|
|
Issue
1, Volume 3, January 2008
Title of the Paper: Shuffle
from Sequential to Parallel in Production Planning
DOWNLOAD
FULL PDF
Authors: Adalbert
Golomety, Alina Pitic, Iulia Golomety, Antoniu Pitic
Abstract: This paper presents an implementation of shuffle operation in
production planning. We present a computational formula for shuffle and some
optimizations to reduce the sets of shuffle strings. Our idea is to combine
shuffle with parallelism for a planning of production phases.
Keywords: shuffle, production phases, production planning, linguistic model,
execution time.
Title of the Paper: LabVIEW
Electrocardiogram Event and Beat Detection
DOWNLOAD
FULL PDF
Authors: Mihaela Lascu,
Dan Lascu
Abstract: QRS and ventricular beat detection is a basic procedure for
electrocardiogram (ECG) processing and analysis. Large variety of methods
have been proposed and used, featuring high percentages of correct detection.
Nevertheless, the problem remains open especially with respect to higher
detection accuracy in noisy ECGs. LabVIEW ( Laboratory Virtual Instrument
Engineering Workbench) is a graphical programming language that uses icons
instead of lines of text to create programs. We developed in LabVIEW the
filtering for removal of artifacts in biomedical signals and the Pan-Tompkins
algorithm. We have investigated problems posed by artifact, noise and
interference of various forms in the acquisition and analysis of several
biomedical signals. We have also established links between the
characteristics of certain epochs in a number of biomedical signals and the
corresponding physiological or pathological events in the biomedical systems
of concern. Event detection is an important step that is required before we
may attempt to analyze the corresponding waves in more detail. A real-time
detection method is proposed, based on comparison between absolute values of
summed differentiated electrocardiograms of one of more ECG leads and
adaptive threshold. Also, a cardiac beat recognition based on continuous
wavelet transform is presented.
Keywords:
biomedical signal, database, electrocardiogram ECG, artifact, noise,
graphical programming language LabVIEW, filtering, notch filter, event
detection, Pan-Tompkins algorithm, adaptive threshold.
Title of the Paper: Resource
Allocation in Grid Computing: An Economic Model
DOWNLOAD
FULL PDF
Authors: Massimiliano
Caramia, Stefano Giordani
Abstract: Grid scheduling, that is, the allocation of distributed
computational resources to user applications, is one of the most challenging
and complex task in Grid computing. The problem of allocating resources in
Grid scheduling requires the definition of a model that allows local and
external schedulers to communicate in order to achieve an efficient
management of the resources themselves. To this aim, some economic/market-based
models have been introduced in the literature, where users, external
schedulers, and local schedulers negotiate to optimize their objectives. In
this paper, we propose a tender/contract-net model for Grid resource
allocation, showing the interactions among the involved actors. The
performance of the proposed market-based approach is experimentally compared
with a round-robin allocation protocol.
Keywords:
Grid computing, Resource Management, Economic models, Scheduling, Simulation.
Title of the Paper: Software
Products and Technologies for the Development and Implementation of SOA
DOWNLOAD
FULL PDF
Authors: Zaigham Mahmood
Abstract: Service Oriented Architecture (SOA) is an emerging organisational
and technical framework to enable an enterprise to deliver self-describing
and platform independent business functionality. Businesses are required to
be agile and dynamic and IT managers are being asked to deliver improved
functionality while leveraging existing IT investment. Globalisation, tighter
economies, business process outsourcing and ever increasing regulatory
environments are forcing the large enterprises to transform the way they
operate. In this context, SOA promises better alignment of IT with business,
seamless integration of business functions and reduced costs of development
and the industry is keen to embrace this new architectural style. Realising
the opportunity, major enterprise software vendors have released a number of
development tools. However, a majority of these are difficult to use and do
not deliver the benefits they claim. In this paper, we introduce the SOA approach,
present the benefits it offers, discuss some of the frameworks, tools and
products offered by major software vendors and provide a general guidance for
building and implementing SOA. The objective is to provide enough background
information that enterprises wishing to embark on the road to SOA have a
better understanding
Keywords:
Service oriented architecture, SOA, Enterprise applications integration, Web
services, Service-orientation, XML.
Title of the Paper: About
Preflow Algorithms for the Minimum Flow Problem
DOWNLOAD
FULL PDF
Authors: Laura
Ciupala, Eleonor Ciurea
Abstract: In this paper, we describe the highest-label preflow algorithm for
minimum flow. This algorithm is a special implementation of the generic preflow
algorithm developed by Ciurea and Ciupală in [8], obtained by imposing
in the generic preflow algorithm the rule that the algorithm must always
select an active node with the highest distance label. Our new algorithm runs
in O(n2m1/2) time, which is substantially better than the running time of the
generic preflow algorithm, that is O(n2m). Moreover, the highest-label
preflow algorithm is the fastest polynomial algorithm for minimum flow
problem.In this paper, we describe the highest-label preflow algorithm for
minimum flow. This algorithm is a special implementation of the generic
preflow algorithm developed by Ciurea and Ciupală in [8], obtained by
imposing in the generic preflow algorithm the rule that the algorithm must
always select an active node with the highest distance label. Our new
algorithm runs in O(n2m1/2) time, which is substantially better than the
running time of the generic preflow algorithm, that is O(n2m). Moreover, the
highest-label preflow algorithm is the fastest polynomial algorithm for
minimum flow problem.
Keywords:
Network flow; Network algorithms; Minimum flow problem; Scaling technique
Title of the Paper: Macula
Precise Localization Using Digital Retinal Angiographies
DOWNLOAD
FULL PDF
Authors: C. Marino, S.
Pena, M. G. Penedo, M. Ortega, J. Rouco, A. Pose-Reino, M. Pena
Abstract: The fovea is a spot located in the center of the macula, and
responsible for sharp central vision. In this paper a method to detect the
macula location and size is presented, as a first step towards the fovea
location. Prior to the macula detection, the optic disk size and position is
computed. This is performed through the combination of two stages: firstly, a
clustering algorithm is used to select the regions which contain the pixels
with the highest gray levels. A correlation filter is applied to these
regions to compute the approximate center of the optic disk. Then, in order
to extract the optic disk, a deformable model which is used. Then, following
the morphological properties of the eye, the macula location and size is
determined by means of a new correlation filter. Search with this filter is
performed in a reduced area of interest, whose size and position is
determined by means, again, of the morphological properties of the eye. The
algorithm has proven to be fast and accurate in the set of test images,
composed by 135 digital retinal images, where the tests have been performed
by comparing our results with those obtained by two expert clinicians from
two different hospital centers.
Keywords:
Optic disk, macula, fovea, correlation filter, deformable model.
Title of the Paper: ICT
Sufficiency in Cooperative Projects via the Internet
DOWNLOAD
FULL PDF
Authors: Nesrin
Ozdener,
Murat Oztok
Abstract: The aim of this study is to determine the effects of cooperative projects
implemented via the Internet on students’ ICT skills. Within the scope of the
study, it was attempted to determine the ICT skills frequently used in
cooperative projects via the Internet, and it was also attempted to examine
the level of students’ and teachers’ ICT skills. At the first stage of the
study, the survey method was used to determine the basic ICT skills that
might be needed by 8th grade students in their cooperative project works. It
was also attempted to examine the existing level of the basic ICT skills of
the 8th grade students. At the second stage of the study, the survey method
was used to examine the level of the basic ICT skills of teachers. At the
third stage of the study, the research population consisted of 58 students
studying in the 8th grade at two different schools. The post-test control
group experimental model was used to determine the effects of cooperative
project works implemented via the Internet on students’ ICT skills. Project
groups were asked to implement one of two different projects. Two counselor
teachers monitored projects and assisted students during the study. At the
end of the training, the counselor teachers of the project groups evaluated
the projects implemented. The data collection tools were practical examinations,
which were used to measure the teachers’ and students’ ICT skills and the
cooperative projects implemented via the Internet. At the end of the study,
the skills required for students to have with respect to ICT were determined,
and it was observed that students who were involved in projects were more
successful compared to those not involved also in terms of the sub-components
constituting ICT, just as in the use of ICT. Also in the study, it is shown
that teachers have significant insufficiencies in terms of use of ICT.
Results obtained from the study emphasize the necessity to create areas where
students can use computers and the Internet actively, instead of explaining
to them these technologies.
Keywords:
Computer, Internet, Multi Media, ICT, Collaborative Projects, Curriculum
Title of the Paper: Point-based
Simplification Algorithm
DOWNLOAD
FULL PDF
Authors: Pai-Feng Lee,
Bin-Shyan Jong
Abstract: This study presents a novel, rapid, and effective point
simplification algorithm based on a point cloud without any normal and
connectivity information. This study is initiated with a scattered sampled
point set in three dimensions, and the final output is a triangular mesh
model, which is simplified according to a restrictive criteria. The proposed
method reduces the number of calculations required to establish the relation
between triangulation and the connectivity. Due to the continuous development
of computer graphics technology, diversified virtual reality applications are
being increasingly adopted. Recently, the efficient and vivid portrayal of 3D
objects in the real world in virtual scenes has become a crucial issue in
computer graphics. A triangular mesh is one of the most popular data
structures for representing 3D models in applications. Numerous methods
currently exist for constructing objects using surface reconstruction. The
data required for the sampled points are generally obtained from a laser
scanner. However, the extracted sampled points are frequently affected by
shape variation. The number of triangles created increases with the number of
points sampled from the surface of a 3D object, which helps in the
reconstruction of the correct model. Nevertheless, subsequent graphics
applications, such as morphing or rendering, increase the computation costs.
Appropriate relevant points should be chosen so as to retain the object
features and reduce the storage space and calculation costs.
Keywords:
point simplification, discrete shape operator, feature extraction, curvature,
torsion.
Title of the Paper: Design
of UML Models and their Simulation using ARENA
DOWNLOAD
FULL PDF
Authors: Artis Teilans,
Arnis Kleins, Yuri Merkuryev, Andris Grinbergs
Abstract: While developing new business systems and reengineering already
existing ones, many organizations use the Unified Modelling Language (UML) to
design a system’s structure and describe system’s behaviour. In spite of
describing system’s behaviour with the UML model, the model itself is static.
UML does not provide a possibility of running the model and studying the
system’s behaviour. In such a situation the necessity arises to simulate the
UML model. To provide that possibility, the designed UML diagrams could be
transformed into a simulation model to be run within a specialized simulation
environment. The paper discusses a transformation of that kind using the
Arena simulation environment. In order to design UML models, a meta-modelling
approach is explored.
Keywords:
Simulation, Arena, UML modelling, transformation of models, meta-model
Title of the Paper: Applying
Mathematical Programming Elements to Answer Market Needs: Case Studies of
Optimization of Electrical Power Flow
DOWNLOAD
FULL PDF
Authors: Emerson
Eustaquio Costa, Luiz Danilo Barbosa Terra, George Leal Jamil
Abstract: This paper seeks to investigate the application of mathematical
programming, considering it as a tool for optimal electrical power generation
and management. Nowadays, observing signals of crisis in various countries,
electrical power emerges not only as a commodity but as a valuable, renewable
and sometimes rare resource. Modeling and studying electrical power systems
with application of mathematical programming can produce alternatives for
optimal management of resources and allow better consumer satisfaction,
impacting positively as a typical marketing indicator.
Keywords:
Mathematical Programming; Linear Programming; Energy flow in electrical
energy networks and markets; Optimum Power Flow DC; Marketing theory.
Issue 2, Volume 3, February 2008
Title of the Paper: Guided
Waves Damage Identification in Beams with Test Pattern Dependent Series
Neural Network Systems
DOWNLOAD
FULL PDF
Authors: C. K. Liew, M.
Veidt
Abstract: In regression neural networks for pattern recognition of
preprocessed guided waves signals in beams, a trained network produced large
errors when identifying a test pattern not found in the training set. To
improve the accuracy of results, a new neural network procedure was
introduced where progressive training was performed in a series combined
network with the integration of a weight-range selection (WRS) technique that
was dependent on the test pattern. The WRS method was applied for a supervised
multi-layer perceptron operating with one hidden layer of neurons and trained
using a backpropagation algorithm. The system was able to achieve average
predictions accurate to 2.5% and 7.8% of the original training range sizes
for the damage location and depth, respectively, while the WRS provided up to
13.9% improvement compared to equivalent conventional neural networks.
Keywords:
multi-layer perceptron, combined neural networks, generalization, ultrasonic
guided waves, quantitative nondestructive evaluation, structural health
monitoring
Title of the Paper: Pseudo-Random
Sequence Generators based on Cellular Automata and Bent Functions
DOWNLOAD
FULL PDF
Authors: Francisco J.
Garcai, Veronica Requena, Virtudes Tomas
Abstract: In this article we construct different pseudo-random sequences
using cellular automata where the local transition functions are based on
balanced functions which are obtained from bent functions.
Keywords:
Pseudo-random sequence, cellular automata, bent function, balanced function.
Title of the Paper: Robust
Romanian Language Automatic Speech Recognizer Based on Multistyle Training
DOWNLOAD
FULL PDF
Authors: Doru-Petru
Munteanu, Constantin-Iulian Vizitiu
Abstract: This paper presents solutions for increasing environmental
robustness of a Romanian language continuous speech recognizer, previously
developed. All state-of-the-art automatic speech recognizers (ASR) are
data-driven and rely heavily on huge speech data for estimating the model
parameters. Most of the available speech corpora used for this training phase
contain clean speech recorded in low noise and reverberation free
environments with high quality audio equipment. However, in real-world ASR
are facing various acoustic conditions, speech signal being degraded by
noise, reverberations, convolution distortions, etc. The acoustic mismatches
between the training conditions and testing conditions are the main cause of
ASR performance degradation. For instance, the word error rate may be an
order of magnitude higher in an office environment than in a clean laboratory
environment. There are a lot of methods and techniques aiming to keep the ASR
performances at an acceptable in various acoustic conditions. In this paper
we are presenting a special strategy called multistyle training for building
a robust Romanian language ASR system. The method is based on training the
recognizer with degraded speech signal obtained by adding to clean speech
various levels artificial noise. Experimental results presented, prove that
this scheme strongly increase the system robustness to additive noise. The
system architecture based on context-dependent HMM phonemes is also described
in detail.
Keywords:
continuous speech recognition, environmental robustness, multistyle training,
context dependent models, hidden Markov models
Issue 3, Volume 3, March 2008
Title of the Paper: Algorithms
for Data Warehouse Design to Enhance Decision-Making
DOWNLOAD
FULL PDF
Authors: Ziyati Elhoussaine,
Driss Aboutajdine, El Qadi Abderrahim
Abstract: On-line analytical processing (OLAP) queries are strongly affected
by the amount data needed to be accessed from the disk. Therefore, there is a
need to employ techniques that can facilitate efficient execution of these
queries. There has been a lot of work to optimize the performance of
relational data warehouses. Among the two fragmentation techniques, vertical
fragmentation is often considered more complicated than horizontal, it nearly
impossible to obtain an optimal solution. Data partitioning concept that has
been studied in the context of relational databases aims to reduce query
execution time and facilitate the parallel execution of queries. In this
paper, we develop a new framework based on genetic algorithm for applying the
partitioning technique on relational DW schema (star schema) to minimize the
total query execution cost. We develop an analytical cost model for executing
a set of OLAP queries on a partitioned star schema. We conduct experiments to
evaluate the utility of partitioning in efficiently executing OLAP queries.
Finally, we show how partitioning can be used to facilitate parallel
execution of OLAP queries.
Keywords:
Partitioning, warehouse, OLAP queries, Genetic algorithm, penalty function,
query optimization.
Title of the Paper: Online
Signature Slant Feature Identification Algorithm
DOWNLOAD
FULL PDF
Authors: Mohd Razif
Shamsuddin, Azlinah Mohamed
Abstract: According to the American National Science and Technology Council
(NSTC), the first signature recognition system was developed in 1965. Then
the research continued in 1970 focusing on the potential of geometric
characteristic of a signature rather than dynamic characteristic. Nowadays,
signature is a commonly used identification procedure. Everyone would be
required having a signature for authorization and other important tasks that
needs identification. Thus, signature has become one of a method to represent
its writer uniquely. Signature has many hidden features that are difficult to
extract. Some of the identified features that a signature should have are
slanting, baseline, proportion and size. This paper covers the area of
signature slant identification. Signatures are captured using a tablet and
saved in a digitized format of x and y values. Then it is filtered and
calculated for its angle and degree. In the end the signature will be
classified to its slant category. A slant algorithm is created and coded into
a functional system. An experiment consisting of 50 signatures are tested and
the finding shows the angle and degree of the slant in every signature. The result
is then tested for its accuracy with an available 10 sample of created
proofed signatures. The result shows a favorable accuracy of 80% correct
slant identification. The creation of this algorithm would be able to give
some degree of contribution in the area of signature recognition.
Keywords:
Slant, Slant Recognition, Signature Recognition, Online Signature, Curved
Stroke, Curved Slant
Title of the Paper: Hardware
IP for Scheduling of Periodic tasks in Multiprocessor Systems
DOWNLOAD
FULL PDF
Authors: Habibullah
Jamal, Zeeshan A. Khan
Abstract: The article presents an Intellectual Property (IP) for scheduling
of multiprocessor systems that is designed using FPGA. The purpose of the IP
is to minimize the processor time for scheduling activity by implementing the
functionality in hardware. The algorithm implemented clusters the similar
tasks on the same processor. Processors not in use are switched to power
saving mode and they are only turned on if there is no other processor to take
on the required activity.
Keywords:
FPGA, Hardware scheduler, multiprocessor systems, real-time systems,
scheduling algorithm.
Title of the Paper: Protocol
– Based With Feature Selection in Intrusion Detection
DOWNLOAD
FULL PDF
Authors: Kun-Ming Yu,
Ming-Feng Wu, Wai-Tak Wong
Abstract: A lightweight network intrusion detection system is more efficient
and effective for real world requirements. Higher performance may result if
insignificant and/or useless features are eliminated, so choice a well
feature selection method is important. Logistic Regression is one of powerful
feature selection method. In this study, protocol type and Logistic
Regression were used to pick up the feature sets and build different protocol
detection model which can get surmount performance than the full feature
using a Support Vector Machine. Evaluation was done over a benchmark dataset
used KDD CUP'99. In terms of time efficiency, the proposed method performs
more than seven times better than other feature selection methods.
Keywords:
Intrusion detection, Logistic Regression, Protocol, Support Vector Machine
Title of the Paper: Application
of Self Organizing Map Approach to Partial Discharge Pattern Recognition of
Cast-Resin Current Transformers
DOWNLOAD
FULL PDF
Authors: Wen-Yeau Chang, Hong-Tzer Yang
Abstract: Partial discharge (PD) measurement and recognition is a significant
tool for potential failure diagnosis of a power transformer. This paper
proposes the application of self organizing map (SOM) approach to recognize
partial discharge patterns of cast-resin current transformer (CRCT). The PD
patterns are measured by using a commercial PD detector. A set of features,
used as operators, for each PD pattern is extracted through statistical
schemes. The proposed SOM classifier has the advantages of high robustness to
ambiguous patterns and is useful in recognizing the PD patterns of electrical
transformers. To verify the effectiveness of the proposed method, the
classifier was verified on 250 sets of field-test PD patterns of CRCTs. The
test results show that the proposed approach may achieve quite satisfactory
recognition of PD patterns.
Keywords:
Cast-resin current transformer, Partial discharge, Pattern recognition, Self
organizing map
Title of the Paper: Efficient
Iris Recognition Scheme Based on Difference of Filters
DOWNLOAD
FULL PDF
Authors: G. S. El
-Taweel, A. K. Helmy
Abstract: With a growing emphasis on human identification, iris recognition has
recently received increasing attention. In this paper, an efficient biometric
scheme for iris recognition system with high performance is introduced.
First, the irises are localized using an effective integral differential
operator. Then the localized iris image is normalized to handle different
size, variation in illumination and pupil dilation. Finally, we propose a
novel and efficient approach to iris feature extraction using a set of
filters, called difference-of-sum filters .These filters can take advantage
of a pre-computed integral image, which makes the filtering process take
constant computation time no matter how big the filters are. Experimental
evaluation shows that the new method has higher recognition accuracy and is
faster than previous methods. The false acceptance rate was reduced by 7% in
comparison with the iris code method.
Keywords:
Biometrics, Iris normalization, Iris localization, Iris Recognition, Feature
Extraction, Difference of Sum Filters.
Title of the Paper: How
Magnification of the Root-Mean-Square Deviation (RMSD) Value Affects the
Convergence Speed of Hopfield Neural Network Classifier
DOWNLOAD
FULL PDF
Authors: Rachid Sammouda
Abstract: The Root Mean Square-Deviation (RMSD) or Root Mean Square Error
(RMSE) is the frequently used measure of the difference between values
predicted by a model or an estimator and the values actually observed from
that which is being modelled or estimated. In this paper, we show that the
magnification of the RMSE, when used with the classifier Hopfield Neural
Network (HNN), may help the network to converge earlier to the same optima
reached using the simple RMSE. The segmentation problem of liver pathological
images is formulated in energy function as a magnified sum of all neurons’
deviations from their actual clusters, and HNN iterates with respect to the
winner-takes-all rule in order to minimize the energy function to a local
optimum close to the global one. Twenty liver color images were used in this
study. Their segmentation results with their corresponding quantitative
analysis show that our approach makes the results more reliable for use as
input data to a computer aided diagnosis of liver cancer.
Keywords:
Hopfield Neural Network, Optimization, Mean-Square-Error, Magnification,
Segmentation, pathological liver color image
Title of the Paper: Partial
Discharge Pattern Recognition of Cast-Resin Current Transformers Using Fuzzy
C-Means Clustering Approach
DOWNLOAD
FULL PDF
Authors: Wen-Yeau Chang, Hong-Tzer Yang
Abstract: Partial discharge (PD) measurement and recognition is a significant
tool for potential failure diagnosis of the high-voltage equipment. This
paper proposes the application of fuzzy c-means (FCM) clustering approach to
recognize partial discharge patterns of cast-resin current transformer
(CRCT). The PD patterns are measured by using a commercial PD detector. A set
of features, used as operators, for each PD pattern is extracted through
statistical schemes. The significant features of PD patterns are extracted by
using the nonlinear principal component analysis (NLPCA) method. The proposed
FCM classifier has the advantages of high robustness and effectiveness to
ambiguous patterns and is useful in recognizing the PD patterns of the
high-voltage equipment. To verify the effectiveness of the proposed method,
the classifier was verified on 250 sets of field-test PD patterns of CRCTs.
The test results show that the proposed approach may achieve quite
satisfactory recognition of PD patterns.
Keywords:
Cast-Resin Current Transformer, Partial Discharge, Pattern Recognition, Fuzzy
C-Means Clustering, Nonlinear Principal Component Analysis
Title of the Paper: The
use of NARX Neural Networks to predict Chaotic Time Series
DOWNLOAD
FULL PDF
Authors: Eugen
Diaconescu
Abstract: The prediction of chaotic time series with neural networks is a
traditional practical problem of dynamic systems. This paper is not intended
for proposing a new model or a new methodology, but to study carefully and
thoroughly several aspects of a model on which there are no enough
communicated experimental data, as well as to derive conclusions that would
be of interest. The recurrent neural networks (RNN) models are not only important
for the forecasting of time series but also generally for the control of the
dynamical system. A RNN with a sufficiently large number of neurons is a
nonlinear autoregressive and moving average (NARMA) model, with “moving
average” referring to the inputs. The prediction can be assimilated to
identification of dynamic process. An architectural approach of RNN with
embedded memory, “Nonlinear Autoregressive model process with eXogenous
input” (NARX), showing promising qualities for dynamic system applications,
is analyzed in this paper. The performances of the NARX model are verified
for several types of chaotic or fractal time series applied as input for
neural network, in relation with the number of neurons, the training
algorithms and the dimensions of his embedded memory. In addition, this work
has attempted to identify a way to use the classic statistical methodologies
(R/S Rescaled Range analysis and Hurst exponent) to obtain new methods of
improving the process efficiency of the prediction chaotic time series with
NARX.
Keywords:
Chaotic Time Series, Hurst Exponent, Prediction, Recurrent Neural Networks,
NARX Model
Issue 4, Volume 3, April 2008
Title of the Paper: Principal
Component Analysis Based on Wavelet Characteristics Applied to Automated
Surface Defect Inspection
DOWNLOAD
FULL PDF
Authors: Hong-Dar Lin,
Chung Yu Chung, Wan-Ting Lin
Abstract: Automated visual inspection, a crucial manufacturing step, has been
replacing the more time-consuming and less accurate human inspection. This
research explores automated visual inspection of surface defects in a
light-emitting diode (LED) chip. Commonly found on chip surface are
water-spot blemishes which impair the appearance and functionality of LEDs.
Automated inspection of water-spot defects is difficult because they have a semi-opaque
appearance and a low intensity contrast with the rough exterior of the LED
chip. Moreover, the defect may fall across two different background textures,
which further increases detection difficulties. The one-level Haar wavelet
transform is first used to decompose a chip image and extract four wavelet
characteristics. Then, wavelet-based principal component analysis (WPCA) and
Hotelling statistic (WHS) approaches are respectively applied to integrate
the multiple wavelet characteristics. Finally, the principal component
analysis of WPCA and the Hotelling control limit of WHS individually judge
the existence of defects. Experimental results show that the proposed WPCA
method achieves detection rates of above 93.8% and false alarm rates of below
3.6%, and outperforms other methods. A valid computer-aided visual defect
inspection system is contributed to help meet the quality control needs of
LED chip manufacturers.
Keywords:
Surface defect inspection, Wavelet characteristics, Principal component analysis,
Hotelling statistic, Machine vision system.
Title of the Paper: A
Web-Based Metadata Schema Repository
DOWNLOAD
FULL PDF
Authors: Yen-Chun Lin,
Hsiang-An Wang, Chien-Chung Huang, Wei Chen
Abstract: The metadata schema of a digital archive describes the structure
and attributes of metadata. Analysis and definition of metadata schema for a
new digital archive must be carefully carried out and determined at the first
stage of development. To ease the task, we used an Extensible Markup Language
(XML) structure to represent the metadata schema, and then designed and
implemented a metadata schema repository to store metadata schemas as XML
documents in a native XML database. The metadata schema repository supports
storage, creation, search, and access management of metadata schemas. A user
can access the repository through a Web browser. With this repository,
projects and organizations can share their metadata schemas over the
Internet. Since the metadata schema must be displayed on a Web browser, we
also present the method of translating the XML representation of metadata
schema into the HyperText Markup Language document.
Keywords:
Digital archive, Extensible Markup Language, HyperText Markup Language,
Metadata schema repository, Native XML database, Web-based
Title of the Paper: Parallel
Prefix Algorithms on the Multicomputer
DOWNLOAD
FULL PDF
Authors: Li-Ling Hung, Yen-Chun Lin
Abstract: A family of computation-efficient parallel prefix algorithms for
message-passing multicomputers are presented. The family generalizes a
previous algorithm that uses only half-duplex communications, and thus can
improve the running time. Several properties of the family are derived,
including the number of computation steps, the number of communication steps,
and the condition for effective use of the family. The family can adopt collective
communication operations to reduce the communication time, and thus becomes a
second family of algorithms. These algorithms provide the flexibility of
choosing either less computation time or less communication time, depending
on the characteristics of the target machine, to achieve the minimal running
time.
Keywords:
Computation-efficient, Cost optimality, Half-duplex, Message-passing
multicomputers, Parallel algorithms, Prefix computation
Title of the Paper: ALRP:
Scalability Study of Ant based Local repair Routing Protocol for Mobile Adhoc
Networks
DOWNLOAD
FULL PDF
Authors: Siva
Kumar D., Bhuvaneswaran R. S.
Abstract: A mobile ad hoc network is a dynamic mobile wireless network that
can be formed without the need for any pre-existing wired or wireless
infrastructure. One of the main challenges in an ad hoc network is the design
of robust routing algorithms that adapt to the frequent and randomly changing
network topology. So there is a great need for a new routing protocol that
have low routing message overhead to enhance the performance of MANET. The
reduction of routing message overhead will decrease the wasted portions of
bandwidth that used for exchange routing messages between nodes, and increase
the bandwidth available for transferring data, which in turn increases the
network throughput and decreases the latency. This paper proposes a new ant
agent based Local repair routing protocol (ALRP) that decreases both of the
routing message overhead and the average end to end delay by on average 28%,
14% respectively less than the well known AODV routing protocol. This led to
increase the throughput by 24% more than AODV routing protocol.
Keywords:
Ad-hoc, AODV, Local Repair, MANET, On demand ant based Multi agent routing
and ALRP
Title of the Paper: A
Hybrid Model of Mathematical Programming and Analytic Hierarchy Process for
the GISMR: The Industrial Localization
DOWNLOAD
FULL PDF
Authors: T. Agouti,
Md. Eladnani, A. Tikniouine, A. Aitouahman
Abstract: One of the major questions which arise for the decision makers is
the localization choice of places of their establishment related to the
constraint of the space, social, economic and policy difference between the
places of production and those of consumption. This question is related to
the diversity of the criteria integrated in the decision-making, and to the
very great number of possible space alternatives. We propose in this article
an approach of aid to the industrial localization decision by profiting from
the advantages offered by the geographical information systems to multiple
representation compounds to the AHP method and from the advantages of the
mathematical programming models. The use of a GISMR combined with AHP will
help us to reduce the number of the space alternatives and to evaluate them according
to real criteria of decision which are quantitative or qualitative. The
evaluations obtained will be integrated in a mathematical model to make the
final choice of the best alternatives. In fact this model is used to identify
the best solution taking into account the criteria fixed by the
decision-maker and the data provisions generated by the GISMR.
Keywords:
Geographical Information Systems to Multiple Representation (GISMR),
Multi-Criteria Decision Analysis (MCDA), Analytic Hierarchy Process (AHP),
Mathematical Programming (MP), Industrial localization.
Title of the Paper: Copyright
Protection Protocols for Copyright Protection Issues
DOWNLOAD
FULL PDF
Authors: Yamuna
Govindharajan, Sivakumar Dakshinamurthi
Abstract: With the pervasiveness of internet, businesses online have become
ubiquitous. The proposed concept is a solution with a specific focus on
preventing disputes that comes out of ownership claims through buying and
selling digital documents. The concept proposed offers a dependable
watermarking method that can help authenticate sellers and buyers of digital
documents. The important issues of copyright protection such as buyer-owner
identification, copyright infringement, and ownership verification are
addressed. Embedding the owners’ and buyers’ identities through watermarks
and provisions for revealing the same as proof to substantiate the ownership
rights of buyer over the digital document, will serve as a solution for
issues arising out of buyer owner identification. To solve copyright
infringement issues, the concept offers necessities that can help the owner
to identify the buyer, from whom the illegal copies of the documents
originated. The provisions to identify the legal owner of the digital
document, can settle controversies regarding multiple ownership claims in the
court of law. The usage of DCT-SVD based watermarking and public key
encryption with hash values fortifies the scheme and makes it a fail-safe
method.
Keywords:
Digital Watermarking, Copyright Protection, Copyright Infringement, Multiple
ownership Disputes.
Title of the Paper: Performance
of Wideband Mobile Channel with Perfect Synchronism BPSK vs QPSK DS-CDMA
DOWNLOAD
FULL PDF
Authors: Hamed
Al-Sharari
Abstract: Direct-sequence code-division multiple access (DS-CDMA) is currently
the subject of much research as it is a promising multiple access capability
for third and fourth generations mobile communication systems. The
synchronous DS-CDMA system is well known for eliminating the effects of
multiple access interference (MAI) which limits the capacity and degrades the
BER performance of the system. In this paper, we investigate the bit error
rate (BER) performance of a synchronous DS-CDMA system over a wideband mobile
radio channel. The BER performance is affected by the difference in path
length ΔL and the number of arriving signals N. Furthermore, the effect
of these parameters is examined on the synchronous DS-CDMA system for
different users’ number as well as different processing gain Gp. In this
environment and under the above conditions the performances of the
BPSK(Binary Phase Shift Keying) and the QPSK (Quadrature Phase Shift Keying)
modulations are compared. The promising simulation results showed the
possibility of applying this system to the wideband mobile radio channel.
Keywords:
BPSK, QPSK, Complex, Gain, Wideband , Synchronism, Direct, Sequence, CDMA,
BER.
Title of the Paper: A
Proposal for New Marking Scheme with its Performance Evaluation for IP
Traceback
DOWNLOAD
FULL PDF
Authors: S. Malliga,
A. Tamilarasi
Abstract: Detecting and defeating Denial of Service (DoS) attacks is one of
the hardest security problems on IP networks. Furthermore, spoofing of IP
packets makes it difficult to combat against and fix such attacks. Packet
marking is one of the methods to mitigate the DoS attack that helps traceback
to the true origin of the packets. A hybrid packet marking algorithm, along
with traceback mechanism to find the true origin of the attack traffic is
presented in this study. The router marks the packets with inbound interface
identifier of the router, but the novelty lies on the way it marks the
packets. The stamping based on modulo technique and reverse modulo for the
purpose reconstruction of attack path to traceback to the real source of the
packets are proposed. The experimental measurements on the presented
algorithm ensure that it requires less amount of time to mark and reconstruct
the attack graph. It is also able to trace back to single packet,
nevertheless it requires logging at very few routers and thus incurring
insignificant storage overhead on the routers. The simulation study and the
qualitative comparison with different traceback schemes are also presented to
show the performance of the proposed system.
Keywords:
DoS attacks, Logging, Modulo, Packet marking, Reverse modulo, Spoofing
Title of the Paper: Towards
Building a Semantic Grid for E-Government Applications
DOWNLOAD
FULL PDF
Authors: Wenyu Zhang, Yan Wang
Abstract: Nowadays, there is a growing number of e-government portals and
solutions that provide integrated governmental e-services to the customers
(citizens, enterprises or other public sectors). However, the administration
and interoperability of distributed e-government nodes are faced with
increasing challenges caused by the service-oriented modeling difficulties
and ontological issues in distributed computing, resource integration and
knowledge sharing over heterogeneous computing platforms. To overcome this, a
Semantic Grid infrastructure is presented in this paper for distributed
management of e-government resources across ubiquitous virtual governmental
agencies. An ontology-based service-oriented approach to problem-solving in
e-government is proposed in the Semantic Grid, enabling to provide, in an
open, dynamic, loosely coupled and scalable manner, the service publication,
discovery and reuse for connecting the customers and agencies of e-government
services based on their semantic similarities in terms of problem-solving
capabilities. The operation of the system is demonstrated using Protégé-2000,
a widely accepted ontology modeling tool to validate the implementation of
the proposed approach towards effective ontological maintenance.
Keywords:
CSCW; E-government; Ontology; Semantic Grid; Semantic Web; Service-oriented.
Title of the Paper: Research
on Reconstruction and Simulation of Rail Traffic in an Ancient Township
through 3D Animation
DOWNLOAD
FULL PDF
Authors: Tingsheng
Weng
Abstract: - The Japanese were dedicated to building Huwei into a new
industrial city after the Japan Suger Refining Corp. was established in Huwei
Township, Yunlin County during the Japanese Occupation. Since then, Huwei has
been called the "Sugar Capital". The development of Huwei Sugar
Refinery directly influencedspatial development in Huwei. Currently, the
township structure is facing many changes due to the construction of the
Central Taiwan Science Park (CTSP), Huwei Park, and the future opening of the
Taiwan High Speed Railway and Yunlin Station in 2010. Insufficient traffic
functions and road capacity will impede local development. This study used
aerial photos of the Huwei area as base maps, designed 3D train animation
running along Huwei Sugar Refinery rail lines, and produced 3D designs of
abandoned areas near the refinery and riverbank bicycle paths with ASP.NET.
Rail transport in Huwei can increase traffic capacity and promote the
developments in industry.
Keywords:
Reconstruction of an ancient township, rail service, aerial photos, 3D
animation simulation, Flash, ASP.NET.
Issue 5, Volume 3, May 2008
Title of the Paper:
Self-Calibration using a Particular Motion of Camera
DOWNLOAD
FULL PDF
Authors:
A. Saaidi, A. Halli, H. Tairi, K. Satori
Abstract: In this article, we are interested in the camera self-calibration
from three views of a 3-D scene. The originality of our method resides in the
new technique used to estimate the homography of the plane at infinity by the
minimization of a non-linear cost function that is based on a particular
motion of the camera "translation and small rotation". Our approach also
permits to calculate the camera parameters and the depths of interest points
detected in the images. Experimental results demonstrate the performance of
our algorithms, in term of precision and convergence.
Keywords:
Self-calibration, interest points, matching, homography of the plane at
infinity
Title of the Paper:
Assessing the Needs of CSCL Tool and its Impacts in Malaysian Context
DOWNLOAD
FULL PDF
Authors:
Z. M. Kasirun, S. S. Salim
Abstract: Reviewing on computer-supported collaborative learning (CSCL) tools
revealed that CSCL is important to support collaborative learning (CL)
strategy in school. Existing CSCL applications are mostly research-based and
are not available for use. Through a survey on the needs for CSCL in Malaysia,
it is confirmed that CSCL application is needed but the available one could
not support CL activities. This paper discusses CSCL study in Malaysia,
especially the relationship between user involvement and type of CSCL
application needed. In particular, the CSCL application that could associate
existing knowledge among students to build new knowledge for their better
understanding and problem solving skills. We examine this need and assess its
impact by developing Collaborative Environment for Teaching and Learning
System (CETLs).
Keywords:
Computer-supported collaborative learning, CSCL, collaborative learning
strategy, collaborative learning environment
Title of the Paper:
Reliability and Performance Analysis of New Fault Tolerant Irregular Network
DOWNLOAD
FULL PDF
Authors:
Rita Mahajan, Renu Vig
Abstract: A lot of work and analysis has been done on regular fault-tolerant
MINs but irregular MINS have the inherent concept of favorite memory module
offering lower latency. The multipath nature of these networks provides a
non-blocking operation. This work introduces a new network, named as MFT-2
network, which contributes fault-tolerance by providing dynamic full-access
capability in the presence of faults. MFT-2 network is improvement on
irregular Four Tree network (FT). In case of any fault the system is
reconfigured which operates in a degraded mode owing to the increased latency.
But this approach minimizes the overheads of providing fault-tolerance, both
in terms of cost and performance, during normal operation of the system.
Irregular nature of these networks has reduced latency, improved dynamic
fault-tolerant routing, high reliability and performance. The probabilistic
approach is used to analyze the MINs based on independent request assumptions.
Keywords:
Multistage Interconnection Networks (MIN), Irregular Network, Parallel
Processing, DOT Network, FT (Four-tree network), Reliability
|
|
|