Abstract: DC-DC converters are widely used in regulated switched mode power supplies and in DC motor drive applications. There are several sources of unwanted nonlinearity in practical power converters. In addition, their operation is characterized by switching that gives birth to a variety of nonlinear dynamics. DC-DC buck and boost converters controlled by pulse-width modulation (PWM) have been simulated. The voltage waveforms and attractors obtained from the circuit simulation have been studied. With the onset of instability, the phenomenon of subharmonic oscillations, quasi-periodicity, bifurcations, and chaos have been observed. This paper is mainly motivated by potential contributions of chaos theory in the design, analysis and control of power converters, in particular and power electronics circuits, in general.
Abstract: This article proposes a current-mode square-rooting
circuit using current follower transconductance amplifier (CTFA).
The amplitude of the output current can be electronically controlled
via input bias current with wide input dynamic range. The proposed
circuit consists of only single CFTA. Without any matching
conditions and external passive elements, the circuit is then
appropriate for an IC architecture. The magnitude of the output signal
is temperature-insensitive. The PSpice simulation results are
depicted, and the given results agree well with the theoretical
anticipation. The power consumption is approximately 1.96mW at
±1.5V supply voltages.
Abstract: Wireless sensor network has recently emerged as enablers
of several areas. Real applications of WSN are being explored
and some of them are yet to come. While the potential of sensor
networks has been only beginning to be realized, several challenges
still remain. One of them is the experimental evaluation of WSN.
Therefore, deploying and operating a testbed to study the real
behavior of WSN become more and more important. The main
contribution of this work is to analysis the RF link budget behavior
of wireless sensor networks in underground mine gallery.
Abstract: Requirement engineering has been the subject of large
volume of researches due to the significant role it plays in the
software development life cycle. However, dynamicity of software
industry is much faster than advances in requirements engineering
approaches. Therefore, this paper aims to systematically review and
evaluate the current research in requirement engineering and identify
new research trends and direction in this field. In addition, various
research methods associated with the Evaluation-based techniques
and empirical study are highlighted for the requirements engineering
field. Finally, challenges and recommendations on future directions
research are presented based on the research team observations
during this study.
Abstract: In this paper, we propose a new architecture for the implementation of the N-point Fast Fourier Transform (FFT), based on the Radix-2 Decimation in Frequency algorithm. This architecture is based on a pipeline circuit that can process a stream of samples and produce two FFT transform samples every clock cycle. Compared to existing implementations the architecture proposed achieves double processing speed using the same circuit complexity.
Abstract: Advances in technology (e.g. the internet,
telecommunication) and political changes (fewer trade barriers and an
enlarged European Union, ASEAN, NAFTA and other organizations)
have led to develop international competition and expand into new
markets. Companies in Thailand, Asia and around the globe are
increasingly being pressured on price and for faster time to enter the
market. At the same time, new markets are appearing and many
companies are looking for changes and shifts in their domestic
markets. These factors have enabled the rapid growth for companies
and globalizing many different business activities during the product
development process from research and development (R&D) to
production.
This research will show and clarify methods how to develop
global product. Also, it will show how important is a global product
impact into Thai Economy development.
Abstract: Cellular communication is being widely used by all
over the world. The users of handsets are increasing due to the
request from marketing sector. The important aspect that has to be
touch in this paper is about the security system of cellular
communication. It is important to provide users with a secure channel
for communication. A brief description of the new GSM cellular
network architecture will be provided. Limitations of cellular
networks, their security issues and the different types of attacks will
be discussed. The paper will go over some new security mechanisms
that have been proposed by researchers. Overall, this paper clarifies
the security system or services of cellular communication using
GSM. Three Malaysian Communication Companies were taken as
Case study in this paper.
Abstract: Obtaining labeled data in supervised learning is often
difficult and expensive, and thus the trained learning algorithm tends
to be overfitting due to small number of training data. As a result,
some researchers have focused on using unlabeled data which may
not necessary to follow the same generative distribution as the labeled
data to construct a high-level feature for improving performance on
supervised learning tasks. In this paper, we investigate the impact of
the relationship between unlabeled and labeled data for classification
performance. Specifically, we will apply difference unlabeled data
which have different degrees of relation to the labeled data for
handwritten digit classification task based on MNIST dataset. Our
experimental results show that the higher the degree of relation
between unlabeled and labeled data, the better the classification
performance. Although the unlabeled data that is completely from
different generative distribution to the labeled data provides the lowest
classification performance, we still achieve high classification performance.
This leads to expanding the applicability of the supervised
learning algorithms using unsupervised learning.
Abstract: In this paper, RSA encryption algorithm and its hardware
implementation in Xilinx-s Virtex Field Programmable Gate
Arrays (FPGA) is analyzed. The issues of scalability, flexible performance,
and silicon efficiency for the hardware acceleration of
public key crypto systems are being explored in the present work.
Using techniques based on the interleaved math for exponentiation,
the proposed RSA calculation architecture is compared to existing
FPGA-based solutions for speed, FPGA utilization, and scalability.
The paper covers the RSA encryption algorithm, interleaved multiplication,
Miller Rabin algorithm for primality test, extended Euclidean
math, basic FPGA technology, and the implementation details of
the proposed RSA calculation architecture. Performance of several
alternative hardware architectures is discussed and compared. Finally,
conclusion is drawn, highlighting the advantages of a fully flexible
& parameterized design.
Abstract: The purpose of this article is to briefly review the opportunities that social media present to counselors and psychologists. Particular attention was given to understanding some of the more important common risks inherent in social media and the potential ethical dilemmas which may arise for counselors and psychologists who embrace them in their practice. Key considerations of issues pertinent to an online presence such as multiple relationships, visibility and privacy, maintaining ethical principles and professional boundaries are being discussed.
Abstract: An implementation of current-mode multiphase sinusoidal oscillators is presented. Using CFTA-based lossy integrators, odd and odd/even phase systems can be realized with following advantages. The condition of oscillation and frequency of oscillation can be orthogonally tuned. The high output impedances facilitate easy driving an external load without additional current buffers. The proposed MSOs provide odd or even phase signals that are equally spaced in phase and equal amplitude. The circuit requires one CFTA, one resistor and one grounded capacitor per phase without additional current amplifier. The results of PSPICE simulations using CMOS CFTA are included to verify theory.
Abstract: Software Development Risks Identification (SDRI),
using Fault Tree Analysis (FTA), is a proposed technique to identify
not only the risk factors but also the causes of the appearance of the
risk factors in software development life cycle. The method is based
on analyzing the probable causes of software development failures
before they become problems and adversely affect a project. It uses
Fault tree analysis (FTA) to determine the probability of a particular
system level failures that are defined by A Taxonomy for Sources of
Software Development Risk to deduce failure analysis in which an
undesired state of a system by using Boolean logic to combine a
series of lower-level events. The major purpose of this paper is to use
the probabilistic calculations of Fault Tree Analysis approach to
determine all possible causes that lead to software development risk
occurrence
Abstract: The present study aims to explore the role of parents'
ethnic socialization practices contributes to the ethnic identity
development, self-esteem and psychological adjustment of multi
ethnic children in Sabah, Malaysia. A total of 342 multi ethnic
children (age range = 10 years old to 14 years old; mean age = 12.65
years, SD = 0.88) and their parents participated in the present study.
The modified version of Multi group Ethnic Identity Measure
(MEIM), The Familial Ethnic Socialization Measure (FESM). The
Rosenberg Self-Esteem Scale (RSE) and Behavioral and Emotional
Rating Scale Edition 2 (BERS-2) were used in this study. The results
showed that: i) parents' ethnic socialization practice was a strong
predictor of ethnic identity development of multi ethnic children; ii)
parents' ethnic socialization practice also was a significant predictor
of self-esteem of multi ethnic children; iii) parents' ethnic
socialization practice was not a significant predictor of psychological
adjustment of multi ethnic children. The results of this study showed
the implications parents' ethnic socialization practices and ethnic
identity development in successful multi ethnic families.
Abstract: This article proposes an Ant Colony Optimization
(ACO) metaheuristic to minimize total makespan for scheduling a set
of jobs and assign workers for uniformly related parallel machines.
An algorithm based on ACO has been developed and coded on a
computer program Matlab®, to solve this problem. The paper
explains various steps to apply Ant Colony approach to the problem
of minimizing makespan for the worker assignment & jobs
scheduling problem in a parallel machine model and is aimed at
evaluating the strength of ACO as compared to other conventional
approaches. One data set containing 100 problems (12 Jobs, 03
machines and 10 workers) which is available on internet, has been
taken and solved through this ACO algorithm. The results of our
ACO based algorithm has shown drastically improved results,
especially, in terms of negligible computational effort of CPU, to
reach the optimal solution. In our case, the time taken to solve all 100
problems is even lesser than the average time taken to solve one
problem in the data set by other conventional approaches like GA
algorithm and SPT-A/LMC heuristics.
Abstract: Construction of tunnels is connected with high
uncertainty in the field of costs, construction period, safety and
impact on surroundings. Risk management became therefore a
common part of tunnel projects, especially after a set of fatal
collapses occurred in 1990's. Such collapses are caused usually by
combination of factors that can be divided into three main groups, i.e.
unfavourable geological conditions, failures in the design and
planning or failures in the execution.
This paper suggests a procedure enabling quantification of the
excavation risk related to extraordinary accidents using FTA and
ETA tools. It will elaborate on a common process of risk analysis and
enable the transfer of information and experience between particular
tunnel construction projects. Further, it gives a guide for designers,
management and other participants, how to deal with risk of such
accidents and how to make qualified decisions based on a
probabilistic approach.
Abstract: In the present paper, we present a modification of the
New Iterative Method (NIM) proposed by Daftardar-Gejji and Jafari
[J. Math. Anal. Appl. 2006;316:753–763] and use it for solving
systems of nonlinear functional equations. This modification yields
a series with faster convergence. Illustrative examples are presented
to demonstrate the method.