Abstract: Research on damage of gears and gear pairs using
vibration signals remains very attractive, because vibration signals
from a gear pair are complex in nature and not easy to interpret.
Predicting gear pair defects by analyzing changes in vibration signal
of gears pairs in operation is a very reliable method. Therefore, a
suitable vibration signal processing technique is necessary to extract
defect information generally obscured by the noise from dynamic
factors of other gear pairs.This article presents the value of cepstrum
analysis in vehicle gearbox fault diagnosis. Cepstrum represents the
overall power content of a whole family of harmonics and sidebands
when more than one family of sidebands is present at the same time.
The concept for the measurement and analysis involved in using the
technique are briefly outlined. Cepstrum analysis is used for detection
of an artificial pitting defect in a vehicle gearbox loaded with
different speeds and torques. The test stand is equipped with three
dynamometers; the input dynamometer serves asthe internal
combustion engine, the output dynamometers introduce the load on
the flanges of the output joint shafts. The pitting defect is
manufactured on the tooth side of a gear of the fifth speed on the
secondary shaft. Also, a method for fault diagnosis of gear faults is
presented based on order Cepstrum. The procedure is illustrated with
the experimental vibration data of the vehicle gearbox. The results
show the effectiveness of Cepstrum analysis in detection and
diagnosis of the gear condition.
Abstract: Energy consumption is an important design issue for
Mobile Subscriber Station (MSS) in the standard IEEE 802.16e.
Because mobility of MSS implies that energy saving becomes an
issue so that lifetime of MSS can be extended before re-charging.
Also, the mechanism in efficiently managing the limited energy is
becoming very significant since a MSS is generally energized by
battery. For these, sleep mode operation is recently specified in the
MAC (Medium Access Control) protocol. In order to reduce the
energy consumption, we focus on the sleep-mode and wake-mode of
the MAC layer, which are included in the IEEE 802.16 standards [1-
2].
Abstract: Clustering algorithms are attractive for the task of class identification in spatial databases. However, the application to large spatial databases rises the following requirements for clustering algorithms: minimal requirements of domain knowledge to determine the input parameters, discovery of clusters with arbitrary shape and good efficiency on large databases. The well-known clustering algorithms offer no solution to the combination of these requirements. In this paper, a density based clustering algorithm (DCBRD) is presented, relying on a knowledge acquired from the data by dividing the data space into overlapped regions. The proposed algorithm discovers arbitrary shaped clusters, requires no input parameters and uses the same definitions of DBSCAN algorithm. We performed an experimental evaluation of the effectiveness and efficiency of it, and compared this results with that of DBSCAN. The results of our experiments demonstrate that the proposed algorithm is significantly efficient in discovering clusters of arbitrary shape and size.
Abstract: Emerging adulthood, the new period which is
especially prevalent in the developed or industrialized countries
during ages 18 to 29, is a new conceptualization proposed by Arnett.
Intimacy is a superordinate concept which includes intimate
interaction and intimate relationship. This study includes two
proceses which are scale development and conduction of gender
differences about markers of starting romantic intimacy among
Turkish emerging adults. In first process, Markers of Starting
Romantic Intimacy Scale, with 17 items and 5 factors, was developed
using by 220 participants. In the second step, the scale was
administered to 318 Turkish male and female emerging adults
between ages 22 and 25. Results show that there is no significant
difference between gender and total score of the scale. With respect
to gender, there are significant differences between gender and in
four subscales which are self perception, affective and cognitive
intimacy, self knowledge and romantic verbalizations. Moreover,
there is no significant relationship between gender and behavioral
intimacy subscale.
Abstract: Multicast Network Technology has pervaded our
lives-a few examples of the Networking Techniques and also for the
improvement of various routing devices we use. As we know the
Multicast Data is a technology offers many applications to the user
such as high speed voice, high speed data services, which is presently
dominated by the Normal networking and the cable system and
digital subscriber line (DSL) technologies. Advantages of Multi cast
Broadcast such as over other routing techniques. Usually QoS
(Quality of Service) Guarantees are required in most of Multicast
applications. The bandwidth-delay constrained optimization and we
use a multi objective model and routing approach based on genetic
algorithm that optimizes multiple QoS parameters simultaneously.
The proposed approach is non-dominated routes and the performance
with high efficiency of GA. Its betterment and high optimization has
been verified. We have also introduced and correlate the result of
multicast GA with the Broadband wireless to minimize the delay in
the path.
Abstract: Crosstalk is the major limiting issue in very high bit-rate digital subscriber line (VDSL) systems in terms of bit-rate or service coverage. At the central office side, joint signal processing accompanied by appropriate power allocation enables complex multiuser processors to provide near capacity rates. Unfortunately complexity grows with the square of the number of lines within a binder, so by taking into account that there are only a few dominant crosstalkers who contribute to main part of crosstalk power, the canceller structure can be simplified which resulted in a much lower run-time complexity. In this paper, a multiuser power control scheme, namely iterative waterfilling, is combined with previously proposed partial crosstalk cancellation approaches to demonstrate the best ever achieved performance which is verified by simulation results.
Abstract: Internet is without any doubt the fastest and effective mean of communication making it possible to reach a great number of people in the world. It draws its base from exchange points. Indeed exchange points are used to inter-connect various Internet suppliers and operators in order to allow them to exchange traffic and it is with these interconnections that Internet made its great strides. They thus make it possible to limit the traffic delivered via the operators of transits. This limitation allows a significant improvement of the quality of service, a reduction in the latency time just as a reduction of the cost of connection for the final subscriber. Through this article we will show how the installation of an IXP allows an improvement and a diversification of the services just as a reduction of the Internet connection costs.
Abstract: Today, the Internet based communication has widen
the opportunity of event monitoring system in the medical field.
There is always a need of analyzing and designing secure and reliable
mobile communication between the hospital and biomedical
engineers mobile units. This study has been carried out to find
possible solution using SIP-based event notification for alerting the
technical staff about the Biomedical Device (BMD) status and
Patients treatment session. The Session Initiation Protocol (SIP) can
be used to create a medical event notification system. SIP can work
on a variety of devices. Its adoption as the protocol of choice for third
generation wireless networks allows for a robust and scalable
environment. One of the advantages of SIP is that it supports personal
mobility through the separation of user addressing and device
addressing. The solution for Telemed alert notification system is
based on SIP - Specific Event Notification. The aim of this project is
to extend mobility service to the hospital technicians who are using
Telemedicine system.
Abstract: The purpose of this study was to develop a “teachers’
self-efficacy scale for high school physical education teachers
(TSES-HSPET)” in Taiwan. This scale is based on the self-efficacy
theory of Bandura [1], [2]. This study used exploratory and
confirmatory factor analyses to test the reliability and validity. The
participants were high school physical education teachers in Taiwan.
Both stratified random sampling and cluster sampling were used to
sample participants for the study. 350 teachers were sampled in the
first stage and 234 valid scales (male 133, female 101) returned.
During the second stage, 350 teachers were sampled and 257 valid
scales (male 143, female 110, 4 did not indicate gender) returned. The
exploratory factor analysis was used in the first stage, and it got
60.77% of total variance for construct validity. The Cronbach’s alpha
coefficient of internal consistency was 0.91 for sumscale, and
subscales were 0.84 and 0.90. In the second stage, confirmatory factor
analysis was used to test construct validity. The result showed that the
fit index could be accepted (χ2 (75) =167.94, p
Abstract: In a recent year usage of VoIP subscription has increased tremendously as compare to Public Switching Telephone System(PSTN). A VoIP subscriber would like to know the exact tariffs of the calls made using VoIP. As the usage increases, the rate of fraud is also increases, causing users complain about excess billing. This in turn hampers the growth of VoIP .This paper describe the common frauds and attack on VoIP based system and make an attempt to solve the billing attack by creating secured channel between caller and callee.
Abstract: Defining strategic position of the organizations within
the industry environment is one of the basic and most important
phases of strategic planning to which extent that one of the
fundamental schools of strategic planning is the strategic positioning
school. In today-s knowledge-based economy and dynamic
environment, it is essential for universities as the centers of
education, knowledge creation and knowledge worker evolvement.
Till now, variant models with different approaches to strategic
positioning are deployed in defining the strategic position within the
various industries. Balanced Scorecard as one of the powerful models
for strategic positioning, analyzes all aspects of the organization
evenly. In this paper with the consideration of BSC strength in
strategic evaluation, it is used for analyzing the environmental
position of the best-s Iranian Business Schools. The results could be
used in developing strategic plans for these schools as well as other
Iranian Management and Business Schools.
Abstract: This paper discusses the applicability of the Data
Distribution Service (DDS) for the development of automated and modular manufacturing systems which require a flexible and robust
communication infrastructure. DDS is an emergent standard for datacentric publish/subscribe middleware systems that provides an
infrastructure for platform-independent many-to-many
communication. It particularly addresses the needs of real-time systems that require deterministic data transfer, have low memory
footprints and high robustness requirements. After an overview of the
standard, several aspects of DDS are related to current challenges for the development of modern manufacturing systems with distributed architectures. Finally, an example application is presented based on a modular active fixturing system to illustrate the described aspects.
Abstract: As current business environment is demanding a
constant adaptation of companies, the planning and strategic
management should be an ongoing and natural process in all kind of
organizations. The use of management and monitoring strategic
performance tools such as the Balanced Scorecard (BSC) have been
popular; even to Small and Medium-sized Enterprises. This paper
aims to investigate whether the BSC is being used in monitoring the
performance of small businesses, particularly in small fuel retailers
companies, which are competing in co-branding; and if not, it aims to
identify its strategic orientation in order to recommend a possible
strategy map for those managers that are willing to adopt this model
as an alternative to traditional ones for organizational performance
evaluation, which often focus only on evaluation of the
organizational financial performance.
Abstract: The paper is concerned with developing stochastic delay mechanisms for efficient multicast protocols and for smooth mobile handover processes which are capable of preserving a given Quality of Service (QoS). In both applications the participating entities (receiver nodes or subscribers) sample a stochastic timer and generate load after a random delay. In this way, the load on the networking resources is evenly distributed which helps to maintain QoS communication. The optimal timer distributions have been sought in different p.d.f. families (e.g. exponential, power law and radial basis function) and the optimal parameter have been found in a recursive manner. Detailed simulations have demonstrated the improvement in performance both in the case of multicast and mobile handover applications.
Abstract: Next generation networks with the idea of convergence of service and control layer in existing networks (fixed, mobile and data) and with the intention of providing services in an integrated network, has opened new horizon for telecom operators. On the other hand, economic problems have caused operators to look for new source of income including consider new services, subscription of more users and their promotion in using morenetwork resources and easy participation of service providers or 3rd party operators in utilizing networks. With this requirement, an architecture based on next generation objectives for service layer is necessary. In this paper, a new architecture based on IMS model explains participation of 3rd party operators in creation and implementation of services on an integrated telecom network.
Abstract: Grid computing is growing rapidly in the distributed
heterogeneous systems for utilizing and sharing large-scale resources
to solve complex scientific problems. Scheduling is the most recent
topic used to achieve high performance in grid environments. It aims
to find a suitable allocation of resources for each job. A typical
problem which arises during this task is the decision of scheduling. It
is about an effective utilization of processor to minimize tardiness
time of a job, when it is being scheduled. This paper, therefore,
addresses the problem by developing a general framework of grid
scheduling using dynamic information and an ant colony
optimization algorithm to improve the decision of scheduling. The
performance of various dispatching rules such as First Come First
Served (FCFS), Earliest Due Date (EDD), Earliest Release Date
(ERD), and an Ant Colony Optimization (ACO) are compared.
Moreover, the benefit of using an Ant Colony Optimization for
performance improvement of the grid Scheduling is also discussed. It
is found that the scheduling system using an Ant Colony
Optimization algorithm can efficiently and effectively allocate jobs
to proper resources.
Abstract: IP multicasting is a key technology for many existing and emerging applications on the Internet. Furthermore, with increasing popularity of wireless devices and mobile equipment, it is necessary to determine the best way to provide this service in a wireless environment. IETF Mobile IP, that provides mobility for hosts in IP networks, proposes two approaches for mobile multicasting, namely, remote subscription (MIP-RS) and bi-directional tunneling (MIP-BT). In MIP-RS, a mobile host re-subscribes to the multicast groups each time it moves to a new foreign network. MIP-RS suffers from serious packet losses while mobile host handoff occurs. In MIP-BT, mobile hosts send and receive multicast packets by way of their home agents (HAs), using Mobile IP tunnels. Therefore, it suffers from inefficient routing and wastage of system resources. In this paper, we propose a protocol called Mobile Multicast support using Old Foreign Agent (MMOFA) for Mobile Hosts. MMOFA is derived from MIP-RS and with the assistance of Mobile host's Old foreign agent, routes the missing datagrams due to handoff in adjacent network via tunneling. Also, we studied the performance of the proposed protocol by simulation under ns-2.27. The results demonstrate that MMOFA has optimal routing efficiency and low delivery cost, as compared to other approaches.
Abstract: The purpose of this study was to explore the
relationship between Burnout, Negative Affectivity, and
Organizational Citizenship Behavior (OCB) for social service
workers at two agencies serving homeless populations. Thirty two
subjects completed surveys. Significant correlations between major
variables and subscales were found.
Abstract: The present study was done primarily to address two major research gaps: firstly, development of an empirical measure of life meaningfulness for substance users and secondly, to determine the psychosocial determinants of life meaningfulness among the substance users. The study is classified into two phases: the first phase which dealt with development of Life Meaningfulness Scale and the second phase which examined the relationship between life meaningfulness and social support, abstinence self efficacy and depression. Both qualitative and quantitative approaches were used for framing items. A Principal Component Analysis yielded three components: Overall Goal Directedness, Striving for healthy lifestyle and Concern for loved ones which collectively accounted for 42.06% of the total variance. The scale and its subscales were also found to be highly reliable. Multiple regression analyses in the second phase of the study revealed that social support and abstinence self efficacy significantly predicted life meaningfulness among 48 recovering inmates of a de-addiction center while level of depression failed to predict life meaningfulness.
Abstract: Obfuscation is a low cost software protection
methodology to avoid reverse engineering and re engineering of
applications. Source code obfuscation aims in obscuring the source
code to hide the functionality of the codes. This paper proposes an
Array data transformation in order to obfuscate the source code
which uses arrays. The applications using the proposed data
structures force the programmer to obscure the logic manually. It
makes the developed obscured codes hard to reverse engineer and
also protects the functionality of the codes.