversibility due to finite temperature
difference heat transfer dominates over that due to condensate film
flow friction and the local entropy generation rate decreases with
increasing A in the upper half of ellipsoid. Meanwhile, the local
entropy generation rate enhances with A around the rear lower half of
ellipsoid.
Abstract: Any rotation of a 3-dimensional object can be performed by three consecutive rotations over Euler angles. Intrinsic rotations produce the same result as extrinsic rotations in transformation. Euler rotations are the movement obtained by changing one of the Euler angles while leaving the other two constant. These Euler rotations are applied in a simple two-axis gimbals set mounted on an automotives. The values of Euler angles are [π/4, π/4, π/4] radians inside the angles ranges for a given coordinate system and these actual orientations can be directly measured from these gimbals set of moving automotives but it can occur the gimbals lock in application at [π/2.24, 0, 0] radians. In order to avoid gimbals lock, the values of quaternion must be [π/4.8, π/8.2, 0, π/4.8] radians. The four-gimbals set can eliminate gimbals lock.
Abstract: This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes are assumed to know their coordinates, the straight line distance between each pair of them can be calculated and then compared with the corresponding hop distance, which in this paper equals hop counts × node-s transmission range R. Dramatic difference may emerge because of an existing wormhole. Our detection mechanism is based on this. The approximate location of the wormhole can also be derived in further steps based on this information. To the best of our knowledge, our method is much easier than other wormhole detecting schemes which also use beacon nodes, and to those have special requirements on each nodes (e.g., GPS receivers or tightly synchronized clocks or directional antennas), ours is more economical. Simulation results show that the algorithm is successful in detecting and locating wormholes when the density of beacon nodes reaches 0.008 per m2.
Abstract: Most of the image watermarking methods, using the properties of the human visual system (HVS), have been proposed in literature. The component of the visual threshold is usually related to either the spatial contrast sensitivity function (CSF) or the visual masking. Especially on the contrast masking, most methods have not mention to the effect near to the edge region. Since the HVS is sensitive what happens on the edge area. This paper proposes ultrasound image watermarking using the visual threshold corresponding to the HVS in which the coefficients in a DCT-block have been classified based on the texture, edge, and plain area. This classification method enables not only useful for imperceptibility when the watermark is insert into an image but also achievable a robustness of watermark detection. A comparison of the proposed method with other methods has been carried out which shown that the proposed method robusts to blockwise memoryless manipulations, and also robust against noise addition.
Abstract: This paper presents a system for discovering
association rules from collections of unstructured documents called
EART (Extract Association Rules from Text). The EART system
treats texts only not images or figures. EART discovers association
rules amongst keywords labeling the collection of textual documents.
The main characteristic of EART is that the system integrates XML
technology (to transform unstructured documents into structured
documents) with Information Retrieval scheme (TF-IDF) and Data
Mining technique for association rules extraction. EART depends on
word feature to extract association rules. It consists of four phases:
structure phase, index phase, text mining phase and visualization
phase. Our work depends on the analysis of the keywords in the
extracted association rules through the co-occurrence of the keywords
in one sentence in the original text and the existing of the keywords
in one sentence without co-occurrence. Experiments applied on a
collection of scientific documents selected from MEDLINE that are
related to the outbreak of H5N1 avian influenza virus.
Abstract: In this paper a new control strategy based on Brain
Emotional Learning (BEL) model has been introduced. A modified
BEL model has been proposed to increase the degree of freedom,
controlling capability, reliability and robustness, which can be
implemented in real engineering systems.
The performance of the proposed BEL controller has been
illustrated by applying it on different nonlinear uncertain systems,
showing very good adaptability and robustness, while maintaining
stability.